4,615 research outputs found

    Generalized Vulnerability Measures of Graphs

    Get PDF
    Several measures of vulnerability of a graph look at how easy it is to disrupt the network by removing/disabling vertices. As graph-theoretical parameters, they treat all vertices alike: each vertex is equally important. For example, the integrity parameter considers the number of vertices removed and the maximum number of vertices in a component that remains. We consider the generalization of these measures of vulnerability to weighted vertices in order to better model real-world applications. In particular, we investigate bounds on the weighted versions of connectivity and integrity, when polynomial algorithms for computation exist, and other characteristics of the generalized measures

    Strong blocking sets and minimal codes from expander graphs

    Full text link
    A strong blocking set in a finite projective space is a set of points that intersects each hyperplane in a spanning set. We provide a new graph theoretic construction of such sets: combining constant-degree expanders with asymptotically good codes, we explicitly construct strong blocking sets in the (k−1)(k-1)-dimensional projective space over Fq\mathbb{F}_q that have size O(qk)O( q k ). Since strong blocking sets have recently been shown to be equivalent to minimal linear codes, our construction gives the first explicit construction of Fq\mathbb{F}_q-linear minimal codes of length nn and dimension kk, for every prime power qq, for which n=O(qk)n = O (q k). This solves one of the main open problems on minimal codes.Comment: 20 page

    Inverse domination integrity of graphs

    Get PDF
    With the growing demand for information transport, networks and network architecture have grown increasingly vital. Nodes and the connections that connect them make up a communication network. When the communication network’s nodes or links are destroyed, the network’s efficiency reduces. If a network is modeled by a graph, then there are various graph theoretical parameters used to express the vulnerability of communication networks such as connectivity, integrity, weak integrity, neighbor integrity, hub integrity, domination integrity, toughness, tenacity etc. In this paper, we introduce a new vulnerability parameter known as an inverse domination integrity which is defined as IDI(G) = min S⊆V (G) {|S| + m(G − S)}, where S is an inverse dominating set and m(G − S) denotes the order of largest component of G − S. We derive few bounds of an inverse domination integrity of graphs. Also, we determine an inverse domination integrity of some families of graphs. Finally, we compute different types of measures of vulnerabilities of probabilistic neural network which are useful in classification and pattern recognition problems.Publisher's Versio

    Graphs with optimal forwarding indices: What is the best throughput you can get with a given number of edges?

    Get PDF
    The (edge) forwarding index of a graph is the minimum, over all possible routings of all the demands, of the maximum load of an edge. This metric is of a great interest since it captures the notion of global congestion in a precise way: the lesser the forwarding-index, the lesser the congestion. In this paper, we study the following design question: Given a number e of edges and a number n of vertices, what is the least congested graph that we can construct? and what forwarding-index can we achieve? Our problem has some distant similarities with the well-known (∆,D) problem, and we sometimes build upon results obtained on it. The goal of this paper is to study how to build graphs with low forwarding indices and to understand how the number of edges impacts the forwarding index. We answer here these questions for different families of graphs: general graphs, graphs with bounded degree, sparse graphs with a small number of edges by providing constructions, most of them asymptotically optimal. Hence, our results allow to understand how the forwarding-index drops when edges are added to a graph and also to determine what is the best (i.e least congested) structure with e edges. Doing so, we partially answer the practical problem that initially motivated our work: If an operator wants to power only e links of its network, in order to reduce the energy consumption (or wiring cost) of its networks, what should be those links and what performance can be expected

    The Fine-Grained Complexity of CFL Reachability

    Full text link
    Many problems in static program analysis can be modeled as the context-free language (CFL) reachability problem on directed labeled graphs. The CFL reachability problem can be generally solved in time O(n3)O(n^3), where nn is the number of vertices in the graph, with some specific cases that can be solved faster. In this work, we ask the following question: given a specific CFL, what is the exact exponent in the monomial of the running time? In other words, for which cases do we have linear, quadratic or cubic algorithms, and are there problems with intermediate runtimes? This question is inspired by recent efforts to classify classic problems in terms of their exact polynomial complexity, known as {\em fine-grained complexity}. Although recent efforts have shown some conditional lower bounds (mostly for the class of combinatorial algorithms), a general picture of the fine-grained complexity landscape for CFL reachability is missing. Our main contribution is lower bound results that pinpoint the exact running time of several classes of CFLs or specific CFLs under widely believed lower bound conjectures (Boolean Matrix Multiplication and kk-Clique). We particularly focus on the family of Dyck-kk languages (which are strings with well-matched parentheses), a fundamental class of CFL reachability problems. We present new lower bounds for the case of sparse input graphs where the number of edges mm is the input parameter, a common setting in the database literature. For this setting, we show a cubic lower bound for Andersen's Pointer Analysis which significantly strengthens prior known results.Comment: Appeared in POPL 2023. Please note the erratum on the first pag

    Integrity of Generalized Transformation Graphs

    Get PDF
    The values of vulnerability helps the network designers to construct such a communication network which remains stable after some of its nodes or communication links are damaged. The transformation graphs considered in this paper are taken as model of the network system and it reveals that, how network can be made more stable and strong. For this purpose the new nodes are inserted in the network. This construction of new network is done by using the definition of generalized transformation graphs of a graphs. Integrity is one of the best vulnerability parameter. In this paper, we investigate the integrity of generalized transformation graphs and their complements. Also, we find integrity of semitotal point graph of combinations of basic graphs. Finally, we characterize few graphs having equal integrity values as that of generalized transformation graphs of same structured graphs

    On (2,2)-Domination in Hexagonal Mesh Pyramid

    Get PDF
    Network topology plays a key role in designing an interconnection network. Various topologies for interconnection networks have been proposed in the literature of which pyramid network is extensively used as a base for both software data structure and hardware design. The pyramid networks can efficiently handle the communication requirements of various problems in graph theory due to its inherent hierarchy at each level. Domination problems are one of the classical types of problems in graph theory with vast application in computer networks and distributed computing. In this paper, we obtain the bounds for a variant of the domination problem namely (2,2)-domination for a pyramid network called Hexagonal mesh pyramid
    • …
    corecore