Lower bounds for graph reconstruction with maximal independent set queries (2404.03472v1)
Abstract: We investigate the number of maximal independent set queries required to reconstruct the edges of a hidden graph. We show that randomised adaptive algorithms need at least $\Omega(\Delta2 \log(n / \Delta) / \log \Delta)$ queries to reconstruct $n$-vertex graphs of maximum degree $\Delta$ with success probability at least $1/2$, and we further improve this lower bound to $\Omega(\Delta2 \log(n / \Delta))$ for randomised non-adaptive algorithms. We also prove that deterministic non-adaptive algorithms require at least $\Omega(\Delta3 \log n / \log \Delta)$ queries. This improves bounds of Konrad, O'Sullivan, and Traistaru, and answers one of their questions. The proof of the lower bound for deterministic non-adaptive algorithms relies on a connection to cover-free families, for which we also improve known bounds.
- Noga Alon and Vera Asodi (2005). Learning a hidden subgraph. SIAM Journal on Discrete Mathematics 18(4), 697–712.
- Ali Z. Abdi and Nader H. Bshouty (2016). Lower bounds for cover-free families. Electronic Journal of Combinatorics 23(2), Paper 2.45, 7.
- Hasan Abasi and Nader H. Bshouty (2019). On learning graphs with edge-detecting queries. Proceedings of the 30th International Conference on Algorithmic Learning Theory, PMLR, vol. 98, 3–30.
- Learning a hidden matching. SIAM Journal on Computing 33(2), 487–501.
- On exact learning monotone DNF from membership queries. Algorithmic learning theory, Lecture Notes in Computer Science, vol. 8776, 111–124.
- Dana Angluin and Jiang Chen (2006). Learning a hidden hypergraph. Journal of Machine Learning Research 7, 2215–2236.
- Dana Angluin and Jiang Chen (2008). Learning a hidden graph using O(logn)𝑂𝑛O(\log n)italic_O ( roman_log italic_n ) queries per edge. Journal of Computer and System Sciences 74(4), 546–556.
- Group testing: an information theory perspective. Foundations and Trends in Communications and Information Theory 15(3-4), 196–392.
- On key storage in secure networks. Journal of Cryptology 8, 189–200.
- Ding-Zhu Du and Frank K. Hwang (2000). Combinatorial group testing and its applications, Series on Applied Mathematics, vol. 12. Second edn. (World Scientific Publishing Co., Inc., River Edge, NJ).
- Ding-Zhu Du and Frank K. Hwang (2006). Pooling designs and nonadaptive group testing, Series on Applied Mathematics, vol. 18 (World Scientific Publishing Co. Pte. Ltd., Hackensack, NJ). Important tools for DNA sequencing.
- A. G. D’yachkov and V. V. Rykov (1982). Bounds on the length of disjunctive codes. Problems of Information Transmission 18(3), 166–171.
- Konrad Engel (1996). Interval packing and covering in the Boolean lattice. Combinatorics, Probability and Computing 5(4), 373–384.
- Uriel Feige (2006). On sums of independent random variables with unbounded variance and estimating the average degree in a graph. SIAM Journal on Computing 35(4), 964–984.
- Zoltán Füredi (1996). On r𝑟ritalic_r-cover-free families. Journal of Combinatorial Theory. Series A 73(1), 172–173.
- Oded Goldreich and Dana Ron (2008). Approximating average parameters of graphs. Random Structures & Algorithms 32(4), 473–493.
- F. K. Hwang and V. T. Sós (1987). Non-adaptive hypergeometric group testing. Studia Scientiarum Mathematicarum Hungarica 22, 257–263.
- Lidiya Khalidah binti Khalil and Christian Konrad (2020). Constructing large matchings via query access to a maximal matching oracle. 40th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, Leibniz International Proceedings in Informatics (LIPIcs), vol. 182, Art. No. 26, 15.
- Maximum matching via maximal matching queries. 40th International Symposium on Theoretical Aspects of Computer Science, Leibniz International Proceedings in Informatics (LIPIcs), vol. 254, Art. No. 41, 22.
- Graph Reconstruction via MIS Queries. arXiv:2401.05845.
- William Kautz and Roy Singleton (1964). Nonrandom binary superimposed codes. IEEE Transactions on Information Theory 10(4), 363–377.
- Chris J. Mitchell and Fred C. Piper (1988). Key storage in secure networks. Discrete Applied Mathematics 21(3), 215–228.
- X. Ma and R. Wei (2004). On a bound of cover-free families. Designs, Codes and Cryptography 32(1-3), 303–321.
- Miklós Ruszinkó (1994). On the upper bound of the size of the r𝑟ritalic_r-cover-free families. Journal of Combinatorial Theory. Series A 66(2), 302–310.
- Secure frameproof codes, key distribution patterns, group testing algorithms and related structures. Journal of Statistical Planning and Inference 86(2), 595–617.
- Generalized cover-free families. Discrete Mathematics 279(1-3), 463–477.
- Some new bounds for cover-free families. Journal of Combinatorial Theory. Series A 90(1), 224–234.
- Ruizhong Wei (2006). On cover-free families. arXiv:2303.17524.
- Lukas Michel (11 papers)
- Alex Scott (148 papers)