Asunder: Constrained Network Structure Detection on Undirected Graphs.
Project description
Asunder is a Python package for constrained network structure detection (constrained graph clustering) on undirected graphs, with a workflow centered on column generation and customizable master/subproblem pipelines. Graph clustering itself is an important task in a lot of traditional optimization, data-mining and machine learning pipelines. In these application areas, constraints on the kind of clusters or structures that are detected naturally occur but generalized workflows / packages for handling them did not exist. Asunder changes that.
Asunder works by combining traditional solver based optimization with classical machine learning algorithms. In the process, expensive Integer Linear Program (ILP) subproblems are replaced with heuristic clustering algorithms while ensuring that dual information from an LP master problem are respected. This enables the solution of a wide range of constrained structure detection (constrained graph clustering) problems, insofar as a master problem, and any other relevant custom element, can be properly formulated. See the problem fit section and the Asunder documentation for more details.
Development of Asunder is led by Andrew Allman's Process Systems Research Team at the University of Michigan.
Install
Base install:
python3 -m pip install put-asunder
Optional extras:
python3 -m pip install "put-asunder[graph,viz]"
Legacy heuristics (best-effort on Python 3.13):
python3 -m pip install "put-asunder[legacy]"
Python Support
- Guaranteed: Python 3.10, 3.11, 3.12, 3.13 for core package.
- Guaranteed: mainstream extras (
graph,viz) on Python 3.10 to 3.13. - Best-effort:
legacyextra on Python 3.13.
Package Layout
asunder: top-level facade for orchestration, config, solvers, and common convenience entry points.asunder.base: reusable algorithms, branch-and-price utilities, column-generation modules, metrics, utilities, and visualization helpers.asunder.nlbp: the built-in nonlinear branch-and-price application layer, including case studies, evaluation flow, and NLBP-specific refinement.
Quickstart
import numpy as np
from asunder import CSDDecomposition, CSDDecompositionConfig
# graph adjacency
A = np.array([
[0, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0],
[1, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0],
[1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1],
[0, 0, 0, 0, 1, 1, 0, 0, 0, 0, 0, 0, 1],
[0, 0, 0, 1, 0, 1, 0, 0, 0, 0, 0, 0, 0],
[0, 0, 0, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0],
[0, 0, 0, 0, 0, 0, 0, 1, 1, 0, 0, 0, 1],
[0, 0, 0, 0, 0, 0, 1, 0, 1, 0, 0, 0, 0],
[0, 0, 0, 0, 0, 0, 1, 1, 0, 0, 0, 0, 0],
[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 0],
[0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 1, 0],
[0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 0, 1],
[0, 0, 1, 1, 0, 0, 1, 0, 0, 0, 0, 1, 0]
], dtype=float)
# ifc_params contains function and parameters for generating initial feasible partition(s)
cfg = CSDDecompositionConfig(
ifc_params={"generator": lambda N, **_: [np.ones((N, N))], "num": 1, "args": {"N": A.shape[0]}},
extract_dual=False,
final_master_solve=False,
)
result = CSDDecomposition(config=cfg).run(A)
print(result.metadata)
The example above uses the top-level facade. Canonical reusable imports live under asunder.base, while the packaged nonlinear branch-and-price workflow lives under asunder.nlbp.
from asunder.base.column_generation.subproblem import heuristic_subproblem
from asunder.base.algorithms.modular_VFD import modular_very_fortunate_descent
from asunder.nlbp.algorithms.refinement import refine_partition_linear_group
from asunder.nlbp.case_studies import run_evaluation
Solver Setup
Asunder accepts user-provided solver objects. Solver support is configured through your local environment rather than through a dedicated package extra. For Gurobi, GRB_LICENSE_FILE is used by your environment. Example:
from asunder import create_solver
solver = create_solver("gurobi_direct")
Problem Fit
Asunder supports general constrained partitioning when requirements can be expressed as must-link, cannot-link and edge-based constraints.
Asunder also works well out of the box for optimization problems where coordination or operations are coupled across space (e.g. central coupling) and/or time and those interactions can be represented as a graph over constraints.
Sample fit signals:
- a useful interpretation of must-link/cannot-link or worthy-edge constraints
- coupling across time periods, units, or resources
- mixed discrete-continuous structure with meaningful constraint interactions
- value from multilevel partitioning or core-periphery structure detection
Some representative domains:
- stochastic design and dispatch in energy systems
- scheduling and resource allocation in healthcare systems
- planning, routing, and location in supply chain and logistics
- network configuration and resource management in telecommunications
As a rule of thumb, reusable decomposition logic belongs in asunder.base, while nonlinear branch-and-price application logic belongs in asunder.nlbp.
For a fuller guide on where default workflows are sufficient versus where customization helps, see the problem fit guide.
Customization Points
For custom problems, typical extension points are:
- Initial feasible partition generator.
solve_master_problemreplacement.- Optional heuristic or ILP subproblem replacement.
- Optional partition refinement stage.
Reusable extension logic should generally be added under asunder.base. The built-in nonlinear branch-and-price refinement path lives under asunder.nlbp.algorithms.
Constraint Graph Compatibility
For the built-in case-study evaluation workflows (run_evaluation, implemented in asunder.nlbp.case_studies.runner and re-exported at top level), Asunder expects a constraint-graph pattern consistent with the provided case studies.
Required structure for run_evaluation-style workflows:
- undirected graph (typically
networkx.Graph) - node attribute
constraint(string tag used for ground-truth and role grouping) - edge attribute
var_typewith values"integer"or"continuous"
Commonly present (recommended) attributes:
- node attribute
type(for example"constraint") - node attribute
details(metadata dict) - edge attributes
weight,variables,var_types
How these are used:
constraintidentifies core/nonlinear tags in built-in case studiesvar_typedetermines candidate edge sets for core-periphery (CP) and community detection with refinement (CD_Refine) paths
If you are not using run_evaluation and instead calling decomposition APIs directly, you can work from an adjacency matrix plus explicit must_link, cannot_link, and optional worthy_edges.
Examples
- Nonlinear B&P-style decomposition:
examples/nonlinear_bp.py - Custom subproblem wiring:
examples/custom_subproblem.py
Documentation
The full documentation is available at asunder.readthedocs.io. That includes getting started guides, problem-fit guidance, API reference pages for asunder.base and asunder.nlbp, and development notes.
References
Asunder integrates or wraps methods from:
- networkx
- sklearn
- python-igraph / leidenalg
- scikit-network
- signed-louvain style algorithms
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file put_asunder-0.1.2.tar.gz.
File metadata
- Download URL: put_asunder-0.1.2.tar.gz
- Upload date:
- Size: 94.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
8fd23b2996038323fa141cd4110f6eabb2422fcf50168f4cc6e04a95b8e632aa
|
|
| MD5 |
47eb145bb562ebb9893539410412624f
|
|
| BLAKE2b-256 |
d6cd0d795a50580723c9372dffbf6195927c1fac223b8590033a3c4d752a545f
|
File details
Details for the file put_asunder-0.1.2-py3-none-any.whl.
File metadata
- Download URL: put_asunder-0.1.2-py3-none-any.whl
- Upload date:
- Size: 106.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3ad313ff4bd9c204135fe5b910a1db1ad5b2b27441f40419ac9e2a430e92192c
|
|
| MD5 |
d022f81f0b077ce23cfb143d18bfccb4
|
|
| BLAKE2b-256 |
ccf55d8bb907b3cd246c597025ab3ee849e9bb0be480a56fbe7519e74b298888
|