Faster Multi-Source Directed Reachability via Shortcuts and Matrix Multiplication
Abstract
Given an -vertex -edge directed graph and a designated source vertex , let be a subset of vertices reachable from in . Given a subset of , for some , designated sources, the -direachability problem is to compute the sets for every . Known naive algorithms for this problem either run a BFS/DFS exploration separately from every source, and as a result require time, or compute the transitive closure of the graph in time, where is the matrix multiplication exponent. Hence, the current state-of-the-art bound for the problem on graphs with edges in , which may be as large as .
Our first contribution is an algorithm with running time for this problem on general graphs, where is the rectangular matrix multiplication exponent (for multiplying an matrix by an matrix). Using current state-of-the-art estimates on , our exponent is better than for , where is a universal constant. For graphs with edges, for , our algorithm has running time . For every , there exists a non-empty interval , so that our running time is better than the state-of-the-art one whenever the input graph has edges with .
Our second contribution is a sequence of algorithms for the -direachability problem, where is our algorithms that we discussed above. We argue that under a certain assumption that we introduce, for every , there exists a sufficiently large index so that improves upon the current state-of-the-art bounds for -direachability with , in the densest regime . (Unconditionally, satisfies this for .) We show that to prove this assumption, it is sufficient to devise an algorithm that computes a rectangular max-min matrix product roughly as efficiently as ordinary matrix product.
Our algorithms heavily exploit recent constructions of directed shortcuts [KP22b, KP22a].
1 Introduction
1.1 Our Unconditional Results
Consider an -vertex directed graph and a pair of vertices . We say that is reachable from (denoted ) iff there exists a directed path in that starts at and ends in . Given a subset of designated vertices called sources, for some , the -reachability matrix is a rectangular Boolean matrix of dimension , in which for every pair , the respective entry is equal to iff is reachable from in . The -direachability problem is, given a directed graph , and a subset of sources, to compute the reachability matrix .
To the best of our knowledge, despite the fundamental nature of this problem, it was not explicitly studied so far. There are two existing obvious solutions for it. The first one runs a BFS (or DFS) from every source , and as a result requires time. We call this algorithm BFS-based. For dense graphs this running time may be as large as . The second solution (which we call TC-based) uses fast square matrix multiplication to compute the transitive closure in time, where is the matrix multiplication exponent. The upper bound is due to [WXXZ24] (see also [Gal24, GU18, LG14, CW90]).111The expression is the running time of the state-of-the-art algorithm for computing a matrix product of two square matrices of dimensions .
In this paper we employ recent breakthroughs due to Kogan and Parter [KP22b, KP22a] concerning directed shortcuts, and devise an algorithm that outperforms the two existing solutions (BFS-based and TC-based) for computing -reachability matrix whenever . (Recall that . Here is a universal constant.) The running time of our algorithm is , where is rectangular matrix multiplication exponent, i.e., is the running time of the state-of-the-art algorithm for multiplying a rectangular matrix with dimensions by a square matrix of dimensions . See Table 1 for the values of this exponent (due to [WXXZ24]), and Table 2 for the comparison of running time of our algorithm with that of previous algorithms for -direachability problem in the range (in which we improve the previous state-of-the-art). The largest gap between our exponent and the previous state-of-the-art is for . Specifically, our exponent for is , while the state-of-the-art is .
Moreover, we show that our algorithm improves the state-of-the-art solutions for -direachability problem in a much wider range of on sparser graphs. Specifically, we show that for every , there exists a non-empty interval of values , so that for all input graphs with edges, our algorithm outperforms both the BFS-based and TC-based solutions. The running time of our algorithm on such graphs is .
We provide some sample values of these intervals in Table 4. See also Table 5 for the comparison between our new bounds for -direachability on sparser graphs and the state-of-the-art ones. For example, for (when ), the interval is , i.e., our algorithm improves the state-of-the-art solutions as long as . Specifically, when , our algorithm requires time for computing reachability from sources, while the state-of-the art solution is the TC-based one, and it requires time. Another example is when . The interval is , and for our solution requires time, while the state-of-the-art BFS-based solution requires time.
1.2 Our Conditional Results
We also devise a recursive variant of our algorithm that further improves our bounds conditioned on a certain algorithmic assumption. Specifically, we define the directed reachability problem with parameters and denoted , for a pair of parameters . The parameter is as above. The parameter affects the hop-bound . The problem accepts as input an -vertex graph and a set of sources, and asks to compute, for every , the set of vertices reachable from in at most hops. For a problem , we denote by its time complexity. In particular stands for time complexity of . Observe that can be easily solved by rectangular Boolean matrix products of an matrix by an square matrix. Let be the adjacency matrix of the input graph . In the first iteration, the rectangular matrix is just the matrix restricted to rows that correspond to sources , while the square matrix is the adjacency matrix augmented with a self-loop for every vertex. On the next iteration is replaced by the Boolean matrix product , etc. This process continues for iterations. Thus, . Now consider the following paths directed reachability problem, , in which instead of designated source vertices we are given dipaths . For every path , and every vertex , we want to compute if is reachable from some vertex in at most hops, and if it is the case, we want to output the last vertex on from which is reachable within at most hops.
Interestingly, the BFS-based algorithm for problem applies (with slight modifications) to the problem, providing a solution with running time (like for the problem) [KP22a]. On the other hand, it does not seem to be the case for the algorithm with running time time for that we described above. Our assumption, which we call paths direachability assumption, is that one nevertheless can achieve running time for problem as well.
We show that under this assumption a variant of our algorithm improves the state-of-the-art -reachability algorithms for dense graphs () for all values of (and not just in the range , which we show unconditionally). Recall that is a universal constant.
We analyse a sequence of algorithms . For each algorithm , , we consider the threshold value upto which this algorithm outperforms the existing state-of-the-art solutions. We show that , and that . In other words, for any exponent of the number of sources, there exists a (sufficiently large) index such that the algorithm outperforms existing state-of-the-art solutions for the -direachability problem with .
We also identify some additional assumptions under which the paths direachability assumption holds. In particular, consider the max-min matrix product. Given two matrices and of appropriate dimensions (so that matrix product is defined), max-min product is defined as follows: for indices so that is an index of a row of and is an index of a column of , we have , where ranges over all possible indices of columns of .
We show that problem reduces to invocations of the max-min matrix products for matrices of dimensions and . Thus, assuming that such a product can be computed in time implies paths direachability assumption. We refer to this assumption as max-min product assumption. Max-min matrix product was studied in [DP09] and [GIA+21]. However, current state-of-the-art bounds for it are far from the desired bound of .
Admittedly, it is not clear how likely are these assumptions. We find it to be an intriguing direction for future research. Also, we believe that the analysis of our algorithms under these assumptions is of independent interest, and that it sheds light on the complexity of multi-source reachability problem. Furthermore, getting sufficiently close to the running time of for paths direachability assumption or to for the max-min product assumption would suffice for providing further improvements to the state-of-the-art bounds for this fundamental problem.
1.3 Our Techniques
In this section we provide a high-level overview of our algorithms. Given a digraph , and a positive integer parameter , we say that a graph is a -shortcut of if for any ordered pair of vertices, is reachable from in iff it is reachable from in using at most hops. Kogan and Parter [KP22b, KP22a] showed that for any parameter , for any digraph , there exists a -shortcut with edges, and moreover, this shortcut can be constructed in time [KP22a].
Our first algorithm starts with invoking the algorithm of [KP22a] for an appropriate parameter . We call this the diameter-reduction step of our algorithm. We then build two matrices. The first one is the adjacency matrix of the graph , with all the diagonal entries equal to . This is a square matrix, and the diagonal entries correspond to self-loops. The second matrix is a rectangular matrix. It is just the adjacency matrix of of the graph restricted to rows corresponding to designated sources of .
Next, our algorithm computes the Boolean matrix product . Specifically, the algorithm computes the product , and then multiplies it by , etc., and does so times. Hence, this computation reduces to Boolean matrix products of a rectangular matrix of dimensions by a square matrix with dimensions . Each of these Boolean matrix products can be computed using standard matrix multiplication (see Section 2.1). We use fast rectangular matrix multiplication algorithm by [WXXZ24] to compute these products. As , this computation, henceforth referred to as the reachability computation step, requires time.
Observe that the running time of the reachability computation step grows with , and the running time of the diameter-reduction step decreases with . It is now left to balance these two running times by carefully choosing . This completes the overview of our basic direachability algorithm, that improves (unconditionally) the state-of-the-art running time for -direachability, , for , . Moreover, as was mentioned above, for any , , there is a non-empty interval of values , such that thus algorithm improves (also, unconditionally) upon state-of-the-art solutions for this problem on graphs with edges,
To improve these results further (based on the paths direachability assumption), we observe that the algorithm of Kogan and Parter [KP22a] for building shortcuts has two parts. In the first part it computes a subset of dipaths and a subset of vertices. This step is implemented via a reduction to a min-cost max-flow (MCMF) instance. Using the recent advances in this area [CKL+22], it can be done within time. The second part of the algorithm of [KP22a] involves computing reachabilities between all pairs . Here for every pair , one needs to compute the last (if any) vertex on from which is reachable. Under our paths direachability assumption, this second part can be implemented via a recursive invocation of our -reachability algorithm. Our conditional bounds are achieved by analysing this recursive scheme.
Related Work Fast rectangular matrix multiplication in conjunction with hopsets was recently employed in a similar way in the context of distance computation in undirected graphs by Elkin and Neiman [EN22]. Directed hopsets, based on Kogan-Parter constructions of shortcuts [KP22b, KP22a], were recently devised in [BW23].
2 Preliminaries
Graph Notation. For an -vertex, -edge digraph , let denote its transitive closure. For a vertex pair , where , let be the length (measured by the number of arcs) of a shortest dipath from to . For , we have . The diameter of , denoted , is defined as . An edge which is not in is called a shortcut edge.
For a dipath , let denote the vertex set of . Also, for two distinct vertices , we write if appears before in , and write , otherwise. We use this notation for any vertex sequence , i.e., even if is not necessarily a dipath.
As mentioned in Section 1, a naive solution to the -direachability involves performing a BFS or DFS exploration from each of the source vertices in .
Definition 1.
For an -vertex -edge digraph , we refer to the naive methods for -direachability (which involve running a BFS or DFS separately from each of the sources in ) as -naiveReach method. We denote by the time complexity of -naiveReach, and it is given by .
Another way to solve -direachability is to compute the transitive closure of the input digraph using square matrix multiplication.
Definition 2.
For an -vertex -edge digraph , we refer to the technique of computing the transitive closure of using square matrix multiplication as -squareReach. Observe that computing the transitive closure of solves -direachability for up to sources. We denote by the time complexity of -squareReach, and it is given by , where is the exponent of in the number of operations required to compute the product of two square matrices.
Definition 3.
For a digraph , a set of shortcut edges is called a -shortcut if .
The following theorem summarizes the fast shortcut computation algorithm by Kogan and Parter [KP22a].
Theorem 1.
(Theorem 1.4, [KP22a]) There exists a randomized algorithm that for every -vertex -edge digraph and , computes, w.h.p., in time a -shortcut set with edges.
Matrix Notation. For a matrix B, we denote by the entry in row and column of . The transpose of is . We use to denote a wildcard, e.g., the notation refers to the vector which is the -th column of .
2.1 Matrix Multiplication and Boolean Matrix Product
Recall that for a fixed integer and , denotes the exponent of in the number of algebraic operations required to compute the product of an matrix by an matrix. Let be an Boolean matrix (i.e., each entry of is either or .). Let be another Boolean matrix of dimensions . Define the Boolean matrix product by
(1) |
where and stand for binary operations and respectively.
Note that the Boolean matrix product (BMM henceforth) of and can be easily computed by treating the two matrices as standard integer matrices and computing the integer matrix product over the integers, and then setting if . Thus the number of operations required to compute the BMM of and as above is . Vassilevska Williams et al. presented the current state-of-the-art upper bounds on (Table 1 of [WXXZ24]). We present these bounds in Table 1 here for completeness.)
upper bound on | |
---|---|
0.321334 | 2 |
0.33 | 2.000100 |
0.34 | 2.000600 |
0.35 | 2.001363 |
0.40 | 2.009541 |
0.45 | 2.023788 |
upper bound on | |
---|---|
0.50 | 2.042994 |
0.527661 | 2.055322 |
0.55 | 2.066134 |
0.60 | 2.092631 |
0.65 | 2.121734 |
0.70 | 2.153048 |
upper bound on | |
---|---|
0.75 | 2.186210 |
0.80 | 2.220929 |
0.85 | 2.256984 |
0.90 | 2.294209 |
0.95 | 2.332440 |
1.00 | 2.371552 |
3 Basic Two-Step -Direachability
In this section, we present the description and analysis of our two-step reachability scheme. Let be a directed unweighted graph. Let be a set of source vertices such that for some . We compute -direachability by executing Algorithm 1. We will henceforth refer to it as Basic -Direachability Algorithm. The algorithm accepts as input the graph and the set of sources. In addition, it accepts as input a parameter . The algorithm is described for an arbitrary choice of . However, in fact, we will set it as a certain function of and , which will be explicated in the sequel. (See Equation (3).)
The lines 1 and 2 constitute the diameter reduction step. We compute a -shortcut (line 1) of the input digraph using [KP22a] (see Theorem 1) and define an boolean matrix , where is the adjacency matrix of (line 2). In line 3 we define a new matrix , which is the adjacency matrix of restricted to the rows corresponding to the set of source vertices. Lines 4 to 5 constitute the reachability computation step. We repeatedly perform a rectangular boolean matrix product, and return the final product as our output.
Let and denote the time complexity of the diameter reduction step and reachability computation step, respectively. Then the overall time complexity of our algorithm is .
3.1 General Graphs
In this section, we consider general -vertex, -edge digraphs, i.e., may be as large as . In the next section, we analyse the case of sparser graphs, and show that when , for some , our bounds can be further improved.
Let for some . In the diameter reduction step we compute a -shortcut of . By Theorem 1, this can be done in time . In the reachability computation step we perform iterations, each of which computes a rectangular matrix product of an matrix by an matrix. Each matrix product requires time. It follows that . The overall time complexity of the algorithm is therefore . Let denote the exponent of (as a function of ) in the overall time complexity of our algorithm. It follows that
(2) |
Since decreases when grows and grows, the minimum is achieved when the following equation holds
(3) |
The parameter is therefore set as , with given by Equation (3). It follows from (2) and (3) that
(4) |
Recall that the time complexity of the naive algorithm is given by . Hence in the range , the naive algorithm is no better than computing the transitive closure of the input digraph. The latter requires time (where . For our algorithm to do better than the naive algorithm in this range we require
Incorporating the state-of-the-art upper bounds on from Table 1, we get that , for . Therefore, since is a monotone function, our algorithm can compute -direachability in time for sources, as opposed to naive algorithm that can only do so for .
Moreover, for , . Observe that by convexity of , it suffices to verify the inequality for the endpoints and . Therefore in the range , our algorithm outperforms the state-of-the-art solutions.
Denote by the threshold value such that
(5) |
For all , we have
(6) |
As the Inequality (6) holds for , it follows that . (The Inequality (6) does not hold for .) In fact, in Section 3.2 (between Lemma 1 and Lemma 2) we argue that . We conclude with the following theorem:
Theorem 2.
Let be an -vertex directed unweighted graph with edges. Fix , , for . Then, there exists a randomized algorithm that computes with high probability -direachability on in time. This algorithm outperforms the state-of-the-art solutions for -direachability for .
For example, we compute -direachability for , in time , improving upon the state-of-the-art bound of for naive algorithm and the state-of-the-art bound of obtained by fast square matrix multiplication. In Table 2, we present values of corresponding to some specific values of in the range and show how they compare to the exponent of in -naiveReach (see Definition 1) and -squareReach (see Definition 2).
Exponent of in | Exponent of in | ||
---|---|---|---|
0.335 | 2.333565 | 2.335 | 2.371552 |
0.34 | 2.3337 | 2.34 | 2.371552 |
0.35 | 2.334241 | 2.35 | 2.371552 |
0.36 | 2.33533 | 2.36 | 2.371552 |
0.37 | 2.336422 | 2.37 | 2.371552 |
0.38 | 2.33751 | 2.38 | 2.371552 |
0.39 | 2.3386 | 2.39 | 2.371552 |
0.40 | 2.33969 | 2.40 | 2.371552 |
0.41 | 2.34159 | 2.41 | 2.371552 |
0.42 | 2.34349 | 2.42 | 2.371552 |
0.43 | 2.34539 | 2.43 | 2.371552 |
0.44 | 2.34729 | 2.44 | 2.371552 |
0.45 | 2.34919 | 2.45 | 2.371552 |
0.46 | 2.35175 | 2.46 | 2.371552 |
0.47 | 2.35431 | 2.47 | 2.371552 |
0.48 | 2.35687 | 2.48 | 2.371552 |
0.49 | 2.359435 | 2.49 | 2.371552 |
0.50 | 2.3621996 | 2.5 | 2.371552 |
0.51 | 2.365081 | 2.51 | 2.371552 |
0.52 | 2.368166 | 2.52 | 2.371552 |
0.53 | 2.371252 | 2.53 | 2.371552 |
3.2 Graphs with edges, for
In this section we argue that when our input -vertex -edge digraph has edges, for some , then our bounds from Theorem 2 can be further improved. Let be the size of the edge set of , where . As before, let , for . Applying Theorem 1 for and , it follows that . Recall that the running time of the reachability computation step is . The second term of will always be dominated by . The overall time complexity of the algorithm is therefore . Let denote the exponent of (as a function of ) in the overall time time complexity of our algorithm. It follows that
(7) |
This expression is minimized when
(8) |
It follows from (7) and (8) that
(9) |
Note that for , we have . Also, when , the exponent is smaller than for a wider range of than the exponent . On the other hand the sparsity of the input digraph also improves the time complexity of the naive algorithm. It is possible that for a given combination of and , may be better than the time complexity, , of our algorithm. For our algorithm to outperform the naive algorithm, we need
This condition is equivalent to
(10) |
By substituting values of from Table 1 for specific values of , we get corresponding lower bounds on . In Table 3, we present these lower bounds for various values of .
0 | |
---|---|
0.34 | |
0.4 | |
0.5 | |
0.6 | |
0.7 | 1.603 |
0.8 | |
0.9 | |
1 |
For our algorithm to work in time, we need
(11) |
For , Inequality (11) implies that , matching the lower bound implied by (10). Indeed, our algorithm improves existing bounds only for . For every , we get some non-trivial intervals of for which . For example, for , (see Table 3) ensures that . For inequality to hold, substituting in (11) implies that . It follows that the inequality always holds for all , i.e., the condition on for is that . We computed these values of intervals for various values of . Specifically, for a number of values of , using the best known upper bounds on , we numerically computed the intervals , such that for graphs with edges, , our algorithm improves the existing bounds bounds on the -direachability problem. In Table 4, we present these intervals for various values of .
Interval | |
---|---|
0.335 | |
0.34 | |
0.4 | |
0.5 | |
0.55 | |
0.6 | |
0.7 | |
0.8 | |
0.9 | |
0.99 | |
1 |
These results suggest that for all , there is a non-empty interval of such that for digraphs with edges, our algorithm improves over existing bounds for -direachability for . We will soon prove it formally.
In Table 5, we present a comparison of our algorithm for graphs with edges for various combinations of and .
Exponent of in | Exponent of in | |||
---|---|---|---|---|
1.95 | 0.375 | 2.32 | 2.325 | 2.371552 |
0.4 | 2.323 | 2.35 | 2.371552 | |
0.45 | 2.3325 | 2.4 | 2.371552 | |
0.50 | 2.345 | 2.45 | 2.371552 | |
1.9 | 0.45 | 2.3159 | 2.35 | 2.371552 |
0.5 | 2.3287 | 2.4 | 2.371552 | |
0.55 | 2.344 | 2.45 | 2.371552 | |
0.6 | 2.362 | 2.5 | 2.371552 | |
1.75 | 0.55 | 2.294 | 2.3 | 2.371552 |
0.6 | 2.312 | 2.35 | 2.371552 | |
0.65 | 2.331 | 2.4 | 2.371552 | |
0.7 | 2.352 | 2.45 | 2.371552 | |
1.525 | 0.8 | 2.323 | 2.325 | 2.371552 |
0.85 | 2.346 | 2.375 | 2.371552 | |
0.9 | 2.3711 | 2.425 | 2.371552 |
Recall that is the lower bound on the value of implied by Inequality (10), i.e., for , our algorithm is better than the -naiveReach method. The threshold is the value such that , i.e., holds. (Recall that we defined it in Section 3.1 as the value that satisfies . These two conditions are equivalent.)
Lemma 1.
For every , we have
(12) |
Proof.
Note that for , we have and for , . The inequality (12) now follows by convexity of the function . ∎
To evaluate the value of we note that for , we have (see Table 1) and . For , we have and . Thus holds for and for . By convexity of the function , it follows that this inequality holds for all . However, for , , whereas . Therefore, there exists a constant , (satisfying ), such that the inequality (and thus ) holds for . In fact, one can verify that , as , while . In the following lemma we formally prove that for , the intervals are non-empty.
Lemma 2.
There exists a threshold such that for every , we have , and there is equality for .
Proof.
For , we have and (as , and is a monotonically increasing function). For , we argue that , i.e., . It is sufficient to prove that
or equivalently
(13) |
We prove that the Inequality (13) holds in the following claim.
Claim 1.
For , we have .
Proof.
Let and . According to Table 1, and . It follows that
(14) |
Note that is the slope of the line connecting points and . By convexity of the function , this slope is smaller than the respective slope , for any . Hence the latter slope is greater than too. See Figure 1 for an illustration.
∎
Hence, the assertion of the lemma holds for .
For , we have . Hence equality holds for . ∎
We proved the following theorem.
Theorem 3.
There is a threshold value , such that for every ,
there exists a non-empty interval that satisfies the following property:
For every and any -vertex -edge digraph with edges,
Algorithm 1 computes -direachability for
faster than the current state-of-the-art algorithms for the problem.
(The latter are -naiveReach method (see Definition 1) and -squareReach method (see Definition 2).)
See Table 4 for sample values of and Table 5
for sample exponents of our and state-of-the-art algorithms.
4 Recursive -direachability
In this section, we describe and analyse our recursive scheme.
The algorithm accepts as input an integer parameter in addition to the input graph ,
the set of sources, and the parameter that will be set below (as a function of and ).
The algorithm will be referred to as Procedure Recur-DiReach().
If , then the algorithm invokes Algorithm 1. i.e., Procedure DiReach(), with the parameter
set as with given by Equation (3).
Otherwise for , Procedure Recur-DiReach() (like Algorithm 1)
starts by computing a -shortcut. The difference is, however, that while Algorithm 1 computes a -shortcut via a blackbox invocation of
Kogan-Parter’s algorithm [KP22a] (see Theorem 1), Procedure Recur-DiReach()
employs itself recursively for computing the shortcut in the following way. It starts with computing the sets and of paths and vertices, respectively, exactly in the same way as Kogan-Parter’s algorithm [KP22a] does. That is, it computes a collection of paths of size by a reduction to an instance of min-cost max-flow and then it samples every path in independently with probability to obtain the set ,
and also samples every vertex independently with probability to obtain .
However, to compute shortcuts between paths in and vertices in it invokes Procedure Recur-DiReach() recursively with parameters .
The parameter will be set as a certain function of and later in the sequel. See Equation (20).
(Note that the paths become sources for this invocation.)
Finally, once the shortcut set is computed, Procedure Recur-DiReach() proceeds in the same way as Procedure
DiReach() does, i.e., it executes lines 2-5 of Algorithm 1.
The pseudocode of Procedure Recur-DiReach() is given in Algorithm 2.
For , , we denote by the exponent of in the number of operations required to
compute -direachability by Procedure Recur-DiReach with depth parameter equal to , with sources (), on graphs with edges, for .
We also write to denote this exponent in the worst-case, i.e., when .
Recall that for a given , we have .
The base step enables us to compute -direachability from
up to sources in time (see Theorem 2) on general graphs.
Below we overview the recursive step for .
Recursive Invocation, :
Recall that (see Section 1.3) the two main computational parts of
-shortcut computation algorithm of Kogan and Parter [KP22a],
for a parameter , are
the computation of a set of vertex-disjoint dipaths in , and
the computation of shortcut edges between a set , , of randomly selected vertices
and a set , , of randomly selected paths.
The first part can be computed by reducing the computation of the path collection
to an instance of min-cost max-flow problem for which we use the algorithm by Chen et al. [CKL+22]). See [KP22a] for more details.
The time complexity of Chen et al.’s algorithm [CKL+22] is .
It follows therefore that the computation of the first part requires time.
For the second part, for every ,
one needs to add a shortcut edge from to the first vertex reachable from (if any)
on . Equivalently, we can reverse the edge orientations and compute reachabilities from to
all the vertices in , where for each and we aim to find the last vertex on
from which is reachable. For the sake of current analysis,
we assume that this can be done by computing
reachability from sources, where each path is treated as a source.
We further elaborate about this assumption in the next section.
4.1 Paths Direachability Assumption
In this section we introduce a number of auxiliary problems, and assumptions about their time complexities. In the next section we analyse our recursive scheme under these assumptions, and show that it improves our basic direachability algorithm (described and analysed in Section 3). Without loss of generality, we assume that the input graph to the -shortcut computation algorithm is a DAG. (If it not the case, one can compute and contract its strongly connected components in time, and reduce the problem to DAGs.) Denote by a fixed topological ordering of vertices of .
Definition 4.
Given an -vertex DAG , and a pair of parameters , and a set of sources, the direachability problem with diameter , denoted , is to compute for every the set of vertices reachable from via at most hops.
We denote by the time complexity of the problem . More generally, we will use the notation for the time complexities of various problems that we will consider below. Note that
(15) |
We also consider a variant of this problem is which each source is replaced by a (di-)path.
Definition 5.
Given an -vertex DAG , and a pair of parameters , and a set of of (source) dipaths, the path direachability problem with diameter , denoted , is to compute for every the set of vertices , such that each is reachable from at least one vertex via at most hops. Moreover, it is also required to compute, for every , the last vertex on from which is reachable within hops.
The assumption that we will make in this section is that can be computed within essentially the same time as .
Assumption 1.
(Paths Direachability Assumption)
(16) |
Next, we discuss several other related problems and algorithms for them that may eventually lead to bounds close to that of Equation (16).
First, one-hop paths direachability problem, denoted , is the paths direachability problem with the second parameter , i.e., . A slightly more general variant of this problem, which we call one-hop monotone subsequence direachability problem, abbreviated , is when each is a subsequence , for some , , of the (fixed) topological ordering of vertices of . We say that is a -monotone subsequence. Note that any dipath in is a -monotone subsequence, but the converse in not necessarily true.
A yet more general problem is when each is a general (not necessarily -monotone) vertex sequence for some . In this case we call the respective problem one-hop (general) sequence direachability problem, abbreviated .
Lemma 3.
can be computed via applications of , i.e.,
).
Proof.
We prove by induction on , , that , for some universal constant . The induction base is immediate, as is a special case of . Thus, .
For the induction step, we consider some , . By definition, an algorithm for solving , for an input set of dipaths, returns for every dipath , a set of vertices . For every , we have a vertex such that is reachable from via at most hops, and moreover, is the last vertex on from which is reachable within at most hops.
By induction hypothesis we assume that invocations of an algorithm for solve , i.e., they produce the sets , and for every , they produce the vertex as above.
As we argue below, via one more invocation of an algorithm for , one can obtain a solution for . Specifically, for every , , for some , we sort the set (from the induction step ) such that the vertices with appear first, sorted among them with respect to the fixed topological ordering , and then appear vertices with , etc., and finally, vertices with appear last. (Within each such subset, vertices are ordered according to .) Denote by the resulting vertex sequence.
We invoke an algorithm for , on the input set of sequences , for all . For every vertex reachable within at most one hop from sequence , let be the last vertex in from which is reachable within at most one hop. The algorithm then sets and returns it. (This is done for all vertices reachable within one hop from , for every .) Also for every , the algorithm returns . (The sets are returned by an algorithm for that receives sequences as input).
To prove correctness, suppose that a vertex is reachable within at most hops from some vertex on a path and let be the last vertex on that satisfies this condition. Then there is an incoming neighbour of which is reachable from within at most hops. The algorithm for inserts into , and the algorithm for discovers that is reachable from , and thus from (within one hop). Thus it inserts into .
Suppose for contradiction that the algorithm returns some vertex , , as . But then, by correctness of the algorithms that we use for and , it follows that there exists an incoming neighbour of which is reachable from within hops and . This is a contradiction to the assumption that . Note also that if is not -reachable from , then it is not -reachable from . Thus, it will not be included in the output of the algorithm for . ∎
This leads to the following assumption.
Assumption 2.
(17) |
Assumption 1 is sufficient for the analysis that we conduct in this section. Next, we identify a number of possible approaches that may be used to provide upper bounds for (in the spirit of Assumption 1).
First, one can reduce on graphs with diameter at most to the exact distance computation problem in a directed graph with sources, with integer weights in the range . Specifically, given an instance of , one adds sources , and connects each source to all the vertices of its respective path . Denote by the new graph that we construct. The vertex set is given by . The edge set is given by .
Denote path (), where is the length (number of hops) of the path . The weight function is set by assigning weight to the edge , weight to the edge , etc. (Generally, for all , is set to .) Finally, all original edges of are assigned weight .
One then invokes an algorithm for distance computation problem on the graph (with the set of sources). For each pair , one sets the last vertex on from which is reachable in the following way: If the distance then is not reachable from at all. Otherwise, let . Note that . We then set as . It is easy to verify the correctness of this reduction. However, to the best of our knowledge, there are currently no known directed exact distance computation algorithms (for multiple sources) that require less than time. The state-of-the-art algorithm by Zwick [Zwi02] requires time for directed all-pairs shortest paths.
Another possible approach to the the study of complexity of is through maximum witnesses of Boolean matrix multiplication (abbreviated as MWBMM) problem. Recall that given two Boolean matrices and , denotes their Boolean matrix product (see (1)). The MWBMM problem asks for every entry of for which , to compute the maximum index such that .
One can reduce the one-hop monotone sequence direachability problem () to this problem in the following way: define the matrix as a incidence matrix, where entry , if vertex belongs to , and otherwise. The columns of are ordered according to the fixed topological ordering of . We also need another matrix which is the adjacency matrix of the input graph . Here both rows and columns are ordered according to ordering .
Consider the Boolean matrix product . For every entry , , , such that , the vertex is not reachable from within one hop. On the other hand iff is one-hop reachable from , and moreover, the largest witness such that is the last vertex on from which is one-hop reachable.
This approach is problematic for two reasons. First, it only solves the one-hop monotone sequence direachability problem, as opposed to the one-hop general sequence direachability problem that we need for proving Assumption 1. Second, to the best of our knowledge, there is currently no known algorithm for the problem for matrices of dimensions and that works in time.
Finally, the third approach for making progress towards proving (possibly a weaker form of) Assumption 1 is via max-min matrix product (see [DP09] and references therein).
Given two matrices and (of appropriate dimensions, i.e., the product is defined), the max-min matrix product is defined in the following way: The entry (for and in the appropriate respective ranges) is given by .
To reduce problem to this matrix product (for matrices of dimensions and , respectively), we define matrices and in the following way: Let be a set of sequences, which serves as an input instance for . Rows of are indexed by sequences and its columns are indexed by vertices . Rows and columns of are indexed by vertices . The ordering of the columns of is the same as that of the rows (and columns) of . For a sequence and a vertex , we set , where is the index of in the sequence . Otherwise (if ), we set . The matrix is the adjacency matrix of the input graph, in which iff and otherwise .
Given a pair , consider the entry of the product matrix . If is not one-hop reachable from , then for all , either or , i.e., we have . Hence in this case, . On the other hand, if is one-hop reachable from , then for every for which , we have and , i.e., . Also, for every , we have , implying that .
Hence in this case we have
as desired. We also need to compute maximum between computed by the above product) and , as it is possible that , and that its index in is higher than the largest index of a vertex from which is reachable by exactly one hop.
Recall also that each sequence is associated with a path , and for every vertex with finite (not ) we store the vertex . At this point these values are recomputed along the lines described in the proof of Lemma 3. Specifically, if , then let be a vertex such that , and we set . Otherwise and the value of stays unchanged.
Denote by the complexity of max-min matrix product of matrix by an matrix. We have proved that
Hence by Lemma 3, we conclude the following corollary:
Corollary 1.
Hence the following assumption would suffice for proving the Paths Direachability Assumption (see Assumption 1).
Assumption 3.
However, to the best of our knowledge, there are currently no known bounds on which are close to . See [DP09, GIA+21] for the state-of-the-art bounds for .
We note that the state-of-the-art quantum algorithm for (i.e., , that is, for square matrices) [LGN14] requires time. It is plausible that for general , , the time complexity of the quantum algorithm for is not much larger than . This could lead to some results along the lines that we obtain under Assumption 1, albeit admittedly not as strong as those that we attain under Assumption 1 (see Section 4.2).
4.2 Analysis of the Recursive Algorithm under Paths Direachability Assumption
The current state-of-the-art algorithms based on matrix multiplication for the paths direachability problem do not provide running time given in Assumption 1. However, we believe that it is of interest to analyse the (hypothetical) situation that such algorithms will eventually be devised. It is worth pointing out that using (BFS-based) naive methods one can compute path direachability for dipaths in the same time as -direachability for sources. i.e., within time [KP22a].
Let , , be the desired diameter of the invocation of Procedure Recur-DiReach (Algorithm 2) with depth parameter . It follows that and we need to invoke Procedure Recur-DiReach recursively with depth for -direachability with . Then, the diameter reduction sub-step of the invocation with depth parameter requires time on graphs with edges, and more generally, time on graphs with edges, for any .222Note that the diameter reduction sub-step of the algorithm of [KP22a] is applied to the original graph that has edges. The reachability sub-step is then applied to a possibly denser graph. We remark also that the implication that this step requires time in general graphs and time on graphs with edges also follows, under Assumption 1, by induction on . Under Assumption 1, step 5 of Algorithm 2 (Procedure Recur-DiReach) is indeed a recursive invocation of the same algorithm on the same input graph with a decremented depth parameter . The reachability computation sub-step of this invocation is the same as the reachability computation step of Algorithm 1. By Assumption 1, for a given , this computation requires iterations of fast rectangular matrix multiplication, i.e., time.
4.3 Analysis for General Graphs
We first analyse the recursive scheme for the most general case when may be as large as . As evident from the above discussion, the following equation defines the function that expresses the exponent of in the running time of an invocation of Procedure Recur-DiReach (Algorithm 2) with depth parameter in terms of the exponent of the desired diameter of this invocation and the function that expresses the exponent of in the running time of its recursive invocation (with depth parameter ):
(18) |
Notice that for ,
(19) |
Note that monotonically does not increase as grows, and increases. Also, for , we have , for any . For , for any , we have (since ). Thus the function is minimized when . We will also soon show that since is a continuous function, so are also the functions . (This can be argued by induction on .) We will also show that they are all monotonically increasing, for . Thus, the parameter will be set so that
(20) |
and the parameter will be set as .
Analysing Equation (4.3) numerically using the state-of-the-art upper bounds on for various values of (see Table 1), we get that , for . Recall that , for (see Theorem 2). Thus, with only one step of our recursive scheme, we can increase the number of sources for which we can compute -direachability in time in general graphs from to (under Assumption 1). In Table 6, we present for various values of and . Each row of the table corresponds to a fixed value of and shows the value of for and . For each , the row corresponding to the first value of for which is highlighted. Empirically, one can see that with each step of recursion, the number of sources from which we can compute -direachability in time in general graphs increases. For example, for , the number of sources from which we can compute -direachability in time is at least .
0.34 | 2.333733 | 2.333733 | 2.333733 | 2.333733 | 2.333733 | 2.333733 |
---|---|---|---|---|---|---|
0.36 | 2.33533 | 2.333733 | 2.333733 | 2.333733 | 2.333733 | 2.333733 |
0.40 | 2.33969 | 2.335332 | 2.333733 | 2.333733 | 2.333733 | 2.333733 |
0.44 | 2.34729 | 2.3375132 | 2.333733 | 2.333733 | 2.333733 | 2.333733 |
0.48 | 2.35687 | 2.339694 | 2.335239 | 2.333733 | 2.333733 | 2.333733 |
0.52 | 2.368166 | 2.3434932 | 2.3353324 | 2.333733 | 2.333733 | 2.333733 |
0.54 | 2.374075 | 2.3453928 | 2.3353324 | 2.333733 | 2.333733 | 2.333733 |
0.56 | 2.3514334 | 2.3353324 | 2.333733 | 2.333733 | 2.333733 | |
0.60 | 2.3568744 | 2.337513 | 2.333733 | 2.333733 | 2.333733 | |
0.64 | 2.365913 | 2.3396939 | 2.335239 | 2.333733 | 2.333733 | |
0.66 | 2.368166 | 2.34203 | 2.3353324 | 2.333733 | 2.333733 | |
0.68 | 2.374075 | 2.342994 | 2.3353324 | 2.333733 | 2.333733 | |
0.72 | 2.3463128 | 2.336308 | 2.334272 | 2.333733 | ||
0.76 | 2.353146 | 2.341734 | 2.335332 | 2.333733 | ||
0.80 | 2.361996 | 2.344272 | 2.3395696 | 2.3353324 | ||
0.84 | 2.36977 | 2.351433 | 2.344272 | 2.3397729 | ||
0.85 | 2.374075 | 2.355351 | 2.346984 | 2.341734 | ||
0.88 | 2.359773 | 2.3514334 | 2.349319 | |||
0.92 | 2.369501 | 2.359773 | 2.359501 | |||
0.93 | 2.374209 | 2.364429 | 2.359501 | |||
0.96 | 2.370262 | 2.370262 | ||||
0.97 | 2.374793 | 2.370262 | ||||
0.98 | 2.375907 |
We next prove that the functions are monotonically non-decreasing and continuous.
Lemma 4.
For any , the function is continuous and monotonically non-decreasing in the entire range , and .
Proof.
The proof is by induction on . For , by Equation (4) we have . We also saw that . Monotonicity and continuity of the function follows from the fact that is monotonically non-decreasing and continuous.
Assume inductively that are all monotonically non-decreasing and continuous, and that . Recall that (see (18)),
In particular, . Note that for , by the inductive hypothesis . Also by the inductive hypothesis, does not increase as grows, while increases. For any , . Hence .
Fix two values . Since is a monotonically non-decreasing function,
(21) |
i.e., is monotonically non-decreasing function.
By induction hypothesis, we have , i.e., for , it holds that . We now argue that
(22) |
i.e, for , we have .
Claim 2.
For any , .
Proof.
For , we have . For , assume inductively that . Then
∎
On the other hand, for any , we have , implying inequality (22).
Hence, for , we have , and for it holds that . Thus by continuity and monotonicity of (which is a part of the induction hypothesis), there exists a value of , , such that
For fixed , let and , respectively, be the values such that and . Then, (by Inequality (21)) implies . By the induction hypothesis, is monotonically non-decreasing. Thus, , i.e., .
Finally, we argue that is a continuous function. Let , , be a fixed value. Since is a continuous function, for any , there exists such that for any with , we have . Recall that , for some fixed . Also,
Let be the value that minimizes . As and , we have
(23) |
This proves that is continuous to the right of (for any ). The proof that it is continuous to the left of , for any , is symmetric. ∎
In the next lemma we argue that with each application of the recursion we obtain running time which is no worse than the one we had before the current application. Moreover, we show that the recursion cannot lead to a better exponent than . Note that unlike Lemma 4 which applies in the entire range , the next lemma applies only for .
Lemma 5.
For any and any for any integer , we have
Proof.
The proof follows by induction on . For , we require
(24) |
Recall that . The inequality (24) (for ) now follows from Lemma 1, i.e., from
(25) |
Assume inductively that for some ,
Recall that
(26) |
Fix , . For , the function increases as grows but still we have . Also, by inductive hypothesis, . Moreover, , because and, by Lemma 4, is monotonically non-decreasing. Hence for any . The minimum in this range is achieved by setting , i.e., we have . At this point we still have . As we increase further, increases and decreases or stays the same. Recall that by Lemma 4, is a monotonically non-decreasing function in the entire range . Suppose first that
(27) |
Our analysis splits into two sub-cases. In the first sub-case, there exists a value so that . Then for , we have . By Lemma 4 is a monotonically non-increasing function of , while is a monotonically increasing function of . Thus,
In this sub-case, by Lemma 4 (monotonicity of ) we also have . On the other hand, if for all , we have , then, in particular, we have . However, by induction hypothesis, , contradiction.
The second sub-case is . Then by monotonicity of and (as functions of ) we have
For , , and thus
∎
Recall that the dual matrix multiplication exponent is the maximum (in fact, supremum) value such that .
Next, we argue that in the range , the functions () are strictly monotonically increasing. (We have already shown in Lemma 4 that these functions are monotonically non-decreasing in the entire range .)
Lemma 6.
For any integer , the function is strictly monotonically increasing in the range . Moreover, in the range , we also have
Proof.
We start with proving the second assertion of the lemma. The proof is by induction on . The induction base holds as is a monotonically increasing function for , and . Moreover, we have seen that for , we have (see Inequalities (24) and (25) and Lemma 1).
Assume inductively that for some , the function is strictly monotonically increasing in the range , and . Fix a value . We have
As by Lemma 4, we have and (by Claim 2) , by continuity of functions and (in terms of ) in the entire range (see Lemma 4), there exists a value such that . By monotonicity of the function in the entire range of (by Lemma 4 it is monotonically non-decreasing), we also conclude that
For , we have . By induction hypothesis, is a strictly monotonically decreasing function of in this range. Using induction hypothesis again, we recall that
Hence for we have
By slightly increasing beyond but below (so that and so that ), we increase and decrease . Moreover, we can also have
(Recall that by Lemma 4, is continuous.) Let denote such a value of . Since and, by induction hypothesis is monotonically increasing for , we have
It follows that . (As for all , we have , and both functions are monotone and continuous in terms of (by Lemma 4), and .) Hence
and also, .
Next, we prove that functions are all strictly monotonically increasing for . We have already seen that it is the case for . We assume inductively that it is the case for for some and prove it for
Observe that for , , and for , by monotonicity of we have
(28) |
On the other hand, for , (and ),
and for , we have by (28)
By continuity and strict monotonicity of for (by the induction hypothesis), the value for which satisfies therefore .
Consider now two values . Then
(29) |
Consider the value for which
(30) |
If then
as desired. Henceforth we assume that
Note also that
i.e., by the induction hypothesis, the function is strictly monotone between and , and
Hence
∎
For any integer , let be the value such that . Observe that by Lemma 5, we have . Hence the sequence converges to a limit , i.e., . Next, we analyze the value of and show that it is equal to . This means that under Assumption 1, sufficiently many recursive invocations of our algorithm lead to an algorithm that improves the state-of-the-art directed reachability for general graphs for all .
Lemma 7.
Proof.
Applying Lemma 5 to , we have
It follows that the sequence converges to a limit greater than or equal to . Assume for contradiction that . The following two cases arise:
Case 1.
In this case, for any arbitrarily small , there exists such that for every , we have
By Claim 1, for any , we also have . We can pick a sufficiently small so that
Hence, for , .
Since and is a monotonically non-decreasing function for (see Lemma 5), it follows that
But by definition, we have . Hence we get a contradiction in this case.
Case 2.
There exists some value such that
If is such that , we get a contradiction similar to the one obtained in Case 1. So we assume from this point on that
It is easy to see that . Indeed, otherwise . As (see Table 6), it follows that . On the other hand, for any , , and this is a contradiction.
Claim 3.
Proof.
Therefore, we have . Hence . But (weakly) increases as grows, and it is equal to in the limit. On the other hand, there exists a fixed constant such that (for all ) . This is a contradiction.
Under the assumption that , we have derived a contradiction in all the cases for which , for some , regardless of whether is less than or at least .
Therefore we conclude that . In other words, for any , there exists such that for any , we have , i.e., . ∎
It also follows that
and also for any , it holds that
(31) |
4.4 Analysis for graphs with edges, for
In this section, we discuss the convergence of the sequence , for a general value . Recall that for graphs with edges, is the exponent of in the number of operations required (under Assumption 1) for computing -direachability () by our recursive scheme of depth . By Inequality (9) we have
The following equation expresses the function in terms of the exponent of the desired diameter and the function .
The formula for for follows, because the running time required to build a -shortcut is dominated by the time needed to solve the path-direachability problem for paths in a graph with edges. The latter, by Assumption 1, can be done in time. (Observe that the recursive step (Line 5 of Algorithm 2) is invoked on the original input graph . Hence if has egdes, all recursive invocations are performed on a graph with edges as well.)
The following lemma is an easy lower bound on .
Lemma 8.
For any and and that satisfy , we have
Remark.
If , then a naive direachability algorithm that computes all-pairs direachabilities in time is at least as fast as any algorithm based on rectangular matrix multiplication. (The rectangular matrix multiplication requires time.)
Proof.
The proof follows by induction on . First, observe that
for .
Assume that for some , we have . By setting , we get
(32) |
For , we have . The last inequality is by inductive hypothesis. For , we have . In either case, , and thus
∎
We next prove a stronger inequality.
Lemma 9.
Remark.
Recall that the expression is the left boundary of the feasibility interval . This is the interval in which improves over the existing bound provided by naive direachability algorithm (see Inequality (10)).
Proof.
The proof is by induction on . The induction base is .
For , we have ,
and
Hence we need to argue that , i.e.,
(35) |
This is exactly the assumption of the lemma.
Note also that strict inequality in (35) implies that
.
(For , the right-hand-side of (35) is .
The inequality holds for .
See Inequality (12) in Section 3.2.)
Note also that since is continuous and monotonically non-decreasing in the range , so is as well.
Similarly, since is monotonically increasing in the range , this is the case with too.
For the induction step we again use . It follows that
(36) | ||||
(The last equality is by induction hypothesis.) Hence,
(37) |
and strict inequality holds if strict inequality holds in (35).
Also, for all , by induction hypothesis, is monotonically increasing. Thus, we have
If , then since is a monotonically non-increasing function of and is a monotonically increasing function of , it follows that
Otherwise, if , then there exists such that , proving that in both cases. Moreover, this argument implies that if inductively, , then as well.
Finally, the inductive argument that shows that is continuous and monotonically non-decreasing function of in the range is identical to the proof that it is the case for , given in the proof of Lemma 4. ∎
We have seen that for any , there exists a non-empty interval of values of such that for all we have
Since, for any in this range we have
it follows that these intervals for become only wider as grows, i.e.,
In fact, the left boundaries of all these intervals all agree. as they correspond to the same inequality
(38) |
(To see it, observe that assuming inductively that for , implies that under the same condition as well. See Lemma 9 and Inequality (37).) Recall that both inequalities and both lead to Inequality (38). However, as grows, the right boundaries of these intervals tend to .
Recall that the right boundaries of these intervals are determined by the inequalities . These inequalities hold for all , and by Lemma 7, .
Note also that for , all these functions agree.
Lemma 10.
For , we have
(39) |
Proof.
References
- [BW23] Aaron Bernstein and Nicole Wein. Closing the Gap Between Directed Hopsets and Shortcut Sets, pages 163–182. 20223. URL: https://epubs.siam.org/doi/abs/10.1137/1.9781611977554.ch7, arXiv:https://epubs.siam.org/doi/pdf/10.1137/1.9781611977554.ch7, doi:10.1137/1.9781611977554.ch7.
- [CKL+22] Li Chen, Rasmus Kyng, Yang P. Liu, Richard Peng, Maximilian Probst Gutenberg, and Sushant Sachdeva. Maximum flow and minimum-cost flow in almost-linear time. In 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS), pages 612–623, 2022. doi:10.1109/FOCS54457.2022.00064.
- [CW90] Don Coppersmith and Shmuel Winograd. Matrix multiplication via arithmetic progressions. Journal of Symbolic Computation, 9(3):251–280, 1990. Computational algebraic complexity editorial. URL: https://www.sciencedirect.com/science/article/pii/S0747717108800132, doi:https://doi.org/10.1016/S0747-7171(08)80013-2.
- [DP09] Ran Duan and Seth Pettie. Fast Algorithms for (max, min)-Matrix Multiplication and Bottleneck Shortest Paths, pages 384–391. 2009. doi:10.1137/1.9781611973068.43.
- [EN22] Michael Elkin and Ofer Neiman. Centralized, parallel, and distributed multi-source shortest paths via hopsets and rectangular matrix multiplication. In Petra Berenbrink and Benjamin Monmege, editors, 39th International Symposium on Theoretical Aspects of Computer Science, STACS 2022, March 15-18, 2022, Marseille, France (Virtual Conference), volume 219 of LIPIcs, pages 27:1–27:22. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2022. URL: https://doi.org/10.4230/LIPIcs.STACS.2022.27, doi:10.4230/LIPICS.STACS.2022.27.
- [Gal24] François Le Gall. Faster rectangular matrix multiplication by combination loss analysis. In Proceedings of the 2023 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), page To appear in SODA 2024, 2024.
- [GIA+21] Fabrizio Grandoni, Giuseppe F. Italian, Aleksander Łukasiewicz, Nikos Parotsidis, and Przemysław Uznański. All-Pairs LCA in DAGs: Breaking through the barrier, pages 273–289. 2021. URL: https://epubs.siam.org/doi/abs/10.1137/1.9781611976465.18, arXiv:https://epubs.siam.org/doi/pdf/10.1137/1.9781611976465.18, doi:10.1137/1.9781611976465.18.
- [GU18] François Le Gall and Florent Urrutia. Improved rectangular matrix multiplication using powers of the coppersmith-winograd tensor. In Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’18, page 1029–1046, USA, 2018. Society for Industrial and Applied Mathematics.
- [KP22a] Shimon Kogan and Merav Parter. Beating matrix multiplication for -directed shortcuts. In 49th International Colloquium on Automata, Languages, and Programming (ICALP 2022), volume 229 of Leibniz International Proceedings in Informatics (LIPIcs), pages 82:1–82:20, Dagstuhl, Germany, 2022. doi:10.4230/LIPIcs.ICALP.2022.82.
- [KP22b] Shimon Kogan and Merav Parter. New Diameter-Reducing Shortcuts and Directed Hopsets: Breaking the Barrier, pages 1326–1341. 2022.
- [LG14] François Le Gall. Powers of tensors and fast matrix multiplication. In Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, ISSAC ’14, page 296–303, New York, NY, USA, 2014. Association for Computing Machinery. doi:10.1145/2608628.2608664.
- [LGN14] François Le Gall and Harumichi Nishimura. Quantum algorithms for matrix products over semirings. In R. Ravi and Inge Li Gørtz, editors, Algorithm Theory – SWAT 2014, pages 331–343, Cham, 2014. Springer International Publishing.
- [WXXZ24] Virginia Vassilevska Williams, Yinzhan Xu, Zixuan Xu, and Renfei Zhou. New bounds for matrix multiplication: from alpha to omega. In Proceedings of the 2023 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), page To appear in SODA 2024, 2024.
- [Zwi02] Uri Zwick. All pairs shortest paths using bridging sets and rectangular matrix multiplication. J. ACM, 49(3):289?317, may 2002. doi:10.1145/567112.567114.