Skip to main content

Sorting with Forbidden Intermediates

  • Conference paper
  • First Online:
Algorithms for Computational Biology (AlCoB 2016)

Part of the book series: Lecture Notes in Computer Science ((LNBI,volume 9702))

Included in the following conference series:

Abstract

A wide range of applications, most notably in comparative genomics, involve the computation of a shortest sorting sequence of operations for a given permutation, where the set of allowed operations is fixed beforehand. Such sequences are useful for instance when reconstructing potential scenarios of evolution between species, or when trying to assess their similarity. We revisit those problems by adding a new constraint on the sequences to be computed: they must avoid a given set of forbidden intermediates, which correspond to species that cannot exist because the mutations that would be involved in their creation are lethal. We initiate this study by focusing on the case where the only mutations that can occur are exchanges of any two elements in the permutations, and give a polynomial time algorithm for solving that problem when the permutation to sort is an involution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    See [3], Appendix B2 for correctness and Appendix B3 for complexity.

  2. 2.

    See [3], Appendix B2-B3 for proofs of correctness and complexity.

  3. 3.

    See [3], Appendix B2 for correctness.

  4. 4.

    See [3], Appendix B2.

References

  1. Bérard, S., Bergeron, A., Chauve, C.: Conservation of combinatorial structures in evolution scenarios. In: Lagergren, J. (ed.) RECOMB-WS 2004. LNCS (LNBI), vol. 3388, pp. 1–14. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Bergeron, A., Blanchette, M., Chateau, A., Chauve, C.: Reconstructing ancestral gene orders using conserved intervals. In: Jonassen, I., Kim, J. (eds.) WABI 2004. LNCS (LNBI), vol. 3240, pp. 14–25. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Comin, C., Labarre, A., Rizzi, R., Vialette, S.: Sorting with forbidden intermediates (extended version). CoRR abs/1602.06283 (2016)

    Google Scholar 

  4. Cuénot, L.: Les races pures et leurs combinaisons chez les souris. Archives de Zoologie Experimentale 3, cxxiii–cxxxii (1905)

    Google Scholar 

  5. Deza, M., Huang, T.: Metrics on permutations, a survey. J. Comb., Inf. Syst. Sci. 23, 173–185 (1998)

    MathSciNet  MATH  Google Scholar 

  6. Diestel, R.: Graph Theory. Graduate Texts in Mathematics. Springer, Heidelberg (2005)

    MATH  Google Scholar 

  7. Fertin, G., Labarre, A., Rusu, I., Tannier, E., Vialette, S.: Combinatorics of Genome Rearrangements. The MIT Press, Cambridge (2009)

    Book  MATH  Google Scholar 

  8. Figeac, M., Varré, J.-S.: Sorting by reversals with common intervals. In: Jonassen, I., Kim, J. (eds.) WABI 2004. LNCS (LNBI), vol. 3240, pp. 26–37. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Gabow, H., Maheshwari, S., Osterweil, L.: On two problems in the generation of program test paths. IEEE Trans. Softw. Eng. 2, 227–231 (1976)

    Article  MathSciNet  Google Scholar 

  10. Gluecksohn-Waelsch, S.: Lethal genes and analysis of differentiation. Science 142(3597), 1269–1276 (1963)

    Article  Google Scholar 

  11. Goldreich, O., Goldwasser, S., Lehman, E., Ron, D., Samorodnitsky, A.: Testing monotonicity. Combinatorica 20(3), 301–337 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  12. Hopcroft, J., Karp, R.: An \(n^{5/2}\) algorithm for maximum matchings in bipartite graphs. SIAM J. Comput. 2(4), 225–231 (1973)

    Article  MathSciNet  MATH  Google Scholar 

  13. Krause, K., Smith, R., Goodwin, M.: Optimal software test planning through automated network analysis. In: Proceedings 1973 IEEE Symposium Computer Software Reliability, pp. 18–22. IEEE (1973)

    Google Scholar 

  14. Labarre, A.: Lower bounding edit distances between permutations. SIAM J. Discrete Math. 27(3), 1410–1428 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  15. Lakshmivarahan, S., Jwo, J.S., Dhall, S.K.: Symmetry in interconnection networks based on Cayley graphs of permutation groups: a survey. parallel comput. 19, 361–407 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  16. Lehman, E., Ron, D.: On disjoint chains of subsets. J. Comb. Theor. Ser. A 94(2), 399–404 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  17. Logan, M., Shahriari, S.: A new matching property for posets and existence of disjoint chains. J. Comb. Theor. Ser. A 108(1), 77–87 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  18. Yinnone, H.: On paths avoiding forbidden pairs of vertices in a graph. Discrete Appl. Math. 74, 85–92 (1997)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carlo Comin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Comin, C., Labarre, A., Rizzi, R., Vialette, S. (2016). Sorting with Forbidden Intermediates. In: Botón-Fernández, M., Martín-Vide, C., Santander-Jiménez, S., Vega-Rodríguez, M.A. (eds) Algorithms for Computational Biology. AlCoB 2016. Lecture Notes in Computer Science(), vol 9702. Springer, Cham. https://doi.org/10.1007/978-3-319-38827-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-38827-4_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-38826-7

  • Online ISBN: 978-3-319-38827-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics