Skip to main content

Graphs of Bounded Treewidth Can Be Canonized in \(\mbox{{\sf AC}$^1$}\)

  • Conference paper
Computer Science – Theory and Applications (CSR 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6651))

Included in the following conference series:

Abstract

In recent results the complexity of isomorphism testing on graphs of bounded treewidth is improved to \(\mbox{{\sf TC}$^1$}\) [17] and further to \(\mbox{{\sf LogCFL}}\) [11]. The computation of canonical forms or a canonical labeling provides more information than isomorphism testing. Whether canonization is in \(\mbox{{\sf NC}}\) or even \(\mbox{{\sf TC}$^1$}\) was stated as an open question in [18]. Köbler and Verbitsky [20] give a \(\mbox{{\sf TC}$^2$}\) canonical labeling algorithm. We show that a canonical labeling can be computed in \(\mbox{{\sf AC}$^1$}\). This is based on several ideas, e.g. that approximate tree decompositions of logarithmic depth can be obtained in logspace [15], and techniques of Lindells tree canonization algorithm [22]. We define recursively what we call a minimal description which gives with respect to some parameters in a logarithmic number of levels a canonical invariant together with an arrangement of all vertices. From this we compute a canonical labeling.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Arnborg, S., Corneil, D., Proskurowski, A.: Complexity of finding embeddings in a k-tree. SIAM Journal on Algebraic and Discrete Methods 8(2), 277–284 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  2. Arvind, V., Das, B., Köbler, J.: A logspace algorithm for partial 2-tree canonization. In: Hirsch, E.A., Razborov, A.A., Semenov, A., Slissenko, A. (eds.) Computer Science – Theory and Applications. LNCS, vol. 5010, pp. 40–51. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  3. Babai, L., Luks, E.M.: Canonical labeling of graphs. In: 15th Annual ACM Symposium on Theory of Computing (STOC), pp. 171–183 (1983)

    Google Scholar 

  4. Bodlaender, H.L.: NC-algorithms for graphs with small treewidth. In: Proceedings of the 14th International Workshop on Graph-Theoretic Concepts in Computer Science (WG), pp. 1–10 (1989)

    Google Scholar 

  5. Bodlaender, H.L.: Polynomial algorithms for graph isomorphism and chromatic index on partial k-trees. Journal of Algorithms 11, 631–644 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  6. Bodlaender, H.L.: A linear-time algorithm for finding tree-decompositions of small treewidth. SIAM Journal on Computing 25(6), 1305–1317 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  7. Bodlaender, H.L.: A partial k-arboretum of graphs with bounded treewidth. Theoretical Computer Science 209, 1–45 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  8. Bodlaender, H.L., Hagerup, T.: Parallel algorithms with optimal speedup for bounded treewidth. SIAM Journal on Computing 27(6), 1725–1746 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  9. Bodlaender, H.L., Koster, A.M.: Combinatorial optimization on graphs of bounded treewidth. The Computer Journal 51(3), 255–269 (2008)

    Article  Google Scholar 

  10. Chandrasekharan, N., Hedetniemi, S.T.: Fast parallel algorithms for tree decomposition and parsing partial k-trees. In: proceedings of the 26th Annual Allerton Conference on Communication, Control, and Computing, pp. 283–292 (1988)

    Google Scholar 

  11. Das, B., Torán, J., Wagner, F.: Restricted space algorithms for isomorphism on bounded treewidth graphs. In: Proceedings of the 27th International Symposium on Theoretical Aspects of Computer Science, pp. 227–238 (2010)

    Google Scholar 

  12. Datta, S., Limaye, N., Nimbhorkar, P.: 3-connected planar graph isomorphism is in log-space. In: Proceedings of the 28th Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS), pp. 153–162 (2008)

    Google Scholar 

  13. Datta, S., Limaye, N., Nimbhorkar, P., Thierauf, T., Wagner, F.: Planar graph isomorphism is in log-space. In: Annual IEEE Conference on Computational Complexity (CCC), pp. 203–214 (2009)

    Google Scholar 

  14. Datta, S., Nimbhorkar, P., Thierauf, T., Wagner, F.: Isomorphism for K 3,3-free and K 5-free graphs is in log-space. In: Proceedings of the 29th Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS), pp. 145–156 (2009)

    Google Scholar 

  15. Elberfeld, M., Jakoby, A., Tantau, T.: Logspace versions of the theorems of Bodlaender and Courcelle. In: Proceedings of the 51st Annual Symposium on Foundations of Computer Science, FOCS (2010)

    Google Scholar 

  16. Elberfeld, M., Jakoby, A., Tantau, T.: Logspace versions of the theorems of Bodlaender and Courcelle. Technical Report TR10-062, Electronic Colloquium on Computational Complexity, ECCC (2010)

    Google Scholar 

  17. Grohe, M., Verbitsky, O.: Testing graph isomorphism in parallel by playing a game. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4051, pp. 3–14. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  18. Köbler, J.: On graph isomorphism for restricted graph classes. In: Beckmann, A., Berger, U., Löwe, B., Tucker, J.V. (eds.) CiE 2006. LNCS, vol. 3988, pp. 241–256. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  19. Köbler, J., Kuhnert, S.: The isomorphism problem for k-trees is complete for logspace. In: Královič, R., Niwiński, D. (eds.) MFCS 2009. LNCS, vol. 5734, pp. 537–548. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  20. Köbler, J., Verbitsky, O.: From invariants to canonization in parallel. In: Hirsch, E.A., Razborov, A.A., Semenov, A., Slissenko, A. (eds.) Computer Science – Theory and Applications. LNCS, vol. 5010, pp. 216–227. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  21. Lagergren, J.: Efficient parallel algorithms for tree-decomposition and related problems. In: In proceedings of the 31st Annual Symposium on Foundations of Computer Science (FOCS), pp. 173–182 (1990)

    Google Scholar 

  22. Lindell, S.: A logspace algorithm for tree canonization (extended abstract). In: Proceedings of the 24th Annual ACM Symposium on Theory of Computing (STOC), pp. 400–404. ACM, New York (1992)

    Google Scholar 

  23. Luks, E.M.: Permutation groups and polynomial-time computation. DIMACS series in Discrete Mathematics and Theoretical Computer Science 11, 139–175 (1993)

    MathSciNet  MATH  Google Scholar 

  24. Reed, B.A.: Finding approximate separators and computing tree width quickly. In: Proceedings of the 24th Annual ACM Symposium on Theory of Computing (STOC), pp. 221–228 (1992)

    Google Scholar 

  25. Robertson, Seymour: Graph minors. II. algorithmic aspects of tree-width. Journal of Algorithms (ALGORITHMS) 7(3), 309–322 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  26. Wanke, E.: Bounded tree-width and LOGCFL. Journal of Algorithms 16 (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wagner, F. (2011). Graphs of Bounded Treewidth Can Be Canonized in \(\mbox{{\sf AC}$^1$}\) . In: Kulikov, A., Vereshchagin, N. (eds) Computer Science – Theory and Applications. CSR 2011. Lecture Notes in Computer Science, vol 6651. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20712-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20712-9_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20711-2

  • Online ISBN: 978-3-642-20712-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics