2,535 research outputs found
Aspects of graph vulnerability.
Thesis (Ph.D.)-University of Natal, 1994.This dissertation details the results of an investigation into, primarily, three aspects of graph vulnerability namely, l-connectivity, Steiner Distance hereditatiness and functional isolation. Following the introduction in Chapter one, Chapter two focusses on the l-connectivity of graphs and introduces the concept of the strong l-connectivity of digraphs. Bounds on this latter parameter are investigated and then the l-connectivity function of particular types of graphs, namely caterpillars and complete multipartite graphs as well as the strong l-connectivity function of digraphs, is explored. The chapter concludes with an examination of extremal graphs with a given l-connectivity. Chapter three investigates Steiner distance hereditary graphs. It is shown that if G is 2-Steiner distance hereditary, then G is k-Steiner distance hereditary for all k≥2. Further, it is shown that if G is k-Steiner distance hereditary (k≥ 3), then G need not be (k - l)-Steiner distance hereditary. An efficient algorithm for determining the Steiner distance of a set of k vertices in a k-Steiner distance hereditary graph is discussed and a characterization of 2-Steiner distance hereditary graphs is given which leads to an efficient algorithm for testing whether a graph is 2-Steiner distance hereditary. Some general properties about the cycle structure of k-Steiner distance hereditary graphs are established and are then used to characterize 3-Steiner distance hereditary graphs. Chapter four contains an investigation of functional isolation sequences of supply graphs. The concept of the Ranked supply graph is introduced and both necessary and sufficient conditions for a sequence of positive nondecreasing integers to be a functional isolation sequence of a ranked supply graph are determined
Notes on the connectivity of Cayley coset digraphs
Hamidoune's connectivity results for hierarchical Cayley digraphs are
extended to Cayley coset digraphs and thus to arbitrary vertex transitive
digraphs. It is shown that if a Cayley coset digraph can be hierarchically
decomposed in a certain way, then it is optimally vertex connected. The results
are obtained by extending the methods used by Hamidoune. They are used to show
that cycle-prefix graphs are optimally vertex connected. This implies that
cycle-prefix graphs have good fault tolerance properties.Comment: 15 page
Sizing the length of complex networks
Among all characteristics exhibited by natural and man-made networks the
small-world phenomenon is surely the most relevant and popular. But despite its
significance, a reliable and comparable quantification of the question `how
small is a small-world network and how does it compare to others' has remained
a difficult challenge to answer. Here we establish a new synoptic
representation that allows for a complete and accurate interpretation of the
pathlength (and efficiency) of complex networks. We frame every network
individually, based on how its length deviates from the shortest and the
longest values it could possibly take. For that, we first had to uncover the
upper and the lower limits for the pathlength and efficiency, which indeed
depend on the specific number of nodes and links. These limits are given by
families of singular configurations that we name as ultra-short and ultra-long
networks. The representation here introduced frees network comparison from the
need to rely on the choice of reference graph models (e.g., random graphs and
ring lattices), a common practice that is prone to yield biased interpretations
as we show. Application to empirical examples of three categories (neural,
social and transportation) evidences that, while most real networks display a
pathlength comparable to that of random graphs, when contrasted against the
absolute boundaries, only the cortical connectomes prove to be ultra-short
- …