Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Directed acyclic graph

This is a good article. Click here for more information.
From Wikipedia, the free encyclopedia
Directed graph with no directed cycles

Example of a directed acyclic graph

Inmathematics, particularlygraph theory, andcomputer science, adirected acyclic graph (DAG) is adirected graph with nodirected cycles. That is, it consists ofvertices andedges (also calledarcs), with each edge directed from one vertex to another, such that following those directions will never form a closed loop. A directed graph is a DAG if and only if it can betopologically ordered, by arranging the vertices as a linear ordering that is consistent with all edge directions. DAGs have numerous scientific and computational applications, ranging from biology (evolution, family trees, epidemiology) to information science (citation networks) to computation (scheduling).

Directed acyclic graphs are also calledacyclic directed graphs[1] oracyclic digraphs.[2]

Definitions

[edit]

Agraph is formed byvertices and byedges connecting pairs of vertices, where the vertices can be any kind of object that is connected in pairs by edges. In the case of adirected graph, each edge has an orientation, from one vertex to another vertex. Awalk in a directed graph is a (finite or infinite) sequence(v1,v2,){\displaystyle (v_{1},v_{2},\dotsc )} of vertices such that each consecutive pair(vi,vi+1){\displaystyle (v_{i},v_{i+1})} is connected by a directed edge. Apath is a walk where all vertices are distinct. Acycle is a walk(v1,v2,,vn){\displaystyle (v_{1},v_{2},\dotsc ,v_{n})} where the only repeated vertex isvn=v1{\displaystyle v_{n}=v_{1}}, meaning the last vertex equals the first vertex. A directed acyclic graph is a directed graph that has no cycles.[1][2][3]

Mathematical properties

[edit]

Reachability relation, transitive closure, and transitive reduction

[edit]
A DAG
Its transitive reduction

Thereachability relation of a DAG can be formalized as apartial order on the vertices of the DAG. In this partial order, two verticesu andv are ordered asuv exactly when there exists a directed path fromu tov in the DAG; that is, whenu can reachv (orv is reachable fromu).[4] However, different DAGs may give rise to the same reachability relation and the same partial order.[5] For example, a DAG with two edgesuv andvw has the same reachability relation as the DAG with three edgesuv,vw, anduw. Both of these DAGs produce the same partial order, in which the vertices are ordered asuvw.

Thetransitive closure of a DAG is the graph with the most edges that has the same reachability relation as the DAG. It has an edgeuv for every pair of vertices (u,v) in the reachability relation of the DAG, and may therefore be thought of as a direct translation of the reachability relation into graph-theoretic terms. The same method of translating partial orders into DAGs works more generally: for every finite partially ordered set(S, ≤), the graph that has a vertex for every element ofS and an edge for every pair of elements in is automatically a transitively closed DAG, and has(S, ≤) as its reachability relation. In this way, every finite partially ordered set can be represented as a DAG.

AHasse diagram representing the partial order of set inclusion (⊆) among the subsets of a three-element set

Thetransitive reduction of a DAG is the graph with the fewest edges that has the same reachability relation as the DAG. It has an edgeuv for every pair of vertices (u,v) in thecovering relation of the reachability relation of the DAG. It is a subgraph of the DAG, formed by discarding the edgesuv for which the DAG also contains a longer directed path fromu tov.Like the transitive closure, the transitive reduction is uniquely defined for DAGs. In contrast, for a directed graph that is not acyclic, there can be more than one minimal subgraph with the same reachability relation.[6] Transitive reductions are useful in visualizing the partial orders they represent, because they have fewer edges than other graphs representing the same orders and therefore lead to simplergraph drawings. AHasse diagram of a partial order is a drawing of the transitive reduction in which the orientation of every edge is shown by placing the starting vertex of the edge in a lower position than its ending vertex.[7]

Topological ordering

[edit]
Atopological ordering of a directed acyclic graph: everyedge goes from earlier in the ordering (upper left) to later in the ordering (lower right). A directed graph is acyclic if and only if it has a topological ordering.
Adding the red edges to the blue directed acyclic graph produces another DAG, thetransitive closure of the blue graph. For each red or blue edgeuv,v isreachable fromu: there exists a blue path starting atu and ending atv.

Atopological ordering of a directed graph is an ordering of its vertices into a sequence, such that for every edge the start vertex of the edge occurs earlier in the sequence than the ending vertex of the edge. A graph that has a topological ordering cannot have any cycles, because the edge into the earliest vertex of a cycle would have to be oriented the wrong way. Therefore, every graph with a topological ordering is acyclic. Conversely, every directed acyclic graph has at least one topological ordering. The existence of a topological ordering can therefore be used as an equivalent definition of a directed acyclic graphs: they are exactly the graphs that have topological orderings.[2]In general, this ordering is not unique; a DAG has a unique topological ordering if and only if it has a directed path containing all the vertices, in which case the ordering is the same as the order in which the vertices appear in the path.[8]

The family of topological orderings of a DAG is the same as the family oflinear extensions of the reachability relation for the DAG,[9] so any two graphs representing the same partial order have the same set of topological orders.

Combinatorial enumeration

[edit]

Thegraph enumeration problem of counting directed acyclic graphs was studied byRobinson (1973).[10]The number of DAGs onn labeled vertices, forn = 0, 1, 2, 3, … (without restrictions on the order in which these numbers appear in a topological ordering of the DAG) is

1, 1, 3, 25, 543, 29281, 3781503, … (sequenceA003024 in theOEIS).

These numbers may be computed by therecurrence relation

an=k=1n(1)k1(nk)2k(nk)ank.{\displaystyle a_{n}=\sum _{k=1}^{n}(-1)^{k-1}{n \choose k}2^{k(n-k)}a_{n-k}.}[10]

Eric W. Weisstein conjectured,[11] andMcKay et al. (2004) proved, that the same numbers count the(0,1) matrices for which alleigenvalues are positivereal numbers. The proof isbijective: a matrixA is anadjacency matrix of a DAG if and only ifA + I is a (0,1) matrix with all eigenvalues positive, whereI denotes theidentity matrix. Because a DAG cannot haveself-loops, its adjacency matrix must have a zero diagonal, so addingI preserves the property that all matrix coefficients are 0 or 1.[12]

Related families of graphs

[edit]
Amultitree, a DAG in which the subgraph reachable from any vertex induces an undirected tree (e.g. in red)
Apolytree, a DAG formed by orienting the edges of an undirected tree

Amultitree (also called astrongly unambiguous graph or amangrove) is a DAG in which there is at most one directed path between any two vertices. Equivalently, it is a DAG in which the subgraph reachable from any vertex induces anundirected tree.[13]

Apolytree (also called adirected tree) is a multitree formed by orienting the edges of an undirected tree.[14]

Anarborescence is a polytree formed byorienting the edges of an undirected tree away from a particular vertex, called theroot of the arborescence.

Computational problems

[edit]

Topological sorting and recognition

[edit]
Main article:Topological sorting

Topological sorting is the algorithmic problem of finding a topological ordering of a given DAG. It can be solved inlinear time.[15] Kahn's algorithm for topological sorting builds the vertex ordering directly. It maintains a list of vertices that have no incoming edges from other vertices that have not already been included in the partially constructed topological ordering; initially this list consists of the vertices with no incoming edges at all. Then, it repeatedly adds one vertex from this list to the end of the partially constructed topological ordering, and checks whether its neighbors should be added to the list. The algorithm terminates when all vertices have been processed in this way.[16] Alternatively, a topological ordering may be constructed by reversing apostorder numbering of adepth-first search graph traversal.[15]

It is also possible to check whether a given directed graph is a DAG in linear time, either by attempting to find a topological ordering and then testing for each edge whether the resulting ordering is valid[17] or alternatively, for some topological sorting algorithms, by verifying that the algorithm successfully orders all the vertices without meeting an error condition.[16]

Construction from cyclic graphs

[edit]

Any undirected graph may be made into a DAG by choosing atotal order for its vertices and directing every edge from the earlier endpoint in the order to the later endpoint. The resultingorientation of the edges is called anacyclic orientation. Different total orders may lead to the same acyclic orientation, so ann-vertex graph can have fewer thann! acyclic orientations. The number of acyclic orientations is equal to|χ(−1)|, whereχ is thechromatic polynomial of the given graph.[18]

The yellow directed acyclic graph is thecondensation of the blue directed graph. It is formed bycontracting eachstrongly connected component of the blue graph into a single yellow vertex.

Any directed graph may be made into a DAG by removing afeedback vertex set or afeedback arc set, a set of vertices or edges (respectively) that touches all cycles. However, the smallest such set isNP-hard to find.[19] An arbitrary directed graph may also be transformed into a DAG, called itscondensation, bycontracting each of itsstrongly connected components into a single supervertex.[20] When the graph is already acyclic, its smallest feedback vertex sets and feedback arc sets areempty, and its condensation is the graph itself.

Transitive closure and transitive reduction

[edit]

The transitive closure of a given DAG, withn vertices andm edges, may be constructed in timeO(mn) by using eitherbreadth-first search ordepth-first search to test reachability from each vertex.[21] Alternatively, it can be solved in timeO(nω) whereω < 2.373 is theexponent for matrix multiplication algorithms; this is a theoretical improvement over theO(mn) bound fordense graphs.[22]

In all of these transitive closure algorithms, it is possible to distinguish pairs of vertices that are reachable by at least one path of length two or more from pairs that can only be connected by a length-one path. The transitive reduction consists of the edges that form length-one paths that are the only paths connecting their endpoints. Therefore, the transitive reduction can be constructed in the same asymptotic time bounds as the transitive closure.[23]

Closure problem

[edit]
Main article:Closure problem

Theclosure problem takes as input a vertex-weighted directed acyclic graph and seeks the minimum (or maximum) weight of a closure – a set of verticesC, such that no edges leaveC. The problem may be formulated for directed graphs without the assumption of acyclicity, but with no greater generality, because in this case it is equivalent to the same problem on the condensation of the graph. It may be solved in polynomial time using a reduction to themaximum flow problem.[24]

Path algorithms

[edit]

Some algorithms become simpler when used on DAGs instead of general graphs, based on the principle of topological ordering. For example, it is possible to findshortest paths andlongest paths from a given starting vertex in DAGs in linear time byprocessing the vertices in a topological order, and calculating the path length for each vertex to be the minimum or maximum length obtained via any of its incoming edges.[25] In contrast, for arbitrary graphs the shortest path may require slower algorithms such asDijkstra's algorithm or theBellman–Ford algorithm,[26] and longest paths in arbitrary graphs areNP-hard to find.[27]

Applications

[edit]

Scheduling

[edit]

Directed acyclic graph representations of partial orderings have many applications inscheduling for systems of tasks with ordering constraints.[28]An important class of problems of this type concern collections of objects that need to be updated, such as the cells of aspreadsheet after one of the cells has been changed, or theobject files of a piece of computer software after itssource code has been changed.In this context, adependency graph is a graph that has a vertex for each object to be updated, and an edge connecting two objects whenever one of them needs to be updated earlier than the other. A cycle in this graph is called acircular dependency, and is generally not allowed, because there would be no way to consistently schedule the tasks involved in the cycle.Dependency graphs without circular dependencies form DAGs.[29]

For instance, when one cell of aspreadsheet changes, it is necessary to recalculate the values of other cells that depend directly or indirectly on the changed cell. For this problem, the tasks to be scheduled are the recalculations of the values of individual cells of the spreadsheet. Dependencies arise when an expression in one cell uses a value from another cell. In such a case, the value that is used must be recalculated earlier than the expression that uses it. Topologically ordering the dependency graph, and using this topological order to schedule the cell updates, allows the whole spreadsheet to be updated with only a single evaluation per cell.[30] Similar problems of task ordering arise inmakefiles for program compilation[30] andinstruction scheduling for low-level computer program optimization.[31]

PERT chart for a project with five milestones (labeled 10–50) and six tasks (labeled A–F). There are two critical paths, ADF and BC.

A somewhat different DAG-based formulation of scheduling constraints is used by theprogram evaluation and review technique (PERT), a method for management of large human projects that was one of the first applications of DAGs. In this method, the vertices of a DAG representmilestones of a project rather than specific tasks to be performed. Instead, a task or activity is represented by an edge of a DAG, connecting two milestones that mark the beginning and completion of the task. Each such edge is labeled with an estimate for the amount of time that it will take a team of workers to perform the task. Thelongest path in this DAG represents thecritical path of the project, the one that controls the total time for the project. Individual milestones can be scheduled according to the lengths of the longest paths ending at their vertices.[32]

Data processing networks

[edit]

A directed acyclic graph may be used to represent a network of processing elements. In this representation, data enters a processing element through its incoming edges and leaves the element through its outgoing edges.

For instance, in electronic circuit design, staticcombinational logic blocks can be represented as an acyclic system oflogic gates that computes a function of an input, where the input and output of the function are represented as individualbits. In general, the output of these blocks cannot be used as the input unless it is captured by a register or state element which maintains its acyclic properties.[33] Electronic circuit schematics either on paper or in a database are a form of directed acyclic graphs using instances or components to form a directed reference to a lower level component. Electronic circuits themselves are not necessarily acyclic or directed.

Dataflow programming languages describe systems of operations ondata streams, and the connections between the outputs of some operations and the inputs of others. These languages can be convenient for describing repetitive data processing tasks, in which the same acyclically-connected collection of operations is applied to many data items. They can be executed as aparallel algorithm in which each operation is performed by a parallel process as soon as another set of inputs becomes available to it.[34]

Incompilers, straight line code (that is, sequences of statements without loops or conditional branches) may be represented by a DAG describing the inputs and outputs of each of the arithmetic operations performed within the code. This representation allows the compiler to performcommon subexpression elimination efficiently.[35] At a higher level of code organization, theacyclic dependencies principle states that the dependencies between modules or components of a large software system should form a directed acyclic graph.[36]

Feedforward neural networks are another example.

Causal structures

[edit]
Main article:Bayesian network

Graphs in which vertices represent events occurring at a definite time, and where the edges always point from an earlier time vertex to a later time vertex, are necessarily directed and acyclic. The lack of a cycle follows because the time associated with a vertex always increases as you follow any directedpath in the graph, so you can never return to a vertex on a path. This reflects our natural intuition that causality means events can only affect the future, they never affect the past, and thus we have nocausal loops. An example of this type of directed acyclic graph are those encountered in thecausal set approach to quantum gravity though in this case the graphs considered aretransitively complete. In the version history example below, each version of the software is associated with a unique time, typically the time the version was saved, committed or released. In the citation graph examples below, the documents are published at one time and can only refer to older documents.

Sometimes events are not associated with a specific physical time. Provided that pairs of events have a purely causal relationship, that is edges representcausal relations between the events, we will have a directed acyclic graph.[37] For instance, aBayesian network represents a system of probabilistic events as vertices in a directed acyclic graph, in which the likelihood of an event may be calculated from the likelihoods of its predecessors in the DAG.[38] In this context, themoral graph of a DAG is the undirected graph created by adding an (undirected) edge between all parents of the same vertex (sometimes calledmarrying), and then replacing all directed edges by undirected edges.[39] Another type of graph with a similar causal structure is aninfluence diagram, the vertices of which represent either decisions to be made or unknown information, and the edges of which represent causal influences from one vertex to another.[40] Inepidemiology, for instance, these diagrams are often used to estimate the expected value of different choices for intervention.[41][42]

The converse is also true. That is in any application represented by a directed acyclic graph there is a causal structure, either an explicit order or time in the example or an order which can be derived from graph structure. This follows because all directed acyclic graphs have atopological ordering, i.e. there is at least one way to put the vertices in an order such that all edges point in the same direction along that order.

Genealogy and version history

[edit]
Family tree of thePtolemaic dynasty, with many marriages betweenclose relatives causingpedigree collapse

Family trees may be seen as directed acyclic graphs, with a vertex for each family member and an edge for each parent-child relationship.[43] Despite the name, these graphs are not necessarily trees because of the possibility of marriages between relatives (so a child has a common ancestor on both the mother's and father's side) causingpedigree collapse.[44] The graphs ofmatrilineal descent (mother-daughter relationships) andpatrilineal descent (father-son relationships) are trees within this graph. Because no one can become their own ancestor, family trees are acyclic.[45]

The version history of adistributed revision control system, such asGit, generally has the structure of a directed acyclic graph, in which there is a vertex for each revision and an edge connecting pairs of revisions that were directly derived from each other. These are not trees in general due to merges.[46]

In manyrandomizedalgorithms incomputational geometry, the algorithm maintains ahistory DAG representing the version history of a geometric structure over the course of a sequence of changes to the structure. For instance in arandomized incremental algorithm forDelaunay triangulation, the triangulation changes by replacing one triangle by three smaller triangles when each point is added, and by "flip" operations that replace pairs of triangles by a different pair of triangles. The history DAG for this algorithm has a vertex for each triangle constructed as part of the algorithm, and edges from each triangle to the two or three other triangles that replace it. This structure allowspoint location queries to be answered efficiently: to find the location of a query pointq in the Delaunay triangulation, follow a path in the history DAG, at each step moving to the replacement triangle that containsq. The final triangle reached in this path must be the Delaunay triangle that containsq.[47]

Citation graphs

[edit]

In acitation graph the vertices are documents with a single publication date. The edges represent the citations from the bibliography of one document to other necessarily earlier documents. The classic example comes from the citations between academic papers as pointed out in the 1965 article "Networks of Scientific Papers"[48] byDerek J. de Solla Price who went on to produce the first model of a citation network, thePrice model.[49] In this case thecitation count of a paper is just the in-degree of the corresponding vertex of the citation network. This is an important measure incitation analysis.Court judgements provide another example as judges support their conclusions in one case by recalling other earlier decisions made in previous cases. A final example is provided by patents which must refer to earlierprior art, earlier patents which are relevant to the current patent claim. By taking the special properties of directed acyclic graphs into account, one can analyse citation networks with techniques not available when analysing the general graphs considered in many studies usingnetwork analysis. For instancetransitive reduction gives new insights into the citation distributions found in different applications highlighting clear differences in the mechanisms creating citations networks in different contexts.[50] Another technique ismain path analysis, which traces the citation links and suggests the most significant citation chains in a givencitation graph.

ThePrice model is too simple to be a realistic model of acitation network but it is simple enough to allow for analytic solutions for some of its properties. Many of these can be found by using results derived from the undirected version of thePrice model, theBarabási–Albert model. However, sincePrice's model gives a directed acyclic graph, it is a useful model when looking for analytic calculations of properties unique to directed acyclic graphs. For instance,the length of the longest path, from the n-th node added to the network to the first node in the network, scales as[51]ln(n){\displaystyle \ln(n)}.

Data compression

[edit]

Directed acyclic graphs may also be used as acompact representation of a collection of sequences. In this type of application, one finds a DAG in which the paths form the given sequences. When many of the sequences share the same subsequences, these shared subsequences can be represented by a shared part of the DAG, allowing the representation to use less space than it would take to list out all of the sequences separately. For example, thedirected acyclic word graph is adata structure in computer science formed by a directed acyclic graph with a single source and with edges labeled by letters or symbols; the paths from the source to the sinks in this graph represent a set ofstrings, such as English words.[52] Any set of sequences can be represented as paths in a tree, by forming a tree vertex for every prefix of a sequence and making the parent of one of these vertices represent the sequence with one fewer element; the tree formed in this way for a set of strings is called atrie. A directed acyclic word graph saves space over a trie by allowing paths to diverge and rejoin, so that a set of words with the same possible suffixes can be represented by a single tree vertex.[53]

The same idea of using a DAG to represent a family of paths occurs in thebinary decision diagram,[54][55] a DAG-based data structure for representing binary functions. In a binary decision diagram, each non-sink vertex is labeled by the name of a binary variable, and each sink and each edge is labeled by a 0 or 1. The function value for anytruth assignment to the variables is the value at the sink found by following a path, starting from the single source vertex, that at each non-sink vertex follows the outgoing edge labeled with the value of that vertex's variable. Just as directed acyclic word graphs can be viewed as a compressed form of tries, binary decision diagrams can be viewed as compressed forms ofdecision trees that save space by allowing paths to rejoin when they agree on the results of all remaining decisions.[56]

References

[edit]
  1. ^abThulasiraman, K.; Swamy, M. N. S. (1992), "5.7 Acyclic Directed Graphs",Graphs: Theory and Algorithms, John Wiley and Son, p. 118,ISBN 978-0-471-51356-8.
  2. ^abcBang-Jensen, Jørgen (2008), "2.1 Acyclic Digraphs",Digraphs: Theory, Algorithms and Applications, Springer Monographs in Mathematics (2nd ed.), Springer-Verlag, pp. 32–34,ISBN 978-1-84800-997-4.
  3. ^Christofides, Nicos (1975),Graph theory: an algorithmic approach, Academic Press, pp. 170–174.
  4. ^Kozen, Dexter (1992),The Design and Analysis of Algorithms, Monographs in Computer Science, Springer, p. 9,ISBN 978-0-387-97687-7.
  5. ^Banerjee, Utpal (1993), "Exercise 2(c)",Loop Transformations for Restructuring Compilers: The Foundations, Springer, p. 19,Bibcode:1993ltfr.book.....B,ISBN 978-0-7923-9318-4.
  6. ^Bang-Jensen, Jørgen; Gutin, Gregory Z. (2008), "2.3 Transitive Digraphs, Transitive Closures and Reductions",Digraphs: Theory, Algorithms and Applications, Springer Monographs in Mathematics, Springer, pp. 36–39,ISBN 978-1-84800-998-1.
  7. ^Jungnickel, Dieter (2012),Graphs, Networks and Algorithms, Algorithms and Computation in Mathematics, vol. 5, Springer, pp. 92–93,ISBN 978-3-642-32278-5.
  8. ^Sedgewick, Robert; Wayne, Kevin (2011), "4,2,25 Unique topological ordering",Algorithms (4th ed.), Addison-Wesley, pp. 598–599,ISBN 978-0-13-276256-4.
  9. ^Bender, Edward A.; Williamson, S. Gill (2005), "Example 26 (Linear extensions – topological sorts)",A Short Course in Discrete Mathematics, Dover Books on Computer Science, Courier Dover Publications, p. 142,ISBN 978-0-486-43946-4.
  10. ^abRobinson, R. W. (1973), "Counting labeled acyclic digraphs", inHarary, F. (ed.),New Directions in the Theory of Graphs, Academic Press, pp. 239–273. See alsoHarary, Frank; Palmer, Edgar M. (1973),Graphical Enumeration,Academic Press, p. 19,ISBN 978-0-12-324245-7.
  11. ^Weisstein, Eric W.,"Weisstein's Conjecture",MathWorld{{cite web}}: CS1 maint: overridden setting (link)
  12. ^McKay, B. D.;Royle, G. F.; Wanless, I. M.;Oggier, F. E.;Sloane, N. J. A.;Wilf, H. (2004),"Acyclic digraphs and eigenvalues of (0,1)-matrices",Journal of Integer Sequences,7: 33,arXiv:math/0310423,Bibcode:2004JIntS...7...33M, Article 04.3.3.
  13. ^Furnas, George W.; Zacks, Jeff (1994), "Multitrees: enriching and reusing hierarchical structure",Proc. SIGCHI conference on Human Factors in Computing Systems (CHI '94), pp. 330–336,doi:10.1145/191666.191778,ISBN 978-0897916509,S2CID 18710118.
  14. ^Rebane, George;Pearl, Judea (1987), "The recovery of causal poly-trees from statistical data",Proc. 3rd Annual Conference on Uncertainty in Artificial Intelligence (UAI 1987), Seattle, WA, USA, July 1987(PDF), pp. 222–228.
  15. ^abCormen, Thomas H.;Leiserson, Charles E.;Rivest, Ronald L.;Stein, Clifford (2001) [1990],Introduction to Algorithms (2nd ed.), MIT Press and McGraw-Hill,ISBN 0-262-03293-7{{cite book}}: CS1 maint: overridden setting (link) Section 22.4, Topological sort, pp. 549–552.
  16. ^abJungnickel (2012), pp. 50–51.
  17. ^Fordepth-first search based topological sorting algorithm, this validity check can be interleaved with the topological sorting algorithm itself; see e.g.Skiena, Steven S. (2009),The Algorithm Design Manual, Springer, pp. 179–181,ISBN 978-1-84800-070-4.
  18. ^Stanley, Richard P. (1973),"Acyclic orientations of graphs"(PDF),Discrete Mathematics,5 (2):171–178,doi:10.1016/0012-365X(73)90108-8.
  19. ^Garey, Michael R.;Johnson, David S. (1979),Computers and Intractability: A Guide to the Theory of NP-Completeness, Series of Books in the Mathematical Sciences (1st ed.), New York:W. H. Freeman and Company,ISBN 9780716710455,MR 0519066,OCLC 247570676, Problems GT7 and GT8, pp. 191–192.
  20. ^Harary, Frank; Norman, Robert Z.; Cartwright, Dorwin (1965),Structural Models: An Introduction to the Theory of Directed Graphs, John Wiley & Sons, p. 63.
  21. ^Skiena (2009), p. 495.
  22. ^Skiena (2009), p. 496.
  23. ^Bang-Jensen & Gutin (2008), p. 38.
  24. ^Picard, Jean-Claude (1976), "Maximal closure of a graph and applications to combinatorial problems",Management Science,22 (11):1268–1272,doi:10.1287/mnsc.22.11.1268,MR 0403596.
  25. ^Cormen et al. 2001, Section 24.2, Single-source shortest paths in directed acyclic graphs, pp. 592–595.
  26. ^Cormen et al. 2001, Sections 24.1, The Bellman–Ford algorithm, pp. 588–592, and 24.3, Dijkstra's algorithm, pp. 595–601.
  27. ^Cormen et al. 2001, p. 966.
  28. ^Skiena (2009), p. 469.
  29. ^Al-Mutawa, H. A.; Dietrich, J.; Marsland, S.; McCartin, C. (2014), "On the shape of circular dependencies in Java programs",23rd Australian Software Engineering Conference, IEEE, pp. 48–57,doi:10.1109/ASWEC.2014.15,ISBN 978-1-4799-3149-1,S2CID 17570052.
  30. ^abGross, Jonathan L.; Yellen, Jay;Zhang, Ping (2013),Handbook of Graph Theory (2nd ed.), CRC Press, p. 1181,ISBN 978-1-4398-8018-0.
  31. ^Srikant, Y. N.; Shankar, Priti (2007),The Compiler Design Handbook: Optimizations and Machine Code Generation (2nd ed.), CRC Press, pp. 19–39,ISBN 978-1-4200-4383-9.
  32. ^Wang, John X. (2002),What Every Engineer Should Know About Decision Making Under Uncertainty, CRC Press, p. 160,ISBN 978-0-8247-4373-4.
  33. ^Sapatnekar, Sachin (2004),Timing, Springer, p. 133,ISBN 978-1-4020-7671-8.
  34. ^Dennis, Jack B. (1974), "First version of a data flow procedure language",Programming Symposium, Lecture Notes in Computer Science, vol. 19, pp. 362–376,doi:10.1007/3-540-06859-7_145,ISBN 978-3-540-06859-4.
  35. ^Touati, Sid; de Dinechin, Benoit (2014),Advanced Backend Optimization, John Wiley & Sons, p. 123,ISBN 978-1-118-64894-0.
  36. ^Garland, Jeff; Anthony, Richard (2003),Large-Scale Software Architecture: A Practical Guide using UML, John Wiley & Sons, p. 215,ISBN 9780470856383.
  37. ^Gopnik, Alison;Schulz, Laura (2007),Causal Learning, Oxford University Press, p. 4,ISBN 978-0-19-803928-0.
  38. ^Shmulevich, Ilya; Dougherty, Edward R. (2010),Probabilistic Boolean Networks: The Modeling and Control of Gene Regulatory Networks, Society for Industrial and Applied Mathematics, p. 58,ISBN 978-0-89871-692-4.
  39. ^Cowell, Robert G.;Dawid, A. Philip;Lauritzen, Steffen L.;Spiegelhalter, David J. (1999), "3.2.1 Moralization",Probabilistic Networks and Expert Systems, Springer, pp. 31–33,ISBN 978-0-387-98767-5.
  40. ^Dorf, Richard C. (1998),The Technology Management Handbook, CRC Press, p. 9-7,ISBN 978-0-8493-8577-3.
  41. ^Boslaugh, Sarah (2008),Encyclopedia of Epidemiology, Volume 1, SAGE, p. 255,ISBN 978-1-4129-2816-8.
  42. ^Pearl, Judea (1995),"Causal diagrams for empirical research",Biometrika,82 (4):669–709,doi:10.1093/biomet/82.4.669.
  43. ^Kirkpatrick, Bonnie B. (April 2011), "Haplotypes versus genotypes on pedigrees",Algorithms for Molecular Biology,6 (10) 10,doi:10.1186/1748-7188-6-10,PMC 3102622,PMID 21504603.
  44. ^McGuffin, M. J.; Balakrishnan, R. (2005),"Interactive visualization of genealogical graphs"(PDF),IEEE Symposium on Information Visualization (INFOVIS 2005), pp. 16–23,doi:10.1109/INFVIS.2005.1532124,ISBN 978-0-7803-9464-3,S2CID 15449409.
  45. ^Bender, Michael A.; Pemmasani, Giridhar; Skiena, Steven; Sumazin, Pavel (2001),"Finding least common ancestors in directed acyclic graphs",Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA '01), Philadelphia, PA, USA: Society for Industrial and Applied Mathematics, pp. 845–854,ISBN 978-0-89871-490-6.
  46. ^Bartlang, Udo (2010),Architecture and Methods for Flexible Content Management in Peer-to-Peer Systems, Springer, p. 59,Bibcode:2010aamf.book.....B,ISBN 978-3-8348-9645-2.
  47. ^Pach, János;Sharir, Micha (2008),Combinatorial Geometry and Its Algorithmic Applications: The Alcalá Lectures, Mathematical surveys and monographs, vol. 152, American Mathematical Society, pp. 93–94,ISBN 978-0-8218-7533-9.
  48. ^Price, Derek J. de Solla (July 30, 1965),"Networks of Scientific Papers"(PDF),Science,149 (3683):510–515,Bibcode:1965Sci...149..510D,doi:10.1126/science.149.3683.510,PMID 14325149.
  49. ^Price, Derek J. de Solla (1976), "A general theory of bibliometric and other cumulative advantage processes",Journal of the American Society for Information Science,27 (5):292–306,doi:10.1002/asi.4630270505,S2CID 8536863.
  50. ^Clough, James R.; Gollings, Jamie; Loach, Tamar V.; Evans, Tim S. (2015), "Transitive reduction of citation networks",Journal of Complex Networks,3 (2):189–203,arXiv:1310.8224,doi:10.1093/comnet/cnu039,S2CID 10228152.
  51. ^Evans, T.S.; Calmon, L.; Vasiliauskaite, V. (2020), "The Longest Path in the Price Model",Scientific Reports,10 (1): 10503,arXiv:1903.03667,Bibcode:2020NatSR..1010503E,doi:10.1038/s41598-020-67421-8,PMC 7324613,PMID 32601403
  52. ^Crochemore, Maxime; Vérin, Renaud (1997), "Direct construction of compact directed acyclic word graphs",Combinatorial Pattern Matching, Lecture Notes in Computer Science, vol. 1264, Springer, pp. 116–129,CiteSeerX 10.1.1.53.6273,doi:10.1007/3-540-63220-4_55,ISBN 978-3-540-63220-7,S2CID 17045308.
  53. ^Lothaire, M. (2005),Applied Combinatorics on Words, Encyclopedia of Mathematics and its Applications, vol. 105, Cambridge University Press, p. 18,ISBN 9780521848022.
  54. ^Lee, C. Y. (1959), "Representation of switching circuits by binary-decision programs",Bell System Technical Journal,38 (4):985–999,Bibcode:1959BSTJ...38..985L,doi:10.1002/j.1538-7305.1959.tb01585.x.
  55. ^Akers, Sheldon B. (1978), "Binary decision diagrams",IEEE Transactions on Computers,C-27 (6):509–516,Bibcode:1978ITCmp.100..509A,doi:10.1109/TC.1978.1675141,S2CID 21028055.
  56. ^Friedman, S. J.; Supowit, K. J. (1987), "Finding the optimal variable ordering for binary decision diagrams",Proc. 24th ACM/IEEE Design Automation Conference (DAC '87), New York, NY, USA: ACM, pp. 348–356,doi:10.1145/37888.37941,ISBN 978-0-8186-0781-3,S2CID 14796451.

External links

[edit]
Wikimedia Commons has media related todirected acyclic graphs.
Retrieved from "https://en.wikipedia.org/w/index.php?title=Directed_acyclic_graph&oldid=1336481249"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp