27 research outputs found

    Random subgraphs make identification affordable

    Full text link
    An identifying code of a graph is a dominating set which uniquely determines all the vertices by their neighborhood within the code. Whereas graphs with large minimum degree have small domination number, this is not the case for the identifying code number (the size of a smallest identifying code), which indeed is not even a monotone parameter with respect to graph inclusion. We show that every graph GG with nn vertices, maximum degree Δ=ω(1)\Delta=\omega(1) and minimum degree Ύ≄clog⁡Δ\delta\geq c\log{\Delta}, for some constant c>0c>0, contains a large spanning subgraph which admits an identifying code with size O(nlog⁡Δή)O\left(\frac{n\log{\Delta}}{\delta}\right). In particular, if ÎŽ=Θ(n)\delta=\Theta(n), then GG has a dense spanning subgraph with identifying code O(log⁥n)O\left(\log n\right), namely, of asymptotically optimal size. The subgraph we build is created using a probabilistic approach, and we use an interplay of various random methods to analyze it. Moreover we show that the result is essentially best possible, both in terms of the number of deleted edges and the size of the identifying code

    Bounds and extremal graphs for total dominating identifying codes

    Full text link
    An identifying code CC of a graph GG is a dominating set of GG such that any two distinct vertices of GG have distinct closed neighbourhoods within CC. The smallest size of an identifying code of GG is denoted γID(G)\gamma^{\text{ID}}(G). When every vertex of GG also has a neighbour in CC, it is said to be a total dominating identifying code of GG, and the smallest size of a total dominating identifying code of GG is denoted by γtID(G)\gamma_t^{\text{ID}}(G). Extending similar characterizations for identifying codes from the literature, we characterize those graphs GG of order nn with γtID(G)=n\gamma_t^{\text{ID}}(G)=n (the only such connected graph is P3P_3) and γtID(G)=n−1\gamma_t^{\text{ID}}(G)=n-1 (such graphs either satisfy γID(G)=n−1\gamma^{\text{ID}}(G)=n-1 or are built from certain such graphs by adding a set of universal vertices, to each of which a private leaf is attached). Then, using bounds from the literature, we remark that any (open and closed) twin-free tree of order nn has a total dominating identifying code of size at most 3n4\frac{3n}{4}. This bound is tight, and we characterize the trees reaching it. Moreover, by a new proof, we show that this bound actually holds for the larger class of all twin-free graphs of girth at least 5. The cycle C8C_8 also attains this bound. We also provide a generalized bound for all graphs of girth at least 5 (possibly with twins). Finally, we relate γtID(G)\gamma_t^{\text{ID}}(G) to the related parameter γID(G)\gamma^{\text{ID}}(G) as well as the location-domination number of GG and its variants, providing bounds that are either tight or almost tight

    Identifying codes in vertex-transitive graphs and strongly regular graphs

    Get PDF
    We consider the problem of computing identifying codes of graphs and its fractional relaxation. The ratio between the size of optimal integer and fractional solutions is between 1 and 2ln(vertical bar V vertical bar) + 1 where V is the set of vertices of the graph. We focus on vertex-transitive graphs for which we can compute the exact fractional solution. There are known examples of vertex-transitive graphs that reach both bounds. We exhibit infinite families of vertex-transitive graphs with integer and fractional identifying codes of order vertical bar V vertical bar(alpha) with alpha is an element of{1/4, 1/3, 2/5}These families are generalized quadrangles (strongly regular graphs based on finite geometries). They also provide examples for metric dimension of graphs

    Identifying codes in vertex-transitive graphs and strongly regular graphs

    Full text link
    We consider the problem of computing identifying codes of graphs and its fractional relaxation. The ratio between the size of optimal integer and fractional solutions is between 1 and 2 ln(|V|)+1 where V is the set of vertices of the graph. We focus on vertex-transitive graphs for which we can compute the exact fractional solution. There are known examples of vertex-transitive graphs that reach both bounds. We exhibit infinite families of vertex-transitive graphs with integer and fractional identifying codes of order |V|^a with a in {1/4,1/3,2/5}. These families are generalized quadrangles (strongly regular graphs based on finite geometries). They also provide examples for metric dimension of graphs

    On location, domination and information retrieval

    Get PDF
    The thesis is divided into two main branches: identifying and locatingdominating codes, and information retrieval. The former topics are motivated by the aim to locate objects in sensor networks (or other similar applications) and the latter one by the need to retrieve information in memories such as DNA data storage systems. Albeit the underlying applications, the study on these topics mainly belongs to discrete mathematics; more specically, to the elds of coding and graph theory. The sensor networks are usually represented by graphs where vertices represent the monitored locations and edges the connections between the locations. Moreover, the locations of the sensors are determined by a code. Furthermore, the desired properties of the sensor network are deeply linked with the properties of the underlying code. The number of errors in reading the data is abundant in the DNA data storage systems. In particular, there can occur more errors than a reasonable error-correcting code can handle. However, this problem is somewhat oset by the possibility to obtain multiple approximations of the same information from the data storage. Hence, the information retrieval process can be modelled by the Levenshtein's channel model, where a message is sent through multiple noisy channels and multiple outputs are received. In the rst two papers of the thesis, we introduce and study the new concepts of self- and solid-locating-dominating codes as a natural analogy to self-identifying codes with respect to locating-dominating codes. The rst paper introduces these new codes and considers them in some graphs such as the Hamming graphs. Then, in the second paper, we broaden our view on the topic by considering graph theoretical questions. We give optimal codes in multiple dierent graph classes and some more general results using concepts such as the Dilworth number and graph complements. The third paper focuses on the q-ary Hamming spaces. In particular, we disprove a conjecture proposed by Goddard and Wash related to identifying codes. In the fourth paper, we return to self- and solid-locating-dominating codes and give optimal codes in some graph classes and consider their densities in innite graphs. In the fth paper, we consider information retrieval in memories; in particular, the Levenshtein's channel model. In the channel model, we transmit some codeword belonging to the binary Hamming space through multiple identical channels. With the help of multiple dierent outputs, we give a list of codewords which may have been sent. In the paper, we study the number of channels required to have a rather small (constant) list size when the properties of the channels, the code and the dimension of the Hamming space are xed. In particular, we give an exact relation between the number of channels and the asymptotic value of the maximum list size.VÀitöskirja kÀsittelee kahta aihetta: identioivia ja paikantavia peittokoodeja sekÀ tiedon noutamista muistista. EnsimmÀisen aiheen motivaationa on objektien paikantaminen sensoriverkoista (sekÀ muut samankaltaiset sovellukset) ja jÀlkimmÀisen tiedonnouto DNA-muisteista. NÀiden aiheiden tutkimus kuuluu diskreettiin matematiikkaan, tÀsmÀllisemmin koodaus- ja graa-teoriaan. Sensoriverkkoja kuvataan yleensÀ graafeilla, joissa solmut esittÀvÀt tarkkailtuja kohteita ja viivat yhteyksiÀ nÀiden kohteiden vÀlillÀ. Edelleen sensorien paikat mÀÀrÀytyvÀt annetun koodin perusteella. TÀstÀ johtuen sensoriverkon halutut ominaisuudet pohjautuvat vahvasti alla olevaan koodiin. Luettaessa tietoa DNA-muisteista tapahtuvien virheiden mÀÀrÀ saattaa olla erittÀin suuri; erityisesti suurempi kuin kiinnitetyn virheitÀ korjaavan koodin korjauskyky. Toisaalta tilanne ei ole aivan nÀin ongelmallinen, sillÀ DNA-muisteista voidaan saada useita eri arvioita muistiin tallennetusta tiedosta. NÀistÀ syistÀ johtuen tietojen noutamista DNA-muisteista voidaan mallintaa kÀyttÀen Levenshteinin kanavamallia. Kanavamallissa yksi viesti lÀhetetÀÀn useiden hÀiriöisten kanavien kautta ja nÀin vastaanotetaan useita viestejÀ (yksi jokaisesta kanavasta). VÀitöskirjan kahdessa ensimmÀisessÀ julkaisussa esitellÀÀn ja tutkitaan uusia paikantavien peittokoodien luokkia, jotka pohjautuvat aiemmin tutkittuihin itse-identioiviin koodeihin. EnsimmÀisessÀ julkaisussa on esitelty nÀmÀ koodiluokat sekÀ tutkittu niitÀ joissain graafeissa kuten Hammingin graafeissa. TÀmÀn jÀlkeen toisessa julkaisussa kÀsitellÀÀn yleisiÀ graa-teoreettisia kysymyksiÀ. Julkaisussa esitetÀÀn optimaaliset koodit useille graaperheille sekÀ joitain yleisempiÀ tuloksia kÀyttÀen mm. Dilworthin lukua sekÀ graakomplementteja. Kolmas julkaisu keskittyy q-arisiin Hammingin avaruuksiin. Erityisesti julkaisussa todistetaan vÀÀrÀksi Goddardin ja Washin aiemmin esittÀmÀ identioivia koodeja koskeva otaksuma. NeljÀs artikkeli kÀsittelee jo kahdessa ensimmÀisessÀ artikkelissa esiteltyjÀ paikantavien peittokoodien luokkia. Artikkeli esittÀÀ optimaalisia koodeja useille graaperheille sekÀ kÀsittelee ÀÀrettömiÀ graafeja. Viides artikkeli kÀsittelee tiedonnoutoa ja erityisesti Levenshteinin kanavamallia. Kanavamallissa binÀÀriseen Hammingin avaruuteen kuuluva koodisana lÀhetetÀÀn useiden identtisten kanavien lÀpi. NÀistÀ kanavista vastaanotetaan useita eri arvioita lÀhetetystÀ koodisanasta ja rakennetaan lista mahdollisesti lÀhetetyistÀ sanoista. Artikkelissa tutkitaan kuinka monta kanavaa tarvitaan, jotta tÀmÀn listan koko on pieni (vakio), kun kanavien ominaisuudet, koodi ja Hammingin avaruuden dimensio on kiinnitetty. Erityisesti löydetÀÀn tÀsmÀllinen suhde kanavien lukumÀÀrÀn ja asymptoottisesti maksimaalisen listan koon vÀlille

    Distances and Domination in Graphs

    Get PDF
    This book presents a compendium of the 10 articles published in the recent Special Issue “Distance and Domination in Graphs”. The works appearing herein deal with several topics on graph theory that relate to the metric and dominating properties of graphs. The topics of the gathered publications deal with some new open lines of investigations that cover not only graphs, but also digraphs. Different variations in dominating sets or resolving sets are appearing, and a review on some networks’ curvatures is also present

    Polynomial growth of concept lattices, canonical bases and generators:: extremal set theory in Formal Concept Analysis

    Get PDF
    We prove that there exist three distinct, comprehensive classes of (formal) contexts with polynomially many concepts. Namely: contexts which are nowhere dense, of bounded breadth or highly convex. Already present in G. Birkhoff's classic monograph is the notion of breadth of a lattice; it equals the number of atoms of a largest boolean suborder. Even though it is natural to define the breadth of a context as being that of its concept lattice, this idea had not been exploited before. We do this and establish many equivalences. Amongst them, it is shown that the breadth of a context equals the size of its largest minimal generator, its largest contranominal-scale subcontext, as well as the Vapnik-Chervonenkis dimension of both its system of extents and of intents. The polynomiality of the aforementioned classes is proven via upper bounds (also known as majorants) for the number of maximal bipartite cliques in bipartite graphs. These are results obtained by various authors in the last decades. The fact that they yield statements about formal contexts is a reward for investigating how two established fields interact, specifically Formal Concept Analysis (FCA) and graph theory. We improve considerably the breadth bound. Such improvement is twofold: besides giving a much tighter expression, we prove that it limits the number of minimal generators. This is strictly more general than upper bounding the quantity of concepts. Indeed, it automatically implies a bound on these, as well as on the number of proper premises. A corollary is that this improved result is a bound for the number of implications in the canonical basis too. With respect to the quantity of concepts, this sharper majorant is shown to be best possible. Such fact is established by constructing contexts whose concept lattices exhibit exactly that many elements. These structures are termed, respectively, extremal contexts and extremal lattices. The usual procedure of taking the standard context allows one to work interchangeably with either one of these two extremal structures. Extremal lattices are equivalently defined as finite lattices which have as many elements as possible, under the condition that they obey two upper limits: one for its number of join-irreducibles, other for its breadth. Subsequently, these structures are characterized in two ways. Our first characterization is done using the lattice perspective. Initially, we construct extremal lattices by the iterated operation of finding smaller, extremal subsemilattices and duplicating their elements. Then, it is shown that every extremal lattice must be obtained through a recursive application of this construction principle. A byproduct of this contribution is that extremal lattices are always meet-distributive. Despite the fact that this approach is revealing, the vicinity of its findings contains unanswered combinatorial questions which are relevant. Most notably, the number of meet-irreducibles of extremal lattices escapes from control when this construction is conducted. Aiming to get a grip on the number of meet-irreducibles, we succeed at proving an alternative characterization of these structures. This second approach is based on implication logic, and exposes an interesting link between number of proper premises, pseudo-extents and concepts. A guiding idea in this scenario is to use implications to construct lattices. It turns out that constructing extremal structures with this method is simpler, in the sense that a recursive application of the construction principle is not needed. Moreover, we obtain with ease a general, explicit formula for the Whitney numbers of extremal lattices. This reveals that they are unimodal, too. Like the first, this second construction method is shown to be characteristic. A particular case of the construction is able to force - with precision - a high number of (in the sense of "exponentially many'') meet-irreducibles. Such occasional explosion of meet-irreducibles motivates a generalization of the notion of extremal lattices. This is done by means of considering a more refined partition of the class of all finite lattices. In this finer-grained setting, each extremal class consists of lattices with bounded breadth, number of join irreducibles and meet-irreducibles as well. The generalized problem of finding the maximum number of concepts reveals itself to be challenging. Instead of attempting to classify these structures completely, we pose questions inspired by TurĂĄn's seminal result in extremal combinatorics. Most prominently: do extremal lattices (in this more general sense) have the maximum permitted breadth? We show a general statement in this setting: for every choice of limits (breadth, number of join-irreducibles and meet-irreducibles), we produce some extremal lattice with the maximum permitted breadth. The tools which underpin all the intuitions in this scenario are hypergraphs and exact set covers. In a rather unexpected, but interesting turn of events, we obtain for free a simple and interesting theorem about the general existence of "rich'' subcontexts. Precisely: every context contains an object/attribute pair which, after removed, results in a context with at least half the original number of concepts

    Caste as Community? Networks of social affinity in a South Indian village

    Get PDF
    We examine three theories of caste and community using new data on social networks among residents of a south Indian village. The first theory treats individual caste groups as separated communities driven by the Brahmanical ideology of hierarchy based on purity and pollution. The second theory departs from the first by placing kings and landlords at the centre of rural (primeval) social structure. Here ritual giving by kings provides the glue that holds a community together by transferring inauspiciousness to gift-recipients and ensuring community welfare. The third theory, that may be treated as a corollary of the second, argues that powerful leaders in the religious and political domains act as patrons of people in their constituencies and forge a sense of community. The resulting community may be single or multi-caste. Using a community structure algorithm from social network analysis, we divide the network of the village into thirteen tight-knit clusters. We find that no cluster or community in the social network has exactly the same boundaries as a caste group in the village. Barring three exceptions, all clusters are multi-caste. Our results are most consistent with the third theory: each cluster has a patron/leader who represents the interests of his constituency at village-level fora and bridges caste and community divides.Social networks, culture, caste, social change, community development, rural India

    Subject Index Volumes 1–200

    Get PDF

    Graph theoretic generalizations of clique: optimization and extensions

    Get PDF
    This dissertation considers graph theoretic generalizations of the maximum clique problem. Models that were originally proposed in social network analysis literature, are investigated from a mathematical programming perspective for the first time. A social network is usually represented by a graph, and cliques were the first models of "tightly knit groups" in social networks, referred to as cohesive subgroups. Cliques are idealized models and their overly restrictive nature motivated the development of clique relaxations that relax different aspects of a clique. Identifying large cohesive subgroups in social networks has traditionally been used in criminal network analysis to study organized crimes such as terrorism, narcotics and money laundering. More recent applications are in clustering and data mining wireless networks, biological networks as well as graph models of databases and the internet. This research has the potential to impact homeland security, bioinformatics, internet research and telecommunication industry among others. The focus of this dissertation is a degree-based relaxation called k-plex. A distance-based relaxation called k-clique and a diameter-based relaxation called k-club are also investigated in this dissertation. We present the first systematic study of the complexity aspects of these problems and application of mathematical programming techniques in solving them. Graph theoretic properties of the models are identified and used in the development of theory and algorithms. Optimization problems associated with the three models are formulated as binary integer programs and the properties of the associated polytopes are investigated. Facets and valid inequalities are identified based on combinatorial arguments. A branch-and-cut framework is designed and implemented to solve the optimization problems exactly. Specialized preprocessing techniques are developed that, in conjunction with the branch-and-cut algorithm, optimally solve the problems on real-life power law graphs, which is a general class of graphs that include social and biological networks. Computational experiments are performed to study the effectiveness of the proposed solution procedures on benchmark instances and real-life instances. The relationship of these models to the classical maximum clique problem is studied, leading to several interesting observations including a new compact integer programming formulation. We also prove new continuous non-linear formulations for the classical maximum independent set problem which maximize continuous functions over the unit hypercube, and characterize its local and global maxima. Finally, clustering and network design extensions of the clique relaxation models are explored
    corecore