2,299 research outputs found

    Robustness of scale-free spatial networks

    Get PDF
    A growing family of random graphs is called robust if it retains a giant component after percolation with arbitrary positive retention probability. We study robustness for graphs, in which new vertices are given a spatial position on the dd-dimensional torus and are connected to existing vertices with a probability favouring short spatial distances and high degrees. In this model of a scale-free network with clustering we can independently tune the power law exponent τ\tau of the degree distribution and the rate δd\delta d at which the connection probability decreases with the distance of two vertices. We show that the network is robust if τ<2+1/δ\tau<2+1/\delta, but fails to be robust if τ>3\tau>3. In the case of one-dimensional space we also show that the network is not robust if τ<2+1/(δ1)\tau<2+1/(\delta-1). This implies that robustness of a scale-free network depends not only on its power-law exponent but also on its clustering features. Other than the classical models of scale-free networks our model is not locally tree-like, and hence we need to develop novel methods for its study, including, for example, a surprising application of the BK-inequality.Comment: 34 pages, 4 figure

    Fault-Tolerant Shortest Paths - Beyond the Uniform Failure Model

    Full text link
    The overwhelming majority of survivable (fault-tolerant) network design models assume a uniform scenario set. Such a scenario set assumes that every subset of the network resources (edges or vertices) of a given cardinality kk comprises a scenario. While this approach yields problems with clean combinatorial structure and good algorithms, it often fails to capture the true nature of the scenario set coming from applications. One natural refinement of the uniform model is obtained by partitioning the set of resources into faulty and secure resources. The scenario set contains every subset of at most kk faulty resources. This work studies the Fault-Tolerant Path (FTP) problem, the counterpart of the Shortest Path problem in this failure model. We present complexity results alongside exact and approximation algorithms for FTP. We emphasize the vast increase in the complexity of the problem with respect to its uniform analogue, the Edge-Disjoint Paths problem

    Logarithmically-small Minors and Topological Minors

    Get PDF
    Mader proved that for every integer tt there is a smallest real number c(t)c(t) such that any graph with average degree at least c(t)c(t) must contain a KtK_t-minor. Fiorini, Joret, Theis and Wood conjectured that any graph with nn vertices and average degree at least c(t)+ϵc(t)+\epsilon must contain a KtK_t-minor consisting of at most C(ϵ,t)lognC(\epsilon,t)\log n vertices. Shapira and Sudakov subsequently proved that such a graph contains a KtK_t-minor consisting of at most C(ϵ,t)lognloglognC(\epsilon,t)\log n \log\log n vertices. Here we build on their method using graph expansion to remove the loglogn\log\log n factor and prove the conjecture. Mader also proved that for every integer tt there is a smallest real number s(t)s(t) such that any graph with average degree larger than s(t)s(t) must contain a KtK_t-topological minor. We prove that, for sufficiently large tt, graphs with average degree at least (1+ϵ)s(t)(1+\epsilon)s(t) contain a KtK_t-topological minor consisting of at most C(ϵ,t)lognC(\epsilon,t)\log n vertices. Finally, we show that, for sufficiently large tt, graphs with average degree at least (1+ϵ)c(t)(1+\epsilon)c(t) contain either a KtK_t-minor consisting of at most C(ϵ,t)C(\epsilon,t) vertices or a KtK_t-topological minor consisting of at most C(ϵ,t)lognC(\epsilon,t)\log n vertices.Comment: 19 page

    Low-Congestion Shortcut and Graph Parameters

    Get PDF
    Distributed graph algorithms in the standard CONGEST model often exhibit the time-complexity lower bound of Omega~(sqrt{n} + D) rounds for many global problems, where n is the number of nodes and D is the diameter of the input graph. Since such a lower bound is derived from special "hard-core" instances, it does not necessarily apply to specific popular graph classes such as planar graphs. The concept of low-congestion shortcuts is initiated by Ghaffari and Haeupler [SODA2016] for addressing the design of CONGEST algorithms running fast in restricted network topologies. Specifically, given a specific graph class X, an f-round algorithm of constructing shortcuts of quality q for any instance in X results in O~(q + f)-round algorithms of solving several fundamental graph problems such as minimum spanning tree and minimum cut, for X. The main interest on this line is to identify the graph classes allowing the shortcuts which are efficient in the sense of breaking O~(sqrt{n}+D)-round general lower bounds. In this paper, we consider the relationship between the quality of low-congestion shortcuts and three major graph parameters, chordality, diameter, and clique-width. The main contribution of the paper is threefold: (1) We show an O(1)-round algorithm which constructs a low-congestion shortcut with quality O(kD) for any k-chordal graph, and prove that the quality and running time of this construction is nearly optimal up to polylogarithmic factors. (2) We present two algorithms, each of which constructs a low-congestion shortcut with quality O~(n^{1/4}) in O~(n^{1/4}) rounds for graphs of D=3, and that with quality O~(n^{1/3}) in O~(n^{1/3}) rounds for graphs of D=4 respectively. These results obviously deduce two MST algorithms running in O~(n^{1/4}) and O~(n^{1/3}) rounds for D=3 and 4 respectively, which almost close the long-standing complexity gap of the MST construction in small-diameter graphs originally posed by Lotker et al. [Distributed Computing 2006]. (3) We show that bounding clique-width does not help the construction of good shortcuts by presenting a network topology of clique-width six where the construction of MST is as expensive as the general case

    Discovery of statistical equivalence classes using computer algebra

    Full text link
    Discrete statistical models supported on labelled event trees can be specified using so-called interpolating polynomials which are generalizations of generating functions. These admit a nested representation. A new algorithm exploits the primary decomposition of monomial ideals associated with an interpolating polynomial to quickly compute all nested representations of that polynomial. It hereby determines an important subclass of all trees representing the same statistical model. To illustrate this method we analyze the full polynomial equivalence class of a staged tree representing the best fitting model inferred from a real-world dataset.Comment: 26 pages, 9 figure

    Degree-3 Treewidth Sparsifiers

    Full text link
    We study treewidth sparsifiers. Informally, given a graph GG of treewidth kk, a treewidth sparsifier HH is a minor of GG, whose treewidth is close to kk, V(H)|V(H)| is small, and the maximum vertex degree in HH is bounded. Treewidth sparsifiers of degree 33 are of particular interest, as routing on node-disjoint paths, and computing minors seems easier in sub-cubic graphs than in general graphs. In this paper we describe an algorithm that, given a graph GG of treewidth kk, computes a topological minor HH of GG such that (i) the treewidth of HH is Ω(k/polylog(k))\Omega(k/\text{polylog}(k)); (ii) V(H)=O(k4)|V(H)| = O(k^4); and (iii) the maximum vertex degree in HH is 33. The running time of the algorithm is polynomial in V(G)|V(G)| and kk. Our result is in contrast to the known fact that unless NPcoNP/polyNP \subseteq coNP/{\sf poly}, treewidth does not admit polynomial-size kernels. One of our key technical tools, which is of independent interest, is a construction of a small minor that preserves node-disjoint routability between two pairs of vertex subsets. This is closely related to the open question of computing small good-quality vertex-cut sparsifiers that are also minors of the original graph.Comment: Extended abstract to appear in Proceedings of ACM-SIAM SODA 201
    corecore