18,657 research outputs found
A linear time algorithm for a variant of the max cut problem in series parallel graphs
Given a graph , a connected sides cut or
is the set of edges of E linking all vertices of U to all vertices
of such that the induced subgraphs and are connected. Given a positive weight function defined on , the
maximum connected sides cut problem (MAX CS CUT) is to find a connected sides
cut such that is maximum. MAX CS CUT is NP-hard. In this
paper, we give a linear time algorithm to solve MAX CS CUT for series parallel
graphs. We deduce a linear time algorithm for the minimum cut problem in the
same class of graphs without computing the maximum flow.Comment: 6 page
Fault-Tolerant Shortest Paths - Beyond the Uniform Failure Model
The overwhelming majority of survivable (fault-tolerant) network design
models assume a uniform scenario set. Such a scenario set assumes that every
subset of the network resources (edges or vertices) of a given cardinality
comprises a scenario. While this approach yields problems with clean
combinatorial structure and good algorithms, it often fails to capture the true
nature of the scenario set coming from applications.
One natural refinement of the uniform model is obtained by partitioning the
set of resources into faulty and secure resources. The scenario set contains
every subset of at most faulty resources. This work studies the
Fault-Tolerant Path (FTP) problem, the counterpart of the Shortest Path problem
in this failure model. We present complexity results alongside exact and
approximation algorithms for FTP. We emphasize the vast increase in the
complexity of the problem with respect to its uniform analogue, the
Edge-Disjoint Paths problem
Detecting Communities under Differential Privacy
Complex networks usually expose community structure with groups of nodes
sharing many links with the other nodes in the same group and relatively few
with the nodes of the rest. This feature captures valuable information about
the organization and even the evolution of the network. Over the last decade, a
great number of algorithms for community detection have been proposed to deal
with the increasingly complex networks. However, the problem of doing this in a
private manner is rarely considered. In this paper, we solve this problem under
differential privacy, a prominent privacy concept for releasing private data.
We analyze the major challenges behind the problem and propose several schemes
to tackle them from two perspectives: input perturbation and algorithm
perturbation. We choose Louvain method as the back-end community detection for
input perturbation schemes and propose the method LouvainDP which runs Louvain
algorithm on a noisy super-graph. For algorithm perturbation, we design
ModDivisive using exponential mechanism with the modularity as the score. We
have thoroughly evaluated our techniques on real graphs of different sizes and
verified their outperformance over the state-of-the-art
Some recent results in the analysis of greedy algorithms for assignment problems
We survey some recent developments in the analysis of greedy algorithms for assignment and transportation problems. We focus on the linear programming model for matroids and linear assignment problems with Monge property, on general linear programs, probabilistic analysis for linear assignment and makespan minimization, and on-line algorithms for linear and non-linear assignment problems
- …