16,385 research outputs found

    Long Paths and Hamiltonian paths in Inhomogenous Random Graphs

    Full text link
    In this paper, we study long paths and Hamiltonian paths in inhomogenous random graphs. In the first part of the paper, we consider an inhomogenous Erd\H{o}s-R\'enyi random graph GEG_E with average edge density pn.p_n. We prove that if npn2⟢∞np_n^2 \longrightarrow \infty as nβ†’βˆž,n \rightarrow \infty, then the longest path contains at least nβˆ’neβˆ’Ξ΄1npn2n-ne^{-\delta_1 np_n^2} nodes with high probability (i.e., with probability converging to one as nβ†’βˆžn \rightarrow \infty), for some constant Ξ΄1>0.\delta_1> 0 . In particular, if npn2=Mlog⁑nnp_n^2 = M\log{n} for some constant M>0M > 0 large, then GEG_E is Hamiltonian with high probability; i.e., the longest path contains all the nodes of GE.G_E. In the second part of the paper, we consider a random geometric graph GRG_R consisting of nn nodes, each independently distributed according to a (not necessarily uniform) density f.f. If rnr_n is the connectivity radius and nrn2⟢∞,nr_n^2 \longrightarrow \infty, then with high probability, the longest cycle contains at least nβˆ’neβˆ’Ξ΄2nrn2n-ne^{-\delta_2 nr_n^2} nodes for some constant Ξ΄2>0.\delta_2 > 0. As a consequence of our proof, we obtain that if nrn2=log⁑n+7log⁑log⁑n+Ο‰nnr_n^2 = \log{n} + 7\log{\log{n}} + \omega_n and Ο‰n⟢∞\omega_n \longrightarrow \infty as nβ†’βˆž,n \rightarrow \infty, then with high probability GRG_R contains a Hamiltonian cycle

    Fault tolerant supergraphs with automorphisms

    Full text link
    Given a graph YY on nn vertices and a desired level of fault-tolerance kk, an objective in fault-tolerant system design is to construct a supergraph XX on n+kn + k vertices such that the removal of any kk nodes from XX leaves a graph containing YY. In order to reconfigure around faults when they occur, it is also required that any two subsets of kk nodes of XX are in the same orbit of the action of its automorphism group. In this paper, we prove that such a supergraph must be the complete graph. This implies that it is very expensive to have an interconnection network which is kk-fault-tolerant and which also supports automorphic reconfiguration. Our work resolves an open problem in the literature. The proof uses a result due to Cameron on kk-homogeneous groups

    Duality in percolation via outermost boundaries III: Plus connected components

    Full text link
    Tile R2\mathbb{R}^2 into disjoint unit squares {Sk}kβ‰₯0\{S_k\}_{k \geq 0} with the origin being the centre of S0S_0 and say that SiS_i and SjS_j are star adjacent if they share a corner and plus adjacent if they share an edge. Every square is either vacant or occupied. In this paper, we use the structure of the outermost boundaries derived in Ganesan (2017) to alternately obtain duality between star and plus connected components in the following sense: There is a star connected cycle of vacant squares attached to and surrounding the finite plus connected component containing the origin

    Randomized detection and detection capacity of multidetector networks

    Full text link
    In this paper, we study the following detection problem. There are nn detectors randomly placed in the unit square S=[βˆ’12,12]2S = \left[-\frac{1}{2},\frac{1}{2}\right]^2 assigned to detect the presence of a source located at the origin. Time is divided into slots of unit length and Di(t)∈{0,1}D_i(t) \in \{0,1\} represents the (random) decision of the ithi^{\rm th} detector in time slot tt. The location of the source is unknown to the detectors and the goal is to design schemes that use the decisions {Di(t)}i,t\{D_i(t)\}_{i,t} and detect the presence of the source in as short time as possible. We first determine the minimum achievable detection time TcapT_{cap} and show the existence of \emph{randomized} detection schemes that have detection times arbitrarily close to TcapT_{cap} for almost all configuration of detectors, provided the number of detectors nn is sufficiently large. We call such schemes as \emph{capacity achieving} and completely characterize all capacity achieving detection schemes

    On some upper bounds on the fractional chromatic number of weighted graphs

    Full text link
    Given a weighted graph G_\bx, where (x(v):v∈V)(x(v): v \in V) is a non-negative, real-valued weight assigned to the vertices of G, let B(G_\bx) be an upper bound on the fractional chromatic number of the weighted graph G_\bx; so \chi_f(G_\bx) \le B(G_\bx). To investigate the worst-case performance of the upper bound BB, we study the graph invariant \beta(G) = \sup_{\bx \ne 0} \frac{B(G_\bx)}{\chi_f(G_\bx)}. \noindent This invariant is examined for various upper bounds BB on the fractional chromatic number. In some important cases, this graph invariant is shown to be related to the size of the largest star subgraph in the graph. This problem arises in the area of resource estimation in distributed systems and wireless networks; the results presented here have implications on the design and performance of decentralized communication networks

    Automorphism group of the modified bubble-sort graph

    Full text link
    The modified bubble-sort graph of dimension nn is the Cayley graph of SnS_n generated by nn cyclically adjacent transpositions. In the present paper, it is shown that the automorphism group of the modified bubble sort graph of dimension nn is SnΓ—D2nS_n \times D_{2n}, for all nβ‰₯5n \ge 5. Thus, a complete structural description of the automorphism group of the modified bubble-sort graph is obtained. A similar direct product decomposition is seen to hold for arbitrary normal Cayley graphs generated by transposition sets

    Graph extensions, edit number and regular graphs

    Full text link
    A graph G on n vertices is said to be extendable if G can be modified to form a new graph H on more than n vertices, while preserving the degrees of the vertices common to G and H. The added vertices all have the same degree and we define edit numbers to quantify the amount of modification needed to obtain the extended graph. Characterizing graphs with least possible edit numbers, we obtain that graphs with zero edit number can be extended using regular graphs. We also describe an iterative algorithm to construct connected regular graphs on arbitrarily large vertex sets, starting from the complete graph on a fixed set of vertices

    Existence of connected regular and nearly regular graphs

    Full text link
    For integers kβ‰₯2k \geq 2 and nβ‰₯k+1n \geq k+1, we prove the following: If nβ‹…kn\cdot k is even, there is a connected kk-regular graph on nn vertices. If nβ‹…kn\cdot k is odd, there is a connected nearly kk-regular graph on nn vertices

    ROUGE 2.0: Updated and Improved Measures for Evaluation of Summarization Tasks

    Full text link
    Evaluation of summarization tasks is extremely crucial to determining the quality of machine generated summaries. Over the last decade, ROUGE has become the standard automatic evaluation measure for evaluating summarization tasks. While ROUGE has been shown to be effective in capturing n-gram overlap between system and human composed summaries, there are several limitations with the existing ROUGE measures in terms of capturing synonymous concepts and coverage of topics. Thus, often times ROUGE scores do not reflect the true quality of summaries and prevents multi-faceted evaluation of summaries (i.e. by topics, by overall content coverage and etc). In this paper, we introduce ROUGE 2.0, which has several updated measures of ROUGE: ROUGE-N+Synonyms, ROUGE-Topic, ROUGE-Topic+Synonyms, ROUGE-TopicUniq and ROUGE-TopicUniq+Synonyms; all of which are improvements over the core ROUGE measures

    Performance Guarantees of Distributed Algorithms for QoS in Wireless Ad Hoc Networks

    Full text link
    Consider a wireless network where each communication link has a minimum bandwidth quality-of-service requirement. Certain pairs of wireless links interfere with each other due to being in the same vicinity, and this interference is modeled by a conflict graph. Given the conflict graph and link bandwidth requirements, the objective is to determine, using only localized information, whether the demands of all the links can be satisfied. At one extreme, each node knows the demands of only its neighbors; at the other extreme, there exists an optimal, centralized scheduler that has global information. The present work interpolates between these two extremes by quantifying the tradeoff between the degree of decentralization and the performance of the distributed algorithm. This open problem is resolved for the primary interference model, and the following general result is obtained: if each node knows the demands of all links in a ball of radius dd centered at the node, then there is a distributed algorithm whose performance is away from that of an optimal, centralized algorithm by a factor of at most (2d+3)/(2d+2)(2d+3)/(2d+2). The tradeoff between performance and complexity of the distributed algorithm is also analyzed. It is shown that for line networks under the protocol interference model, the row constraints are a factor of at most 33 away from optimal. Both bounds are best possible
    • …
    corecore