Professional Documents
Culture Documents
VC Savage
VC Savage
Carla SAVAGE
Computer Science Department, North Carolina State Unioersity, Raleigh, NC 27650, U.S.A.
Keywords: Vertex cover, depth-first search, approximation algorithms, graph algorithms, combinatorial algorithms
vertex r of V distinguished as the root. For v E V, A vertex cover in T, theq can be found in time
let d(v) denote the distance from v io r. If w E V O(n) by computing a proper matching in T.
and (w, v) E E and d(w) = d(v) + 1, then v is the
father of w and w is the son of v. Every vertex W,
distinct from r, has a father, denoted by f(w).
4. Vertex cover approximation
Vertices w, and w2 are brothers if there is a vertex
v with v = f(w,) = f(w2). We now prove the main result.
Let T = (V, E, r) be a tree rooted at r. If M is a
matching in, T, a vertex v is called free with respect
Theorem 3. Let T be a dfs spanning tree of G with
to M if v is not incident with any edge of M.
NL(T) the set of nonleaves of T and let C(G) be a
Define a proper matching of T to be a matching
minimum cover for G. Then NL(T) is a vertex cover
M c E which satisfies the following property:
for G with ]NL(T)]/]C(G)] e 2.
Let M be a proper matching in the tree T = Since IX] .= n - 2]M(t)] and (L(T)] = n - (NL(T)],
(V, E, r) and let S be the set of ‘sons’ in the edges we have ]NL(T)] < 2]M(T)]. In summary,
of M and F the set of ‘fathers’, that is,
]M(T)] s ]M(G)] G ]C(G)] < INL(T)I G 2]M(T>
S-l (wEV](w,f(w))EM), and thus ]NL(T)]/]C(G)] G 2.
F= (fjw)lwES}.
It can be seen that this bound is tight bY
Any vertex not in S or F is free with respect to M. considering the case in which G is a path of (0 dd
length and the depth-first search is done from a
Theorem 2. The set F is a minimum cover for T. vertex of degree 1.
Note that the string of inequalities
Proof. Since iF] = IM], if F is a vertex cover for T,
it must be miriimum. To show that F is a vertex IM(T)I 6 (M(G)1 g IW)l sG
IWT)l fGW(T)I
cover, let e = (w, v) be an edge of T with f(w) = V. shows that /M(G)]/(M(T)] e 2. This provides a
If w is free, v must be in F, since M is proper. If proof of Theorem 1 which is much simpler than
w E S, then v E F by definition of S and F. Thus the proof appearing in [S].
either w or v must be in F. If T is a dfs spanning tree of G, Theorem 3 can
234
Volume 14, Number 5 INFORMATION PROCESSING LETTERS 23 July 1982
be used to relate the size of a minimum cover of T scheme, more suited to graphs with IM(G)I/JM(T)I
to a minimum cover of G. < 2/k. c;ln be used to obtain a vertex cover for G
within a factor k of the minimum.
Corollary 4. If C(G) is a vertex cover of G and T a It should be mentioned here that Gavril has
dfs spanning tree of G with vertex cover C(T), then noted another technique for approximating a vertex
ICCG)l/lW)l g 2. cover [3]. A maximal matching in G is a matching
N with the property that no edge in G joins two
Proof. Let M(T) be a maximum matching in T and vertices which are free with respect to N. The set
NL(T) the set of nonleaves of T. From the proof E(N) of endpoints of edges in N forms a vertex
of Theorem 3 we have that cover for G and the following inequalities will
hold:
IC(T)l G IC(G)l G INL(T)J 6 2(M(T)] = 2)C(T)I.
The result follows. INI Q IM(G)I Q ICWI QlW)I = 2lNI.
Thus, JE(N)I/IC(G)I d 2. In fact,
Note that this bound is tight. If G = K n for n
odd, then IC(G)l = n - 1. A dfs spanning tree T IEW
-*-*-= lW)l IMW 2
for G would be a path of length n - 1 with IC(T)I = IW)l IMW IN/ l
i(n - 1).
So it also occurs in this approximation technique
that if E(N) is a relatively bad approximation to
C(G), then IC(G)I/IM(G)I is relatively small.
5. Tradeoffs
ratio IC(G)I/!M(G)I must then be relatively small, maximum matching in bipartite graphs, SIAM J. Comput 2
(1973) 225-231.
a property of G which is independent of the choice
(51 C. Savage, Maximum matchings and trees Inform. Prarccr~~
of T among dfs spanning trees. It may be possible Lett. IO (4/S) (1980) 202-205.
to show for some k, 1 < k < 2, that if [6] R.E. I arjan, Depth-first search and linear graph ~l~~~r~t~rn~.
INLtT)I/IC(G)I ’ k, another approximation SIAM J. Comput. I (1972) l46- 160.