2,387 research outputs found

    Graphs with large generalized (edge-)connectivity

    Full text link
    The generalized kk-connectivity κk(G)\kappa_k(G) of a graph GG, introduced by Hager in 1985, is a nice generalization of the classical connectivity. Recently, as a natural counterpart, we proposed the concept of generalized kk-edge-connectivity λk(G)\lambda_k(G). In this paper, graphs of order nn such that κk(G)=n−k2−1\kappa_k(G)=n-\frac{k}{2}-1 and λk(G)=n−k2−1\lambda_k(G)=n-\frac{k}{2}-1 for even kk are characterized.Comment: 25 pages. arXiv admin note: text overlap with arXiv:1207.183

    The generalized 3-connectivity of Lexicographic product graphs

    Full text link
    The generalized kk-connectivity κk(G)\kappa_k(G) of a graph GG, introduced by Chartrand et al., is a natural and nice generalization of the concept of (vertex-)connectivity. In this paper, we prove that for any two connected graphs GG and HH, κ3(G∘H)≥κ3(G)∣V(H)∣\kappa_3(G\circ H)\geq \kappa_3(G)|V(H)|. We also give upper bounds for κ3(G□H)\kappa_3(G\Box H) and κ3(G∘H)\kappa_3(G\circ H). Moreover, all the bounds are sharp.Comment: 13 pages. arXiv admin note: text overlap with arXiv:1103.609

    The strong rainbow vertex-connection of graphs

    Full text link
    A vertex-colored graph GG is said to be rainbow vertex-connected if every two vertices of GG are connected by a path whose internal vertices have distinct colors, such a path is called a rainbow path. The rainbow vertex-connection number of a connected graph GG, denoted by rvc(G)rvc(G), is the smallest number of colors that are needed in order to make GG rainbow vertex-connected. If for every pair u,vu, v of distinct vertices, GG contains a rainbow u−vu-v geodesic, then GG is strong rainbow vertex-connected. The minimum number kk for which there exists a kk-vertex-coloring of GG that results in a strongly rainbow vertex-connected graph is called the strong rainbow vertex-connection number of GG, denoted by srvc(G)srvc(G). Observe that rvc(G)≤srvc(G)rvc(G)\leq srvc(G) for any nontrivial connected graph GG. In this paper, sharp upper and lower bounds of srvc(G)srvc(G) are given for a connected graph GG of order nn, that is, 0≤srvc(G)≤n−20\leq srvc(G)\leq n-2. Graphs of order nn such that srvc(G)=1,2,n−2srvc(G)= 1, 2, n-2 are characterized, respectively. It is also shown that, for each pair a,ba, b of integers with a≥5a\geq 5 and b≥(7a−8)/5b\geq (7a-8)/5, there exists a connected graph GG such that rvc(G)=arvc(G)=a and srvc(G)=bsrvc(G)=b.Comment: 10 page

    Enabling Multi-level Trust in Privacy Preserving Data Mining

    Full text link
    Privacy Preserving Data Mining (PPDM) addresses the problem of developing accurate models about aggregated data without access to precise information in individual data record. A widely studied \emph{perturbation-based PPDM} approach introduces random perturbation to individual values to preserve privacy before data is published. Previous solutions of this approach are limited in their tacit assumption of single-level trust on data miners. In this work, we relax this assumption and expand the scope of perturbation-based PPDM to Multi-Level Trust (MLT-PPDM). In our setting, the more trusted a data miner is, the less perturbed copy of the data it can access. Under this setting, a malicious data miner may have access to differently perturbed copies of the same data through various means, and may combine these diverse copies to jointly infer additional information about the original data that the data owner does not intend to release. Preventing such \emph{diversity attacks} is the key challenge of providing MLT-PPDM services. We address this challenge by properly correlating perturbation across copies at different trust levels. We prove that our solution is robust against diversity attacks with respect to our privacy goal. That is, for data miners who have access to an arbitrary collection of the perturbed copies, our solution prevent them from jointly reconstructing the original data more accurately than the best effort using any individual copy in the collection. Our solution allows a data owner to generate perturbed copies of its data for arbitrary trust levels on-demand. This feature offers data owners maximum flexibility.Comment: 20 pages, 5 figures. Accepted for publication in IEEE Transactions on Knowledge and Data Engineerin
    • …
    corecore