Reliability Analysis of Communication Networks

Size: px
Start display at page:

Download "Reliability Analysis of Communication Networks"

Transcription

1 Reliability Analysis of Communication Networks Mathematical models and algorithms Peter Tittmann Hochschule Mittweida May 2007 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

2 Models for Communication Networks Communication network Network topology Server Switch Base station Fiber optical transmission line Transmission line (copper) Wireless channel Server failure probability Link availability Line length (costs) Transfer rate User terminal PoP Mathematical model (un-) directed graph Vertex Edge (arc) Weights of vertices Edge weights Terminal vertex Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

3 Problems What is the probability that a certain vertex is reachable from another given vertex? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

4 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

5 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Which mean transmission rate can be realized? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

6 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Which mean transmission rate can be realized? Where are the weak points of the network (e.g. w.r.t. reliability or security)? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

7 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Which mean transmission rate can be realized? Where are the weak points of the network (e.g. w.r.t. reliability or security)? Is a spread of failure within the network possible? How? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

8 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Which mean transmission rate can be realized? Where are the weak points of the network (e.g. w.r.t. reliability or security)? Is a spread of failure within the network possible? How? What is the mean (average) packet delay? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

9 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Which mean transmission rate can be realized? Where are the weak points of the network (e.g. w.r.t. reliability or security)? Is a spread of failure within the network possible? How? What is the mean (average) packet delay? What is the probability of packet loss? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

10 Problems What is the probability that a certain vertex is reachable from another given vertex? What is the probability of network overload? Which mean transmission rate can be realized? Where are the weak points of the network (e.g. w.r.t. reliability or security)? Is a spread of failure within the network possible? How? What is the mean (average) packet delay? What is the probability of packet loss? How is tra c load distributed over the network? Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

11 Constraints Network technology, used protocol (IP, ATM, SS7, GSM) Routing, redundancy properties Service under consideration Supply of data Type of failure Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

12 Mathematical Model Network Structure Graphs Directed or undirected graph G = (V, E ) p e... availability of edge e 2 E All edges are assumed to fail independently. W set of paths C set of cuts Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

13 Reliability Measures All-terminal reliability (connectedness probability) R(G ) = P (fg is connectedg) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

14 Reliability Measures All-terminal reliability (connectedness probability) R(G ) = P (fg is connectedg) K-terminal probability R(G, K ), jk j 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

15 Reliability Measures All-terminal reliability (connectedness probability) R(G ) = P (fg is connectedg) K-terminal probability R(G, K ), jk j 2 The residual connectedness probability: G is considered operating if and only if at least one vertex is in operating state and all operating vertices of G belong to one component. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

16 Reliability Measures All-terminal reliability (connectedness probability) R(G ) = P (fg is connectedg) K-terminal probability R(G, K ), jk j 2 The residual connectedness probability: G is considered operating if and only if at least one vertex is in operating state and all operating vertices of G belong to one component. Probability of a given data transfer between two vertices. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

17 Reliability Measures All-terminal reliability (connectedness probability) R(G ) = P (fg is connectedg) K-terminal probability R(G, K ), jk j 2 The residual connectedness probability: G is considered operating if and only if at least one vertex is in operating state and all operating vertices of G belong to one component. Probability of a given data transfer between two vertices. Resilience: Expectation for the number of vertex pairs that are connected by operating paths. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

18 Reliability Measures All-terminal reliability (connectedness probability) R(G ) = P (fg is connectedg) K-terminal probability R(G, K ), jk j 2 The residual connectedness probability: G is considered operating if and only if at least one vertex is in operating state and all operating vertices of G belong to one component. Probability of a given data transfer between two vertices. Resilience: Expectation for the number of vertex pairs that are connected by operating paths. Importance measures Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

19 All-Terminal Reliability Example Sets of minimum paths spanning trees W = ffa, b, dg, fa, b, eg, fa, c, dg, fa, c, eg, fa, d, eg, fb, c, dg, fb, c, eg, Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

20 All-Terminal Reliability Example R (G ) = p a p b p d + p a p b p e + p a p c p d + p a p c p e + p a p d p e + p b p c p d +p b p c p e + p b p d p e 2p a p b p c p d 2p a p b p c p e 3p a p b p d p e 2p a p c p d p e 2p b p c p d p e + 4p a p b p c p d p e Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

21 Decomposition R (G ) = (1 p c ) R (G c) + p c R (G /c) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

22 All-Terminal Reliability Reductions 1 Parallel reduction e f g 2 Degree-2-reduction p g = p e + p f p e p f e f g Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

23 All-Terminal Reliability Reductions 1 Parallel reduction e f g 2 Degree-2-reduction p g = p e + p f p e p f e f g ω = p e + p f p e p f, p g = p e p f p e + p f p e p f. R (G ) = ωr G 0 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

24 All-Terminal Reliability Reductions G w (1 p)(1 p) e f u (1 p)p e f + p(1 e p) f G 1 u e w v p p f e f u G 2 uw v w R (G ) = (p e + p f 2p e p f ) R (G 1 ) +p e p f R (G 2 ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

25 All-Terminal Reliability Reductions G w (1 p)(1 p) e f u (1 p)p e f + p(1 e p) f G 1 u e w v p p f e f u G 2 uw G' u g w 1 p g p g u w G 1 G 2 uw v w R G 0 = (1 p g ) R (G 1 ) +p g R (G 2 ) R (G ) = (p e + p f 2p e p f ) R (G 1 ) +p e p f R (G 2 ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

26 All-Terminal Reliability Reductions Reduction principle R (G ) = ωr G 0 R (G ) = (p e + p f 2p e p f ) R (G 1 ) + p e p f R (G 2 ) R G 0 = (1 p g ) R (G 1 ) + p g R (G 2 ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

27 All-Terminal Reliability Reductions Reduction principle R (G ) = ωr G 0 R (G ) = (p e + p f 2p e p f ) R (G 1 ) + p e p f R (G 2 ) R G 0 = (1 p g ) R (G 1 ) + p g R (G 2 ) Method of coe cient comparison p e + p f 2p e p f = ω (1 p g ) p e p f = ωp g Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

28 All-Terminal Reliability Reductions Reduction principle R (G ) = ωr G 0 R (G ) = (p e + p f 2p e p f ) R (G 1 ) + p e p f R (G 2 ) R G 0 = (1 p g ) R (G 1 ) + p g R (G 2 ) Method of coe cient comparison Solution (reduction parameter) p e + p f 2p e p f = ω (1 p g ) p e p f = ωp g ω = p e + p f p e p f p e p p g = f p e + p f p e p f Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

29 All-Terminal Reliability Reductions Bridge reduction R(G ) = p e R G 0 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

30 All-Terminal Reliability Vertex Separators Cut vertex articulation G 1 [ G 2 = G G 1 \ G 2 = (fvg, ) R(G ) = R G 1 R G 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

31 All-Terminal Reliability Vertex Separators Separating vertex pair G 1 [ G 2 = G G 1 \ G 2 = (fu, vg, ) R(G ) = R G 1 R Guv 2 + R G 1 uv R G 2 R G 1 R G 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

32 All-Terminal Reliability Vertex Separators U P (U) P G 1, π G 2 π separating vertex set partition lattice of U probability that G 1 induces π obtained from G 2 merging the blocks of π R(G ) = P G 1, π R G 2 π π2p(u ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

33 Reliability polynomials De nition The reliability polynomial R(G, p) is the probability that the undirected graph G = (V, E ) is connected, assuming all edges of G fail independently with probability 1 p. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

34 Reliability polynomials De nition The reliability polynomial R(G, p) is the probability that the undirected graph G = (V, E ) is connected, assuming all edges of G fail independently with probability 1 p. R (G, p) = = = 1 m i=n 1 m i=n 1 a i p i c i... number of cut sets of cardinality i n i... number of spanning subgraphs of G n i p i (1 p) m i m c i p m i (1 p) i i=λ Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

35 Reliability polynomials Recursive De nition 8 < p n 1, if G is a tree with n vertices, R (G, p) = 0, if G is disconnected, : pr (G /e) + (1 p) R (G e), else. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

36 Reliability polynomials Recursive De nition 8 < p n 1, if G is a tree with n vertices, R (G, p) = 0, if G is disconnected, : pr (G /e) + (1 p) R (G e), else. Fact This de nition does not require any meaning of the variable p. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

37 Reliability polynomials Properties 1 If G is connected then and R (G, 0) = 0, R (G, 1) = 1 p m R (G, p) 1 (1 p) m. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

38 Reliability polynomials Properties 1 If G is connected then and 2 Monotonicity: R (G, 0) = 0, R (G, 1) = 1 p m R (G, p) 1 (1 p) m. p 1 < p 2 ) R (G, p 1 ) < R (G, p 2 ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

39 Reliability polynomials Properties 1 If G is connected then and 2 Monotonicity: R (G, 0) = 0, R (G, 1) = 1 p m R (G, p) 1 (1 p) m. p 1 < p 2 ) R (G, p 1 ) < R (G, p 2 ) 3 If G is a graph with at least three vertices then dr (G, p) dp = 0. p=0 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

40 Reliability polynomials Properties 1 If G is connected then and 2 Monotonicity: R (G, 0) = 0, R (G, 1) = 1 p m R (G, p) 1 (1 p) m. p 1 < p 2 ) R (G, p 1 ) < R (G, p 2 ) 3 If G is a graph with at least three vertices then dr (G, p) dp = 0. p=0 4 If G is biconnected then dr (G, p) dp = 0. p=1 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

41 Reliability polynomials Reliability Function R(G) p Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

42 Reliability polynomials Special Graphs Trees R (T n, p) = p n 1 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

43 Reliability polynomials Special Graphs Cycles R (C n, p) = np n 1 (n 1) p n Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

44 Reliability polynomials Special Graphs Ladder R (L n, p) = p2n 1 2 n α [(4 3p + α)n (4 3p α) n ] with α = p 12 20p + 9p 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

45 Reliability polynomials Special Graphs Complete graphs Recurrence equation r n := R (K n, q), q := 1 n 1 r n = 1 k 1 r 1 = 1 n 1 k=1 q k(n p k) r k Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

46 Reliability polynomials Special Graphs Explicit representation with r n = ( 1) jλj+1 n λ λ`n λ = (λ 1,..., λ k ) = jλj k 1 jλj qa 2(λ) 1 k 1 2 k 2 n k n and a 2 (λ 1,..., λ s ) = 1 2 n 2! s λ 2 i i=1 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

47 Reliability polynomials Special Graphs Explicit representation with r n = ( 1) jλj+1 n λ λ`n λ = (λ 1,..., λ k ) = jλj k 1 jλj qa 2(λ) 1 k 1 2 k 2 n k n and a 2 (λ 1,..., λ s ) = 1 2 Exponential generating function r n = q n2 z n 2 ln n! n 2! s λ 2 i i=1! q n2 zn 2 n0 n! Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

48 The K-terminal reliability Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

49 The K-terminal reliability De nition G is K-connected if all vertices of K V belong to one component of G. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

50 The K-terminal reliability 8 < 0 if G is not K-connected, R (G, K ) = 1 if G = (fvg, ), v 2 K, : p e R (G /e, K 0 ) + (1 p e ) R (G e, K ) else, where K 0 = (K n fu, vg) [ X, e = fu, vg, w is the vertex obtained merging vertices u and v and fwg, if K \ fu, vg 6= X =, else.. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

51 The K-terminal reliability Complete state enumeration: with R (G, K ) = p e F E e2f (1 p) ξ (G [F ], K ) e2e nf 1, if G [F ] is K-connected, ξ (G [F ], K ) = 0, else. For K = fs, tg, the probability R(G, K ) is called two-terminal reliability (or st-reliability).. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

52 The K-terminal reliability Properties 1 Let p = (p 1,..., p m ) be the vector of edge availabilities of G. Then p p 0 ) (G, K, p) R G, K, p 0. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

53 The K-terminal reliability Properties 1 Let p = (p 1,..., p m ) be the vector of edge availabilities of G. Then p p 0 ) (G, K, p) R G, K, p 0. 2 Monotonicity with respect to terminal vertex sets: K L ) R (G, K ) R (G, L) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

54 The K-terminal reliability Properties 1 Let p = (p 1,..., p m ) be the vector of edge availabilities of G. Then p p 0 ) (G, K, p) R G, K, p 0. 2 Monotonicity with respect to terminal vertex sets: 3 If K \ L 6= then K L ) R (G, K ) R (G, L) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

55 The K-terminal reliability Properties 1 Let p = (p 1,..., p m ) be the vector of edge availabilities of G. Then p p 0 ) (G, K, p) R G, K, p 0. 2 Monotonicity with respect to terminal vertex sets: 3 If K \ L 6= then K L ) R (G, K ) R (G, L) 1 R (G, K [ L) R (G, K ) + R (G, L) 1, Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

56 The K-terminal reliability Properties 1 Let p = (p 1,..., p m ) be the vector of edge availabilities of G. Then p p 0 ) (G, K, p) R G, K, p 0. 2 Monotonicity with respect to terminal vertex sets: 3 If K \ L 6= then K L ) R (G, K ) R (G, L) 1 R (G, K [ L) R (G, K ) + R (G, L) 1, 2 R (G, K [ L) R (G, K ) R (G, L). Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

57 The K-terminal reliability Properties 1 Let p = (p 1,..., p m ) be the vector of edge availabilities of G. Then p p 0 ) (G, K, p) R G, K, p 0. 2 Monotonicity with respect to terminal vertex sets: 3 If K \ L 6= then K L ) R (G, K ) R (G, L) 1 R (G, K [ L) R (G, K ) + R (G, L) 1, 2 R (G, K [ L) R (G, K ) R (G, L). 4 The K-terminal reliability of the complete graph K n : n k j(n j) R (K n, k) = r j q j k n j=k Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

58 Reliability Calculations Reductions Series reduction e f g p g = p e p f Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

59 Reliability Calculations Reductions Polygon-to chain reductions R (G ) = ωr (G 0 ) a b c f g h d e α = ab (1 c) d (1 e), β = (1 a) bc (1 d) e γ = a(1 b)c(d + e 2de) + (a + c 2ac)bd(1 e) δ = abcde a + 1 b + 1 c + 1 d + 1 e f = ω = δ β + δ, g = δ γ + δ, h = (α + δ) (β + δ) (γ + δ) δ 2 δ α + δ, Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

60 Reliability Calculations Reductions Delta-Star reduction a b c g e f x Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

61 Reliability Calculations Reductions Delta-Star reduction a b c g e f x α = a + b + c ab ac cc + abc β = a + bc abc γ = b + ac abc δ = c + ab abc e = α β, f = α γ, g = α δ, x = βγδ α 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

62 Partitions of Vertex Sets Partition Lattice M = fa, b, c, dg, P (M).. set of all partitions of M π σ if and only if π is a re nement of σ abcd abc/d ab/cd abd/c ac/bd acd/b ad/bc bcd/a ab/c/d ac/b/d ad/b/c bc/a/d bd/a/c cd/a/b a/b/c/d Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

63 Partitions of Vertex Sets Incidence Algebra Möbius function i=1 jσj jπj jσj µ (π, σ) = ( 1) (p i 1)! Supremum function Inverse a (x, y) = x _ y = ˆ1 a 1 (x, z) = y µ (y, z) µ (y, x) µ y, ˆ1 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

64 Partitions of Vertex Sets Network Reliability Theorem R (G, K ) = σπ(k ) τ2p(v ) a 1 (σ, τ) R (G τ ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

65 Partitions of Vertex Sets Network Reliability Theorem R (G, K ) = σπ(k ) τ2p(v ) a 1 (σ, τ) R (G τ ) Theorem R (G ) = ( 1) jσj+1 (jσj 1)! qje (G,σ)j σ2p(v ) Tittmann, P.: Partitions and network reliability, Discrete Applied Mathematics 95 (1999), Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

66 Separating Vertex Sets De nition Let G 1 = V 1, E 1 and G 2 = V 2, E 2 be two subgraphs of G = (V, E ) such that V 1 [ V 2 = V, V 1 \ V 2 = U, E 1 [ E 2 = E, E 1 \ E 2 =. Then U is called a separating vertex set of G. a U 1 G b 2 G c d Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

67 Separating Vertex Sets a b c d a b c d a b c d induced partition: π = a/bc/d Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

68 Separating Vertex Sets a b d c ab cd G! G ab/cd Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

69 Separating Vertex Sets The Splitting Formula Number of terms: R (G ) = Pπ 1 R G 2 π π2p(u ) B (u) 1 p u e u(r +1/r 1) 1 with r e r = u Exponential generating function: e e z 1 = B(n) zn n0 n! Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

70 Separating Vertex Sets Symmetric graphs Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

71 Separating Vertex Sets Symmetric graphs a a 1 2 G G G 1 a G2 a b b b b c c c c d d d d R (G ) = λ`u u λ jλj k 1 jλj P1 λ R G 2 λ Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

72 Separating Vertex Sets Symmetric graphs Number of terms: n B (n) p (n) p n t n Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

73 Separating Vertex Sets Symmetric graphs A form of the splitting formula that requires only all-terminal reliability calculations for G 1 and G 2 : R (G ) = π2p(u ) σ2p(u ) R Gπ 1 a 1 (π, σ) R Gσ 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

74 Separating Vertex Sets Symmetric graphs Special cases juj = 1 : R (G ) = R G 1 R G 2 juj = 2 : R (G ) = R G 1 R Guv 2 + R G 1 uv R G 2 juj = 3 : A 1 3 = C A abc, ab/c, ac/b, bc/a, a/b/c R G 1 R G 2 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

75 Separating Vertex Sets Multiple splitting R (G 0 G 1... G n ) = q T 0 A1 1 Q 1A2 1 Q 2 An 1 1 Q n 1An 1 q n Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

76 Separating Vertex Sets Multiple splitting Gorlov, V.; Tittmann, P.: A uni ed approach to the reliability of recurrent structures, in Ellart von Collani et al. (editors): Advances in stochastic models for reliability, quality and safety, Birkhäuser, Boston, 1998 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

77 Tree decompositions De nition A tree decomposition of a graph G = (V, E ) is a pair (T, φ) with a tree T = (W, F ) and a map φ : W! 2 V which assigns a vertex subset of G to each vertex of T such that S 1 w 2W φ (w) = V. 2 For each edge fu, vg 2 E there exists w in T such that fu, vg φ (w). 3 Let v 2 W be on the path between u and w in T. Then we have φ (u) \ φ (w) φ (v). Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

78 Tree decompositions De nition The width of a tree decomposition is maxfφ (w) : w 2 W g 1. The treewidth tw(g ) of G is the minimum width of a tree decomposition of G. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

79 Tree decompositions Example Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

80 Partial k-trees De nition A graph G = (V, E ) is a k-tree if it is a complete graph with k + 1 vertices or if G contains a vertex v 2 V whose neighborhood induces a k-clique of G and G v is again a k-tree. A partial k-tree is a subgraph of a k-tree. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

81 Partial k-trees Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

82 Path Decompositions De nition A path decomposition is a sequence X = (X 1,..., X r ) of vertex subsets of G such that the following conditions are satis ed r[ 1 X i = V. i=1 2 Each edge of G is contained in at least one of X 1,..., X r. 3 For all i, j, k with 1 i < j < k r the relation X i \ X k X j is valid. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

83 Path Decompositions De nition A canonical path decomposition satis es in addition: 4. All subsets of the sequence X contain at most pw (G ) + 1 vertices. 5. jx i+1 X i j = 1 for i = 1,..., r 1. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

84 Path Decompositions f1g, f1, 2g, f1, 2, 3g, f2, 3g, f2, 3, 5g, f2, 5g, f2, 4, 5g, f4, 5g, f4, 5, 8g, f4, 5g, f4g, f4, 6g, f4g, f4, 7g, f7g 1, 2, 3, 1, 5, 3, 4, 2, 8, 8, 5, 6, 6, 7, 7 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

85 Path Decompositions De nition A composition order of G = (V, E ) is a sequence s = (s 1,..., s r ) of vertices and edges such that 1 The removal of all edges of s yields a canonical path decomposition of G. 2 Each edge is exactly once in s. 3 If s k = (u, v) 2 E then there are indices i, j, p, q with i, j < k and p, q > k such that u = s i = s p and v = s j = s q. Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

86 Path Decompositions Composition order: (1, 2, f1, 2g, 3, f1, 3g, 1, f2, 3g, 4, f2, 4g, 2, f3, 4g, 5, f3, 5g, 3, f4, 5g, 6, f4, 6g, 4, f5, 6g, 5, 6). Assigned path decomposition: (, f1g, f1, 2g, f1, 2, 3g, f2, 3g, f2, 3, 4g, f3, 4g, f3, 4, 5g, f4, 5g, f4, 5, 6g, f5, 6g, f6g, ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

87 Path Decompositions Composition Algorithms State = (index, value) Index: Partition of the set of active vertices Value: Polynomial Transformation of states 1. Vertex activation: (π, P π ) 7! (π/fvg, P π ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

88 Path Decompositions 2. Vertex deactivation: If fvg is a singleton of π then (π, P π ) 7!. Else: 0 1 (π, P π ) 7! v, v 2Y 2π jy j>1 3. The insertion of an edge e generates two successor states: P π (I) (π, P π ) 7! (π, (1 p) P π ) C A (II) (π, P π ) 7! (π _ e, pp π + P π_e ) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

89 Path Decompositions Example s i X i+1 Z i+1 1 f1g f(1, 1)g 2 f1, 2g f(1/2, 1)g f1, 2g f1, 2g f(1/2, 1 p), (12, p)g 3 f1, 2, 3g f(1/2/3, 1 p), (12/3, p)g f1, 3g f1, 2, 3g f 1/2/3, 1 2p + p 2, 12/3, p p 2, 13/2, p p 2, 123, p 2 g 1 f2, 3g f 2/3, 2p 2p 2, 23, p 2 g f2, 3g f2, 3g f 2/3, 2p 4p 2 + 2p 3, 23, 3p 2 2p 3 g Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

90 Path Decompositions Numeric Example n = 53, m = 203 R(G ) = , (53 s) R st (G ) = , (221 s) Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

91 Path Decompositions Algorithmic Principles André Pönitz: Über eine Methode zur Konstruktion von Algorithmen für die Berechnung von Invarianten in endlichen ungerichteten Hypergraphen, (About a generation method for algorithms for the calculation of invariants of nite graphs and hypergraphs), PhDThesis, Technische Universität Freiberg, Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

92 Directed Graphs s e 2 e 1 v e 3 e u 4 e 5 e w 6 e 7 t Algebraic Methods R st (G ) = M O p e W 2W e2w Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

93 Directed Graphs Iteration procedure 0 0 p 1 p p 5 p 6 P = B 0 p 3 0 p 4 0 1, if i = s p 7 A, s i = 0 else x 0 = (0,..., 0), s = (s 1,..., s n ) x n = x n 1 P s for n > 0 Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

94 Directed Graphs Splitting X s G 1 Y G 2 t R st (G ) = X U ( 1) jx j jy j+1 R s,u ny (G 1 U ny )R X,t(GX 2 ) Y X Peter Tittmann (Hochschule Mittweida) Network Reliability / 64

CS 484 Data Mining. Association Rule Mining 2

CS 484 Data Mining. Association Rule Mining 2 CS 484 Data Mining Association Rule Mining 2 Review: Reducing Number of Candidates Apriori principle: If an itemset is frequent, then all of its subsets must also be frequent Apriori principle holds due

More information

Data Mining Concepts & Techniques

Data Mining Concepts & Techniques Data Mining Concepts & Techniques Lecture No. 04 Association Analysis Naeem Ahmed Email: naeemmahoto@gmail.com Department of Software Engineering Mehran Univeristy of Engineering and Technology Jamshoro

More information

Math for Liberal Studies

Math for Liberal Studies Math for Liberal Studies We want to measure the influence each voter has As we have seen, the number of votes you have doesn t always reflect how much influence you have In order to measure the power of

More information

Graph Polynomials and Their Representations

Graph Polynomials and Their Representations Graph Polynomials and Their Representations By the Faculty of Mathematik und Informatik of the Technische Universität Bergakademie Freiberg approved Thesis to attain the academic degree of doctor rerum

More information

A note on the total domination number of a tree

A note on the total domination number of a tree A note on the total domination number of a tree 1 Mustapha Chellali and 2 Teresa W. Haynes 1 Department of Mathematics, University of Blida. B.P. 270, Blida, Algeria. E-mail: m_chellali@yahoo.com 2 Department

More information

Do in calculator, too.

Do in calculator, too. You do Do in calculator, too. Sequence formulas that give you the exact definition of a term are explicit formulas. Formula: a n = 5n Explicit, every term is defined by this formula. Recursive formulas

More information

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)

More information

ALL GRAPH GENUS DISTRIBUTIONS ARE LOG-CONCAVE, AND RELATED CONJECTURES JONATHAN L. GROSS

ALL GRAPH GENUS DISTRIBUTIONS ARE LOG-CONCAVE, AND RELATED CONJECTURES JONATHAN L. GROSS ALL GRAPH GENUS DISTRIBUTIONS ARE LOG-CONCAVE, AND RELATED CONJECTURES JONATHAN L. GROSS DEPARTMENT OF COMPUTER SCIENCE COLUMBIA UNIVERSITY, NEW YORK, NY 10027 Version: 14:05 January 13, 2014 1. Definition

More information

Set Notation and Axioms of Probability NOT NOT X = X = X'' = X

Set Notation and Axioms of Probability NOT NOT X = X = X'' = X Set Notation and Axioms of Probability Memory Hints: Intersection I AND I looks like A for And Union U OR + U looks like U for Union Complement NOT X = X = X' NOT NOT X = X = X'' = X Commutative Law A

More information

Exact Algorithms for Dominating Induced Matching Based on Graph Partition

Exact Algorithms for Dominating Induced Matching Based on Graph Partition Exact Algorithms for Dominating Induced Matching Based on Graph Partition Mingyu Xiao School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731,

More information

DATA MINING - 1DL360

DATA MINING - 1DL360 DATA MINING - DL360 Fall 200 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht0 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology, Uppsala

More information

3. Branching Algorithms

3. Branching Algorithms 3. Branching Algorithms COMP6741: Parameterized and Exact Computation Serge Gaspers Semester 2, 2015 Contents 1 Introduction 1 2 Maximum Independent Set 3 2.1 Simple Analysis................................................

More information

DATA MINING - 1DL360

DATA MINING - 1DL360 DATA MINING - 1DL36 Fall 212" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht12 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology, Uppsala

More information

Tree Decompositions and Tree-Width

Tree Decompositions and Tree-Width Tree Decompositions and Tree-Width CS 511 Iowa State University December 6, 2010 CS 511 (Iowa State University) Tree Decompositions and Tree-Width December 6, 2010 1 / 15 Tree Decompositions Definition

More information

arxiv: v1 [math.st] 1 Nov 2017

arxiv: v1 [math.st] 1 Nov 2017 ASSESSING THE RELIABILITY POLYNOMIAL BASED ON PERCOLATION THEORY arxiv:1711.00303v1 [math.st] 1 Nov 2017 SAJADI, FARKHONDEH A. Department of Statistics, University of Isfahan, Isfahan 81744,Iran; f.sajadi@sci.ui.ac.ir

More information

Lecture 3 : Probability II. Jonathan Marchini

Lecture 3 : Probability II. Jonathan Marchini Lecture 3 : Probability II Jonathan Marchini Puzzle 1 Pick any two types of card that can occur in a normal pack of shuffled playing cards e.g. Queen and 6. What do you think is the probability that somewhere

More information

Minimization of Symmetric Submodular Functions under Hereditary Constraints

Minimization of Symmetric Submodular Functions under Hereditary Constraints Minimization of Symmetric Submodular Functions under Hereditary Constraints J.A. Soto (joint work with M. Goemans) DIM, Univ. de Chile April 4th, 2012 1 of 21 Outline Background Minimal Minimizers and

More information

Finding Paths with Minimum Shared Edges in Graphs with Bounded Treewidth

Finding Paths with Minimum Shared Edges in Graphs with Bounded Treewidth Finding Paths with Minimum Shared Edges in Graphs with Bounded Treewidth Z.-Q. Ye 1, Y.-M. Li 2, H.-Q. Lu 3 and X. Zhou 4 1 Zhejiang University, Hanzhou, Zhejiang, China 2 Wenzhou University, Wenzhou,

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 2 Luca Trevisan August 29, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 2 Luca Trevisan August 29, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analysis Handout Luca Trevisan August 9, 07 Scribe: Mahshid Montazer Lecture In this lecture, we study the Max Cut problem in random graphs. We compute the probable

More information

Notes on MapReduce Algorithms

Notes on MapReduce Algorithms Notes on MapReduce Algorithms Barna Saha 1 Finding Minimum Spanning Tree of a Dense Graph in MapReduce We are given a graph G = (V, E) on V = N vertices and E = m N 1+c edges for some constant c > 0. Our

More information

The Lefthanded Local Lemma characterizes chordal dependency graphs

The Lefthanded Local Lemma characterizes chordal dependency graphs The Lefthanded Local Lemma characterizes chordal dependency graphs Wesley Pegden March 30, 2012 Abstract Shearer gave a general theorem characterizing the family L of dependency graphs labeled with probabilities

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

Likelihood Analysis of Gaussian Graphical Models

Likelihood Analysis of Gaussian Graphical Models Faculty of Science Likelihood Analysis of Gaussian Graphical Models Ste en Lauritzen Department of Mathematical Sciences Minikurs TUM 2016 Lecture 2 Slide 1/43 Overview of lectures Lecture 1 Markov Properties

More information

3. Branching Algorithms COMP6741: Parameterized and Exact Computation

3. Branching Algorithms COMP6741: Parameterized and Exact Computation 3. Branching Algorithms COMP6741: Parameterized and Exact Computation Serge Gaspers 12 1 School of Computer Science and Engineering, UNSW Australia 2 Optimisation Resarch Group, NICTA Semester 2, 2015

More information

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided

More information

Reverse mathematics of some topics from algorithmic graph theory

Reverse mathematics of some topics from algorithmic graph theory F U N D A M E N T A MATHEMATICAE 157 (1998) Reverse mathematics of some topics from algorithmic graph theory by Peter G. C l o t e (Chestnut Hill, Mass.) and Jeffry L. H i r s t (Boone, N.C.) Abstract.

More information

Alvaro Rodrigues-Neto Research School of Economics, Australian National University. ANU Working Papers in Economics and Econometrics # 587

Alvaro Rodrigues-Neto Research School of Economics, Australian National University. ANU Working Papers in Economics and Econometrics # 587 Cycles of length two in monotonic models José Alvaro Rodrigues-Neto Research School of Economics, Australian National University ANU Working Papers in Economics and Econometrics # 587 October 20122 JEL:

More information

3.7 Cutting plane methods

3.7 Cutting plane methods 3.7 Cutting plane methods Generic ILP problem min{ c t x : x X = {x Z n + : Ax b} } with m n matrix A and n 1 vector b of rationals. According to Meyer s theorem: There exists an ideal formulation: conv(x

More information

Analogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph

Analogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph Analogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph M. Lemańska a, J. A. Rodríguez-Velázquez b, Rolando Trujillo-Rasua c, a Department of Technical

More information

There are two types of problems:

There are two types of problems: Np-complete Introduction: There are two types of problems: Two classes of algorithms: Problems whose time complexity is polynomial: O(logn), O(n), O(nlogn), O(n 2 ), O(n 3 ) Examples: searching, sorting,

More information

Lecture Notes for Chapter 6. Introduction to Data Mining

Lecture Notes for Chapter 6. Introduction to Data Mining Data Mining Association Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 6 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004

More information

Routing Algorithms. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur

Routing Algorithms. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Routing Algorithms CS60002: Distributed Systems Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Main Features Table Computation The routing tables must be computed

More information

Generating k-vertex Connected Spanning Subgraphs and k-edge Connected Spanning Subgraphs

Generating k-vertex Connected Spanning Subgraphs and k-edge Connected Spanning Subgraphs Generating k-vertex Connected Spanning Subgraphs and k-edge Connected Spanning Subgraphs Endre Boros Konrad Borys Khaled Elbassioni Vladimir Gurvich Kazuhisa Makino Gabor Rudolf Abstract We show that k-vertex

More information

Strange Combinatorial Connections. Tom Trotter

Strange Combinatorial Connections. Tom Trotter Strange Combinatorial Connections Tom Trotter Georgia Institute of Technology trotter@math.gatech.edu February 13, 2003 Proper Graph Colorings Definition. A proper r- coloring of a graph G is a map φ from

More information

< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1

< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1 List of Problems jacques@ucsd.edu Those question with a star next to them are considered slightly more challenging. Problems 9, 11, and 19 from the book The probabilistic method, by Alon and Spencer. Question

More information

Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia

Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia Andreas Krause krausea@cs.tum.edu Technical University of Munich February 12, 2003 This survey gives an introduction

More information

Tutte Polynomials with Applications

Tutte Polynomials with Applications Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 12, Number 6 (26), pp. 4781 4797 Research India Publications http://www.ripublication.com/gjpam.htm Tutte Polynomials with Applications

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also

More information

Discrete Probability Distributions

Discrete Probability Distributions Chapter 4 Discrete Probability Distributions 4.1 Random variable A random variable is a function that assigns values to different events in a sample space. Example 4.1.1. Consider the experiment of rolling

More information

Extremal Graphs Having No Stable Cutsets

Extremal Graphs Having No Stable Cutsets Extremal Graphs Having No Stable Cutsets Van Bang Le Institut für Informatik Universität Rostock Rostock, Germany le@informatik.uni-rostock.de Florian Pfender Department of Mathematics and Statistics University

More information

DATA MINING LECTURE 3. Frequent Itemsets Association Rules

DATA MINING LECTURE 3. Frequent Itemsets Association Rules DATA MINING LECTURE 3 Frequent Itemsets Association Rules This is how it all started Rakesh Agrawal, Tomasz Imielinski, Arun N. Swami: Mining Association Rules between Sets of Items in Large Databases.

More information

Decomposition of random graphs into complete bipartite graphs

Decomposition of random graphs into complete bipartite graphs Decomposition of random graphs into complete bipartite graphs Fan Chung Xing Peng Abstract We consider the problem of partitioning the edge set of a graph G into the minimum number τg) of edge-disjoint

More information

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V. Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains

More information

Out-colourings of Digraphs

Out-colourings of Digraphs Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.

More information

Graph. Supply Vertices and Demand Vertices. Supply Vertices. Demand Vertices

Graph. Supply Vertices and Demand Vertices. Supply Vertices. Demand Vertices Partitioning Graphs of Supply and Demand Generalization of Knapsack Problem Takao Nishizeki Tohoku University Graph Supply Vertices and Demand Vertices Supply Vertices Demand Vertices Graph Each Supply

More information

On the Complexity of Budgeted Maximum Path Coverage on Trees

On the Complexity of Budgeted Maximum Path Coverage on Trees On the Complexity of Budgeted Maximum Path Coverage on Trees H.-C. Wirth An instance of the budgeted maximum coverage problem is given by a set of weighted ground elements and a cost weighted family of

More information

CSCE 750 Final Exam Answer Key Wednesday December 7, 2005

CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 Do all problems. Put your answers on blank paper or in a test booklet. There are 00 points total in the exam. You have 80 minutes. Please note

More information

On Dominator Colorings in Graphs

On Dominator Colorings in Graphs On Dominator Colorings in Graphs Ralucca Michelle Gera Department of Applied Mathematics Naval Postgraduate School Monterey, CA 994, USA ABSTRACT Given a graph G, the dominator coloring problem seeks a

More information

Fractal Geometry of Minimal Spanning Trees

Fractal Geometry of Minimal Spanning Trees Fractal Geometry of Minimal Spanning Trees T. S. Jackson and N. Read Part I: arxiv:0902.3651 Part II: arxiv:0909.5343 Accepted by Phys. Rev. E Problem Definition Given a graph with costs on the edges,

More information

COMP 5331: Knowledge Discovery and Data Mining

COMP 5331: Knowledge Discovery and Data Mining COMP 5331: Knowledge Discovery and Data Mining Acknowledgement: Slides modified by Dr. Lei Chen based on the slides provided by Jiawei Han, Micheline Kamber, and Jian Pei And slides provide by Raymond

More information

Deciding the Bell number for hereditary graph properties. A. Atminas, A. Collins, J. Foniok and V. Lozin

Deciding the Bell number for hereditary graph properties. A. Atminas, A. Collins, J. Foniok and V. Lozin Deciding the Bell number for hereditary graph properties A. Atminas, A. Collins, J. Foniok and V. Lozin REPORT No. 11, 2013/2014, spring ISSN 1103-467X ISRN IML-R- -11-13/14- -SE+spring Deciding the Bell

More information

Running Time. Assumption. All capacities are integers between 1 and C.

Running Time. Assumption. All capacities are integers between 1 and C. Running Time Assumption. All capacities are integers between and. Invariant. Every flow value f(e) and every residual capacities c f (e) remains an integer throughout the algorithm. Theorem. The algorithm

More information

Approximate Counting and Markov Chain Monte Carlo

Approximate Counting and Markov Chain Monte Carlo Approximate Counting and Markov Chain Monte Carlo A Randomized Approach Arindam Pal Department of Computer Science and Engineering Indian Institute of Technology Delhi March 18, 2011 April 8, 2011 Arindam

More information

Probability Propagation

Probability Propagation Graphical Models, Lectures 9 and 10, Michaelmas Term 2009 November 13, 2009 Characterizing chordal graphs The following are equivalent for any undirected graph G. (i) G is chordal; (ii) G is decomposable;

More information

Linear Extensions of N-free Orders

Linear Extensions of N-free Orders Linear Extensions of N-free Orders Stefan Felsner felsner@math.tu-berlin.de Institut für Mathematik Technische Universität Berlin Strasse des 17. Juni 136 D-10623 Berlin, Germany Thibault Manneville tmannevi@clipper.ens.fr

More information

UNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours.

UNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours. UNIVERSITY OF YORK MSc Examinations 2004 MATHEMATICS Networks Time Allowed: 3 hours. Answer 4 questions. Standard calculators will be provided but should be unnecessary. 1 Turn over 2 continued on next

More information

Gallai s Conjecture For Graphs of Girth at Least Four. Peter Harding and Sean McGuinness Thompson Rivers University

Gallai s Conjecture For Graphs of Girth at Least Four. Peter Harding and Sean McGuinness Thompson Rivers University Gallai s Conjecture For Graphs of Girth at Least Four Peter Harding and Sean McGuinness Thompson Rivers University i Gallai s Conjecture For Graphs of Girth at Least Four Peter Harding and Sean McGuinness

More information

A Note on the Complexity of Network Reliability Problems. Hans L. Bodlaender Thomas Wolle

A Note on the Complexity of Network Reliability Problems. Hans L. Bodlaender Thomas Wolle A Note on the Complexity of Network Reliability Problems Hans L. Bodlaender Thomas Wolle institute of information and computing sciences, utrecht university technical report UU-CS-2004-001 www.cs.uu.nl

More information

Parameterized Domination in Circle Graphs

Parameterized Domination in Circle Graphs Parameterized Domination in Circle Graphs Nicolas Bousquet 1, Daniel Gonçalves 1, George B. Mertzios 2, Christophe Paul 1, Ignasi Sau 1, and Stéphan Thomassé 3 1 AlGCo project-team, CNRS, LIRMM, Montpellier,

More information

Undirected Graphical Models

Undirected Graphical Models Undirected Graphical Models 1 Conditional Independence Graphs Let G = (V, E) be an undirected graph with vertex set V and edge set E, and let A, B, and C be subsets of vertices. We say that C separates

More information

8/29/13 Comp 555 Fall

8/29/13 Comp 555 Fall 8/29/13 Comp 555 Fall 2013 1 (from Lecture 2) Restriction enzymes break DNA whenever they encounter specific base sequences They occur reasonably frequently within long sequences (a 6-base sequence target

More information

LIMITING PROBABILITY TRANSITION MATRIX OF A CONDENSED FIBONACCI TREE

LIMITING PROBABILITY TRANSITION MATRIX OF A CONDENSED FIBONACCI TREE International Journal of Applied Mathematics Volume 31 No. 18, 41-49 ISSN: 1311-178 (printed version); ISSN: 1314-86 (on-line version) doi: http://dx.doi.org/1.173/ijam.v31i.6 LIMITING PROBABILITY TRANSITION

More information

ACO Comprehensive Exam 19 March Graph Theory

ACO Comprehensive Exam 19 March Graph Theory 1. Graph Theory Let G be a connected simple graph that is not a cycle and is not complete. Prove that there exist distinct non-adjacent vertices u, v V (G) such that the graph obtained from G by deleting

More information

Department of Electrical & Electronics EE-333 DIGITAL SYSTEMS

Department of Electrical & Electronics EE-333 DIGITAL SYSTEMS Department of Electrical & Electronics EE-333 DIGITAL SYSTEMS 1) Given the two binary numbers X = 1010100 and Y = 1000011, perform the subtraction (a) X -Y and (b) Y - X using 2's complements. a) X = 1010100

More information

Self-Organized Public-Key Management for Mobile Ad Hoc Networks

Self-Organized Public-Key Management for Mobile Ad Hoc Networks Self-Organized Public-Key Management for Mobile Ad Hoc Networks Srđan Čapkun, Levente Buttyàn and Jean-Pierre Hubaux {srdan.capkun, levente.buttyan and jean-pierre.hubaux}@epfl.ch Laboratory for Computer

More information

Generating p-extremal graphs

Generating p-extremal graphs Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum

More information

ACO Comprehensive Exam October 14 and 15, 2013

ACO Comprehensive Exam October 14 and 15, 2013 1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for

More information

Efficient Reassembling of Graphs, Part 1: The Linear Case

Efficient Reassembling of Graphs, Part 1: The Linear Case Efficient Reassembling of Graphs, Part 1: The Linear Case Assaf Kfoury Boston University Saber Mirzaei Boston University Abstract The reassembling of a simple connected graph G = (V, E) is an abstraction

More information

Lecture 4: DNA Restriction Mapping

Lecture 4: DNA Restriction Mapping Lecture 4: DNA Restriction Mapping Study Chapter 4.1-4.3 9/3/2013 COMP 465 Fall 2013 1 Recall Restriction Enzymes (from Lecture 2) Restriction enzymes break DNA whenever they encounter specific base sequences

More information

On the Approximability of Partial VC Dimension

On the Approximability of Partial VC Dimension On the Approximability of Partial VC Dimension Cristina Bazgan 1 Florent Foucaud 2 Florian Sikora 1 1 LAMSADE, Université Paris Dauphine, CNRS France 2 LIMOS, Université Blaise Pascal, Clermont-Ferrand

More information

2 GRAPH AND NETWORK OPTIMIZATION. E. Amaldi Introduction to Operations Research Politecnico Milano 1

2 GRAPH AND NETWORK OPTIMIZATION. E. Amaldi Introduction to Operations Research Politecnico Milano 1 2 GRAPH AND NETWORK OPTIMIZATION E. Amaldi Introduction to Operations Research Politecnico Milano 1 A variety of decision-making problems can be formulated in terms of graphs and networks Examples: - transportation

More information

Induced Saturation of Graphs

Induced Saturation of Graphs Induced Saturation of Graphs Maria Axenovich a and Mónika Csikós a a Institute of Algebra and Geometry, Karlsruhe Institute of Technology, Englerstraße 2, 76128 Karlsruhe, Germany Abstract A graph G is

More information

LECTURE 3. Last time:

LECTURE 3. Last time: LECTURE 3 Last time: Mutual Information. Convexity and concavity Jensen s inequality Information Inequality Data processing theorem Fano s Inequality Lecture outline Stochastic processes, Entropy rate

More information

arxiv: v1 [math.co] 5 May 2016

arxiv: v1 [math.co] 5 May 2016 Uniform hypergraphs and dominating sets of graphs arxiv:60.078v [math.co] May 06 Jaume Martí-Farré Mercè Mora José Luis Ruiz Departament de Matemàtiques Universitat Politècnica de Catalunya Spain {jaume.marti,merce.mora,jose.luis.ruiz}@upc.edu

More information

Branchwidth of graphic matroids.

Branchwidth of graphic matroids. Branchwidth of graphic matroids. Frédéric Mazoit and Stéphan Thomassé Abstract Answering a question of Geelen, Gerards, Robertson and Whittle [2], we prove that the branchwidth of a bridgeless graph is

More information

Enumerating minimal connected dominating sets in graphs of bounded chordality,

Enumerating minimal connected dominating sets in graphs of bounded chordality, Enumerating minimal connected dominating sets in graphs of bounded chordality, Petr A. Golovach a,, Pinar Heggernes a, Dieter Kratsch b a Department of Informatics, University of Bergen, N-5020 Bergen,

More information

Combinatorial semigroups and induced/deduced operators

Combinatorial semigroups and induced/deduced operators Combinatorial semigroups and induced/deduced operators G. Stacey Staples Department of Mathematics and Statistics Southern Illinois University Edwardsville Modified Hypercubes Particular groups & semigroups

More information

Lecture 4: DNA Restriction Mapping

Lecture 4: DNA Restriction Mapping Lecture 4: DNA Restriction Mapping Study Chapter 4.1-4.3 8/28/2014 COMP 555 Bioalgorithms (Fall 2014) 1 Recall Restriction Enzymes (from Lecture 2) Restriction enzymes break DNA whenever they encounter

More information

A note on network reliability

A note on network reliability A note on network reliability Noga Alon Institute for Advanced Study, Princeton, NJ 08540 and Department of Mathematics Tel Aviv University, Tel Aviv, Israel Let G = (V, E) be a loopless undirected multigraph,

More information

A Note on Roman {2}-domination problem in graphs

A Note on Roman {2}-domination problem in graphs A Note on Roman {2}-domination problem in graphs arxiv:1804.09338v3 [math.co] 17 Feb 2019 Hangdi Chen and Changhong Lu School of Mathematical Sciences, Shanghai Key Laboratory of PMMP, East China Normal

More information

k-degenerate Graphs Allan Bickle Date Western Michigan University

k-degenerate Graphs Allan Bickle Date Western Michigan University k-degenerate Graphs Western Michigan University Date Basics Denition The k-core of a graph G is the maximal induced subgraph H G such that δ (H) k. The core number of a vertex, C (v), is the largest value

More information

Propositional Logic. What is discrete math? Tautology, equivalence, and inference. Applications

Propositional Logic. What is discrete math? Tautology, equivalence, and inference. Applications What is discrete math? Propositional Logic The real numbers are continuous in the senses that: between any two real numbers there is a real number The integers do not share this property. In this sense

More information

On the mean connected induced subgraph order of cographs

On the mean connected induced subgraph order of cographs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,

More information

A = A U. U [n] P(A U ). n 1. 2 k(n k). k. k=1

A = A U. U [n] P(A U ). n 1. 2 k(n k). k. k=1 Lecture I jacques@ucsd.edu Notation: Throughout, P denotes probability and E denotes expectation. Denote (X) (r) = X(X 1)... (X r + 1) and let G n,p denote the Erdős-Rényi model of random graphs. 10 Random

More information

OPERATIONS RESEARCH CENTE R

OPERATIONS RESEARCH CENTE R OPERATIONS RESEARCH CENTE R working paper I jll I_ MASSAC HUSE TTS INSTITUTE OF TECHNOLOGY Some Lattice-Theoretic Tools for Network Reliability Analysis by Daniel Bienstock OR 138-85 August 1985 This research

More information

Data Mining and Analysis: Fundamental Concepts and Algorithms

Data Mining and Analysis: Fundamental Concepts and Algorithms Data Mining and Analysis: Fundamental Concepts and Algorithms dataminingbook.info Mohammed J. Zaki 1 Wagner Meira Jr. 2 1 Department of Computer Science Rensselaer Polytechnic Institute, Troy, NY, USA

More information

9/2/2009 Comp /Comp Fall

9/2/2009 Comp /Comp Fall Lecture 4: DNA Restriction Mapping Study Chapter 4.1-4.34.3 9/2/2009 Comp 590-90/Comp 790-90 Fall 2009 1 Recall Restriction Enzymes (from Lecture 2) Restriction enzymes break DNA whenever they encounter

More information

ON THE NUMBER OF COMPONENTS OF A GRAPH

ON THE NUMBER OF COMPONENTS OF A GRAPH Volume 5, Number 1, Pages 34 58 ISSN 1715-0868 ON THE NUMBER OF COMPONENTS OF A GRAPH HAMZA SI KADDOUR AND ELIAS TAHHAN BITTAR Abstract. Let G := (V, E be a simple graph; for I V we denote by l(i the number

More information

The Steiner Network Problem

The Steiner Network Problem The Steiner Network Problem Pekka Orponen T-79.7001 Postgraduate Course on Theoretical Computer Science 7.4.2008 Outline 1. The Steiner Network Problem Linear programming formulation LP relaxation 2. The

More information

ICS 252 Introduction to Computer Design

ICS 252 Introduction to Computer Design ICS 252 fall 2006 Eli Bozorgzadeh Computer Science Department-UCI References and Copyright Textbooks referred [Mic94] G. De Micheli Synthesis and Optimization of Digital Circuits McGraw-Hill, 1994. [CLR90]

More information

Graph Theorizing Peg Solitaire. D. Paul Hoilman East Tennessee State University

Graph Theorizing Peg Solitaire. D. Paul Hoilman East Tennessee State University Graph Theorizing Peg Solitaire D. Paul Hoilman East Tennessee State University December 7, 00 Contents INTRODUCTION SIMPLE SOLVING CONCEPTS 5 IMPROVED SOLVING 7 4 RELATED GAMES 5 5 PROGENATION OF SOLVABLE

More information

5 Flows and cuts in digraphs

5 Flows and cuts in digraphs 5 Flows and cuts in digraphs Recall that a digraph or network is a pair G = (V, E) where V is a set and E is a multiset of ordered pairs of elements of V, which we refer to as arcs. Note that two vertices

More information

List H-Coloring a Graph by Removing Few Vertices

List H-Coloring a Graph by Removing Few Vertices List H-Coloring a Graph by Removing Few Vertices Rajesh Chitnis 1, László Egri 2, and Dániel Marx 2 1 Department of Computer Science, University of Maryland at College Park, USA, rchitnis@cs.umd.edu 2

More information

CSE 591 Homework 3 Sample Solutions. Problem 1

CSE 591 Homework 3 Sample Solutions. Problem 1 CSE 591 Homework 3 Sample Solutions Problem 1 (a) Let p = max{1, k d}, q = min{n, k + d}, it suffices to find the pth and qth largest element of L and output all elements in the range between these two

More information

Part III: Traveling salesman problems

Part III: Traveling salesman problems Transportation Logistics Part III: Traveling salesman problems c R.F. Hartl, S.N. Parragh 1/282 Motivation Motivation Why do we study the TSP? c R.F. Hartl, S.N. Parragh 2/282 Motivation Motivation Why

More information

Almost giant clusters for percolation on large trees

Almost giant clusters for percolation on large trees for percolation on large trees Institut für Mathematik Universität Zürich Erdős-Rényi random graph model in supercritical regime G n = complete graph with n vertices Bond percolation with parameter p(n)

More information

Generalized Pigeonhole Properties of Graphs and Oriented Graphs

Generalized Pigeonhole Properties of Graphs and Oriented Graphs Europ. J. Combinatorics (2002) 23, 257 274 doi:10.1006/eujc.2002.0574 Available online at http://www.idealibrary.com on Generalized Pigeonhole Properties of Graphs and Oriented Graphs ANTHONY BONATO, PETER

More information

Ring Sums, Bridges and Fundamental Sets

Ring Sums, Bridges and Fundamental Sets 1 Ring Sums Definition 1 Given two graphs G 1 = (V 1, E 1 ) and G 2 = (V 2, E 2 ) we define the ring sum G 1 G 2 = (V 1 V 2, (E 1 E 2 ) (E 1 E 2 )) with isolated points dropped. So an edge is in G 1 G

More information

The Strong Largeur d Arborescence

The Strong Largeur d Arborescence The Strong Largeur d Arborescence Rik Steenkamp (5887321) November 12, 2013 Master Thesis Supervisor: prof.dr. Monique Laurent Local Supervisor: prof.dr. Alexander Schrijver KdV Institute for Mathematics

More information

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash Equilibrium Price of Stability Coping With NP-Hardness

More information