2018
DOI: 10.1016/j.dam.2018.01.005
|View full text |Cite
|
Sign up to set email alerts
|

On comparing algorithms for the maximum clique problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Let 𝑝 be a constant, 𝐺 ∼ G(𝑛, 𝑝) and 𝐺 * be obtained from 𝐺 using the construction of Lemma 2 with 𝑁 = |𝑉 (𝐺 * )|. Based on a much stronger result from [Pittel, 1982], [Züge and Carmo, 2018] point out that the number of cliques in 𝐺 is 𝑛 Θ(log 𝑛) with high probability. In contrast, Theorem 3 tells us that the expected number of cliques in 𝐺 * is 𝑁 Θ( 𝑁) .…”
Section: Instances With Exponential Number Of Cliquesmentioning
confidence: 99%
See 3 more Smart Citations
“…Let 𝑝 be a constant, 𝐺 ∼ G(𝑛, 𝑝) and 𝐺 * be obtained from 𝐺 using the construction of Lemma 2 with 𝑁 = |𝑉 (𝐺 * )|. Based on a much stronger result from [Pittel, 1982], [Züge and Carmo, 2018] point out that the number of cliques in 𝐺 is 𝑛 Θ(log 𝑛) with high probability. In contrast, Theorem 3 tells us that the expected number of cliques in 𝐺 * is 𝑁 Θ( 𝑁) .…”
Section: Instances With Exponential Number Of Cliquesmentioning
confidence: 99%
“…The experimental results reported in all these cases seem surprising in the light of the theoretical results mentioned above. This apparent contradiction was investigated in [Züge and Carmo, 2018], which shows that branch and bound algorithms for MC have quasi-polynomial average running time (under G(𝑛, 𝑝)for fixed 𝑝.) This leaves open the question of whether these (and other) algorithms do have subexponential running time in the worst case or not.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Linear programming and mixed integer programming approaches are applicable and such models are presented in [3,[64][65][66]. There are also approaches based on deterministic methods such as branch and bound [67][68][69][70]. The exact algorithms, expressed as codes in programming languages, are described in [44,[71][72][73].…”
Section: Introductionmentioning
confidence: 99%