Reliability Analysis of Communication Networks
|
|
- Edgar Kelley
- 6 years ago
- Views:
Transcription
1 Reliability Analysis of Communication Networks Mathematical models and algorithms Peter Tittmann Hochschule Mittweida May 2007 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
2 Models for Communication Networks Communication network Network topology Server Switch Base station Fiber optical transmission line Transmission line (copper) Wireless channel Server failure probability Link availability Line length (costs) Transfer rate User terminal PoP Mathematical model (un-) directed graph Vertex Edge (arc) Weights of vertices Edge weights Terminal vertex Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
3 Problems What is the probability that a certain vertex is reachable from another given vertex? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
4 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
5 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Which mean transmission rate can be realized? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
6 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Which mean transmission rate can be realized? Where are the weak points of the network (e.g. w.r.t. reliability or security)? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
7 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Which mean transmission rate can be realized? Where are the weak points of the network (e.g. w.r.t. reliability or security)? Is a spread of failure within the network possible? How? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
8 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Which mean transmission rate can be realized? Where are the weak points of the network (e.g. w.r.t. reliability or security)? Is a spread of failure within the network possible? How? What is the mean (average) packet delay? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
9 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Which mean transmission rate can be realized? Where are the weak points of the network (e.g. w.r.t. reliability or security)? Is a spread of failure within the network possible? How? What is the mean (average) packet delay? What is the probability of packet loss? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
10 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Which mean transmission rate can be realized? Where are the weak points of the network (e.g. w.r.t. reliability or security)? Is a spread of failure within the network possible? How? What is the mean (average) packet delay? What is the probability of packet loss? How is tra c load distributed over the network? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
11 Constraints Network technology, used protocol (IP, ATM, SS7, GSM) Routing, redundancy properties Service under consideration Supply of data Type of failure Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
12 Mathematical Model Network Structure Graphs Directed or undirected graph G = (V, E ) p e... availability of edge e 2 E All edges are assumed to fail independently. W set of paths C set of cuts Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
13 Reliability Measures All-terminal reliability (connectedness probability) R(G ) = P (fg is connectedg) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
14 Reliability Measures All-terminal reliability (connectedness probability) R(G ) = P (fg is connectedg) K-terminal probability R(G, K ), jk j 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
15 Reliability Measures All-terminal reliability (connectedness probability) R(G ) = P (fg is connectedg) K-terminal probability R(G, K ), jk j 2 The residual connectedness probability: G is considered operating if and only if at least one vertex is in operating state and all operating vertices of G belong to one component. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
16 Reliability Measures All-terminal reliability (connectedness probability) R(G ) = P (fg is connectedg) K-terminal probability R(G, K ), jk j 2 The residual connectedness probability: G is considered operating if and only if at least one vertex is in operating state and all operating vertices of G belong to one component. Probability of a given data transfer between two vertices. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
17 Reliability Measures All-terminal reliability (connectedness probability) R(G ) = P (fg is connectedg) K-terminal probability R(G, K ), jk j 2 The residual connectedness probability: G is considered operating if and only if at least one vertex is in operating state and all operating vertices of G belong to one component. Probability of a given data transfer between two vertices. Resilience: Expectation for the number of vertex pairs that are connected by operating paths. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
18 Reliability Measures All-terminal reliability (connectedness probability) R(G ) = P (fg is connectedg) K-terminal probability R(G, K ), jk j 2 The residual connectedness probability: G is considered operating if and only if at least one vertex is in operating state and all operating vertices of G belong to one component. Probability of a given data transfer between two vertices. Resilience: Expectation for the number of vertex pairs that are connected by operating paths. Importance measures Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
19 All-Terminal Reliability Example Sets of minimum paths spanning trees W = ffa, b, dg, fa, b, eg, fa, c, dg, fa, c, eg, fa, d, eg, fb, c, dg, fb, c, eg, Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
20 All-Terminal Reliability Example R (G ) = p a p b p d + p a p b p e + p a p c p d + p a p c p e + p a p d p e + p b p c p d +p b p c p e + p b p d p e 2p a p b p c p d 2p a p b p c p e 3p a p b p d p e 2p a p c p d p e 2p b p c p d p e + 4p a p b p c p d p e Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
21 Decomposition R (G ) = (1 p c ) R (G c) + p c R (G /c) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
22 All-Terminal Reliability Reductions 1 Parallel reduction e f g 2 Degree-2-reduction p g = p e + p f p e p f e f g Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
23 All-Terminal Reliability Reductions 1 Parallel reduction e f g 2 Degree-2-reduction p g = p e + p f p e p f e f g ω = p e + p f p e p f, p g = p e p f p e + p f p e p f. R (G ) = ωr G 0 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
24 All-Terminal Reliability Reductions G w (1 p)(1 p) e f u (1 p)p e f + p(1 e p) f G 1 u e w v p p f e f u G 2 uw v w R (G ) = (p e + p f 2p e p f ) R (G 1 ) +p e p f R (G 2 ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
25 All-Terminal Reliability Reductions G w (1 p)(1 p) e f u (1 p)p e f + p(1 e p) f G 1 u e w v p p f e f u G 2 uw G' u g w 1 p g p g u w G 1 G 2 uw v w R G 0 = (1 p g ) R (G 1 ) +p g R (G 2 ) R (G ) = (p e + p f 2p e p f ) R (G 1 ) +p e p f R (G 2 ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
26 All-Terminal Reliability Reductions Reduction principle R (G ) = ωr G 0 R (G ) = (p e + p f 2p e p f ) R (G 1 ) + p e p f R (G 2 ) R G 0 = (1 p g ) R (G 1 ) + p g R (G 2 ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
27 All-Terminal Reliability Reductions Reduction principle R (G ) = ωr G 0 R (G ) = (p e + p f 2p e p f ) R (G 1 ) + p e p f R (G 2 ) R G 0 = (1 p g ) R (G 1 ) + p g R (G 2 ) Method of coe cient comparison p e + p f 2p e p f = ω (1 p g ) p e p f = ωp g Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
28 All-Terminal Reliability Reductions Reduction principle R (G ) = ωr G 0 R (G ) = (p e + p f 2p e p f ) R (G 1 ) + p e p f R (G 2 ) R G 0 = (1 p g ) R (G 1 ) + p g R (G 2 ) Method of coe cient comparison Solution (reduction parameter) p e + p f 2p e p f = ω (1 p g ) p e p f = ωp g ω = p e + p f p e p f p e p p g = f p e + p f p e p f Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
29 All-Terminal Reliability Reductions Bridge reduction R(G ) = p e R G 0 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
30 All-Terminal Reliability Vertex Separators Cut vertex articulation G 1 [ G 2 = G G 1 \ G 2 = (fvg, ) R(G ) = R G 1 R G 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
31 All-Terminal Reliability Vertex Separators Separating vertex pair G 1 [ G 2 = G G 1 \ G 2 = (fu, vg, ) R(G ) = R G 1 R Guv 2 + R G 1 uv R G 2 R G 1 R G 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
32 All-Terminal Reliability Vertex Separators U P (U) P G 1, π G 2 π separating vertex set partition lattice of U probability that G 1 induces π obtained from G 2 merging the blocks of π R(G ) = P G 1, π R G 2 π π2p(u ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
33 Reliability polynomials De nition The reliability polynomial R(G, p) is the probability that the undirected graph G = (V, E ) is connected, assuming all edges of G fail independently with probability 1 p. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
34 Reliability polynomials De nition The reliability polynomial R(G, p) is the probability that the undirected graph G = (V, E ) is connected, assuming all edges of G fail independently with probability 1 p. R (G, p) = = = 1 m i=n 1 m i=n 1 a i p i c i... number of cut sets of cardinality i n i... number of spanning subgraphs of G n i p i (1 p) m i m c i p m i (1 p) i i=λ Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
35 Reliability polynomials Recursive De nition 8 < p n 1, if G is a tree with n vertices, R (G, p) = 0, if G is disconnected, : pr (G /e) + (1 p) R (G e), else. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
36 Reliability polynomials Recursive De nition 8 < p n 1, if G is a tree with n vertices, R (G, p) = 0, if G is disconnected, : pr (G /e) + (1 p) R (G e), else. Fact This de nition does not require any meaning of the variable p. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
37 Reliability polynomials Properties 1 If G is connected then and R (G, 0) = 0, R (G, 1) = 1 p m R (G, p) 1 (1 p) m. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
38 Reliability polynomials Properties 1 If G is connected then and 2 Monotonicity: R (G, 0) = 0, R (G, 1) = 1 p m R (G, p) 1 (1 p) m. p 1 < p 2 ) R (G, p 1 ) < R (G, p 2 ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
39 Reliability polynomials Properties 1 If G is connected then and 2 Monotonicity: R (G, 0) = 0, R (G, 1) = 1 p m R (G, p) 1 (1 p) m. p 1 < p 2 ) R (G, p 1 ) < R (G, p 2 ) 3 If G is a graph with at least three vertices then dr (G, p) dp = 0. p=0 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
40 Reliability polynomials Properties 1 If G is connected then and 2 Monotonicity: R (G, 0) = 0, R (G, 1) = 1 p m R (G, p) 1 (1 p) m. p 1 < p 2 ) R (G, p 1 ) < R (G, p 2 ) 3 If G is a graph with at least three vertices then dr (G, p) dp = 0. p=0 4 If G is biconnected then dr (G, p) dp = 0. p=1 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
41 Reliability polynomials Reliability Function R(G) p Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
42 Reliability polynomials Special Graphs Trees R (T n, p) = p n 1 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
43 Reliability polynomials Special Graphs Cycles R (C n, p) = np n 1 (n 1) p n Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
44 Reliability polynomials Special Graphs Ladder R (L n, p) = p2n 1 2 n α [(4 3p + α)n (4 3p α) n ] with α = p 12 20p + 9p 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
45 Reliability polynomials Special Graphs Complete graphs Recurrence equation r n := R (K n, q), q := 1 n 1 r n = 1 k 1 r 1 = 1 n 1 k=1 q k(n p k) r k Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
46 Reliability polynomials Special Graphs Explicit representation with r n = ( 1) jλj+1 n λ λ`n λ = (λ 1,..., λ k ) = jλj k 1 jλj qa 2(λ) 1 k 1 2 k 2 n k n and a 2 (λ 1,..., λ s ) = 1 2 n 2! s λ 2 i i=1 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
47 Reliability polynomials Special Graphs Explicit representation with r n = ( 1) jλj+1 n λ λ`n λ = (λ 1,..., λ k ) = jλj k 1 jλj qa 2(λ) 1 k 1 2 k 2 n k n and a 2 (λ 1,..., λ s ) = 1 2 Exponential generating function r n = q n2 z n 2 ln n! n 2! s λ 2 i i=1! q n2 zn 2 n0 n! Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
48 The K-terminal reliability Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
49 The K-terminal reliability De nition G is K-connected if all vertices of K V belong to one component of G. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
50 The K-terminal reliability 8 < 0 if G is not K-connected, R (G, K ) = 1 if G = (fvg, ), v 2 K, : p e R (G /e, K 0 ) + (1 p e ) R (G e, K ) else, where K 0 = (K n fu, vg) [ X, e = fu, vg, w is the vertex obtained merging vertices u and v and fwg, if K \ fu, vg 6= X =, else.. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
51 The K-terminal reliability Complete state enumeration: with R (G, K ) = p e F E e2f (1 p) ξ (G [F ], K ) e2e nf 1, if G [F ] is K-connected, ξ (G [F ], K ) = 0, else. For K = fs, tg, the probability R(G, K ) is called two-terminal reliability (or st-reliability).. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
52 The K-terminal reliability Properties 1 Let p = (p 1,..., p m ) be the vector of edge availabilities of G. Then p p 0 ) (G, K, p) R G, K, p 0. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
53 The K-terminal reliability Properties 1 Let p = (p 1,..., p m ) be the vector of edge availabilities of G. Then p p 0 ) (G, K, p) R G, K, p 0. 2 Monotonicity with respect to terminal vertex sets: K L ) R (G, K ) R (G, L) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
54 The K-terminal reliability Properties 1 Let p = (p 1,..., p m ) be the vector of edge availabilities of G. Then p p 0 ) (G, K, p) R G, K, p 0. 2 Monotonicity with respect to terminal vertex sets: 3 If K \ L 6= then K L ) R (G, K ) R (G, L) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
55 The K-terminal reliability Properties 1 Let p = (p 1,..., p m ) be the vector of edge availabilities of G. Then p p 0 ) (G, K, p) R G, K, p 0. 2 Monotonicity with respect to terminal vertex sets: 3 If K \ L 6= then K L ) R (G, K ) R (G, L) 1 R (G, K [ L) R (G, K ) + R (G, L) 1, Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
56 The K-terminal reliability Properties 1 Let p = (p 1,..., p m ) be the vector of edge availabilities of G. Then p p 0 ) (G, K, p) R G, K, p 0. 2 Monotonicity with respect to terminal vertex sets: 3 If K \ L 6= then K L ) R (G, K ) R (G, L) 1 R (G, K [ L) R (G, K ) + R (G, L) 1, 2 R (G, K [ L) R (G, K ) R (G, L). Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
57 The K-terminal reliability Properties 1 Let p = (p 1,..., p m ) be the vector of edge availabilities of G. Then p p 0 ) (G, K, p) R G, K, p 0. 2 Monotonicity with respect to terminal vertex sets: 3 If K \ L 6= then K L ) R (G, K ) R (G, L) 1 R (G, K [ L) R (G, K ) + R (G, L) 1, 2 R (G, K [ L) R (G, K ) R (G, L). 4 The K-terminal reliability of the complete graph K n : n k j(n j) R (K n, k) = r j q j k n j=k Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
58 Reliability Calculations Reductions Series reduction e f g p g = p e p f Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
59 Reliability Calculations Reductions Polygon-to chain reductions R (G ) = ωr (G 0 ) a b c f g h d e α = ab (1 c) d (1 e), β = (1 a) bc (1 d) e γ = a(1 b)c(d + e 2de) + (a + c 2ac)bd(1 e) δ = abcde a + 1 b + 1 c + 1 d + 1 e f = ω = δ β + δ, g = δ γ + δ, h = (α + δ) (β + δ) (γ + δ) δ 2 δ α + δ, Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
60 Reliability Calculations Reductions Delta-Star reduction a b c g e f x Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
61 Reliability Calculations Reductions Delta-Star reduction a b c g e f x α = a + b + c ab ac cc + abc β = a + bc abc γ = b + ac abc δ = c + ab abc e = α β, f = α γ, g = α δ, x = βγδ α 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
62 Partitions of Vertex Sets Partition Lattice M = fa, b, c, dg, P (M).. set of all partitions of M π σ if and only if π is a re nement of σ abcd abc/d ab/cd abd/c ac/bd acd/b ad/bc bcd/a ab/c/d ac/b/d ad/b/c bc/a/d bd/a/c cd/a/b a/b/c/d Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
63 Partitions of Vertex Sets Incidence Algebra Möbius function i=1 jσj jπj jσj µ (π, σ) = ( 1) (p i 1)! Supremum function Inverse a (x, y) = x _ y = ˆ1 a 1 (x, z) = y µ (y, z) µ (y, x) µ y, ˆ1 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
64 Partitions of Vertex Sets Network Reliability Theorem R (G, K ) = σπ(k ) τ2p(v ) a 1 (σ, τ) R (G τ ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
65 Partitions of Vertex Sets Network Reliability Theorem R (G, K ) = σπ(k ) τ2p(v ) a 1 (σ, τ) R (G τ ) Theorem R (G ) = ( 1) jσj+1 (jσj 1)! qje (G,σ)j σ2p(v ) Tittmann, P.: Partitions and network reliability, Discrete Applied Mathematics 95 (1999), Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
66 Separating Vertex Sets De nition Let G 1 = V 1, E 1 and G 2 = V 2, E 2 be two subgraphs of G = (V, E ) such that V 1 [ V 2 = V, V 1 \ V 2 = U, E 1 [ E 2 = E, E 1 \ E 2 =. Then U is called a separating vertex set of G. a U 1 G b 2 G c d Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
67 Separating Vertex Sets a b c d a b c d a b c d induced partition: π = a/bc/d Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
68 Separating Vertex Sets a b d c ab cd G! G ab/cd Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
69 Separating Vertex Sets The Splitting Formula Number of terms: R (G ) = Pπ 1 R G 2 π π2p(u ) B (u) 1 p u e u(r +1/r 1) 1 with r e r = u Exponential generating function: e e z 1 = B(n) zn n0 n! Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
70 Separating Vertex Sets Symmetric graphs Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
71 Separating Vertex Sets Symmetric graphs a a 1 2 G G G 1 a G2 a b b b b c c c c d d d d R (G ) = λ`u u λ jλj k 1 jλj P1 λ R G 2 λ Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
72 Separating Vertex Sets Symmetric graphs Number of terms: n B (n) p (n) p n t n Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
73 Separating Vertex Sets Symmetric graphs A form of the splitting formula that requires only all-terminal reliability calculations for G 1 and G 2 : R (G ) = π2p(u ) σ2p(u ) R Gπ 1 a 1 (π, σ) R Gσ 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
74 Separating Vertex Sets Symmetric graphs Special cases juj = 1 : R (G ) = R G 1 R G 2 juj = 2 : R (G ) = R G 1 R Guv 2 + R G 1 uv R G 2 juj = 3 : A 1 3 = C A abc, ab/c, ac/b, bc/a, a/b/c R G 1 R G 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
75 Separating Vertex Sets Multiple splitting R (G 0 G 1... G n ) = q T 0 A1 1 Q 1A2 1 Q 2 An 1 1 Q n 1An 1 q n Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
76 Separating Vertex Sets Multiple splitting Gorlov, V.; Tittmann, P.: A uni ed approach to the reliability of recurrent structures, in Ellart von Collani et al. (editors): Advances in stochastic models for reliability, quality and safety, Birkhäuser, Boston, 1998 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
77 Tree decompositions De nition A tree decomposition of a graph G = (V, E ) is a pair (T, φ) with a tree T = (W, F ) and a map φ : W! 2 V which assigns a vertex subset of G to each vertex of T such that S 1 w 2W φ (w) = V. 2 For each edge fu, vg 2 E there exists w in T such that fu, vg φ (w). 3 Let v 2 W be on the path between u and w in T. Then we have φ (u) \ φ (w) φ (v). Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
78 Tree decompositions De nition The width of a tree decomposition is maxfφ (w) : w 2 W g 1. The treewidth tw(g ) of G is the minimum width of a tree decomposition of G. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
79 Tree decompositions Example Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
80 Partial k-trees De nition A graph G = (V, E ) is a k-tree if it is a complete graph with k + 1 vertices or if G contains a vertex v 2 V whose neighborhood induces a k-clique of G and G v is again a k-tree. A partial k-tree is a subgraph of a k-tree. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
81 Partial k-trees Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
82 Path Decompositions De nition A path decomposition is a sequence X = (X 1,..., X r ) of vertex subsets of G such that the following conditions are satis ed r[ 1 X i = V. i=1 2 Each edge of G is contained in at least one of X 1,..., X r. 3 For all i, j, k with 1 i < j < k r the relation X i \ X k X j is valid. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
83 Path Decompositions De nition A canonical path decomposition satis es in addition: 4. All subsets of the sequence X contain at most pw (G ) + 1 vertices. 5. jx i+1 X i j = 1 for i = 1,..., r 1. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
84 Path Decompositions f1g, f1, 2g, f1, 2, 3g, f2, 3g, f2, 3, 5g, f2, 5g, f2, 4, 5g, f4, 5g, f4, 5, 8g, f4, 5g, f4g, f4, 6g, f4g, f4, 7g, f7g 1, 2, 3, 1, 5, 3, 4, 2, 8, 8, 5, 6, 6, 7, 7 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
85 Path Decompositions De nition A composition order of G = (V, E ) is a sequence s = (s 1,..., s r ) of vertices and edges such that 1 The removal of all edges of s yields a canonical path decomposition of G. 2 Each edge is exactly once in s. 3 If s k = (u, v) 2 E then there are indices i, j, p, q with i, j < k and p, q > k such that u = s i = s p and v = s j = s q. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
86 Path Decompositions Composition order: (1, 2, f1, 2g, 3, f1, 3g, 1, f2, 3g, 4, f2, 4g, 2, f3, 4g, 5, f3, 5g, 3, f4, 5g, 6, f4, 6g, 4, f5, 6g, 5, 6). Assigned path decomposition: (, f1g, f1, 2g, f1, 2, 3g, f2, 3g, f2, 3, 4g, f3, 4g, f3, 4, 5g, f4, 5g, f4, 5, 6g, f5, 6g, f6g, ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
87 Path Decompositions Composition Algorithms State = (index, value) Index: Partition of the set of active vertices Value: Polynomial Transformation of states 1. Vertex activation: (π, P π ) 7! (π/fvg, P π ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
88 Path Decompositions 2. Vertex deactivation: If fvg is a singleton of π then (π, P π ) 7!. Else: 0 1 (π, P π ) 7! v, v 2Y 2π jy j>1 3. The insertion of an edge e generates two successor states: P π (I) (π, P π ) 7! (π, (1 p) P π ) C A (II) (π, P π ) 7! (π _ e, pp π + P π_e ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
89 Path Decompositions Example s i X i+1 Z i+1 1 f1g f(1, 1)g 2 f1, 2g f(1/2, 1)g f1, 2g f1, 2g f(1/2, 1 p), (12, p)g 3 f1, 2, 3g f(1/2/3, 1 p), (12/3, p)g f1, 3g f1, 2, 3g f 1/2/3, 1 2p + p 2, 12/3, p p 2, 13/2, p p 2, 123, p 2 g 1 f2, 3g f 2/3, 2p 2p 2, 23, p 2 g f2, 3g f2, 3g f 2/3, 2p 4p 2 + 2p 3, 23, 3p 2 2p 3 g Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
90 Path Decompositions Numeric Example n = 53, m = 203 R(G ) = , (53 s) R st (G ) = , (221 s) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
91 Path Decompositions Algorithmic Principles André Pönitz: Über eine Methode zur Konstruktion von Algorithmen für die Berechnung von Invarianten in endlichen ungerichteten Hypergraphen, (About a generation method for algorithms for the calculation of invariants of nite graphs and hypergraphs), PhDThesis, Technische Universität Freiberg, Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
92 Directed Graphs s e 2 e 1 v e 3 e u 4 e 5 e w 6 e 7 t Algebraic Methods R st (G ) = M O p e W 2W e2w Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
93 Directed Graphs Iteration procedure 0 0 p 1 p p 5 p 6 P = B 0 p 3 0 p 4 0 1, if i = s p 7 A, s i = 0 else x 0 = (0,..., 0), s = (s 1,..., s n ) x n = x n 1 P s for n > 0 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
94 Directed Graphs Splitting X s G 1 Y G 2 t R st (G ) = X U ( 1) jx j jy j+1 R s,u ny (G 1 U ny )R X,t(GX 2 ) Y X Peter Tittmann (Hochschule Mittweida) Network Reliability / 64
CS 484 Data Mining. Association Rule Mining 2
CS 484 Data Mining Association Rule Mining 2 Review: Reducing Number of Candidates Apriori principle: If an itemset is frequent, then all of its subsets must also be frequent Apriori principle holds due
More informationData Mining Concepts & Techniques
Data Mining Concepts & Techniques Lecture No. 04 Association Analysis Naeem Ahmed Email: naeemmahoto@gmail.com Department of Software Engineering Mehran Univeristy of Engineering and Technology Jamshoro
More informationMath for Liberal Studies
Math for Liberal Studies We want to measure the influence each voter has As we have seen, the number of votes you have doesn t always reflect how much influence you have In order to measure the power of
More informationGraph Polynomials and Their Representations
Graph Polynomials and Their Representations By the Faculty of Mathematik und Informatik of the Technische Universität Bergakademie Freiberg approved Thesis to attain the academic degree of doctor rerum
More informationA note on the total domination number of a tree
A note on the total domination number of a tree 1 Mustapha Chellali and 2 Teresa W. Haynes 1 Department of Mathematics, University of Blida. B.P. 270, Blida, Algeria. E-mail: m_chellali@yahoo.com 2 Department
More informationDo in calculator, too.
You do Do in calculator, too. Sequence formulas that give you the exact definition of a term are explicit formulas. Formula: a n = 5n Explicit, every term is defined by this formula. Recursive formulas
More informationPreliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}
Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)
More informationALL GRAPH GENUS DISTRIBUTIONS ARE LOG-CONCAVE, AND RELATED CONJECTURES JONATHAN L. GROSS
ALL GRAPH GENUS DISTRIBUTIONS ARE LOG-CONCAVE, AND RELATED CONJECTURES JONATHAN L. GROSS DEPARTMENT OF COMPUTER SCIENCE COLUMBIA UNIVERSITY, NEW YORK, NY 10027 Version: 14:05 January 13, 2014 1. Definition
More informationSet Notation and Axioms of Probability NOT NOT X = X = X'' = X
Set Notation and Axioms of Probability Memory Hints: Intersection I AND I looks like A for And Union U OR + U looks like U for Union Complement NOT X = X = X' NOT NOT X = X = X'' = X Commutative Law A
More informationExact Algorithms for Dominating Induced Matching Based on Graph Partition
Exact Algorithms for Dominating Induced Matching Based on Graph Partition Mingyu Xiao School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731,
More informationDATA MINING - 1DL360
DATA MINING - DL360 Fall 200 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht0 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology, Uppsala
More information3. Branching Algorithms
3. Branching Algorithms COMP6741: Parameterized and Exact Computation Serge Gaspers Semester 2, 2015 Contents 1 Introduction 1 2 Maximum Independent Set 3 2.1 Simple Analysis................................................
More informationDATA MINING - 1DL360
DATA MINING - 1DL36 Fall 212" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht12 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology, Uppsala
More informationTree Decompositions and Tree-Width
Tree Decompositions and Tree-Width CS 511 Iowa State University December 6, 2010 CS 511 (Iowa State University) Tree Decompositions and Tree-Width December 6, 2010 1 / 15 Tree Decompositions Definition
More informationarxiv: v1 [math.st] 1 Nov 2017
ASSESSING THE RELIABILITY POLYNOMIAL BASED ON PERCOLATION THEORY arxiv:1711.00303v1 [math.st] 1 Nov 2017 SAJADI, FARKHONDEH A. Department of Statistics, University of Isfahan, Isfahan 81744,Iran; f.sajadi@sci.ui.ac.ir
More informationLecture 3 : Probability II. Jonathan Marchini
Lecture 3 : Probability II Jonathan Marchini Puzzle 1 Pick any two types of card that can occur in a normal pack of shuffled playing cards e.g. Queen and 6. What do you think is the probability that somewhere
More informationMinimization of Symmetric Submodular Functions under Hereditary Constraints
Minimization of Symmetric Submodular Functions under Hereditary Constraints J.A. Soto (joint work with M. Goemans) DIM, Univ. de Chile April 4th, 2012 1 of 21 Outline Background Minimal Minimizers and
More informationFinding Paths with Minimum Shared Edges in Graphs with Bounded Treewidth
Finding Paths with Minimum Shared Edges in Graphs with Bounded Treewidth Z.-Q. Ye 1, Y.-M. Li 2, H.-Q. Lu 3 and X. Zhou 4 1 Zhejiang University, Hanzhou, Zhejiang, China 2 Wenzhou University, Wenzhou,
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 2 Luca Trevisan August 29, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analysis Handout Luca Trevisan August 9, 07 Scribe: Mahshid Montazer Lecture In this lecture, we study the Max Cut problem in random graphs. We compute the probable
More informationNotes on MapReduce Algorithms
Notes on MapReduce Algorithms Barna Saha 1 Finding Minimum Spanning Tree of a Dense Graph in MapReduce We are given a graph G = (V, E) on V = N vertices and E = m N 1+c edges for some constant c > 0. Our
More informationThe Lefthanded Local Lemma characterizes chordal dependency graphs
The Lefthanded Local Lemma characterizes chordal dependency graphs Wesley Pegden March 30, 2012 Abstract Shearer gave a general theorem characterizing the family L of dependency graphs labeled with probabilities
More informationRobust Network Codes for Unicast Connections: A Case Study
Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,
More informationLikelihood Analysis of Gaussian Graphical Models
Faculty of Science Likelihood Analysis of Gaussian Graphical Models Ste en Lauritzen Department of Mathematical Sciences Minikurs TUM 2016 Lecture 2 Slide 1/43 Overview of lectures Lecture 1 Markov Properties
More information3. Branching Algorithms COMP6741: Parameterized and Exact Computation
3. Branching Algorithms COMP6741: Parameterized and Exact Computation Serge Gaspers 12 1 School of Computer Science and Engineering, UNSW Australia 2 Optimisation Resarch Group, NICTA Semester 2, 2015
More informationApplications of the Lopsided Lovász Local Lemma Regarding Hypergraphs
Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided
More informationReverse mathematics of some topics from algorithmic graph theory
F U N D A M E N T A MATHEMATICAE 157 (1998) Reverse mathematics of some topics from algorithmic graph theory by Peter G. C l o t e (Chestnut Hill, Mass.) and Jeffry L. H i r s t (Boone, N.C.) Abstract.
More informationAlvaro Rodrigues-Neto Research School of Economics, Australian National University. ANU Working Papers in Economics and Econometrics # 587
Cycles of length two in monotonic models José Alvaro Rodrigues-Neto Research School of Economics, Australian National University ANU Working Papers in Economics and Econometrics # 587 October 20122 JEL:
More information3.7 Cutting plane methods
3.7 Cutting plane methods Generic ILP problem min{ c t x : x X = {x Z n + : Ax b} } with m n matrix A and n 1 vector b of rationals. According to Meyer s theorem: There exists an ideal formulation: conv(x
More informationAnalogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph
Analogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph M. Lemańska a, J. A. Rodríguez-Velázquez b, Rolando Trujillo-Rasua c, a Department of Technical
More informationThere are two types of problems:
Np-complete Introduction: There are two types of problems: Two classes of algorithms: Problems whose time complexity is polynomial: O(logn), O(n), O(nlogn), O(n 2 ), O(n 3 ) Examples: searching, sorting,
More informationLecture Notes for Chapter 6. Introduction to Data Mining
Data Mining Association Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 6 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004
More informationRouting Algorithms. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur
Routing Algorithms CS60002: Distributed Systems Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Main Features Table Computation The routing tables must be computed
More informationGenerating k-vertex Connected Spanning Subgraphs and k-edge Connected Spanning Subgraphs
Generating k-vertex Connected Spanning Subgraphs and k-edge Connected Spanning Subgraphs Endre Boros Konrad Borys Khaled Elbassioni Vladimir Gurvich Kazuhisa Makino Gabor Rudolf Abstract We show that k-vertex
More informationStrange Combinatorial Connections. Tom Trotter
Strange Combinatorial Connections Tom Trotter Georgia Institute of Technology trotter@math.gatech.edu February 13, 2003 Proper Graph Colorings Definition. A proper r- coloring of a graph G is a map φ from
More information< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1
List of Problems jacques@ucsd.edu Those question with a star next to them are considered slightly more challenging. Problems 9, 11, and 19 from the book The probabilistic method, by Alon and Spencer. Question
More informationBounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia
Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia Andreas Krause krausea@cs.tum.edu Technical University of Munich February 12, 2003 This survey gives an introduction
More informationTutte Polynomials with Applications
Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 12, Number 6 (26), pp. 4781 4797 Research India Publications http://www.ripublication.com/gjpam.htm Tutte Polynomials with Applications
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationDiscrete Probability Distributions
Chapter 4 Discrete Probability Distributions 4.1 Random variable A random variable is a function that assigns values to different events in a sample space. Example 4.1.1. Consider the experiment of rolling
More informationExtremal Graphs Having No Stable Cutsets
Extremal Graphs Having No Stable Cutsets Van Bang Le Institut für Informatik Universität Rostock Rostock, Germany le@informatik.uni-rostock.de Florian Pfender Department of Mathematics and Statistics University
More informationDATA MINING LECTURE 3. Frequent Itemsets Association Rules
DATA MINING LECTURE 3 Frequent Itemsets Association Rules This is how it all started Rakesh Agrawal, Tomasz Imielinski, Arun N. Swami: Mining Association Rules between Sets of Items in Large Databases.
More informationDecomposition of random graphs into complete bipartite graphs
Decomposition of random graphs into complete bipartite graphs Fan Chung Xing Peng Abstract We consider the problem of partitioning the edge set of a graph G into the minimum number τg) of edge-disjoint
More informationDynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.
Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains
More informationOut-colourings of Digraphs
Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.
More informationGraph. Supply Vertices and Demand Vertices. Supply Vertices. Demand Vertices
Partitioning Graphs of Supply and Demand Generalization of Knapsack Problem Takao Nishizeki Tohoku University Graph Supply Vertices and Demand Vertices Supply Vertices Demand Vertices Graph Each Supply
More informationOn the Complexity of Budgeted Maximum Path Coverage on Trees
On the Complexity of Budgeted Maximum Path Coverage on Trees H.-C. Wirth An instance of the budgeted maximum coverage problem is given by a set of weighted ground elements and a cost weighted family of
More informationCSCE 750 Final Exam Answer Key Wednesday December 7, 2005
CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 Do all problems. Put your answers on blank paper or in a test booklet. There are 00 points total in the exam. You have 80 minutes. Please note
More informationOn Dominator Colorings in Graphs
On Dominator Colorings in Graphs Ralucca Michelle Gera Department of Applied Mathematics Naval Postgraduate School Monterey, CA 994, USA ABSTRACT Given a graph G, the dominator coloring problem seeks a
More informationFractal Geometry of Minimal Spanning Trees
Fractal Geometry of Minimal Spanning Trees T. S. Jackson and N. Read Part I: arxiv:0902.3651 Part II: arxiv:0909.5343 Accepted by Phys. Rev. E Problem Definition Given a graph with costs on the edges,
More informationCOMP 5331: Knowledge Discovery and Data Mining
COMP 5331: Knowledge Discovery and Data Mining Acknowledgement: Slides modified by Dr. Lei Chen based on the slides provided by Jiawei Han, Micheline Kamber, and Jian Pei And slides provide by Raymond
More informationDeciding the Bell number for hereditary graph properties. A. Atminas, A. Collins, J. Foniok and V. Lozin
Deciding the Bell number for hereditary graph properties A. Atminas, A. Collins, J. Foniok and V. Lozin REPORT No. 11, 2013/2014, spring ISSN 1103-467X ISRN IML-R- -11-13/14- -SE+spring Deciding the Bell
More informationRunning Time. Assumption. All capacities are integers between 1 and C.
Running Time Assumption. All capacities are integers between and. Invariant. Every flow value f(e) and every residual capacities c f (e) remains an integer throughout the algorithm. Theorem. The algorithm
More informationApproximate Counting and Markov Chain Monte Carlo
Approximate Counting and Markov Chain Monte Carlo A Randomized Approach Arindam Pal Department of Computer Science and Engineering Indian Institute of Technology Delhi March 18, 2011 April 8, 2011 Arindam
More informationProbability Propagation
Graphical Models, Lectures 9 and 10, Michaelmas Term 2009 November 13, 2009 Characterizing chordal graphs The following are equivalent for any undirected graph G. (i) G is chordal; (ii) G is decomposable;
More informationLinear Extensions of N-free Orders
Linear Extensions of N-free Orders Stefan Felsner felsner@math.tu-berlin.de Institut für Mathematik Technische Universität Berlin Strasse des 17. Juni 136 D-10623 Berlin, Germany Thibault Manneville tmannevi@clipper.ens.fr
More informationUNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours.
UNIVERSITY OF YORK MSc Examinations 2004 MATHEMATICS Networks Time Allowed: 3 hours. Answer 4 questions. Standard calculators will be provided but should be unnecessary. 1 Turn over 2 continued on next
More informationGallai s Conjecture For Graphs of Girth at Least Four. Peter Harding and Sean McGuinness Thompson Rivers University
Gallai s Conjecture For Graphs of Girth at Least Four Peter Harding and Sean McGuinness Thompson Rivers University i Gallai s Conjecture For Graphs of Girth at Least Four Peter Harding and Sean McGuinness
More informationA Note on the Complexity of Network Reliability Problems. Hans L. Bodlaender Thomas Wolle
A Note on the Complexity of Network Reliability Problems Hans L. Bodlaender Thomas Wolle institute of information and computing sciences, utrecht university technical report UU-CS-2004-001 www.cs.uu.nl
More informationParameterized Domination in Circle Graphs
Parameterized Domination in Circle Graphs Nicolas Bousquet 1, Daniel Gonçalves 1, George B. Mertzios 2, Christophe Paul 1, Ignasi Sau 1, and Stéphan Thomassé 3 1 AlGCo project-team, CNRS, LIRMM, Montpellier,
More informationUndirected Graphical Models
Undirected Graphical Models 1 Conditional Independence Graphs Let G = (V, E) be an undirected graph with vertex set V and edge set E, and let A, B, and C be subsets of vertices. We say that C separates
More information8/29/13 Comp 555 Fall
8/29/13 Comp 555 Fall 2013 1 (from Lecture 2) Restriction enzymes break DNA whenever they encounter specific base sequences They occur reasonably frequently within long sequences (a 6-base sequence target
More informationLIMITING PROBABILITY TRANSITION MATRIX OF A CONDENSED FIBONACCI TREE
International Journal of Applied Mathematics Volume 31 No. 18, 41-49 ISSN: 1311-178 (printed version); ISSN: 1314-86 (on-line version) doi: http://dx.doi.org/1.173/ijam.v31i.6 LIMITING PROBABILITY TRANSITION
More informationACO Comprehensive Exam 19 March Graph Theory
1. Graph Theory Let G be a connected simple graph that is not a cycle and is not complete. Prove that there exist distinct non-adjacent vertices u, v V (G) such that the graph obtained from G by deleting
More informationDepartment of Electrical & Electronics EE-333 DIGITAL SYSTEMS
Department of Electrical & Electronics EE-333 DIGITAL SYSTEMS 1) Given the two binary numbers X = 1010100 and Y = 1000011, perform the subtraction (a) X -Y and (b) Y - X using 2's complements. a) X = 1010100
More informationSelf-Organized Public-Key Management for Mobile Ad Hoc Networks
Self-Organized Public-Key Management for Mobile Ad Hoc Networks Srđan Čapkun, Levente Buttyàn and Jean-Pierre Hubaux {srdan.capkun, levente.buttyan and jean-pierre.hubaux}@epfl.ch Laboratory for Computer
More informationGenerating p-extremal graphs
Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum
More informationACO Comprehensive Exam October 14 and 15, 2013
1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for
More informationEfficient Reassembling of Graphs, Part 1: The Linear Case
Efficient Reassembling of Graphs, Part 1: The Linear Case Assaf Kfoury Boston University Saber Mirzaei Boston University Abstract The reassembling of a simple connected graph G = (V, E) is an abstraction
More informationLecture 4: DNA Restriction Mapping
Lecture 4: DNA Restriction Mapping Study Chapter 4.1-4.3 9/3/2013 COMP 465 Fall 2013 1 Recall Restriction Enzymes (from Lecture 2) Restriction enzymes break DNA whenever they encounter specific base sequences
More informationOn the Approximability of Partial VC Dimension
On the Approximability of Partial VC Dimension Cristina Bazgan 1 Florent Foucaud 2 Florian Sikora 1 1 LAMSADE, Université Paris Dauphine, CNRS France 2 LIMOS, Université Blaise Pascal, Clermont-Ferrand
More information2 GRAPH AND NETWORK OPTIMIZATION. E. Amaldi Introduction to Operations Research Politecnico Milano 1
2 GRAPH AND NETWORK OPTIMIZATION E. Amaldi Introduction to Operations Research Politecnico Milano 1 A variety of decision-making problems can be formulated in terms of graphs and networks Examples: - transportation
More informationInduced Saturation of Graphs
Induced Saturation of Graphs Maria Axenovich a and Mónika Csikós a a Institute of Algebra and Geometry, Karlsruhe Institute of Technology, Englerstraße 2, 76128 Karlsruhe, Germany Abstract A graph G is
More informationLECTURE 3. Last time:
LECTURE 3 Last time: Mutual Information. Convexity and concavity Jensen s inequality Information Inequality Data processing theorem Fano s Inequality Lecture outline Stochastic processes, Entropy rate
More informationarxiv: v1 [math.co] 5 May 2016
Uniform hypergraphs and dominating sets of graphs arxiv:60.078v [math.co] May 06 Jaume Martí-Farré Mercè Mora José Luis Ruiz Departament de Matemàtiques Universitat Politècnica de Catalunya Spain {jaume.marti,merce.mora,jose.luis.ruiz}@upc.edu
More informationBranchwidth of graphic matroids.
Branchwidth of graphic matroids. Frédéric Mazoit and Stéphan Thomassé Abstract Answering a question of Geelen, Gerards, Robertson and Whittle [2], we prove that the branchwidth of a bridgeless graph is
More informationEnumerating minimal connected dominating sets in graphs of bounded chordality,
Enumerating minimal connected dominating sets in graphs of bounded chordality, Petr A. Golovach a,, Pinar Heggernes a, Dieter Kratsch b a Department of Informatics, University of Bergen, N-5020 Bergen,
More informationCombinatorial semigroups and induced/deduced operators
Combinatorial semigroups and induced/deduced operators G. Stacey Staples Department of Mathematics and Statistics Southern Illinois University Edwardsville Modified Hypercubes Particular groups & semigroups
More informationLecture 4: DNA Restriction Mapping
Lecture 4: DNA Restriction Mapping Study Chapter 4.1-4.3 8/28/2014 COMP 555 Bioalgorithms (Fall 2014) 1 Recall Restriction Enzymes (from Lecture 2) Restriction enzymes break DNA whenever they encounter
More informationA note on network reliability
A note on network reliability Noga Alon Institute for Advanced Study, Princeton, NJ 08540 and Department of Mathematics Tel Aviv University, Tel Aviv, Israel Let G = (V, E) be a loopless undirected multigraph,
More informationA Note on Roman {2}-domination problem in graphs
A Note on Roman {2}-domination problem in graphs arxiv:1804.09338v3 [math.co] 17 Feb 2019 Hangdi Chen and Changhong Lu School of Mathematical Sciences, Shanghai Key Laboratory of PMMP, East China Normal
More informationk-degenerate Graphs Allan Bickle Date Western Michigan University
k-degenerate Graphs Western Michigan University Date Basics Denition The k-core of a graph G is the maximal induced subgraph H G such that δ (H) k. The core number of a vertex, C (v), is the largest value
More informationPropositional Logic. What is discrete math? Tautology, equivalence, and inference. Applications
What is discrete math? Propositional Logic The real numbers are continuous in the senses that: between any two real numbers there is a real number The integers do not share this property. In this sense
More informationOn the mean connected induced subgraph order of cographs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,
More informationA = A U. U [n] P(A U ). n 1. 2 k(n k). k. k=1
Lecture I jacques@ucsd.edu Notation: Throughout, P denotes probability and E denotes expectation. Denote (X) (r) = X(X 1)... (X r + 1) and let G n,p denote the Erdős-Rényi model of random graphs. 10 Random
More informationOPERATIONS RESEARCH CENTE R
OPERATIONS RESEARCH CENTE R working paper I jll I_ MASSAC HUSE TTS INSTITUTE OF TECHNOLOGY Some Lattice-Theoretic Tools for Network Reliability Analysis by Daniel Bienstock OR 138-85 August 1985 This research
More informationData Mining and Analysis: Fundamental Concepts and Algorithms
Data Mining and Analysis: Fundamental Concepts and Algorithms dataminingbook.info Mohammed J. Zaki 1 Wagner Meira Jr. 2 1 Department of Computer Science Rensselaer Polytechnic Institute, Troy, NY, USA
More information9/2/2009 Comp /Comp Fall
Lecture 4: DNA Restriction Mapping Study Chapter 4.1-4.34.3 9/2/2009 Comp 590-90/Comp 790-90 Fall 2009 1 Recall Restriction Enzymes (from Lecture 2) Restriction enzymes break DNA whenever they encounter
More informationON THE NUMBER OF COMPONENTS OF A GRAPH
Volume 5, Number 1, Pages 34 58 ISSN 1715-0868 ON THE NUMBER OF COMPONENTS OF A GRAPH HAMZA SI KADDOUR AND ELIAS TAHHAN BITTAR Abstract. Let G := (V, E be a simple graph; for I V we denote by l(i the number
More informationThe Steiner Network Problem
The Steiner Network Problem Pekka Orponen T-79.7001 Postgraduate Course on Theoretical Computer Science 7.4.2008 Outline 1. The Steiner Network Problem Linear programming formulation LP relaxation 2. The
More informationICS 252 Introduction to Computer Design
ICS 252 fall 2006 Eli Bozorgzadeh Computer Science Department-UCI References and Copyright Textbooks referred [Mic94] G. De Micheli Synthesis and Optimization of Digital Circuits McGraw-Hill, 1994. [CLR90]
More informationGraph Theorizing Peg Solitaire. D. Paul Hoilman East Tennessee State University
Graph Theorizing Peg Solitaire D. Paul Hoilman East Tennessee State University December 7, 00 Contents INTRODUCTION SIMPLE SOLVING CONCEPTS 5 IMPROVED SOLVING 7 4 RELATED GAMES 5 5 PROGENATION OF SOLVABLE
More information5 Flows and cuts in digraphs
5 Flows and cuts in digraphs Recall that a digraph or network is a pair G = (V, E) where V is a set and E is a multiset of ordered pairs of elements of V, which we refer to as arcs. Note that two vertices
More informationList H-Coloring a Graph by Removing Few Vertices
List H-Coloring a Graph by Removing Few Vertices Rajesh Chitnis 1, László Egri 2, and Dániel Marx 2 1 Department of Computer Science, University of Maryland at College Park, USA, rchitnis@cs.umd.edu 2
More informationCSE 591 Homework 3 Sample Solutions. Problem 1
CSE 591 Homework 3 Sample Solutions Problem 1 (a) Let p = max{1, k d}, q = min{n, k + d}, it suffices to find the pth and qth largest element of L and output all elements in the range between these two
More informationPart III: Traveling salesman problems
Transportation Logistics Part III: Traveling salesman problems c R.F. Hartl, S.N. Parragh 1/282 Motivation Motivation Why do we study the TSP? c R.F. Hartl, S.N. Parragh 2/282 Motivation Motivation Why
More informationAlmost giant clusters for percolation on large trees
for percolation on large trees Institut für Mathematik Universität Zürich Erdős-Rényi random graph model in supercritical regime G n = complete graph with n vertices Bond percolation with parameter p(n)
More informationGeneralized Pigeonhole Properties of Graphs and Oriented Graphs
Europ. J. Combinatorics (2002) 23, 257 274 doi:10.1006/eujc.2002.0574 Available online at http://www.idealibrary.com on Generalized Pigeonhole Properties of Graphs and Oriented Graphs ANTHONY BONATO, PETER
More informationRing Sums, Bridges and Fundamental Sets
1 Ring Sums Definition 1 Given two graphs G 1 = (V 1, E 1 ) and G 2 = (V 2, E 2 ) we define the ring sum G 1 G 2 = (V 1 V 2, (E 1 E 2 ) (E 1 E 2 )) with isolated points dropped. So an edge is in G 1 G
More informationThe Strong Largeur d Arborescence
The Strong Largeur d Arborescence Rik Steenkamp (5887321) November 12, 2013 Master Thesis Supervisor: prof.dr. Monique Laurent Local Supervisor: prof.dr. Alexander Schrijver KdV Institute for Mathematics
More informationCS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash
CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash Equilibrium Price of Stability Coping With NP-Hardness
More information