Skip to main content
Log in

Gallai-Edmonds decomposition as a pruning technique

  • Original Paper
  • Published:
Central European Journal of Operations Research Aims and scope Submit manuscript

Abstract

We introduce a generic propagation mechanism for constraint programming. The method is based on the results of matching theory which is a mature and well-studied subject of graph theory. A first benefit of our new pruning technique comes from the fact that it can be applied on several global constraints whose solution is representable by a matching in a particular graph. In this work we describe a filtering scheme for such a family based on the Gallai-Edmonds Structure Theorem. In a number of important cases our method achieves hyper-arc consistency in polynomial time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. A barrier is a set \(X \subseteq V\) such that the number of odd components of \(G-X\) is equal to \(|X| + \delta (G)\).

References

  • Althaus E, Bockmayr A, Elf M, Kasper T, Jünger M, Mehlhorn K (2002) SCIL-symbolic constraints in integer linear programming. Lecture Notes Comput Sci 2461:75–87

  • Apt KR (2003) Principles of constraint programming. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Beldiceanu N, Carlsson M, Rampon J-X (2012) Global constraint catalog. Technical Report T2012–03, Swedish Institute of Computer Science, October 4

  • Beldiceanu N, Contejean E (1994) Introducing global constraints in CHIP. Math Comput Model 20(12): 97–123

    Google Scholar 

  • Beldiceanu N, Katriel I, Lorca X (2006) Undirected forest constraints. Lecture Notes Comput Sci 3990: 29–43

  • Beldiceanu N, Petit T (2004) Cost evaluation of soft global constraints. Lecture Notes Comput Sci 3011: 80–95

    Google Scholar 

  • Beldiceanu N, Simonis H (2012) A model seeker. Description and detailed results. Update of Technical Report 4C-2012-01, Cork Constraint Computation Centre, University College Cork, 19 May 2012 (unpublished)

  • Berge C (1957) Two theorems in graph theory. Proc Natl Acad Sci USA 43:842–844

    Article  Google Scholar 

  • Cormen TH, Leiserson CE, Rivest RL, Stein C (2001) Introduction to algorithms, 2nd edn. MIT Press, Cambridge, MA

    Google Scholar 

  • Cymer R (2012) Dulmage-Mendelsohn canonical decomposition as a generic pruning technique. Constraints 17(3):234–272

    Article  Google Scholar 

  • Dechter R (2003) Constraint processing. Morgan Kaufmann Publishers, USA

    Google Scholar 

  • Edmonds J (1965) Paths, trees and flowers. Can J Math 17:449–467

    Article  Google Scholar 

  • Gabow HN (1976) An efficient implementation of Edmonds’ algorithm for maximum matching on graphs. J Assoc Comput Mach 23(2):221–234

    Article  Google Scholar 

  • Gabow HN (1983) An efficient reduction technique for degree-constrained subgraph and bidirected network flow problem. In: Proceedings of the 15th annual ACM symposium on theory of computing, New York, pp 448–456

  • Gabow HN (1990) Data structures for weighted matching and nearest common ancestors with linking. In: Proceedings of the 1st annual ACM-SIAM symposium on discrete algorithms, Philadephia, pp 434–443

  • Gabow HN, Tarjan RE (1985) A linear-time algorithm for a special case of disjoint set union. J Comput Syst Sci 30:209–221

    Article  Google Scholar 

  • Gallai T (1963) Kritische Graphen II. Magyar Tudományos Akadémia; Matematikai Kutató Intézetének Közleményei 8:373–395

    Google Scholar 

  • Gallai T (1964) Maximale Systeme unabhängiger Kanten. Magyar Tudományos Akadémia; Matematikai Kutató Intézetének Közleményei 9:401–413

    Google Scholar 

  • Garey MR, Johnson DS (1979) Computers and intractability: a guide to the theory of NP-completeness. Freeman, San Francisco, CA

    Google Scholar 

  • Henz M, Müller T, Thiel S (2004) Global constraints for round robin tournament scheduling. Eur J Oper Res 1(153):92–101

    Google Scholar 

  • Lovász L. (1987) Matching structure and the matching lattice. J Comb Theory (B) 43:187–222

    Google Scholar 

  • Lovász L, Plummer MD (1986) Matching theory. Annals of discrete mathematics (29). North-Holland, Amsterdam

  • Mehlhorn K, Näher S (1999) LEDA: a platform for combinatorial and geometric computing. Cambridge University Press, Cambridge

    Google Scholar 

  • Meijer H, Núñez-Rodríguez Y, Rappaport D (2009) An algorithm for computing simple k-factors. Inf Process Lett 109:620–625

    Article  Google Scholar 

  • Micali S, Vazirani VV (1980) An \(O(\sqrt{|V|}\cdot |E|)\) algorithm for finding maximum matching in general graphs. In: Proceedings of the 21st annual symposium on foundations of computer science, pp 17–27

  • Norman RZ, Rabin MO (1959) An algorithm for a minimum cover of a graph. Proc Am Math Soc 10: 315–319

    Google Scholar 

  • Petersen J (1891) Die Theorie der regulären Graphen. Acta Math 15:193–220

    Google Scholar 

  • Petit T, Régin J-C, Bessière C (2001) Specific filtering algorithms for over-constrained problems. Lecture Notes Comput Sci 2239:451–463

    Google Scholar 

  • Régin J.C. (1999) The symmetric alldiff constraint. In: Proceedings of the 16th international joint conference on artificial intelligence (IJCAI-99), pp 420–425

  • Régin J-C, Petit T, Bessiere C, Puget J-F (2000) An original constraint based approach for solving over constrained problems. Lecture Notes Comput Sci 1894:543–548

    Google Scholar 

  • Tarjan RE (1983) Data structures and network algorithms. SIAM Press, Philadelphia, PA

  • Trick MA (2003) Integer and constraint programming approaches for round-robin tournament scheduling. Lecture Notes Comput Sci 2740:63–77

    Google Scholar 

  • Tsang E (1993) Foundations of constraint satisfaction. Academic Press, New York

    Google Scholar 

  • Tutte WT (1954) A short proof of the factor theorem for finite graphs. Can J Math 6:347–352

    Article  Google Scholar 

  • Tutte WT (1981) Graph factors. Combinatorica 1:79–97

    Article  Google Scholar 

  • van Hoeve W-J (2001) The alldifferent constraint: a survey. In: Proceedings of the 6th annual workshop of the ERCIM working group on constraints, Prague, Czech Republic

  • Vazirani VV (1994) A theory of alternating paths and blossoms for proving correctness of the \(O(\sqrt{|V|}\cdot |E|)\) general graph maximum matching algorithm. Combinatorica 14:71–109

    Article  Google Scholar 

Download references

Acknowledgments

The author would like to thank the referees for many useful suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Radosław Cymer.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Cymer, R. Gallai-Edmonds decomposition as a pruning technique. Cent Eur J Oper Res 23, 149–185 (2015). https://doi.org/10.1007/s10100-013-0309-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10100-013-0309-4

Keywords

Navigation