2,419 research outputs found

    Multiple domination models for placement of electric vehicle charging stations in road networks

    Get PDF
    Electric and hybrid vehicles play an increasing role in the road transport networks. Despite their advantages, they have a relatively limited cruising range in comparison to traditional diesel/petrol vehicles, and require significant battery charging time. We propose to model the facility location problem of the placement of charging stations in road networks as a multiple domination problem on reachability graphs. This model takes into consideration natural assumptions such as a threshold for remaining battery load, and provides some minimal choice for a travel direction to recharge the battery. Experimental evaluation and simulations for the proposed facility location model are presented in the case of real road networks corresponding to the cities of Boston and Dublin.Comment: 20 pages, 5 figures; Original version from March-April 201

    On the size of identifying codes in triangle-free graphs

    Get PDF
    In an undirected graph GG, a subset C⊆V(G)C\subseteq V(G) such that CC is a dominating set of GG, and each vertex in V(G)V(G) is dominated by a distinct subset of vertices from CC, is called an identifying code of GG. The concept of identifying codes was introduced by Karpovsky, Chakrabarty and Levitin in 1998. For a given identifiable graph GG, let \M(G) be the minimum cardinality of an identifying code in GG. In this paper, we show that for any connected identifiable triangle-free graph GG on nn vertices having maximum degree Δ≄3\Delta\geq 3, \M(G)\le n-\tfrac{n}{\Delta+o(\Delta)}. This bound is asymptotically tight up to constants due to various classes of graphs including (Δ−1)(\Delta-1)-ary trees, which are known to have their minimum identifying code of size n−nΔ−1+o(1)n-\tfrac{n}{\Delta-1+o(1)}. We also provide improved bounds for restricted subfamilies of triangle-free graphs, and conjecture that there exists some constant cc such that the bound \M(G)\le n-\tfrac{n}{\Delta}+c holds for any nontrivial connected identifiable graph GG

    Absorption Time of the Moran Process

    Get PDF
    The Moran process models the spread of mutations in populations on graphs. We investigate the absorption time of the process, which is the time taken for a mutation introduced at a randomly chosen vertex to either spread to the whole population, or to become extinct. It is known that the expected absorption time for an advantageous mutation is O(n^4) on an n-vertex undirected graph, which allows the behaviour of the process on undirected graphs to be analysed using the Markov chain Monte Carlo method. We show that this does not extend to directed graphs by exhibiting an infinite family of directed graphs for which the expected absorption time is exponential in the number of vertices. However, for regular directed graphs, we show that the expected absorption time is Omega(n log n) and O(n^2). We exhibit families of graphs matching these bounds and give improved bounds for other families of graphs, based on isoperimetric number. Our results are obtained via stochastic dominations which we demonstrate by establishing a coupling in a related continuous-time model. The coupling also implies several natural domination results regarding the fixation probability of the original (discrete-time) process, resolving a conjecture of Shakarian, Roos and Johnson.Comment: minor change

    Exploiting chordal structure in polynomial ideals: a Gr\"obner bases approach

    Get PDF
    Chordal structure and bounded treewidth allow for efficient computation in numerical linear algebra, graphical models, constraint satisfaction and many other areas. In this paper, we begin the study of how to exploit chordal structure in computational algebraic geometry, and in particular, for solving polynomial systems. The structure of a system of polynomial equations can be described in terms of a graph. By carefully exploiting the properties of this graph (in particular, its chordal completions), more efficient algorithms can be developed. To this end, we develop a new technique, which we refer to as chordal elimination, that relies on elimination theory and Gr\"obner bases. By maintaining graph structure throughout the process, chordal elimination can outperform standard Gr\"obner basis algorithms in many cases. The reason is that all computations are done on "smaller" rings, of size equal to the treewidth of the graph. In particular, for a restricted class of ideals, the computational complexity is linear in the number of variables. Chordal structure arises in many relevant applications. We demonstrate the suitability of our methods in examples from graph colorings, cryptography, sensor localization and differential equations.Comment: 40 pages, 5 figure

    The self-dual point of the two-dimensional random-cluster model is critical for q≄1q\geq 1

    Get PDF
    We prove a long-standing conjecture on random-cluster models, namely that the critical point for such models with parameter q≄1q\geq1 on the square lattice is equal to the self-dual point psd(q)=q/(1+q)p_{sd}(q) = \sqrt q /(1+\sqrt q). This gives a proof that the critical temperature of the qq-state Potts model is equal to log⁥(1+q)\log (1+\sqrt q) for all q≄2q\geq 2. We further prove that the transition is sharp, meaning that there is exponential decay of correlations in the sub-critical phase. The techniques of this paper are rigorous and valid for all q≄1q\geq 1, in contrast to earlier methods valid only for certain given qq. The proof extends to the triangular and the hexagonal lattices as well.Comment: 27 pages, 10 figure

    Parameterized Inapproximability of Target Set Selection and Generalizations

    Full text link
    In this paper, we consider the Target Set Selection problem: given a graph and a threshold value thr(v)thr(v) for any vertex vv of the graph, find a minimum size vertex-subset to "activate" s.t. all the vertices of the graph are activated at the end of the propagation process. A vertex vv is activated during the propagation process if at least thr(v)thr(v) of its neighbors are activated. This problem models several practical issues like faults in distributed networks or word-to-mouth recommendations in social networks. We show that for any functions ff and ρ\rho this problem cannot be approximated within a factor of ρ(k)\rho(k) in f(k)⋅nO(1)f(k) \cdot n^{O(1)} time, unless FPT = W[P], even for restricted thresholds (namely constant and majority thresholds). We also study the cardinality constraint maximization and minimization versions of the problem for which we prove similar hardness results

    An Order-based Algorithm for Minimum Dominating Set with Application in Graph Mining

    Full text link
    Dominating set is a set of vertices of a graph such that all other vertices have a neighbour in the dominating set. We propose a new order-based randomised local search (RLSo_o) algorithm to solve minimum dominating set problem in large graphs. Experimental evaluation is presented for multiple types of problem instances. These instances include unit disk graphs, which represent a model of wireless networks, random scale-free networks, as well as samples from two social networks and real-world graphs studied in network science. Our experiments indicate that RLSo_o performs better than both a classical greedy approximation algorithm and two metaheuristic algorithms based on ant colony optimisation and local search. The order-based algorithm is able to find small dominating sets for graphs with tens of thousands of vertices. In addition, we propose a multi-start variant of RLSo_o that is suitable for solving the minimum weight dominating set problem. The application of RLSo_o in graph mining is also briefly demonstrated
    • 

    corecore