2005
DOI: 10.1007/11427186_44
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Evaluation of the Greedy and Random Algorithms for Finding Independent Sets in Random Graphs

Abstract: Abstract. This work is motivated by the long-standing open problem of designing a polynomial-time algorithm that with high probability constructs an asymptotically maximum independent set in a random graph. We present the results of an experimental investigation of the comparative performance of several efficient heuristics for constructing maximal independent sets. Among the algorithms that we evaluate are the well known randomized heuristic, the greedy heuristic, and a modification of the latter which breaks… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 14 publications
(14 reference statements)
0
4
0
Order By: Relevance
“…Note that we now cannot obtain the exact independent number if NP ̸ = P. Therefore we develop an algorithm to calculate its theoretical upper bound. The detail of our algorithm is shown in the Appendix (see Algorithm 5), which is modified for the semi-external model from the approach in [13]. In our implementation, for each β value, we generate ten random graphs and compute their optimal bounds with Algorithm 5.…”
Section: Lemma 1 Given a Power Law Graph P (α β) The Expected Numbmentioning
confidence: 99%
See 2 more Smart Citations
“…Note that we now cannot obtain the exact independent number if NP ̸ = P. Therefore we develop an algorithm to calculate its theoretical upper bound. The detail of our algorithm is shown in the Appendix (see Algorithm 5), which is modified for the semi-external model from the approach in [13]. In our implementation, for each β value, we generate ten random graphs and compute their optimal bounds with Algorithm 5.…”
Section: Lemma 1 Given a Power Law Graph P (α β) The Expected Numbmentioning
confidence: 99%
“…Then the algorithm proceeds in three phases: pre-swap (Line 7-14), swap (Line 15-19) and post-swap (Line 20-28). (1) In the pre-swap phase, there are three cases for vertex u: (i) u has conflicted with other swap candidates (Line 9-10); or (ii) there is a new 1-2 swap skeleton for u (Line 11-12); or (iii) there will be a 0-1 swap for u (Line [13][14]. (2) In the swap phase, more vertices are added to the independent set.…”
Section: One-k-swap Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The MNLS graphic model G (n, m, p) can be transformed into the MIS graphic model G(m, p) with m vertices, and each pair of nodes generate an edge with the probability p. For G(m, p), it is known in [13] that, for fixed p, the standard randomized algorithm 3 outputs an independent set of size log 1/(1−p) m, with the probability near 1.…”
Section: Propositionmentioning
confidence: 99%