53 research outputs found

    On the Recognition of Fuzzy Circular Interval Graphs

    Get PDF
    Fuzzy circular interval graphs are a generalization of proper circular arc graphs and have been recently introduced by Chudnovsky and Seymour as a fundamental subclass of claw-free graphs. In this paper, we provide a polynomial-time algorithm for recognizing such graphs, and more importantly for building a suitable representation.Comment: 12 pages, 2 figure

    Horizontal collaboration in forestry: game theory models and algorithms for trading demands

    Full text link
    In this paper, we introduce a new cooperative game theory model that we call production-distribution game to address a major open problem for operations research in forestry, raised by R\"onnqvist et al. in 2015, namely, that of modelling and proposing efficient sharing principles for practical collaboration in transportation in this sector. The originality of our model lies in the fact that the value/strength of a player does not only depend on the individual cost or benefit of the objects she owns but also depends on her market shares (customers demand). We show however that the production-distribution game is an interesting special case of a market game introduced by Shapley and Shubik in 1969. As such it exhibits the nice property of having a non-empty core. We then prove that we can compute both the nucleolus and the Shapley value efficiently, in a nontrivial and interesting special case. We in particular provide two different algorithms to compute the nucleolus: a simple separation algorithm and a fast primal-dual algorithm. Our results can be used to tackle more general versions of the problem and we believe that our contribution paves the way towards solving the challenging open problem herein

    Rerouting Flows When Links Fail

    Get PDF
    We introduce and investigate reroutable flows, a robust version of network flows in which link failures can be mitigated by rerouting the affected flow. Given a capacitated network, a path flow is reroutable if after failure of an arbitrary arc, we can reroute the interrupted flow from the tail of that arc to the sink, without modifying the flow that is not affected by the failure. Similar types of restoration, which are often termed "local", were previously investigated in the context of network design, such as min-cost capacity planning. In this paper, our interest is in computing maximum flows under this robustness assumption. An important new feature of our model, distinguishing it from existing max robust flow models, is that no flow can get lost in the network. We also study a tightening of reroutable flows, called strictly reroutable flows, making more restrictive assumptions on the capacities available for rerouting. For both variants, we devise a reroutable-flow equivalent of an s-t-cut and show that the corresponding max flow/min cut gap is bounded by 2. It turns out that a strictly reroutable flow of maximum value can be found using a compact LP formulation, whereas the problem of finding a maximum reroutable flow is NP-hard, even when all capacities are in {1, 2}. However, the tightening can be used to get a 2-approximation for reroutable flows. This ratio is tight in general networks, but we show that in the case of unit capacities, every reroutable flow can be transformed into a strictly reroutable flow of same value. While it is NP-hard to compute a maximal integral flow even for unit capacities, we devise a surprisingly simple combinatorial algorithm that finds a half-integral strictly reroutable flow of value 1, or certifies that no such solutions exits. Finally, we also give a hardness result for the case of multiple arc failures

    On non-rank facets of the stable set polytope of claw-free graphs and circulant graphs

    Get PDF
    We deal with non-rank facets of the stable set polytope of claw-free graphs. We extend results of Giles and Trotter [7] by (i) showing that for any nonnegative integer a there exists a circulant graph whose stable set polytope has a facet-inducing inequality with (a,a+1)-valued coefficients (rank facets have only coefficients 0, 1), and (ii) providing new facets of the stable set polytope with up to five different non-zero coefficients for claw-free graphs. We prove that coefficients have to be consecutive in any facet with exactly two different non-zero coefficients (assuming they are relatively prime). Last but not least, we present a complete description of the stable set polytope for graphs with stability number 2, already observed by Cook [3] and Shepherd [18

    Polynomial cases of the tarification problem

    Get PDF
    We consider the problem of determining a set of optimal tariffs for an agent in a network, who owns a subset of the arcs of the network, and who wishes to maximize his revenues on this subset from a set of clients that make use of the network.The general variant of this problem is NP-hard, already with a single client. This paper introduces several new polynomially solvable special cases. An important case is the following.For multiple clients, if the number of tariff arcs is bounded from above, we can solve the problem by a polynomial number of linear programs (each of which is of polynomial size). Furthermore, we show that the parametric tarification problem and the single arc fixed charge tarification problem can be solved in polynomial time.Economics ;

    A short proof of the VPN tree routing conjecture on ring networks

    Get PDF
    Only recently, Hurkens, Keijsper, and Stougie proved the VPN Tree Routing Conjecture for the special case of ring networks. We present a short proof of a slightly stronger result which might also turn out to be useful for proving the VPN Tree Routing Conjecture for general networks

    Night Worker

    Get PDF
    Virtual private network design is the following NP-hard problem. We are given a communication network represented as a weighted graph with thresholds on the nodes which represent the amount of flow that a node can send to and receive from the network. The task is to reserve capacities at minimum cost and to specify paths between every ordered pair of nodes such that all valid traffic-matrices can be routed along the corresponding paths. Recently, this network design problem has received considerable attention in the literature. It is motivated by the fact that the exact amount of flow which is exchanged between terminals is not known in advance and prediction is often elusive. The main contributions of this paper are as follows: (1) Using Hu’s 2-commodity flow theorem, we provide a new and considerably stronger lower bound on the cost of an optimum solution. With this lower bound we reanalyze a simple routing scheme which has been described in the literature many times, and provide an improved upper bound on its approximation ratio. (2) We present a new randomized approximation algorithm. In contrast to earlier approaches from the literature, the resulting solution does not have tree structure. A combination of our new algorithm with the simple routing scheme yields an expected performance ratio of 3.79 for virtual private network design. This is a considerable improvement of the previously best known 5.55-approximatio
    • …
    corecore