Academia.eduAcademia.edu

Graph Automorphism

description212 papers
group3 followers
lightbulbAbout this topic
Graph automorphism is a concept in graph theory that refers to a bijective mapping of a graph's vertices onto itself that preserves the graph's structure, meaning that the adjacency relationships between vertices remain unchanged. This concept is crucial for understanding the symmetries and structural properties of graphs.
lightbulbAbout this topic
Graph automorphism is a concept in graph theory that refers to a bijective mapping of a graph's vertices onto itself that preserves the graph's structure, meaning that the adjacency relationships between vertices remain unchanged. This concept is crucial for understanding the symmetries and structural properties of graphs.

Key research themes

1. How can graph automorphisms be leveraged to improve graph compression methods?

This theme explores the role of graph automorphisms—symmetries within graphs—in identifying redundant structural information that can be exploited for lossless data compression. Detecting global and local graph symmetries enables the representation of graphs more succinctly by encoding automorphisms rather than enumerating all edges explicitly. The significance lies in optimizing storage and querying efficiencies for large-scale structured data where the automorphism-induced redundancies are present.

Key finding: This paper introduces two novel classes of compressible graphs based on automorphisms: symmetry-compressible graphs relying on global symmetries, and near symmetry-compressible graphs incorporating local symmetries to broaden... Read more
Key finding: This study identifies challenges posed by multiple adjacency matrix representations for graphs with duplicate vertex labels, which lead to redundant storage of automorphic graphs in graph databases. The authors propose a fast... Read more
Key finding: The paper proposes utilizing the sequence of eigenvector centrality (EVC) values as a discriminative feature to preliminarily filter out non-isomorphic graph pairs before deploying costlier isomorphism tests. Results on... Read more

2. What algebraic and combinatorial structures underpin graph automorphisms and their extensions in homomorphisms and isomorphism problems?

This theme investigates the algebraic frameworks and complexity classifications related to graph automorphisms, graph homomorphisms (including correspondence and list homomorphisms), and two-fold automorphisms. These studies elucidate how automorphisms interrelate with homomorphism extensions, constrain isomorphism detection, and drive dichotomy results in computational complexity, thereby advancing theoretical understanding of graph symmetry operations and their algorithmic implications.

Key finding: The paper establishes a complexity dichotomy for the novel class of correspondence homomorphism problems to reflexive graphs. It demonstrates that for fixed target graph H, deciding the existence of 'correspondence'... Read more
Key finding: Introducing the concept of two-fold automorphisms—pairs of vertex permutations whose separate action preserves the graph edge set—the paper connects this generalized symmetry to canonical double covers and nontrivial... Read more
Key finding: This work categorizes the 18 morphism-extension classes for countable graphs, defined by extending local homomorphisms, monomorphisms, or isomorphisms to global endomorphisms or automorphisms. It proves various equalities and... Read more

3. How do algebraic structures emerge from graph automorphisms in the context of graph associahedra and related polytopes?

This theme focuses on the algebraic and operadic structures arising from graph automorphisms manifest in convex polytopes associated with graphs, specifically graph associahedra. Through the definition of tubings and substitution operations reflecting automorphism-induced decompositions, researchers establish connections to operads, Hopf algebras, and pre-Lie coalgebras. This bridges topological and algebraic graph theories, elucidating how automorphisms govern combinatorial polytope properties and induce rich algebraic frameworks.

Key finding: The authors provide an algebraic description of graph associahedra by introducing a substitution operation on tubings reflecting connected subgraph decompositions invariant under graph automorphisms. This equips the vector... Read more

All papers in Graph Automorphism

Two vertices of a graph are said to be similar if there exists a graph automorphism mapping one of them into the other. Procedures aiming to separate vertices of a graph into equivalence classes accordingly to their similarities are the... more
We study whether sets inside NP can be reduced to sets with low information content but possibly still high computational complexity. Examples of sets with low information content are tally sets, sparse sets, P-selective sets and... more
The problem of lifting graph automorphisms along covering projections is considered in a purely combinatorial setting. Because of certain natural applications and greater generality, graphs are allowed to have semiedges. This requires... more
A graph is called a semi–regular graph if its automorphism group action on its ordered pair of adjacent vertices is semi–regular. In this paper, a necessary and sufficient condition for an automorphism of the graph Γ to be an automorphism... more
Automatic symmetry detection has received a signican t amount of interest, which has re- sulted in a large number of proposed methods. This paper reports on our experiences while im- plementing the approach of (9). In particular, it... more
In this paper we demonstrate a potential extension of formal verification methodology in order to deal with time-domain properties of analog and mixed-signal circuits whose dynamic behavior is described by differential algebraic... more
The distinguishing number D(G) of a graph is the least integer d such that there is a d-labeling of the vertices of G that is not preserved by any nontrivial automorphism of G. We show that the distinguishing number of the square and... more
The dynamics of disease transmission strongly depends on the properties of the population contact network. Pair-approximation models and individual-based network simulation have been used extensively to model contact networks with... more
Ontology classification—the computation of subsumption hierarchies for classes and properties—is one of the most important tasks for OWL reasoners. Based on the algorithm by Shearer and Horrocks [9], we present a new classification... more
The problem of lifting graph automorphisms along covering projections is considered in a purely combinatorial setting. Because of certain natural applications and greater generality, graphs are allowed to have semiedges. This requires... more
Research in algorithms for Boolean satisfiability and their implementations [23, 6] has recently outpaced benchmarking efforts. Most of the classic DIMACS benchmarks [10] can be solved in seconds on commodity PCs. More recent benchmarks... more
Many symmetry breaking techniques assume that the symmetries of a CSP are given as input in addition to the CSP itself. We present a method that can be used to detect all the symmetries of a CSP. This method constructs a graph that has... more
This paper is motivated by the theory of sequential dynamical systems (SDS), developed as a basis for a mathematical theory of computer simulation. A sequential dynamical system is a collection of symmetric Boolean local update functions,... more
Graph transduction is a popular class of semi-supervised learning techniques, which aims to estimate a classification function defined over a graph of labeled and unlabeled data points. The general idea is to propagate the provided label... more
In computational complexity theory, a function f is called b(n)-enumerable if there exists a polynomial-time function which can restrict the output of f (x) to one of b(n) possible values. This paper investigates #GA, the function which... more
In computational complexity theory, a function f is called b(n)-enumerable if there exists a polynomial-time function which can restrict the output of f (x) to one of b(n) possible values. This paper investigates #GA, the function which... more
Let $G$ be a finite simple graph of order $n$, maximum degree $\Delta$, and minimum degree $\delta$. A compact regularization of $G$ is a $\Delta$-regular graph $H$ of which $G$ is an induced subgraph: $H$ is symmetric if every... more
Ontology classification—the computation of subsumption hierarchies for classes and properties—is one of the most important tasks for OWL reasoners. Based on the algorithm by Shearer and Horrocks [9], we present a new classification... more
Ontology classification—the computation of subsumption hierarchies for classes and properties—is one of the most important tasks for OWL reasoners. Based on the algorithm by Shearer and Horrocks [9], we present a new classification... more
We study whether sets inside NP can be reduced to sets with low information content but possibly still high computational complexity. Examples of sets with low information content are tally sets, sparse sets, P-selective sets and... more
We show that the graph isomorphism problem is low for PP and for C = P, i.e., it does not provide a PP or C = P computation with any additional power when used as an oracle. Furthermore, we show that graph isomorphism belongs to the class... more
This paper is motivated by the theory of sequential dynamical systems (SDS), developed as a basis for a mathematical theory of computer simulation. A sequential dynamical system is a collection of symmetric Boolean local update functions,... more
Boolean satisfiability (SAT) solvers have experienced dramatic improvements in their performance and scalability over the last several years [5, 7] and are now routinely used in diverse EDA applications. Nevertheless, a number of... more
A systematic approach is developed for enumerating congruence classes of 2-cell imbeddings of connected graphs on closed orientable 2-manifolds. The method is applied to the wheel graphs and to the complete graphs. Congruence class genus... more
A systematic approach is developed for enumerating congruence classes of 2-cell imbeddings of connected graphs on closed orientable 2-manifolds. The method is applied to the wheel graphs and to the complete graphs. Congruence class genus... more
This paper reports on an on-going project to investigate techniques to diagnose complex dynamical systems that are modeled as hybrid systems. In particular, we examine continuous systems with embedded supervisory controllers that... more
Contextual ontologies are ontologies that characterize a concept by a set of properties that vary according to context. Contextual ontologies are now crucial for users who intend to exchange information in a domain. Existing ontology... more
We study Facility Location games, where a number of facilities are placed in a metric space based on locations reported by strategic agents. A mechanism maps the agents’ locations to a set of facilities. The agents seek to minimize their... more
In this paper we demonstrate a potential extension of formal verification methodology in order to deal with time-domain properties of analog and mixed-signal circuits whose dynamic behavior is described by differential algebraic... more
Differential Evolution (DE) is generally considered as a reliable, accurate, robust and fast optimization technique. DE has been successfully applied to solve a wide range of numerical optimization problems. However, the user is required... more
We show that the graph isomorphism problem is low for PP and for C = P, i.e., it does not provide a PP or C = P computation with any additional power when used as an oracle. Furthermore, we show that graph isomorphism belongs to the class... more
A novel solution to the problem of virtual craniofacial reconstruction using computer vision, graph theory and geometric constraints is proposed. Virtual craniofacial reconstruction is modeled along the lines of the well-known problem of... more
Cryptography is one of the prime techniques of secured symbolic data transmission over any communication channel. Security is the most challenging and essential aspects in today's internet and network applications. Thus, design of a... more
Download research papers for free!