156 research outputs found

    Methods and problems of wavelength-routing in all-optical networks

    Get PDF
    We give a survey of recent theoretical results obtained for wavelength-routing in all-optical networks. The survey is based on the previous survey in [Beauquier, B., Bermond, J-C., Gargano, L., Hell, P., Perennes, S., Vaccaro, U.: Graph problems arising from wavelength-routing in all-optical networks. In: Proc. of the 2nd Workshop on Optics and Computer Science, part of IPPS'97, 1997]. We focus our survey on the current research directions and on the used methods. We also state several open problems connected with this line of research, and give an overview of several related research directions

    Parameterized and approximation complexity of the detection pair problem in graphs

    Full text link
    We study the complexity of the problem DETECTION PAIR. A detection pair of a graph GG is a pair (W,L)(W,L) of sets of detectors with WV(G)W\subseteq V(G), the watchers, and LV(G)L\subseteq V(G), the listeners, such that for every pair u,vu,v of vertices that are not dominated by a watcher of WW, there is a listener of LL whose distances to uu and to vv are different. The goal is to minimize W+L|W|+|L|. This problem generalizes the two classic problems DOMINATING SET and METRIC DIMENSION, that correspond to the restrictions L=L=\emptyset and W=W=\emptyset, respectively. DETECTION PAIR was recently introduced by Finbow, Hartnell and Young [A. S. Finbow, B. L. Hartnell and J. R. Young. The complexity of monitoring a network with both watchers and listeners. Manuscript, 2015], who proved it to be NP-complete on trees, a surprising result given that both DOMINATING SET and METRIC DIMENSION are known to be linear-time solvable on trees. It follows from an existing reduction by Hartung and Nichterlein for METRIC DIMENSION that even on bipartite subcubic graphs of arbitrarily large girth, DETECTION PAIR is NP-hard to approximate within a sub-logarithmic factor and W[2]-hard (when parameterized by solution size). We show, using a reduction to SET COVER, that DETECTION PAIR is approximable within a factor logarithmic in the number of vertices of the input graph. Our two main results are a linear-time 22-approximation algorithm and an FPT algorithm for DETECTION PAIR on trees.Comment: 13 page

    Centroidal bases in graphs

    Get PDF
    We introduce the notion of a centroidal locating set of a graph GG, that is, a set LL of vertices such that all vertices in GG are uniquely determined by their relative distances to the vertices of LL. A centroidal locating set of GG of minimum size is called a centroidal basis, and its size is the centroidal dimension CD(G)CD(G). This notion, which is related to previous concepts, gives a new way of identifying the vertices of a graph. The centroidal dimension of a graph GG is lower- and upper-bounded by the metric dimension and twice the location-domination number of GG, respectively. The latter two parameters are standard and well-studied notions in the field of graph identification. We show that for any graph GG with nn vertices and maximum degree at least~2, (1+o(1))lnnlnlnnCD(G)n1(1+o(1))\frac{\ln n}{\ln\ln n}\leq CD(G) \leq n-1. We discuss the tightness of these bounds and in particular, we characterize the set of graphs reaching the upper bound. We then show that for graphs in which every pair of vertices is connected via a bounded number of paths, CD(G)=Ω(E(G))CD(G)=\Omega\left(\sqrt{|E(G)|}\right), the bound being tight for paths and cycles. We finally investigate the computational complexity of determining CD(G)CD(G) for an input graph GG, showing that the problem is hard and cannot even be approximated efficiently up to a factor of o(logn)o(\log n). We also give an O(nlnn)O\left(\sqrt{n\ln n}\right)-approximation algorithm

    Improved Analysis of Deterministic Load-Balancing Schemes

    Full text link
    We consider the problem of deterministic load balancing of tokens in the discrete model. A set of nn processors is connected into a dd-regular undirected network. In every time step, each processor exchanges some of its tokens with each of its neighbors in the network. The goal is to minimize the discrepancy between the number of tokens on the most-loaded and the least-loaded processor as quickly as possible. Rabani et al. (1998) present a general technique for the analysis of a wide class of discrete load balancing algorithms. Their approach is to characterize the deviation between the actual loads of a discrete balancing algorithm with the distribution generated by a related Markov chain. The Markov chain can also be regarded as the underlying model of a continuous diffusion algorithm. Rabani et al. showed that after time T=O(log(Kn)/μ)T = O(\log (Kn)/\mu), any algorithm of their class achieves a discrepancy of O(dlogn/μ)O(d\log n/\mu), where μ\mu is the spectral gap of the transition matrix of the graph, and KK is the initial load discrepancy in the system. In this work we identify some natural additional conditions on deterministic balancing algorithms, resulting in a class of algorithms reaching a smaller discrepancy. This class contains well-known algorithms, eg., the Rotor-Router. Specifically, we introduce the notion of cumulatively fair load-balancing algorithms where in any interval of consecutive time steps, the total number of tokens sent out over an edge by a node is the same (up to constants) for all adjacent edges. We prove that algorithms which are cumulatively fair and where every node retains a sufficient part of its load in each step, achieve a discrepancy of O(min{dlogn/μ,dn})O(\min\{d\sqrt{\log n/\mu},d\sqrt{n}\}) in time O(T)O(T). We also show that in general neither of these assumptions may be omitted without increasing discrepancy. We then show by a combinatorial potential reduction argument that any cumulatively fair scheme satisfying some additional assumptions achieves a discrepancy of O(d)O(d) almost as quickly as the continuous diffusion process. This positive result applies to some of the simplest and most natural discrete load balancing schemes.Comment: minor corrections; updated literature overvie

    From Balls and Bins to Points and Vertices

    Get PDF
    Given a graph G = (V, E) with |V| = n, we consider the following problem. Place m = n points on the vertices of G independently and uniformly at random. Once the points are placed, relocate them using a bijection from the points to the vertices that minimizes the maximum distance between the random place of the points and their target vertices. We look for an upper bound on this maximum relocation distance that holds with high probability (over the initial placements of the points). For general graphs and in the case m ≤ n, we prove the #P -hardness of the problem and that the maximum relocation distance is O(√n) with high probability. We present a Fully Polynomial Randomized Approximation Scheme when the input graph admits a polynomial-size family of witness cuts while for trees we provide a 2-approximation algorithm. Many applications concern the variation in which m = (1 − ǫ)n for some 0 < ǫ < 1. We provide several bounds for the maximum relocation distance according to different graph topologies

    On the distance-edge-monitoring numbers of graphs

    Full text link
    Foucaud et al. [Discrete Appl. Math. 319 (2022), 424-438] recently introduced and initiated the study of a new graph-theoretic concept in the area of network monitoring. For a set MM of vertices and an edge ee of a graph GG, let P(M,e)P(M, e) be the set of pairs (x,y)(x, y) with a vertex xx of MM and a vertex yy of V(G)V(G) such that dG(x,y)dGe(x,y)d_G(x, y)\neq d_{G-e}(x, y). For a vertex xx, let EM(x)EM(x) be the set of edges ee such that there exists a vertex vv in GG with (x,v)P({x},e)(x, v) \in P(\{x\}, e). A set MM of vertices of a graph GG is distance-edge-monitoring set if every edge ee of GG is monitored by some vertex of MM, that is, the set P(M,e)P(M, e) is nonempty. The distance-edge-monitoring number of a graph GG, denoted by dem(G)dem(G), is defined as the smallest size of distance-edge-monitoring sets of GG. The vertices of MM represent distance probes in a network modeled by GG; when the edge ee fails, the distance from xx to yy increases, and thus we are able to detect the failure. It turns out that not only we can detect it, but we can even correctly locate the failing edge. In this paper, we continue the study of \emph{distance-edge-monitoring sets}. In particular, we give upper and lower bounds of P(M,e)P(M,e), EM(x)EM(x), dem(G)dem(G), respectively, and extremal graphs attaining the bounds are characterized. We also characterize the graphs with dem(G)=3dem(G)=3

    Constructing Incremental Sequences in Graphs

    Get PDF
    Given a weighted graph , we investigate the problem of constructing a sequence of subsets of vertices (called groups) with small diameters, where the diameter of a group is calculated using distances in G. The constraint on these n groups is that they must be incremental: . The cost of a sequence is the maximum ratio between the diameter of each group Mi and the diameter of a group with I vertices and minimum diameter: . This quantity captures the impact of the incremental constraint on the diameters of the groups in a sequence. We give general bounds on the value of this ratio and we prove that the problem of constructing an optimal incremental sequence cannot be solved approximately in polynomial time with an approximation ratio less than 2 unless P = NP. Finally, we give a 4-approximation algorithm and we show that the analysis of our algorithm is tight

    Monitoring the edges of product networks using distances

    Full text link
    Foucaud {\it et al.} recently introduced and initiated the study of a new graph-theoretic concept in the area of network monitoring. Let GG be a graph with vertex set V(G)V(G), MM a subset of V(G)V(G), and ee be an edge in E(G)E(G), and let P(M,e)P(M, e) be the set of pairs (x,y)(x,y) such that dG(x,y)dGe(x,y)d_G(x, y)\neq d_{G-e}(x, y) where xMx\in M and yV(G)y\in V(G). MM is called a \emph{distance-edge-monitoring set} if every edge ee of GG is monitored by some vertex of MM, that is, the set P(M,e)P(M, e) is nonempty. The {\em distance-edge-monitoring number} of GG, denoted by dem(G)\operatorname{dem}(G), is defined as the smallest size of distance-edge-monitoring sets of GG. For two graphs G,HG,H of order m,nm,n, respectively, in this paper we prove that max{mdem(H),ndem(G)}dem(GH)mdem(H)+ndem(G)dem(G)dem(H)\max\{m\operatorname{dem}(H),n\operatorname{dem}(G)\} \leq\operatorname{dem}(G\,\Box \,H) \leq m\operatorname{dem}(H)+n\operatorname{dem}(G) -\operatorname{dem}(G)\operatorname{dem}(H), where \Box is the Cartesian product operation. Moreover, we characterize the graphs attaining the upper and lower bounds and show their applications on some known networks. We also obtain the distance-edge-monitoring numbers of join, corona, cluster, and some specific networks.Comment: 19 page

    Constructing disjoint Steiner trees in Sierpi\'{n}ski graphs

    Full text link
    Let GG be a graph and SV(G)S\subseteq V(G) with S2|S|\geq 2. Then the trees T1,T2,,TT_1, T_2, \cdots, T_\ell in GG are \emph{internally disjoint Steiner trees} connecting SS (or SS-Steiner trees) if E(Ti)E(Tj)=E(T_i) \cap E(T_j )=\emptyset and V(Ti)V(Tj)=SV(T_i)\cap V(T_j)=S for every pair of distinct integers i,ji,j, 1i,j1 \leq i, j \leq \ell. Similarly, if we only have the condition E(Ti)E(Tj)=E(T_i) \cap E(T_j )=\emptyset but without the condition V(Ti)V(Tj)=SV(T_i)\cap V(T_j)=S, then they are \emph{edge-disjoint Steiner trees}. The \emph{generalized kk-connectivity}, denoted by κk(G)\kappa_k(G), of a graph GG, is defined as κk(G)=min{κG(S)SV(G) and S=k}\kappa_k(G)=\min\{\kappa_G(S)|S \subseteq V(G) \ \textrm{and} \ |S|=k \}, where κG(S)\kappa_G(S) is the maximum number of internally disjoint SS-Steiner trees. The \emph{generalized local edge-connectivity} λG(S)\lambda_{G}(S) is the maximum number of edge-disjoint Steiner trees connecting SS in GG. The {\it generalized kk-edge-connectivity} λk(G)\lambda_k(G) of GG is defined as λk(G)=min{λG(S)SV(G) and S=k}\lambda_k(G)=\min\{\lambda_{G}(S)\,|\,S\subseteq V(G) \ and \ |S|=k\}. These measures are generalizations of the concepts of connectivity and edge-connectivity, and they and can be used as measures of vulnerability of networks. It is, in general, difficult to compute these generalized connectivities. However, there are precise results for some special classes of graphs. In this paper, we obtain the exact value of λk(S(n,))\lambda_{k}(S(n,\ell)) for 3kn3\leq k\leq \ell^n, and the exact value of κk(S(n,))\kappa_{k}(S(n,\ell)) for 3k3\leq k\leq \ell, where S(n,)S(n, \ell) is the Sierpi\'{n}ski graphs with order n\ell^n. As a direct consequence, these graphs provide additional interesting examples when λk(S(n,))=κk(S(n,))\lambda_{k}(S(n,\ell))=\kappa_{k}(S(n,\ell)). We also study the some network properties of Sierpi\'{n}ski graphs
    corecore