search
HomeTechnology peripheralsAIA new breakthrough was made in the minimum cut problem of undirected graphs, and Google research won the SODA 2024 Best Paper Award

Google blog released new research to solve the minimum cut problem of undirected graphs.

In 1996, American computer scientist David R Karger and other researchers proposed a new approach to the minimum cut problem in the paper "A new approach to the minimum cut problem" The surprisingly random algorithm Karger's algorithm is very important in theoretical computer science and is especially suitable for approximate minimum cut problems on large-scale graphs.

Karger's algorithm can find a minimum cut point in a graph with time O (m log^3n). They call this time nearly linear time, which means Linearly multiplied by a polylog factor.

In a blog just updated by Google, they introduced a previously published paper "Deterministic Near-Linear Time Minimum Cut in Weighted Graphs", and the research obtained ACM-SIAM SODA24 Best Paper Award. The article details a new algorithm that runs in almost linear time (rather than near linear time). This algorithm is deterministic and can reliably find the correct minimum cut. It improves the previous algorithm that may not be guaranteed to be correct or only applicable to Algorithms for simple graphs. Arguably this is the biggest discovery since Karger's famous randomization algorithm.
无向图最小割问题取得新突破,谷歌研究获SODA 2024最佳论文奖
  • Paper address: https://arxiv.org/pdf/2401.05627.pdf
  • Paper Title: Deterministic Near-Linear Time Minimum Cut in Weighted Graphs

Note: The minimum cut problem (often called minimum cut) is about graph connectivity The basic structural question, which generally focuses on what is the simplest way to disconnect the network? In graph theory, the set of edges that can make a network flow graph no longer connected (that is, divided into two subgraphs) by removing all the edges is called a cut of the graph, and the smallest cut on a graph is called a minimum cut.
无向图最小割问题取得新突破,谷歌研究获SODA 2024最佳论文奖
##                                                                                                                                                                                                                                                                     ​A minimal cut of a graph (containing two edges).

Method introduction

Regarding the minimum cut problem, Karger In 1996, he pioneered a nearly linear time random algorithm that can find the minimum cut with a high probability. This work also gave a key insight that there is a smaller graph, which is in All cut sizes are largely preserved.

This finding is useful because slower algorithms can be run using smaller graphs as input, and slower running times (for smaller graphs in terms of size) can still be close to linear with the size of the original (larger) graph.

#In fact, many structural discoveries about the minimum cut problem are carried out along this direction.

Google does this, starting from a graph G with n nodes, and then based on the paper "Randomized Approximation Schemes for Cuts and Flows in Capacitated Graphs" (authored by Benzur The cut-preserving sparsification method proposed by , Karger proved that it is possible to construct a sparse weighted graph G' with fewer edges, and on this graph, the size of almost all cuts is roughly the same as the size of the corresponding cuts in the original graph G.

This concept can be illustrated by the following example: the original graph consists of two complete graphs connected by a single edge, while the sparsified graph has fewer edges, but Edges are weighted more heavily, while the size of all cuts is roughly preserved.

无向图最小割问题取得新突破,谷歌研究获SODA 2024最佳论文奖

To construct this sparser graph, Benzur and Karger adopted the method of independently sampling edges. In this method, each edge in the graph G has a certain probability of being included in the graph G', and its weight in G' will be amplified according to the inverse of the sampling probability (for example, if an edge's original weight is 1 The edge is included with a probability of 10%, then its weight is adjusted to 10). It turns out that this very simple (almost linear time) approach can construct cut-preserving graph sparsifications with a high probability of success.

However, the Karger algorithm is a Monte Carlo algorithm, that is, the output may be incorrect with a small probability, and there is no There are known methods to determine whether the output is correct.

# Therefore, researchers have been working hard to explore ways to solve the open problem of near-linear time deterministic algorithms. Since the construction of cut-preserving graph sparsification is the only stochastic component in Karger's algorithm, one approach is to find a deterministic construction of the sparsification in near-linear time (also called derandomization).

In 2015, Kawarabayashi and Thorup achieved an important milestone - finding a graph for a simple graph (that is, there is at most one edge between each pair of nodes and all edge weights are equal to 1 graph) of a deterministic near-linear time algorithm.

The study leads to a key idea, that is, there is some connection between the minimum cut and another important graph structure (called "low-conductance cut"). This connection was crucial to later derandomizing Karger's algorithm on general edge-weighted graphs, and helped Google derive its new algorithm.

Alignment of minimum cut and low-conductance cut

Conductance of graph cut S Defined as the ratio of the cut size of S to the volume of S (assuming that S is the smaller volume side of the cut and non-empty), where the volume of S is the degree of the node in S.

# A low-conductance cut S intuitively captures the bottleneck in the network, since only a small number of edges (relative to its volume) connect S to the rest of the graph. The conductance of a graph is defined as the minimum conductance for any cut in the graph, and graphs with large conductance (also called extended graphs) are said to be well connected because there are no bottlenecks inside.
无向图最小割问题取得新突破,谷歌研究获SODA 2024最佳论文奖
## This red dotted line indicates that the CUT size is 2, and the smaller side (bottom) volume is 24, so the confptance is 1/12, this It is also the conductance of the graph.

Kawayabarashi and Thorup observed that in simple graphs with large minimum node degrees, any nontrivial (i.e., having at least two nodes on either side ) minimum cut must have low conductance. Based on this observation, if the graph can be partitioned into well-connected clusters, then the partitioning must be consistent with every nontrivial minimal cut, since every cluster must lie exactly on one side of every cut. Then, each cluster is shrunk to a node and a smaller graph is processed where all non-trivial minimum cuts of the original graph are intact.

However, for weighted graphs, the above observation no longer holds, and the same partitioning used in the simple graph case may not be exactly consistent with non-trivial minimum cuts.

As shown in the figure below, Jason Li observed in 2021 that this division is still roughly consistent with non-trivial minimum cuts. In particular, for a non-trivial minimal cut S, there is a cut S' that is similar to S such that S' is consistent with the cluster. Jason Li further observed that this property of partitioning can be exploited to effectively de-randomize the construction of cut-preserving graph sparsity.

无向图最小割问题取得新突破,谷歌研究获SODA 2024最佳论文奖

#The new algorithm designed by Google aims to construct a partition to formulate the use case of minimum cut. The Google study is more precise and faster than the more general, off-the-shelf methods Jason Li used in previous work. The new research optimizes the running time while ensuring accuracy, and finally achieves a near-linear time deterministic algorithm for the minimum cut problem.

Reference link: https://research.google/blog/solving-the-minimum-cut-problem-for-undirected-graphs/

The above is the detailed content of A new breakthrough was made in the minimum cut problem of undirected graphs, and Google research won the SODA 2024 Best Paper Award. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:机器之心. If there is any infringement, please contact admin@php.cn delete
Are You At Risk Of AI Agency Decay? Take The Test To Find OutAre You At Risk Of AI Agency Decay? Take The Test To Find OutApr 21, 2025 am 11:31 AM

This article explores the growing concern of "AI agency decay"—the gradual decline in our ability to think and decide independently. This is especially crucial for business leaders navigating the increasingly automated world while retainin

How to Build an AI Agent from Scratch? - Analytics VidhyaHow to Build an AI Agent from Scratch? - Analytics VidhyaApr 21, 2025 am 11:30 AM

Ever wondered how AI agents like Siri and Alexa work? These intelligent systems are becoming more important in our daily lives. This article introduces the ReAct pattern, a method that enhances AI agents by combining reasoning an

Revisiting The Humanities In The Age Of AIRevisiting The Humanities In The Age Of AIApr 21, 2025 am 11:28 AM

"I think AI tools are changing the learning opportunities for college students. We believe in developing students in core courses, but more and more people also want to get a perspective of computational and statistical thinking," said University of Chicago President Paul Alivisatos in an interview with Deloitte Nitin Mittal at the Davos Forum in January. He believes that people will have to become creators and co-creators of AI, which means that learning and other aspects need to adapt to some major changes. Digital intelligence and critical thinking Professor Alexa Joubin of George Washington University described artificial intelligence as a “heuristic tool” in the humanities and explores how it changes

Understanding LangChain Agent FrameworkUnderstanding LangChain Agent FrameworkApr 21, 2025 am 11:25 AM

LangChain is a powerful toolkit for building sophisticated AI applications. Its agent architecture is particularly noteworthy, allowing developers to create intelligent systems capable of independent reasoning, decision-making, and action. This expl

What are the Radial Basis Functions Neural Networks?What are the Radial Basis Functions Neural Networks?Apr 21, 2025 am 11:13 AM

Radial Basis Function Neural Networks (RBFNNs): A Comprehensive Guide Radial Basis Function Neural Networks (RBFNNs) are a powerful type of neural network architecture that leverages radial basis functions for activation. Their unique structure make

The Meshing Of Minds And Machines Has ArrivedThe Meshing Of Minds And Machines Has ArrivedApr 21, 2025 am 11:11 AM

Brain-computer interfaces (BCIs) directly link the brain to external devices, translating brain impulses into actions without physical movement. This technology utilizes implanted sensors to capture brain signals, converting them into digital comman

Insights on spaCy, Prodigy and Generative AI from Ines MontaniInsights on spaCy, Prodigy and Generative AI from Ines MontaniApr 21, 2025 am 11:01 AM

This "Leading with Data" episode features Ines Montani, co-founder and CEO of Explosion AI, and co-developer of spaCy and Prodigy. Ines offers expert insights into the evolution of these tools, Explosion's unique business model, and the tr

A Guide to Building Agentic RAG Systems with LangGraphA Guide to Building Agentic RAG Systems with LangGraphApr 21, 2025 am 11:00 AM

This article explores Retrieval Augmented Generation (RAG) systems and how AI agents can enhance their capabilities. Traditional RAG systems, while useful for leveraging custom enterprise data, suffer from limitations such as a lack of real-time dat

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.