56,098 research outputs found
Parameterized Verification of Safety Properties in Ad Hoc Network Protocols
We summarize the main results proved in recent work on the parameterized
verification of safety properties for ad hoc network protocols. We consider a
model in which the communication topology of a network is represented as a
graph. Nodes represent states of individual processes. Adjacent nodes represent
single-hop neighbors. Processes are finite state automata that communicate via
selective broadcast messages. Reception of a broadcast is restricted to
single-hop neighbors. For this model we consider a decision problem that can be
expressed as the verification of the existence of an initial topology in which
the execution of the protocol can lead to a configuration with at least one
node in a certain state. The decision problem is parametric both on the size
and on the form of the communication topology of the initial configurations. We
draw a complete picture of the decidability and complexity boundaries of this
problem according to various assumptions on the possible topologies.Comment: In Proceedings PACO 2011, arXiv:1108.145
Improved Compact Visibility Representation of Planar Graph via Schnyder's Realizer
Let be an -node planar graph. In a visibility representation of ,
each node of is represented by a horizontal line segment such that the line
segments representing any two adjacent nodes of are vertically visible to
each other. In the present paper we give the best known compact visibility
representation of . Given a canonical ordering of the triangulated , our
algorithm draws the graph incrementally in a greedy manner. We show that one of
three canonical orderings obtained from Schnyder's realizer for the
triangulated yields a visibility representation of no wider than
. Our easy-to-implement O(n)-time algorithm bypasses the
complicated subroutines for four-connected components and four-block trees
required by the best previously known algorithm of Kant. Our result provides a
negative answer to Kant's open question about whether is a
worst-case lower bound on the required width. Also, if has no degree-three
(respectively, degree-five) internal node, then our visibility representation
for is no wider than (respectively, ).
Moreover, if is four-connected, then our visibility representation for
is no wider than , matching the best known result of Kant and He. As a
by-product, we obtain a much simpler proof for a corollary of Wagner's Theorem
on realizers, due to Bonichon, Sa\"{e}c, and Mosbah.Comment: 11 pages, 6 figures, the preliminary version of this paper is to
appear in Proceedings of the 20th Annual Symposium on Theoretical Aspects of
Computer Science (STACS), Berlin, Germany, 200
Layered Label Propagation: A MultiResolution Coordinate-Free Ordering for Compressing Social Networks
We continue the line of research on graph compression started with WebGraph,
but we move our focus to the compression of social networks in a proper sense
(e.g., LiveJournal): the approaches that have been used for a long time to
compress web graphs rely on a specific ordering of the nodes (lexicographical
URL ordering) whose extension to general social networks is not trivial. In
this paper, we propose a solution that mixes clusterings and orders, and devise
a new algorithm, called Layered Label Propagation, that builds on previous work
on scalable clustering and can be used to reorder very large graphs (billions
of nodes). Our implementation uses overdecomposition to perform aggressively on
multi-core architecture, making it possible to reorder graphs of more than 600
millions nodes in a few hours. Experiments performed on a wide array of web
graphs and social networks show that combining the order produced by the
proposed algorithm with the WebGraph compression framework provides a major
increase in compression with respect to all currently known techniques, both on
web graphs and on social networks. These improvements make it possible to
analyse in main memory significantly larger graphs
Rich-club and page-club coefficients for directed graphs
Rich-club and page-club coefficients and their null models are introduced for
directed graphs. Null models allow for a quantitative discussion of the
rich-club and page-club phenomena. These coefficients are computed for four
directed real-world networks: Arxiv High Energy Physics paper citation network,
Web network (released from Google), Citation network among US Patents, and
Email network from a EU research institution. The results show a high
correlation between rich-club and page-club ordering. For journal paper
citation network, we identify both rich-club and page-club ordering, showing
that {}"elite" papers are cited by other {}"elite" papers. Google web network
shows partial rich-club and page-club ordering up to some point and then a
narrow declining of the corresponding normalized coefficients, indicating the
lack of rich-club ordering and the lack of page-club ordering, i.e. high
in-degree (PageRank) pages purposely avoid sharing links with other high
in-degree (PageRank) pages. For UC patents citation network, we identify
page-club and rich-club ordering providing a conclusion that {}"elite" patents
are cited by other {}"elite" patents. Finally, for e-mail communication network
we show lack of both rich-club and page-club ordering. We construct an example
of synthetic network showing page-club ordering and the lack of rich-club
ordering.Comment: 18 pages, 6 figure
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs
Attack graphs are a powerful tool for security risk assessment by analysing
network vulnerabilities and the paths attackers can use to compromise network
resources. The uncertainty about the attacker's behaviour makes Bayesian
networks suitable to model attack graphs to perform static and dynamic
analysis. Previous approaches have focused on the formalization of attack
graphs into a Bayesian model rather than proposing mechanisms for their
analysis. In this paper we propose to use efficient algorithms to make exact
inference in Bayesian attack graphs, enabling the static and dynamic network
risk assessments. To support the validity of our approach we have performed an
extensive experimental evaluation on synthetic Bayesian attack graphs with
different topologies, showing the computational advantages in terms of time and
memory use of the proposed techniques when compared to existing approaches.Comment: 14 pages, 15 figure
- …