Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

BIE-GRA Graph Algorithms and Complexity Theory Extent of teaching: 2P+2C
Instructor: Completion: Z,ZK
Department: 18101 Credits: 5 Semester: L

Annotation:
Students get an overview of typical usages of graph models in computing. They learn algorithmic methods of solving graph problems. They understand algorithms for the key application domains of graph theory (flows in networks, heuristic search, approximation of complex problems). Students get basic competence in computer science background: they understand Turing machine models and issues of NP-completeness and NP-hardness.

Lecture syllabus:
1. Graph models, undirected graphs, isomorphism.
2. Degree, connectedness, digraphs.
3. Strong connectedness, acyclic graphs, graph representation and breadth-first traversal.
4. Depth-first traversal, topologic sort, strong components.
5. Euler graphs, dominating and independent sets, graph coloring, distance.
6. Trees, spanning trees, circuits, minimal spanning trees.
7. Shortest paths, algorithms for $1\to n$ shortest paths.
8. Algorithms for $n\to n$ shortest paths, planarity.
9. Flows in networks, maximum flow algorithm.
10. Cheapest circulation, matchings, assignment problem.
11. Problem state space, heuristic search.
12. Turing machines.
13. Complexity classes, NP-complete problems. Approximation algorithms.

Seminar syllabus:
1. Induction, recursion, recurrence.
2. Trees and their computer representation, tree traversals.
3. Graph properties (isomorphism, connectedness, components, node degrees).
4. Strong connectedness, decomposition into strong components, topological sort.
5. Graph representations and traversals.
6. Eulerian trail, Chinese postman problem, project selection.
7. Independence, dominance, chromatic number, cyclomatic number.
8. Trees, spanning trees and minimal spanning trees.
9. Shortest paths.
10. Shortest paths, planarity, project work (consultation).
11. Flows in networks, circulations, matchings.
12. Heuristic search algorithms.
13. Turing machines.

Literature:
1. Kolář, J. ''Theoretical Computer Science''. Praha: ČVUT, 1998. ISBN 80-01-01788-5.
3. Cormen, T. H., Leiserson, C. E., Rivest, R. L. ''Introduction to Algorithms''. The MIT Press, 2001. ISBN 0262032937.
4. Sedgewick, R. ''Algorithms in Java, Part 5: Graph Algorithms (3rd Edition)''. Addison-Wesley Professional, 2003. ISBN 0201361213.

Requirements:
We assume a working knowledge of basic abstract data types, their efficient implementations and applications to graph problem solutions. Students are expected to have a passive knowledge of basic proof techniques used in mathematics (proof by induction, by contradiction, constructive proof) and apart from being able to design a new or modify an existing algorithm, they should be able to analyze its complexity.

A pair of objects EFA + GRA may be recognized if the student successfully completes a pair of objects AG1 + AG2. Students can ask for it at the study department.
A student who lacks subject GRA must enroll the course AG2 and reques for the aptitude test.
Students who have been recognised the course GRA from the previous studies, must register for the course AG2 and can ask for the recognition of assessment.

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
BIE-TI.2015_ORIGINAL Computer Science (Bachelor, in English) V Není
BIE-TI.2015 Computer Science (Bachelor, in English) V Není
BIE-WSI-SI.2015 Software Engineering (Bachelor, in English) V Není
BIE-BIT.2015 Computer Security and Information technology (Bachelor, in English) V Není


Page updated 25. 4. 2024, semester: Z,L/2023-4, Z/2019-20, Z/2024-5, L/2022-3, Z/2020-1, Z,L/2021-2, L/2020-1, Z/2022-3, L/2019-20, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška