16 research outputs found

    Fault-Detection in Networks

    Get PDF
    To find broken links in networks we use the cut-set space. Information on which nodes can talk, or not, to which other nodes allows reduction of the problem to that of decoding the cut-set code of a graph. Special classes of such codes are known to have polynomial-time decoding algorithms. We present a simple algorithm to achieve the reduction and apply it in two examples

    Locating-dominating sets and identifying codes in graphs of girth at least 5

    Full text link
    Locating-dominating sets and identifying codes are two closely related notions in the area of separating systems. Roughly speaking, they consist in a dominating set of a graph such that every vertex is uniquely identified by its neighbourhood within the dominating set. In this paper, we study the size of a smallest locating-dominating set or identifying code for graphs of girth at least 5 and of given minimum degree. We use the technique of vertex-disjoint paths to provide upper bounds on the minimum size of such sets, and construct graphs who come close to meet these bounds.Comment: 20 pages, 9 figure

    Identification, location-domination and metric dimension on interval and permutation graphs. II. Algorithms and complexity

    Get PDF
    We consider the problems of finding optimal identifying codes, (open) locating-dominating sets and resolving sets (denoted Identifying Code, (Open) Open Locating-Dominating Set and Metric Dimension) of an interval or a permutation graph. In these problems, one asks to distinguish all vertices of a graph by a subset of the vertices, using either the neighbourhood within the solution set or the distances to the solution vertices. Using a general reduction for this class of problems, we prove that the decision problems associated to these four notions are NP-complete, even for interval graphs of diameter 2 and permutation graphs of diameter 2. While Identifying Code and (Open) Locating-Dominating Set are trivially fixed-parameter-tractable when parameterized by solution size, it is known that in the same setting Metric Dimension is W[2]-hard. We show that for interval graphs, this parameterization of Metric Dimension is fixed-parameter-tractable

    Metric Dimension Parameterized by Feedback Vertex Set and Other Structural Parameters

    Get PDF
    For a graph GG, a subset S⊆V(G)S \subseteq V(G) is called a \emph{resolving set}if for any two vertices u,v∈V(G)u,v \in V(G), there exists a vertex w∈Sw \in S suchthat d(w,u)≠d(w,v)d(w,u) \neq d(w,v). The {\sc Metric Dimension} problem takes as input agraph GG and a positive integer kk, and asks whether there exists a resolvingset of size at most kk. This problem was introduced in the 1970s and is knownto be NP-hard~[GT~61 in Garey and Johnson's book]. In the realm ofparameterized complexity, Hartung and Nichterlein~[CCC~2013] proved that theproblem is W[2]-hard when parameterized by the natural parameter kk. They alsoobserved that it is FPT when parameterized by the vertex cover number and askedabout its complexity under \emph{smaller} parameters, in particular thefeedback vertex set number. We answer this question by proving that {\sc MetricDimension} is W[1]-hard when parameterized by the feedback vertex set number.This also improves the result of Bonnet and Purohit~[IPEC 2019] which statesthat the problem is W[1]-hard parameterized by the treewidth. Regarding theparameterization by the vertex cover number, we prove that {\sc MetricDimension} does not admit a polynomial kernel under this parameterizationunless NP⊆coNP/polyNP\subseteq coNP/poly. We observe that a similar result holds when theparameter is the distance to clique. On the positive side, we show that {\scMetric Dimension} is FPT when parameterized by either the distance to clusteror the distance to co-cluster, both of which are smaller parameters than thevertex cover number.<br

    Bounds and extremal graphs for total dominating identifying codes

    Full text link
    An identifying code CC of a graph GG is a dominating set of GG such that any two distinct vertices of GG have distinct closed neighbourhoods within CC. The smallest size of an identifying code of GG is denoted γID(G)\gamma^{\text{ID}}(G). When every vertex of GG also has a neighbour in CC, it is said to be a total dominating identifying code of GG, and the smallest size of a total dominating identifying code of GG is denoted by γtID(G)\gamma_t^{\text{ID}}(G). Extending similar characterizations for identifying codes from the literature, we characterize those graphs GG of order nn with γtID(G)=n\gamma_t^{\text{ID}}(G)=n (the only such connected graph is P3P_3) and γtID(G)=n−1\gamma_t^{\text{ID}}(G)=n-1 (such graphs either satisfy γID(G)=n−1\gamma^{\text{ID}}(G)=n-1 or are built from certain such graphs by adding a set of universal vertices, to each of which a private leaf is attached). Then, using bounds from the literature, we remark that any (open and closed) twin-free tree of order nn has a total dominating identifying code of size at most 3n4\frac{3n}{4}. This bound is tight, and we characterize the trees reaching it. Moreover, by a new proof, we show that this bound actually holds for the larger class of all twin-free graphs of girth at least 5. The cycle C8C_8 also attains this bound. We also provide a generalized bound for all graphs of girth at least 5 (possibly with twins). Finally, we relate γtID(G)\gamma_t^{\text{ID}}(G) to the related parameter γID(G)\gamma^{\text{ID}}(G) as well as the location-domination number of GG and its variants, providing bounds that are either tight or almost tight

    A Design Space Exploration Framework for ANN-Based Fault Detection in Hardware Systems

    Get PDF

    Performance Modelling and Network Monitoring for Internet of Things (IoT) Connectivity

    Get PDF

    Locating-dominating sets and identifying codes in Graphs of Girth at least 5

    Get PDF
    Locating-dominating sets and identifying codes are two closely related notions in the area of separating systems. Roughly speaking, they consist in a dominating set of a graph such that every vertex is uniquely identified by its neighbourhood within the dominating set. In this paper, we study the size of a smallest locating-dominating set or identifying code for graphs of girth at least 5 and of given minimum degree. We use the technique of vertex-disjoint paths to provide upper bounds on the minimum size of such sets, and construct graphs who come close to meeting these bounds.Award-winningPostprint (author’s final draft

    Fault-tolerant Stochastic Distributed Systems

    Get PDF
    The present doctoral thesis discusses the design of fault-tolerant distributed systems, placing emphasis in addressing the case where the actions of the nodes or their interactions are stochastic. The main objective is to detect and identify faults to improve the resilience of distributed systems to crash-type faults, as well as detecting the presence of malicious nodes in pursuit of exploiting the network. The proposed analysis considers malicious agents and computational solutions to detect faults. Crash-type faults, where the affected component ceases to perform its task, are tackled in this thesis by introducing stochastic decisions in deterministic distributed algorithms. Prime importance is placed on providing guarantees and rates of convergence for the steady-state solution. The scenarios of a social network (state-dependent example) and consensus (time- dependent example) are addressed, proving convergence. The proposed algorithms are capable of dealing with packet drops, delays, medium access competition, and, in particular, nodes failing and/or losing network connectivity. The concept of Set-Valued Observers (SVOs) is used as a tool to detect faults in a worst-case scenario, i.e., when a malicious agent can select the most unfavorable sequence of communi- cations and inject a signal of arbitrary magnitude. For other types of faults, it is introduced the concept of Stochastic Set-Valued Observers (SSVOs) which produce a confidence set where the state is known to belong with at least a pre-specified probability. It is shown how, for an algorithm of consensus, it is possible to exploit the structure of the problem to reduce the computational complexity of the solution. The main result allows discarding interactions in the model that do not contribute to the produced estimates. The main drawback of using classical SVOs for fault detection is their computational burden. By resorting to a left-coprime factorization for Linear Parameter-Varying (LPV) systems, it is shown how to reduce the computational complexity. By appropriately selecting the factorization, it is possible to consider detectable systems (i.e., unobservable systems where the unobservable component is stable). Such a result plays a key role in the domain of Cyber-Physical Systems (CPSs). These techniques are complemented with Event- and Self-triggered sampling strategies that enable fewer sensor updates. Moreover, the same triggering mechanisms can be used to make decisions of when to run the SVO routine or resort to over-approximations that temporarily compromise accuracy to gain in performance but maintaining the convergence characteristics of the set-valued estimates. A less stringent requirement for network resources that is vital to guarantee the applicability of SVO-based fault detection in the domain of Networked Control Systems (NCSs)
    corecore