Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2023 Oct 15:337:81-105.
doi: 10.1016/j.dam.2023.04.019. Epub 2023 May 8.

Factorization and pseudofactorization of weighted graphs

Affiliations

Factorization and pseudofactorization of weighted graphs

Kristin Sheridan et al. Discrete Appl Math. .

Abstract

For unweighted graphs, finding isometric embeddings of a graph G is closely related to decompositions of G into Cartesian products of smaller graphs. When G is isomorphic to a Cartesian graph product, we call the factors of this product a factorization of G. When G is isomorphic to an isometric subgraph of a Cartesian graph product, we call those factors a pseudofactorization of G. Prior work has shown that an unweighted graph's pseudofactorization can be used to generate a canonical isometric embedding into a product of the smallest possible pseudofactors. However, for arbitrary weighted graphs, which represent a richer variety of metric spaces, methods for finding isometric embeddings or determining their existence remain elusive, and indeed pseudofactorization and factorization have not previously been extended to this context. In this work, we address the problem of finding the factorization and pseudofactorization of a weighted graph G, where G satisfies the property that every edge constitutes a shortest path between its endpoints. We term such graphs minimal graphs, noting that every graph can be made minimal by removing edges not affecting its path metric. We generalize pseudofactorization and factorization to minimal graphs and develop new proof techniques that extend the previously proposed algorithms due to Graham and Winkler [Graham and Winkler, '85] and Feder [Feder, '92] for pseudofactorization and factorization of unweighted graphs. We show that any n-vertex, m-edge graph with positive integer edge weights can be factored in O(m2) time, plus the time to find all pairs shortest paths (APSP) distances in a weighted graph, resulting in an overall running time of O(m2+n2 log log n) time. We also show that a pseudofactorization for such a graph can be computed in O(mn) time, plus the time to solve APSP, resulting in an O(mn+n2 log log n) running time.

PubMed Disclaimer

Conflict of interest statement

Declarations of Interest The authors declare that they have no competing interests.

Figures

Figure 1:
Figure 1:
A schematic showing how hypercube embeddings can be used to construct a set of DNA sequences with a particular relationship. a) An unweighted graph representing the desired binding strength relationships between DNA strands. b) A hypercube embedding (equivalent to an assignment of binary strings) of this graph. c-d) Each binary string in the hypercube embedding corresponds to a DNA sequence, by associating 0 and 1 with point mutations within a sequence. When mutations are not adjacent and the pre- and post-mutation bases are chosen carefully, the binding strength between DNA strands is approximately determined by the number of mutations between one strand and the complement of the other. This relationship can be captured in a hypercube or Hamming graph.
Figure 2:
Figure 2:
The graph on the right is the Cartesian product of the graphs on the left. The parent edge of a given edge in the product graph is the edge in a factor that has the same color as it. For example, edges (a,x)(a,y), (b,x)(b,y), and (c,x)(c,y) in the product graph all have edge xy in the second factor as their parent edge. Here, edges of the same color have the same weight.
Figure 3:
Figure 3:
Subfigure (a) shows a non-prime, non-irreducible graph. Subfigure (b) shows the prime factorization of the graph in (a). Subfigure (c) shows the canonical pseudofactorization of the graph in (a).
Figure 4:
Figure 4:
A generalization of pseudofactorization to weighted graphs must be done with care. For example, if pseudofactorization requires only that the input graph is isometrically embeddable into a Cartesian graph product, then even graphs such as K2 have no irreducible pseudofactorization. We require that a graph also be isomorphic to a subgraph of the Cartesian graph product, which precludes this example.
Figure 5:
Figure 5:
An unweighted graph (left) and a minimal weighted graph with the same vertex adjacency (right). Edges that are the same color are members of the same equivalence class under θ*. The graph on the left has two equivalence classes and it is not irreducible, while the graph on the right has only one equivalence class and is irreducible.
Figure 6:
Figure 6:
If uvθvx and uvθvx, then existence of the subgraph depicted here implies that uv and uv satisfy the square property.
Figure 7:
Figure 7:
Illustration of Algorithm 1 on a weighted graph of six nodes. (a) The algorithm first finds the equivalence classes of θ*, shown here with distinct colors. The algorithm then considers the remaining graph when each equivalence class is removed and uses that to construct the final output graphs. In this case, there are three θ* equivalence classes and thus three pseudofactors. (b) This subfigure shows in the first panel the same graph as in (a), in the second panel it shows its irreducible pseudofactorization, and in the third panel it shows Cartesian product of those pseudofactors, of which the original graph is an isometric subgraph.
Figure 8:
Figure 8:
Paths described in the proof of Lemma 3.4. (a) A graph in which uCa has an edge to distinct v, vCb, which the proof of Lemma 3.4 shows is impossible. (b) Definitions of Qa and Qb from the proof when considering uCa, vCb.
Figure 9:
Figure 9:
A visualization of the path constructed in the proof of Theorem 3.9. (a) Each Ci is a connected component in Gk, where Ek is the equivalence class we consider in the theorem. Starting at u, we construct a path Q0 through edges in C0 to x01, which is some vertex in C0 with an edge to C1. We similarly construct Q1 from x11 to x12 and so on. The path Q2Qn2 is the concatenation of the paths through connected components C2 through Cn2. (b) Part of Gk* for the graph in (a). We have πk(u)=q0 and πk(v)=qn, and the path Q*=(q0,q1,,qn) is an arbitrary path from πk(u) to πk(v) through Gk*. The theorem shows that because of how Gk* is constructed, there must exist a path in G like the one shown in (a), where the only edges in Ek are the xj1jxjj and the weight of each xj1jxjj in G is the same weight as qj1qj in Gk*. (c) An example of this process applied to the graph from Figure 7, when considering the green pseudofactor shown on the right. Edge weights are omitted for simplicity. When the graph on the left is isometrically embedded into the product of its pseudofactors (see Figure 7b) with isometric embedding π, πk(u)=q0 and πk(v)=q1. We let Q*=(q0,q1). When constructing Q, we can select Q0 to be (u) (so x01=u) and Q1 to be (x11,v). Alternatively, we could select Q0 to be (u,y01) and Q1 to be (v) (so v=y11). Thus, although existence of the path Q is guaranteed, Q is not necessarily unique.
Figure 10:
Figure 10:
a) A weighted graph G. b) Gθ. c) G with edges colored according to their equivalence class under θ*. Each equivalence class corresponds to a connected component of Gθ. d-f) Analogous illustration for the graph shown in (d).
Figure 11:
Figure 11:
(a) An input graph G. (b) Gθ. (c) G with a spanning tree T (edges not in T are in gray). (d) GθT. The black and gray outlines indicate if each edge is in spanning tree T or not, respectively. The graph is the subgraph of Gθ with only those edges incident to an element of T. (e) For this choice of T, Gθ and GθT produce the same equivalence classes on the edges of G.

References

    1. Antebi Yaron E, Linton James M, Klumpe Heidi, Bintu Bogdan, Gong Mengsha, Su Christina, McCardell Reed, and Elowitz Michael B. Combinatorial signal perception in the BMP pathway. Cell, 170(6):1184–1196, 2017. - PMC - PubMed
    1. Baum Eric B. Building an associative memory vastly larger than the brain. Science, 268(5210):583–585, 1995. - PubMed
    1. Berleant Joseph, Sheridan Kristin, Condon Anne, Williams Virginia Vassilevska, and Bathe Mark. Isometric hamming embeddings of weighted graphs . Discrete Applied Mathematics, 332:119–128, 2023. - PMC - PubMed
    1. Cherry Kevin M and Qian Lulu. Scaling up molecular pattern recognition with DNA-based winner-take-all neural networks. Nature, 559(7714):370–376, 2018. - PubMed
    1. Deza Michel and Laurent Monique. Additional notes. In Graham RL, Korte B, Lovasz Bonn L., Wigderson A, and Ziegler GM, editors, Geometry of Cuts and Metrics, chapter 20.4, pages 308–311. Springer, 1997.

LinkOut - more resources