Structural Resilience of Cyberphysical Systems Under Attack

Size: px
Start display at page:

Download "Structural Resilience of Cyberphysical Systems Under Attack"

Transcription

1 Structural Resilience of Cyberphysical Systems Under Attack Bhaskar Ramasubramanian 1, M.A. Rajan 2, M. Girish Chandra 2 1 Department of Electrical and Computer Engineering, and Institute for Systems Research, University of Maryland, College Park, MD 20742, USA. 2 Innovation Labs, Tata Consultancy Services, Bangalore India. 1 / 13

2 Cyberphysical Systems Working of physical system intimately linked to functioning of computers that influence interactions among subsystems. Often controlled over a network computational resources and bandwidth affect their working. Consequence: system can be remotely attacked. (a) (b) (c) Figure: Examples of CPSs 2 / 13

3 Structural Resilience: Motivation Structural Approach: Motivation Large scale CPS: many states, variables values fluctuate computational analysis costly. Structural approach: knowledge of only positions of zero/ nonzero entries of system matrices. Properties will hold for almost all valid numerical realizations. 3 / 13

4 Structural Resilience: Motivation Structural Approach: Motivation Large scale CPS: many states, variables values fluctuate computational analysis costly. Structural approach: knowledge of only positions of zero/ nonzero entries of system matrices. Properties will hold for almost all valid numerical realizations. Prior Work Attacks on LTI systems in terms of controllability of a modified system [Barreto(2013)]. Structural design of large scale systems [Pequito(2015)]. Minimal structural controllability, minimal cost constrained structural controllability [Pequito(2014), Pequito(2015)]. 3 / 13

5 Structured Linear Systems Consider the linear structured system: ẋ(t) = [A]x(t) + [B]u(t) Structural framework: every entry in [A] and [B] is either a fixed zero or a free parameter. Structural Controllability ([A], [B]) is structurally controllable if there exists an admissible numerical realization (A, B) that is controllable. If ([A], [B]) is structurally controllable, then almost every admissible numerical realization will be controllable. The structured system is then said to be generically controllable. 4 / 13

6 Structured Systems and Graph Theory Directed Graph Representation D = (V, E), where V = U X and E = E A E B, where E A = {(x j, x i ) [A] ij 0}, E B = {(u j, x i ) [B] ij 0}. Bipartite Graph Representation For any V 1, V 2, a bipartite graph B(V 1, V 2, E V1,V 2 ) is a digraph with vertex set V 1 V 2 and edge set E V1,V 2 {(v 1, v 2 ) v 1 V 1, v 2 V 2 }. Matching: an independent edge set. Maximum Matching: matching with largest number of edges. B(V, V, E): bipartite graph associated with D(V, E). 5 / 13

7 Preliminaries Strongly Connected Component (SCC) : maximal strongly connected subgraph. Non Top-Linked SCC : SCC with no incoming edge. Top Assignable SCC : non top-linked SCC containing at least one right unmatched vertex in a maximum matching. 6 / 13

8 Preliminaries Strongly Connected Component (SCC) : maximal strongly connected subgraph. Non Top-Linked SCC : SCC with no incoming edge. Top Assignable SCC : non top-linked SCC containing at least one right unmatched vertex in a maximum matching. Assume m : # right unmatched vertices in a maximum matching. α : maximum top assignability index. β : # non top-linked SCCs. Theorem [Liu(2011), Pequito(2015)] The minimum number of inputs required to make the system structurally controllable is one, if m = 0, and m, otherwise. The minimum number of links between input and state needed to achieve structural controllability is p = m + β α. 6 / 13

9 Structural Resilience ) T Let u = ( u T def u T att CPS modeled as a linear structured system: ẋ(t) = [A]x(t) + [B def ]u def (t) + [B att ]u att (t) ASSUME: set of attacked nodes remains unchanged with time. Structural Resilience Given the structured system with ([A], [B]) structurally controllable before an attack, characterize the system s structural resilience to denial of service (DoS) attacks and integrity attacks. 7 / 13

10 DoS Attack Resilience DoS attack u att = 0, u def arbitrary; [B att ] = 0. X def, X att : (disjoint) sets of state vertices accessible to the defender and attacker inputs. ASSUME: number of right unmatched vertices, m, in a maximum matching of B([A]) is nonzero. m def, m att : number of right unmatched vertices in B([A]) corresponding to X def and X att (thus, m def + m att = m). l(p Q): set of links from P to Q. The system model is: ẋ(t) = [A]x(t) + [B def ]u def (t) 8 / 13

11 DoS Attack Resilience Lemma: DoS Attack Success A DoS attack is structurally successful if U def < m def, and: 1 U def U att m + β α. OR 2 U def U att m and l((u def U att ) X ) m + β α. 9 / 13

12 DoS Attack Resilience Lemma: DoS Attack Success A DoS attack is structurally successful if U def < m def, and: 1 U def U att m + β α. OR 2 U def U att m and l((u def U att ) X ) m + β α. Lemma If U def m def, a DoS attack is structurally successful if: 1 There exists an unreachable state from the vertices of U def. OR 2 There does not exist a disjoint union of U def rooted path families and cycle families covering all the states. OR 3 l(u def X ) < m def + β α. OR 4 Every maximum matching of B([A]) has a right unmatched vertex in X att. OR 5 There is a non top linked SCC in D([A]) comprising exclusively vertices from X att. 9 / 13

13 Examples Let states x 1,..., x 6 be accessible to U def and x 7,..., x 10 to U att. x 1 x 1 x 1 x 3 x2 x 3 x2 x 3 x2 x 8 x 7 x 4 x 8 x 7 x 4 x 8 x 7 x 4 x 5 x 5 x 5 x 6 x 6 x 6 x 9 (a) x 10 x 9 (b) x 10 x 9 (c) x 10 Figure: Structural Resilience to DoS Attack 10 / 13

14 State Feedback Integrity Attack Resilience Only control signals corresponding to attacker maintain their integrity; defender controls are arbitrary. Here, u att (t) = K att x(t); u def is arbitrary. m A, m Aatt : number of right unmatched vertices in a maximum matching of B([A)] and B([A att ]) respectively. The system model is: ẋ(t) = ([A] + [B att ][K att ])x(t) + [B def ]u def (t) = [A att ]x(t) + [B def ]u def (t) Theorem If the system is structurally resilient to a DoS attack for some [B def ] with zero structure Z(B def ), then there exists a [B def ] with Z(B def ) Z(B def ) for which it will also be structurally resilient to a state feedback integrity attack. Further, if m Aatt + β Aatt α Aatt m A + β A α A for some choice of [B def ] corresponding to the DoS case, then the same [B def ] will ensure structural resilience to a state feedback integrity attack. 11 / 13

15 Conclusion Formulated a structural approach to study resilience of CPSs to attacks. Attack success interpreted in terms of digraph and bipartite graph representations of system structure. Results independent of numerical realizations of system parameters. Future Directions: Cost of controllability. Robustness to worst attack with least cost. Extension to distributed systems. 12 / 13

16 Thank You. Questions? 13 / 13

Generic degree structure of the minimal polynomial nullspace basis: a block Toeplitz matrix approach

Generic degree structure of the minimal polynomial nullspace basis: a block Toeplitz matrix approach Generic degree structure of the minimal polynomial nullspace basis: a block Toeplitz matrix approach Bhaskar Ramasubramanian 1, Swanand R. Khare and Madhu N. Belur 3 December 17, 014 1 Department of Electrical

More information

Minimum Sensor Placement for Single Robust. Observability of Structured Complex Networks

Minimum Sensor Placement for Single Robust. Observability of Structured Complex Networks Minimum Sensor Placement for Single Robust 1 Observability of Structured Complex Networks Xiaofei Liu 1, Sérgio Pequito 1,2, Soummya Kar 1 Bruno Sinopoli 1 A. Pedro Aguiar 2,3 arxiv:1507.07205v2 [math.oc]

More information

Resilient Structural Stabilizability of Undirected Networks

Resilient Structural Stabilizability of Undirected Networks Resilient Structural Stabilizability of Undirected Networks Jingqi Li, Ximing Chen, Sérgio Pequito, George J. Pappas, Victor M. Preciado arxiv:181.126v1 [math.oc] 29 Sep 218 Abstract In this paper, we

More information

Monomial subdigraphs of reachable and controllable positive discrete-time systems

Monomial subdigraphs of reachable and controllable positive discrete-time systems Monomial subdigraphs of reachable and controllable positive discrete-time systems Rafael Bru a, Louis Caccetta b and Ventsi G. Rumchev b a Dept. de Matemàtica Aplicada, Univ. Politècnica de València, Camí

More information

Trade-offs between driving nodes and time-to-control in complex networks Supplementary Information

Trade-offs between driving nodes and time-to-control in complex networks Supplementary Information Trade-offs between driving nodes and time-to-control in complex networks Supplementary Information Sérgio Pequito Victor M. Preciado Albert-László Barabási George J. Pappas CONTENTS I PRELIMINARIES AND

More information

A Framework for Structural Input/Output and Control Configuration Selection in Large-Scale Systems

A Framework for Structural Input/Output and Control Configuration Selection in Large-Scale Systems Carnegie Mellon University Research Showcase @ CMU Department of Electrical and Computer Engineering Carnegie Institute of Technology 9-2014 A Framework for Structural Input/Output and Control Configuration

More information

On the Complexity of the Constrained Input Selection Problem for Structural Linear Systems

On the Complexity of the Constrained Input Selection Problem for Structural Linear Systems On the Complexity of the Constrained Input Selection Problem for Structural Linear Systems Sérgio Pequito a,b Soummya Kar a A. Pedro Aguiar a,c a Institute for System and Robotics, Instituto Superior Técnico,

More information

Australian National University WORKSHOP ON SYSTEMS AND CONTROL

Australian National University WORKSHOP ON SYSTEMS AND CONTROL Australian National University WORKSHOP ON SYSTEMS AND CONTROL Canberra, AU December 7, 2017 Australian National University WORKSHOP ON SYSTEMS AND CONTROL A Distributed Algorithm for Finding a Common

More information

Lectures 6, 7 and part of 8

Lectures 6, 7 and part of 8 Lectures 6, 7 and part of 8 Uriel Feige April 26, May 3, May 10, 2015 1 Linear programming duality 1.1 The diet problem revisited Recall the diet problem from Lecture 1. There are n foods, m nutrients,

More information

arxiv: v1 [math.oc] 1 Apr 2014

arxiv: v1 [math.oc] 1 Apr 2014 On the NP-completeness of the Constrained Minimal Structural Controllability/Observability Problem Sérgio Pequito, Soummya Kar A. Pedro Aguiar, 1 arxiv:1404.0072v1 [math.oc] 1 Apr 2014 Abstract This paper

More information

Zero controllability in discrete-time structured systems

Zero controllability in discrete-time structured systems 1 Zero controllability in discrete-time structured systems Jacob van der Woude arxiv:173.8394v1 [math.oc] 24 Mar 217 Abstract In this paper we consider complex dynamical networks modeled by means of state

More information

The least eigenvalue of the signless Laplacian of non-bipartite unicyclic graphs with k pendant vertices

The least eigenvalue of the signless Laplacian of non-bipartite unicyclic graphs with k pendant vertices Electronic Journal of Linear Algebra Volume 26 Volume 26 (2013) Article 22 2013 The least eigenvalue of the signless Laplacian of non-bipartite unicyclic graphs with k pendant vertices Ruifang Liu rfliu@zzu.edu.cn

More information

A lower bound for the Laplacian eigenvalues of a graph proof of a conjecture by Guo

A lower bound for the Laplacian eigenvalues of a graph proof of a conjecture by Guo A lower bound for the Laplacian eigenvalues of a graph proof of a conjecture by Guo A. E. Brouwer & W. H. Haemers 2008-02-28 Abstract We show that if µ j is the j-th largest Laplacian eigenvalue, and d

More information

Minimum number of non-zero-entries in a 7 7 stable matrix

Minimum number of non-zero-entries in a 7 7 stable matrix Linear Algebra and its Applications 572 (2019) 135 152 Contents lists available at ScienceDirect Linear Algebra and its Applications www.elsevier.com/locate/laa Minimum number of non-zero-entries in a

More information

Laplacian Integral Graphs with Maximum Degree 3

Laplacian Integral Graphs with Maximum Degree 3 Laplacian Integral Graphs with Maximum Degree Steve Kirkland Department of Mathematics and Statistics University of Regina Regina, Saskatchewan, Canada S4S 0A kirkland@math.uregina.ca Submitted: Nov 5,

More information

Consensus-Based Distributed Optimization with Malicious Nodes

Consensus-Based Distributed Optimization with Malicious Nodes Consensus-Based Distributed Optimization with Malicious Nodes Shreyas Sundaram Bahman Gharesifard Abstract We investigate the vulnerabilities of consensusbased distributed optimization protocols to nodes

More information

ARTICLE IN PRESS Theoretical Computer Science ( )

ARTICLE IN PRESS Theoretical Computer Science ( ) Theoretical Computer Science ( ) Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Conditional matching preclusion for hypercube-like

More information

On the adjacency matrix of a block graph

On the adjacency matrix of a block graph On the adjacency matrix of a block graph R. B. Bapat Stat-Math Unit Indian Statistical Institute, Delhi 7-SJSS Marg, New Delhi 110 016, India. email: rbb@isid.ac.in Souvik Roy Economics and Planning Unit

More information

Chapter 9: Relations Relations

Chapter 9: Relations Relations Chapter 9: Relations 9.1 - Relations Definition 1 (Relation). Let A and B be sets. A binary relation from A to B is a subset R A B, i.e., R is a set of ordered pairs where the first element from each pair

More information

Designing Decentralized Control Systems without Structural Fixed Modes: A Multilayer Approach

Designing Decentralized Control Systems without Structural Fixed Modes: A Multilayer Approach Designing Decentralized Control Systems without Structural Fixed Modes: A Multilayer Approach Sérgio Pequito,2 Clarance Agbi Nipun Popli Soummya Kar A. Pedro Aguiar 2,3 Marija Ilić Department of Electrical

More information

THE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS

THE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS THE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS GÁBOR HORVÁTH, CHRYSTOPHER L. NEHANIV, AND KÁROLY PODOSKI Dedicated to John Rhodes on the occasion of his 80th birthday.

More information

An Algorithmist s Toolkit September 24, Lecture 5

An Algorithmist s Toolkit September 24, Lecture 5 8.49 An Algorithmist s Toolkit September 24, 29 Lecture 5 Lecturer: Jonathan Kelner Scribe: Shaunak Kishore Administrivia Two additional resources on approximating the permanent Jerrum and Sinclair s original

More information

Shortest paths with negative lengths

Shortest paths with negative lengths Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no

More information

QR FACTORIZATIONS USING A RESTRICTED SET OF ROTATIONS

QR FACTORIZATIONS USING A RESTRICTED SET OF ROTATIONS QR FACTORIZATIONS USING A RESTRICTED SET OF ROTATIONS DIANNE P. O LEARY AND STEPHEN S. BULLOCK Dedicated to Alan George on the occasion of his 60th birthday Abstract. Any matrix A of dimension m n (m n)

More information

Graph fundamentals. Matrices associated with a graph

Graph fundamentals. Matrices associated with a graph Graph fundamentals Matrices associated with a graph Drawing a picture of a graph is one way to represent it. Another type of representation is via a matrix. Let G be a graph with V (G) ={v 1,v,...,v n

More information

Topics in Approximation Algorithms Solution for Homework 3

Topics in Approximation Algorithms Solution for Homework 3 Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L

More information

On scores in tournaments and oriented graphs. on score sequences in oriented graphs. Also we give a new proof for Avery s

On scores in tournaments and oriented graphs. on score sequences in oriented graphs. Also we give a new proof for Avery s Chapter On scores in tournaments and oriented graphs In this Chapter, we report the results available in literature on score sequences in tournaments and oriented graphs. We obtain many new results on

More information

Math 775 Homework 1. Austin Mohr. February 9, 2011

Math 775 Homework 1. Austin Mohr. February 9, 2011 Math 775 Homework 1 Austin Mohr February 9, 2011 Problem 1 Suppose sets S 1, S 2,..., S n contain, respectively, 2, 3,..., n 1 elements. Proposition 1. The number of SDR s is at least 2 n, and this bound

More information

Discrete Optimization 23

Discrete Optimization 23 Discrete Optimization 23 2 Total Unimodularity (TU) and Its Applications In this section we will discuss the total unimodularity theory and its applications to flows in networks. 2.1 Total Unimodularity:

More information

State and input observability for structured linear systems: A graph-theoretic approach

State and input observability for structured linear systems: A graph-theoretic approach State and input observability for structured linear systems: A graph-theoretic approach Taha Boukhobza, Frédéric Hamelin, Sinuhé Martinez-Martinez To cite this version: Taha Boukhobza, Frédéric Hamelin,

More information

Double domination in signed graphs

Double domination in signed graphs PURE MATHEMATICS RESEARCH ARTICLE Double domination in signed graphs P.K. Ashraf 1 * and K.A. Germina 2 Received: 06 March 2016 Accepted: 21 April 2016 Published: 25 July 2016 *Corresponding author: P.K.

More information

Discrete Applied Mathematics

Discrete Applied Mathematics Discrete Applied Mathematics 159 (2011) 1345 1351 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam On disconnected cuts and separators

More information

Lecture 1 and 2: Introduction and Graph theory basics. Spring EE 194, Networked estimation and control (Prof. Khan) January 23, 2012

Lecture 1 and 2: Introduction and Graph theory basics. Spring EE 194, Networked estimation and control (Prof. Khan) January 23, 2012 Lecture 1 and 2: Introduction and Graph theory basics Spring 2012 - EE 194, Networked estimation and control (Prof. Khan) January 23, 2012 Spring 2012: EE-194-02 Networked estimation and control Schedule

More information

A New Approximation Algorithm for the Asymmetric TSP with Triangle Inequality By Markus Bläser

A New Approximation Algorithm for the Asymmetric TSP with Triangle Inequality By Markus Bläser A New Approximation Algorithm for the Asymmetric TSP with Triangle Inequality By Markus Bläser Presented By: Chris Standish chriss@cs.tamu.edu 23 November 2005 1 Outline Problem Definition Frieze s Generic

More information

Separating Hierarchical and General Hub Labelings

Separating Hierarchical and General Hub Labelings Separating Hierarchical and General Hub Labelings Andrew V. Goldberg 1 Ilya Razenshteyn 2 Ruslan Savchenko 3 1 Microsoft Research Silicon Valley 2 CSAIL, MIT 3 Moscow State University June 23, 2013 Overview

More information

Bounds for the Zero Forcing Number of Graphs with Large Girth

Bounds for the Zero Forcing Number of Graphs with Large Girth Theory and Applications of Graphs Volume 2 Issue 2 Article 1 2015 Bounds for the Zero Forcing Number of Graphs with Large Girth Randy Davila Rice University, rrd32@txstate.edu Franklin Kenter Rice University,

More information

Representations of All Solutions of Boolean Programming Problems

Representations of All Solutions of Boolean Programming Problems Representations of All Solutions of Boolean Programming Problems Utz-Uwe Haus and Carla Michini Institute for Operations Research Department of Mathematics ETH Zurich Rämistr. 101, 8092 Zürich, Switzerland

More information

Complexity of Checking the Existence of a Stabilizing Decentralized Controller

Complexity of Checking the Existence of a Stabilizing Decentralized Controller 2009 American Control Conference Hyatt Regency Riverfront, St Louis, MO, USA June 10-12, 2009 WeC151 Complexity of Checking the Existence of a Stabilizing Decentralized Controller Javad Lavaei and Somayeh

More information

Nonnegative Matrices I

Nonnegative Matrices I Nonnegative Matrices I Daisuke Oyama Topics in Economic Theory September 26, 2017 References J. L. Stuart, Digraphs and Matrices, in Handbook of Linear Algebra, Chapter 29, 2006. R. A. Brualdi and H. J.

More information

On star forest ascending subgraph decomposition

On star forest ascending subgraph decomposition On star forest ascending subgraph decomposition Josep M. Aroca and Anna Lladó Department of Mathematics, Univ. Politècnica de Catalunya Barcelona, Spain josep.m.aroca@upc.edu,aina.llado@upc.edu Submitted:

More information

Section 1.7: Properties of the Leslie Matrix

Section 1.7: Properties of the Leslie Matrix Section 1.7: Properties of the Leslie Matrix Definition: A matrix A whose entries are nonnegative (positive) is called a nonnegative (positive) matrix, denoted as A 0 (A > 0). Definition: A square m m

More information

On a Conjecture of Thomassen

On a Conjecture of Thomassen On a Conjecture of Thomassen Michelle Delcourt Department of Mathematics University of Illinois Urbana, Illinois 61801, U.S.A. delcour2@illinois.edu Asaf Ferber Department of Mathematics Yale University,

More information

Induced Cycles of Fixed Length

Induced Cycles of Fixed Length Induced Cycles of Fixed Length Terry McKee Wright State University Dayton, Ohio USA terry.mckee@wright.edu Cycles in Graphs Vanderbilt University 31 May 2012 Overview 1. Investigating the fine structure

More information

Finite Frames and Graph Theoretical Uncertainty Principles

Finite Frames and Graph Theoretical Uncertainty Principles Finite Frames and Graph Theoretical Uncertainty Principles (pkoprows@math.umd.edu) University of Maryland - College Park April 13, 2015 Outline 1 Motivation 2 Definitions 3 Results Outline 1 Motivation

More information

Relations Graphical View

Relations Graphical View Introduction Relations Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Recall that a relation between elements of two sets is a subset of their Cartesian

More information

A Creative Review on Integer Additive Set-Valued Graphs

A Creative Review on Integer Additive Set-Valued Graphs A Creative Review on Integer Additive Set-Valued Graphs N. K. Sudev arxiv:1407.7208v2 [math.co] 30 Jan 2015 Department of Mathematics Vidya Academy of Science & Technology Thalakkottukara, Thrissur-680501,

More information

The matrix approach for abstract argumentation frameworks

The matrix approach for abstract argumentation frameworks The matrix approach for abstract argumentation frameworks Claudette CAYROL, Yuming XU IRIT Report RR- -2015-01- -FR February 2015 Abstract The matrices and the operation of dual interchange are introduced

More information

Scheduling on Unrelated Parallel Machines. Approximation Algorithms, V. V. Vazirani Book Chapter 17

Scheduling on Unrelated Parallel Machines. Approximation Algorithms, V. V. Vazirani Book Chapter 17 Scheduling on Unrelated Parallel Machines Approximation Algorithms, V. V. Vazirani Book Chapter 17 Nicolas Karakatsanis, 2008 Description of the problem Problem 17.1 (Scheduling on unrelated parallel machines)

More information

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive

More information

Definition: A binary relation R from a set A to a set B is a subset R A B. Example:

Definition: A binary relation R from a set A to a set B is a subset R A B. Example: Chapter 9 1 Binary Relations Definition: A binary relation R from a set A to a set B is a subset R A B. Example: Let A = {0,1,2} and B = {a,b} {(0, a), (0, b), (1,a), (2, b)} is a relation from A to B.

More information

Reachability of recurrent positions in the chip-firing game

Reachability of recurrent positions in the chip-firing game Egerváry Research Group on Combinatorial Optimization Technical reports TR-2015-10. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H 1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.

More information

arxiv: v3 [math.ds] 21 Jan 2018

arxiv: v3 [math.ds] 21 Jan 2018 ASYMPTOTIC BEHAVIOR OF CONJUNCTIVE BOOLEAN NETWORK OVER WEAKLY CONNECTED DIGRAPH XUDONG CHEN, ZUGUANG GAO, AND TAMER BAŞAR arxiv:1708.01975v3 [math.ds] 21 Jan 2018 Abstract. A conjunctive Boolean network

More information

Decomposing dense bipartite graphs into 4-cycles

Decomposing dense bipartite graphs into 4-cycles Decomposing dense bipartite graphs into 4-cycles Nicholas J. Cavenagh Department of Mathematics The University of Waikato Private Bag 3105 Hamilton 3240, New Zealand nickc@waikato.ac.nz Submitted: Jun

More information

NCS Lecture 8 A Primer on Graph Theory. Cooperative Control Applications

NCS Lecture 8 A Primer on Graph Theory. Cooperative Control Applications NCS Lecture 8 A Primer on Graph Theory Richard M. Murray Control and Dynamical Systems California Institute of Technology Goals Introduce some motivating cooperative control problems Describe basic concepts

More information

Graph-Constrained Group Testing

Graph-Constrained Group Testing Mahdi Cheraghchi et al. presented by Ying Xuan May 20, 2010 Table of contents 1 Motivation and Problem Definitions 2 3 Correctness Proof 4 Applications call for connected pools detection of congested links

More information

Measurement partitioning and observational. equivalence in state estimation

Measurement partitioning and observational. equivalence in state estimation Measurement partitioning and observational 1 equivalence in state estimation Mohammadreza Doostmohammadian, Student Member, IEEE, and Usman A. Khan, Senior Member, IEEE arxiv:1412.5111v1 [cs.it] 16 Dec

More information

Generic degree structure of the minimal polynomial nullspace basis: a block Toeplitz matrix approach

Generic degree structure of the minimal polynomial nullspace basis: a block Toeplitz matrix approach Generic degree structure of the minimal polynomial nullspace basis: a block Toeplitz matrix approach Bhaskar Ramasubramanian, Swanand R Khare and Madhu N Belur Abstract This paper formulates the problem

More information

Lecture Introduction. 2 Brief Recap of Lecture 10. CS-621 Theory Gems October 24, 2012

Lecture Introduction. 2 Brief Recap of Lecture 10. CS-621 Theory Gems October 24, 2012 CS-62 Theory Gems October 24, 202 Lecture Lecturer: Aleksander Mądry Scribes: Carsten Moldenhauer and Robin Scheibler Introduction In Lecture 0, we introduced a fundamental object of spectral graph theory:

More information

Disjoint Hamiltonian Cycles in Bipartite Graphs

Disjoint Hamiltonian Cycles in Bipartite Graphs Disjoint Hamiltonian Cycles in Bipartite Graphs Michael Ferrara 1, Ronald Gould 1, Gerard Tansey 1 Thor Whalen Abstract Let G = (X, Y ) be a bipartite graph and define σ (G) = min{d(x) + d(y) : xy / E(G),

More information

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected.

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected. 4 Connectivity 2-connectivity Separation: A separation of G of order k is a pair of subgraphs (H, K) with H K = G and E(H K) = and V (H) V (K) = k. Such a separation is proper if V (H) \ V (K) and V (K)

More information

On disconnected cuts and separators

On disconnected cuts and separators On disconnected cuts and separators Takehiro Ito 1, Marcin Kamiński 2, Daniël Paulusma 3 and Dimitrios M. Thilikos 4 1 Graduate School of Information Sciences, Tohoku University, Aoba-yama 6-6-05, Sendai,

More information

Introduction to Algorithms

Introduction to Algorithms Introduction to Algorithms 6.046J/18.401J/SMA5503 Lecture 18 Prof. Erik Demaine Negative-weight cycles Recall: If a graph G = (V, E) contains a negativeweight cycle, then some shortest paths may not exist.

More information

The Miracles of Tropical Spectral Theory

The Miracles of Tropical Spectral Theory The Miracles of Tropical Spectral Theory Emmanuel Tsukerman University of California, Berkeley e.tsukerman@berkeley.edu July 31, 2015 1 / 110 Motivation One of the most important results in max-algebra

More information

Complex Laplacians and Applications in Multi-Agent Systems

Complex Laplacians and Applications in Multi-Agent Systems 1 Complex Laplacians and Applications in Multi-Agent Systems Jiu-Gang Dong, and Li Qiu, Fellow, IEEE arxiv:1406.186v [math.oc] 14 Apr 015 Abstract Complex-valued Laplacians have been shown to be powerful

More information

4. Duality Duality 4.1 Duality of LPs and the duality theorem. min c T x x R n, c R n. s.t. ai Tx = b i i M a i R n

4. Duality Duality 4.1 Duality of LPs and the duality theorem. min c T x x R n, c R n. s.t. ai Tx = b i i M a i R n 2 4. Duality of LPs and the duality theorem... 22 4.2 Complementary slackness... 23 4.3 The shortest path problem and its dual... 24 4.4 Farkas' Lemma... 25 4.5 Dual information in the tableau... 26 4.6

More information

Generalizations of the Strong Arnold Property and the Inverse Eigenvalue Problem of a Graph

Generalizations of the Strong Arnold Property and the Inverse Eigenvalue Problem of a Graph Generalizations of the and the Inverse Eigenvalue Problem of a Graph Iowa State University and American Institute of Mathematics MM Joint Mathematics Meetings Atlanta, GA, January 7, 2017 Joint work with

More information

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected.

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected. 4 Connectivity 2-connectivity Separation: A separation of G of order k is a pair of subgraphs (H 1, H 2 ) so that H 1 H 2 = G E(H 1 ) E(H 2 ) = V (H 1 ) V (H 2 ) = k Such a separation is proper if V (H

More information

7 Matrix Operations. 7.0 Matrix Multiplication + 3 = 3 = 4

7 Matrix Operations. 7.0 Matrix Multiplication + 3 = 3 = 4 7 Matrix Operations Copyright 017, Gregory G. Smith 9 October 017 The product of two matrices is a sophisticated operations with a wide range of applications. In this chapter, we defined this binary operation,

More information

arxiv: v1 [eess.sp] 2 Apr 2019

arxiv: v1 [eess.sp] 2 Apr 2019 When Does a Multi-channel Linear System Have a Structurally Fixed Spectrum? F. Liu 1 and A. S. Morse 1 arxiv:1904.01505v1 [eess.sp] 2 Apr 2019 Abstract It is well known that a fixed spectrum {i.e., the

More information

Orthogonality graph of the algebra of upper triangular matrices *

Orthogonality graph of the algebra of upper triangular matrices * Orthogonality graph of the algebra of upper triangular matrices * arxiv:602.03236v [math.co] 0 Feb 206 B.R. Bakhadly Lomonosov Moscow State University, Faculty of Mechanics and Mathematics Abstract We

More information

Factors in Graphs With Multiple Degree Constraints

Factors in Graphs With Multiple Degree Constraints Factors in Graphs With Multiple Degree Constraints Richard C. Brewster, Morten Hegner Nielsen, and Sean McGuinness Thompson Rivers University Kamloops, BC V2C0C8 Canada October 4, 2011 Abstract For a graph

More information

Cyclic Path Covering Number of Euler Graphs

Cyclic Path Covering Number of Euler Graphs Global Journal of Mathematical Sciences: Theory and Practical. ISSN 0974-3200 Volume 4, Number 4 (2012), pp. 465 473 International Research Publication House http://www.irphouse.com Cyclic Path Covering

More information

Standard Diraphs the (unique) digraph with no vertices or edges. (modulo n) for every 1 i n A digraph whose underlying graph is a complete graph.

Standard Diraphs the (unique) digraph with no vertices or edges. (modulo n) for every 1 i n A digraph whose underlying graph is a complete graph. 5 Directed Graphs What is a directed graph? Directed Graph: A directed graph, or digraph, D, consists of a set of vertices V (D), a set of edges E(D), and a function which assigns each edge e an ordered

More information

1 Primals and Duals: Zero Sum Games

1 Primals and Duals: Zero Sum Games CS 124 Section #11 Zero Sum Games; NP Completeness 4/15/17 1 Primals and Duals: Zero Sum Games We can represent various situations of conflict in life in terms of matrix games. For example, the game shown

More information

CS 6820 Fall 2014 Lectures, October 3-20, 2014

CS 6820 Fall 2014 Lectures, October 3-20, 2014 Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given

More information

EE 381V: Large Scale Learning Spring Lecture 16 March 7

EE 381V: Large Scale Learning Spring Lecture 16 March 7 EE 381V: Large Scale Learning Spring 2013 Lecture 16 March 7 Lecturer: Caramanis & Sanghavi Scribe: Tianyang Bai 16.1 Topics Covered In this lecture, we introduced one method of matrix completion via SVD-based

More information

The Multiple Traveling Salesman Problem with Time Windows: Bounds for the Minimum Number of Vehicles

The Multiple Traveling Salesman Problem with Time Windows: Bounds for the Minimum Number of Vehicles The Multiple Traveling Salesman Problem with Time Windows: Bounds for the Minimum Number of Vehicles Snežana Mitrović-Minić Ramesh Krishnamurti School of Computing Science, Simon Fraser University, Burnaby,

More information

Integer programming: an introduction. Alessandro Astolfi

Integer programming: an introduction. Alessandro Astolfi Integer programming: an introduction Alessandro Astolfi Outline Introduction Examples Methods for solving ILP Optimization on graphs LP problems with integer solutions Summary Introduction Integer programming

More information

GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017)

GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017) GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017) C. Croitoru croitoru@info.uaic.ro FII November 12, 2017 1 / 33 OUTLINE Matchings Analytical Formulation of the Maximum Matching Problem Perfect Matchings

More information

ON GLOBAL DOMINATING-χ-COLORING OF GRAPHS

ON GLOBAL DOMINATING-χ-COLORING OF GRAPHS - TAMKANG JOURNAL OF MATHEMATICS Volume 48, Number 2, 149-157, June 2017 doi:10.5556/j.tkjm.48.2017.2295 This paper is available online at http://journals.math.tku.edu.tw/index.php/tkjm/pages/view/onlinefirst

More information

Alternating paths revisited II: restricted b-matchings in bipartite graphs

Alternating paths revisited II: restricted b-matchings in bipartite graphs Egerváry Research Group on Combinatorial Optimization Technical reports TR-2005-13. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H 1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.

More information

Matrix Completion Problems for Pairs of Related Classes of Matrices

Matrix Completion Problems for Pairs of Related Classes of Matrices Matrix Completion Problems for Pairs of Related Classes of Matrices Leslie Hogben Department of Mathematics Iowa State University Ames, IA 50011 lhogben@iastate.edu Abstract For a class X of real matrices,

More information

Vulnerability Analysis of Feedback Systems

Vulnerability Analysis of Feedback Systems Vulnerability Analysis of Feedback Systems Nathan Woodbury Advisor: Dr. Sean Warnick Honors Thesis Defense 11/14/2013 Acknowledgements Advisor Dr. Sean Warnick Honors Committee Dr. Scott Steffensen Dr.

More information

Hamiltonian paths in tournaments A generalization of sorting DM19 notes fall 2006

Hamiltonian paths in tournaments A generalization of sorting DM19 notes fall 2006 Hamiltonian paths in tournaments A generalization of sorting DM9 notes fall 2006 Jørgen Bang-Jensen Imada, SDU 30. august 2006 Introduction and motivation Tournaments which we will define mathematically

More information

Structural Hybrid Systems

Structural Hybrid Systems Structural Hybrid Systems Guilherme Henrique Caçador Ramos Abstract This thesis introduces the concept of structural hybrid systems to address, as a particular case, the model checking problem of switching

More information

ON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES

ON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES ON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES SANTOSH N. KABADI AND ABRAHAM P. PUNNEN Abstract. Polynomially testable characterization of cost matrices associated

More information

Lecture Notes Introduction to Cluster Algebra

Lecture Notes Introduction to Cluster Algebra Lecture Notes Introduction to Cluster Algebra Ivan C.H. Ip Update: May 16, 2017 5 Review of Root Systems In this section, let us have a brief introduction to root system and finite Lie type classification

More information

Bipartite Ramanujan Graphs of Every Degree

Bipartite Ramanujan Graphs of Every Degree Spectral Graph Theory Lecture 26 Bipartite Ramanujan Graphs of Every Degree Daniel A. Spielman December 9, 2015 Disclaimer These notes are not necessarily an accurate representation of what happened in

More information

MEASUREMENT PARTITIONING AND OBSERVATIONAL EQUIVALENCE IN STATE ESTIMATION. Mohammadreza Doostmohammadian and Usman A. Khan

MEASUREMENT PARTITIONING AND OBSERVATIONAL EQUIVALENCE IN STATE ESTIMATION. Mohammadreza Doostmohammadian and Usman A. Khan MESUREMENT PRTITIONING ND OBSERVTIONL EQUIVLENCE IN STTE ESTIMTION Mohammadreza Doostmohammadian and Usman. Khan ECE Department, Tufts University, Medford M {mrd, khan}@ece.tufts.edu BSTRCT This paper

More information

5 Flows and cuts in digraphs

5 Flows and cuts in digraphs 5 Flows and cuts in digraphs Recall that a digraph or network is a pair G = (V, E) where V is a set and E is a multiset of ordered pairs of elements of V, which we refer to as arcs. Note that two vertices

More information

1 T 1 = where 1 is the all-ones vector. For the upper bound, let v 1 be the eigenvector corresponding. u:(u,v) E v 1(u)

1 T 1 = where 1 is the all-ones vector. For the upper bound, let v 1 be the eigenvector corresponding. u:(u,v) E v 1(u) CME 305: Discrete Mathematics and Algorithms Instructor: Reza Zadeh (rezab@stanford.edu) Final Review Session 03/20/17 1. Let G = (V, E) be an unweighted, undirected graph. Let λ 1 be the maximum eigenvalue

More information

Secondary κ-kernel Symmetric Fuzzy Matrices

Secondary κ-kernel Symmetric Fuzzy Matrices Intern. J. Fuzzy Mathematical rchive Vol. 5, No. 2, 24, 89-94 ISSN: 232 3242 (P), 232 325 (online) Published on 2 December 24 www.researchmathsci.org International Journal of Secondary κ-ernel Symmetric

More information

Parity Versions of 2-Connectedness

Parity Versions of 2-Connectedness Parity Versions of 2-Connectedness C. Little Institute of Fundamental Sciences Massey University Palmerston North, New Zealand c.little@massey.ac.nz A. Vince Department of Mathematics University of Florida

More information

SKEW-SPECTRA AND SKEW ENERGY OF VARIOUS PRODUCTS OF GRAPHS. Communicated by Ivan Gutman

SKEW-SPECTRA AND SKEW ENERGY OF VARIOUS PRODUCTS OF GRAPHS. Communicated by Ivan Gutman Transactions on Combinatorics ISSN (print: 2251-8657, ISSN (on-line: 2251-8665 Vol. 4 No. 2 (2015, pp. 13-21. c 2015 University of Isfahan www.combinatorics.ir www.ui.ac.ir SKEW-SPECTRA AND SKEW ENERGY

More information

Bipartite Matchings. Andreas Klappenecker

Bipartite Matchings. Andreas Klappenecker Bipartite Matchings Andreas Klappenecker Matching Number m(g) = number of edges in a maximally large matching. Why is m(g) < 4? m(g) = W iff A

More information

Connectedness of Efficient Solutions in Multiple. Objective Combinatorial Optimization

Connectedness of Efficient Solutions in Multiple. Objective Combinatorial Optimization Connectedness of Efficient Solutions in Multiple Objective Combinatorial Optimization Jochen Gorski Kathrin Klamroth Stefan Ruzika Communicated by H. Benson Abstract Connectedness of efficient solutions

More information

Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model

Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model Saleh Soltan, Gil Zussman Department of Electrical Engineering Columbia University, New York, NY Email: {saleh,gil}@ee.columbia.edu

More information

Regular Sparse Crossbar Concentrators

Regular Sparse Crossbar Concentrators Regular Sparse Crossbar Concentrators Weiming Guo and A. Yavuz Oruç Electrical Engineering Department College Park, MD 20742 ABSTRACT A bipartite concentrator is a single stage sparse crossbar switching

More information

Section Summary. Relations and Functions Properties of Relations. Combining Relations

Section Summary. Relations and Functions Properties of Relations. Combining Relations Chapter 9 Chapter Summary Relations and Their Properties n-ary Relations and Their Applications (not currently included in overheads) Representing Relations Closures of Relations (not currently included

More information

Spectral Graph Theory and You: Matrix Tree Theorem and Centrality Metrics

Spectral Graph Theory and You: Matrix Tree Theorem and Centrality Metrics Spectral Graph Theory and You: and Centrality Metrics Jonathan Gootenberg March 11, 2013 1 / 19 Outline of Topics 1 Motivation Basics of Spectral Graph Theory Understanding the characteristic polynomial

More information