In computer science and graph theory, the term color-coding refers to an algorithmic technique which is useful in the discovery of network motifs. For example, it can be used to detect a simple path of length k in a given graph. The traditional color-coding algorithm is probabilistic, but it can be derandomized without much overhead in the running time.
Color-coding also applies to the detection of cycles of a given length, and more generally it applies to the subgraph isomorphism problem (an NP-complete problem), where it yields polynomial time algorithms when the subgraph pattern that it is trying to detect has bounded treewidth.
The color-coding method was proposed and analyzed in 1994 by Noga Alon, Raphael Yuster, and Uri Zwick.[1][2]
Results
editThe following results can be obtained through the method of color-coding:
- For every fixed constant k, if a graph G = (V, E) contains a simple cycle of size k, then such a cycle can be found in:
- expected time, or
- worst-case time, where ω is the exponent of matrix multiplication.[3]
- For every fixed constant k, and every graph G = (V, E) that is in any nontrivial minor-closed graph family (e.g., a planar graph), if G contains a simple cycle of size k, then such cycle can be found in:
- O(V) expected time, or
- O(V log V) worst-case time.
- If a graph G = (V, E) contains a subgraph isomorphic to a bounded treewidth graph which has O(log V) vertices, then such a subgraph can be found in polynomial time.
The method
editTo solve the problem of finding a subgraph in a given graph G = (V, E), where H can be a path, a cycle, or any bounded treewidth graph where , the method of color-coding begins by randomly coloring each vertex of G with colors, and then tries to find a colorful copy of H in colored G. Here, a graph is colorful if every vertex in it is colored with a distinct color. This method works by repeating (1) random coloring a graph and (2) finding colorful copy of the target subgraph, and eventually the target subgraph can be found if the process is repeated a sufficient number of times.
Suppose a copy of H in G becomes colorful with some non-zero probability p. It immediately follows that if the random coloring is repeated 1/p times, then this copy is expected to become colorful once. Note that though p is small, it is shown that if , p is only polynomially small. Suppose again there exists an algorithm such that, given a graph G and a coloring which maps each vertex of G to one of the k colors, it finds a copy of colorful H, if one exists, within some runtime O(r). Then the expected time to find a copy of H in G, if one exists, is .
Sometimes it is also desirable to use a more restricted version of colorfulness. For example, in the context of finding cycles in planar graphs, it is possible to develop an algorithm that finds well-colored cycles. Here, a cycle is well-colored if its vertices are colored by consecutive colors.
Example
editAn example would be finding a simple cycle of length k in graph G = (V, E).
By applying random coloring method, each simple cycle has a probability of to become colorful, since there are ways of coloring the k vertices on the cycle, among which there are colorful occurrences. Then an algorithm (described next) can be used to find colorful cycles in the randomly colored graph G in time , where is the matrix multiplication constant. Therefore, it takes overall time to find a simple cycle of length k in G.
The colorful cycle-finding algorithm works by first finding all pairs of vertices in V that are connected by a simple path of length k − 1, and then checking whether the two vertices in each pair are connected. Given a coloring function c : V → {1, ..., k} to color graph G, enumerate all partitions of the color set {1, ..., k} into two subsets C1, C2 of size each. Note that V can be divided into V1 and V2 accordingly, and let G1 and G2 denote the subgraphs induced by V1 and V2 respectively. Then, recursively find colorful paths of length in each of G1 and G2. Suppose the boolean matrix A1 and A2 represent the connectivity of each pair of vertices in G1 and G2 by a colorful path, respectively, and let B be the matrix describing the adjacency relations between vertices of V1 and those of V2, the boolean product gives all pairs of vertices in V that are connected by a colorful path of length k − 1. Thus, the recursive relation of matrix multiplications is , which yields a runtime of . Although this algorithm finds only the end points of the colorful path, another algorithm by Alon and Naor[4] that finds colorful paths themselves can be incorporated into it.
Derandomization
editThe derandomization of color-coding involves enumerating possible colorings of a graph G, such that the randomness of coloring G is no longer required. For the target subgraph H in G to be discoverable, the enumeration has to include at least one instance where the H is colorful. To achieve this, enumerating a k-perfect family F of hash functions from {1, ..., |V|} to {1, ..., k} is sufficient. By definition, F is k-perfect if for every subset S of {1, ..., |V|} where , there exists a hash function h in F such that h : S → {1, ..., k} is perfect. In other words, there must exist a hash function in F that colors any given k vertices with k distinct colors.
There are several approaches to construct such a k-perfect hash family:
- The best explicit construction is by Moni Naor, Leonard J. Schulman, and Aravind Srinivasan,[5] where a family of size can be obtained. This construction does not require the target subgraph to exist in the original subgraph finding problem.
- Another explicit construction by Jeanette P. Schmidt and Alan Siegel[6] yields a family of size .
- Another construction that appears in the original paper of Noga Alon et al.[2] can be obtained by first building a k-perfect family that maps {1, ..., |V|} to {1, ..., k2}, followed by building another k-perfect family that maps {1, ..., k2} to {1, ..., k}. In the first step, it is possible to construct such a family with 2nlog k random bits that are almost 2log k-wise independent,[7][8] and the sample space needed for generating those random bits can be as small as . In the second step, it has been shown by Jeanette P. Schmidt and Alan Siegel[6] that the size of such k-perfect family can be . Consequently, by composing the k-perfect families from both steps, a k-perfect family of size that maps from {1, ..., |V|} to {1, ..., k} can be obtained.
In the case of derandomizing well-coloring, where each vertex on the subgraph is colored consecutively, a k-perfect family of hash functions from {1, ..., |V|} to {1, ..., k!} is needed. A sufficient k-perfect family which maps from {1, ..., |V|} to {1, ..., kk} can be constructed in a way similar to the approach 3 above (the first step). In particular, it is done by using nklog k random bits that are almost klog k independent, and the size of the resulting k-perfect family will be .
The derandomization of color-coding method can be easily parallelized, yielding efficient NC algorithms.
Applications
editRecently, color-coding has attracted much attention in the field of bioinformatics. One example is the detection of signaling pathways in protein-protein interaction (PPI) networks. Another example is to discover and to count the number of motifs in PPI networks. Studying both signaling pathways and motifs allows a deeper understanding of the similarities and differences of many biological functions, processes, and structures among organisms.
Due to the huge amount of gene data that can be collected, searching for pathways or motifs can be highly time consuming. However, by exploiting the color-coding method, the motifs or signaling pathways with vertices in a network G with n vertices can be found very efficiently in polynomial time. Thus, this enables us to explore more complex or larger structures in PPI networks.
Further reading
edit- Alon, N.; Dao, P.; Hajirasouliha, I.; Hormozdiari, F.; Sahinalp, S. C. (2008). "Biomolecular network motif counting and discovery by color coding". Bioinformatics. 24 (13): i241–i249. doi:10.1093/bioinformatics/btn163. PMC 2718641. PMID 18586721.
- Hüffner, F.; Wernicke, S.; Zichner, T. (2008). "Algorithm Engineering for Color-Coding with Applications to Signaling Pathway Detection". Algorithmica. 52 (2): 114–132. CiteSeerX 10.1.1.68.9469. doi:10.1007/s00453-007-9008-7. S2CID 81069.
References
edit- ^ Alon, N., Yuster, R., and Zwick, U. 1994. Color-coding: a new method for finding simple paths, cycles and other small subgraphs within large graphs. In Proceedings of the Twenty-Sixth Annual ACM Symposium on theory of Computing (Montreal, Quebec, Canada, May 23–25, 1994). STOC '94. ACM, New York, NY, 326–335. DOI= http://doi.acm.org/10.1145/195058.195179
- ^ a b Alon, N., Yuster, R., and Zwick, U. 1995. Color-coding. J. ACM 42, 4 (Jul. 1995), 844–856. DOI= http://doi.acm.org/10.1145/210332.210337
- ^ Coppersmith–Winograd Algorithm
- ^ Alon, N. and Naor, M. 1994 Derandomization, Witnesses for Boolean Matrix Multiplication and Construction of Perfect Hash Functions. Technical Report. UMI Order Number: CS94-11., Weizmann Science Press of Israel.
- ^ Naor, M., Schulman, L. J., and Srinivasan, A. 1995. Splitters and near-optimal derandomization. In Proceedings of the 36th Annual Symposium on Foundations of Computer Science (October 23–25, 1995). FOCS. IEEE Computer Society, Washington, DC, 182.
- ^ a b Schmidt, J. P.; Siegel, A. (1990). "The spatial complexity of oblivious k-probe Hash functions". SIAM J. Comput. 19 (5): 775–786. doi:10.1137/0219054.
- ^ Naor, J. and Naor, M. 1990. Small-bias probability spaces: efficient constructions and applications. In Proceedings of the Twenty-Second Annual ACM Symposium on theory of Computing (Baltimore, Maryland, United States, May 13–17, 1990). H. Ortiz, Ed. STOC '90. ACM, New York, NY, 213-223. DOI= http://doi.acm.org/10.1145/100216.100244
- ^ Alon, N., Goldreich, O., Hastad, J., and Peralta, R. 1990. Simple construction of almost k-wise independent random variables. In Proceedings of the 31st Annual Symposium on Foundations of Computer Science (October 22–24, 1990). SFCS. IEEE Computer Society, Washington, DC, 544-553 vol.2. doi:10.1109/FSCS.1990.89575