Improving Network Connectivity Using Trusted Nodes and Edges
|
|
- Jane Gray
- 6 years ago
- Views:
Transcription
1 Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon of any networked system. A high connectiity is often desired within networks; for instance to increase robstness to failres, and resilience against attacks. A typical approach to increasing network connectiity is to strategically add links; howeer adding links is not always the most sitable option. In this paper, we propose an alternatie approach to improing network connectiity, that is by making a small sbset of nodes and edges trsted, which means that sch nodes and edges remain intact at all times and are inssceptible to failres. We then show that by controlling the nmber of trsted nodes and edges, any desired leel of network connectiity can be obtained. Along with characterizing network connectiity with trsted nodes and edges, we present heristics to compte a small nmber of sch nodes and edges. Finally, we illstrate or reslts on arios networks. I. INTRODUCTION Connectedness among arios components is a central theme and a characteristic phenomenon in any networked system. It signifies a large nmber of other network attribtes, sch as network reliability, robstness to failres, resilience against attacks, and other strctral properties of the network. As a reslt many notions defining connectedness hae been proposed. In particlar, network connectiity in terms of ertex and edge connectiities are one of the most widely considered concepts with significant ramifications. In essence, network connectiity captres the ability of the network to retain a connection between any two nodes nder a certain nmber of node or edge failres. A higher network connectiity is desirable in general to ensre that any two nodes remain connected een nder a large nmber of node or edge failres. Not only for strctral robstness, highly connected networks are more sitable to achiee arios other network objecties sch as information spread, resilient consenss [], and sriable network designs nder node or edge failres [2]. Network connectiity can be improed by strategically adding links (edges) between nodes, i.e., by incorporating redndancy, a techniqe commonly referred to as the connectiity agmentation [3], [4]. Althogh effectie, improing network connectiity by adding edges is not always practical de to economic and feasibility isses. Moreoer, adding more links also increases the attack srface for the potential attackers to case edge failres. These concerns inspire s to deise an alternatie strategy to improe network connectiity. Here, we propose an alternatie approach that does not inole strategic addition of edges or links to improe network connectiity. The basic idea is to ensre the aailability and operational integrity of a ery small sbset of nodes and edges at all times by protecting them from failres/attacks. We call sch a sbset of nodes and edges trsted. They correspond to the network components that are more reliable owing to more resorces and higher secrity measres. For instance, in terms of protection against physical attacks, defense mechanisms against jamming, protected memory, and sophisticated athentication mechanisms. We then show that the oerall network connectiity is significantly improed by making a ery small sbset of nodes and edges trsted, een if the original network is sparse. Moreoer, by controlling the nmber of trsted nodes, any desired leel of connectiity cold be obtained. Ths, instead of the idea of redndancy to improe connectiity, we exploit the notion of reliability (trstedness) of a small sbnetwork to improe connectiity. Or main contribtions are as follows: ) We propose and characterize the notion of network connectiity sing trsted nodes and edges, and show that network connectiity can be significantly improed by selecting a small sbset of trsted nodes or edges. 2) We proide ways to compte network connectiity in the presence of trsted nodes and edges, and also gie heristics to select the minimm set of trsted nodes and edges to achiee any desired ale of network connectiity. 3) Finally, we ealate or reslts nmerically on arios networks inclding Erdős-Rényi, preferential attachment, and random geometric networks. The problems related to adding the minimm nmber of edges to attain the desired network connectiity are referred to as the connectiity agmentation problems. The isse was inestigated in detail for the first time in [4]. Since then, new techniqes hae been deeloped to optimally increase the ertex and edge connectiities (e.g., [], [6], [7]). For a comprehensie list of papers in the area, we refer readers to an earlier srey by Frank [8] and Chapter 8 in a more recent work of Nagamochi and Ibaraki [3]. A closely related field is the area of sriable network design, in which the basic premise is to design and analyze algorithms that exploit strctral properties of the network to make them srie nder failre of network components (e.g., [2], [9]). To improe strctral properties of networks, adding protected resorces or defending a sbset of network components has been a sefl approach. Similar to trsted nodes, the notion of anchor nodes was sed in [0] in the context of maximizing the size of a special strctre, known as the k-core, in graphs. In a recent work, Dzibiński and Goyal [] explore trade-offs between the cost of adding links and defending nodes against attacks for network connectiity. II. PRELIMINARIES Let G(V, E) be an ndirected graph with a ertex set V and edge set E. An edge between ertices and is denoted by
2 U, and ertices and are called neighbors of each other. The neighborhood of a ertex, denoted by N, is the set of all neighbors of. The neighborhood of a sbset of ertices U V is N U = N. A path P of length n is a nonempty graph with the ertex set V = { 0, 2,, n }, and the edge set { 0, 2,, n n }. The ertices 0 and n are the end ertices, whereas, all remaining ertices are the inner ertices of the path. In a graph G, two paths are ertex-independent if they do not hae any common inner ertex. Similarly, two paths are edge-independent if they do not hae any common edge. We se the terms ertex and node interchangeably throghot the paper. If W is a sbset of ertices (edges), then G \ W is the sbgraph indced by the remaining ertices and edges of G. If G \ W has at least two components, then W separates G. Similarly, if and belong to two different components, then W separates and. Sch a set W is referred to as the ertex ct (edge ct). Next, we state the definitions of ertex and edge connectiity. A graph is k-ertex connected if there does not exist a set of k ertices whose remoal disconnects the graph. Likewise, the graph is k-edge connected if there is no sbset of k edges whose remoal disconnects the graph. Vertex connectiity of G, denoted by κ(g), is the maximm ale of k for which G is k-ertex connected. Similarly, the maximm ale of k for which G is k-edge connected is the edge connectiity of G, denoted by λ(g). The ertex connectiity of a complete graph with n nodes is defined to be n althogh no ertex ct exists. A classical theorem of Menger relates the notion of connectiity to the nmber of ertex and edge-independent paths between any two nodes. Theorem 2.: (Menger s theorem [2]) - Let and be distinct, non-adjacent ertices of G. The minimm size of a ertex ct separating and is eqal to the maximm nmber of ertex-independent paths between and. - Let and be distinct ertices of G. The minimm size of an edge ct that separates and is eqal to the maximm nmber of edge-independent paths between and. As a conseqence, for any k 2, a graph is k-ertex connected (k-edge connected) if and only if any two ertices hae k ertex-independent (k edge-independent) paths between them. Seeral ersions and proofs of this fndamental reslts hae been reported (e.g., see [3]). III. CONNECTIVITY WITH TRUSTED NODES AND EDGES In the traditional k-ertex (k-edge) connectiity notion, the idea is to ensre that the graph remains connected if any k nodes (k edges) are remoed from the network. By adding more edges between nodes, the ertex and edge connectiities can be improed. Howeer, if we fix a small sbset of nodes (edges) sch that they cannot be remoed from the network, then the minimm nmber of nodes (edges) from the remaining set that are reqired to disconnect the network also increases. Ths, instead of adding more edges or links, we get an alternatie way to improe network connectiity. A merit of this approach is that by making only a ery small fraction of the oerall nodes (edges) inssceptible to remoals, or as we call trsted, the oerall node (edge) connectiity can be significantly improed. In practice, trstedness can be achieed by making sch components more resorcefl and highly secre against physical attacks, tampering, and malicios intrsions throgh sophisticated secrity mechanisms. Next, we define the new notion of connectiity as follows: Definition (k-vertex Connected with T ) An ndirected graph G(V, E) is said to be k-ertex connected with T V, if there does not exist a set of fewer than k ertices in V \ T whose remoal disconnects the graph. The maximm ale of k for which the graph is k-ertex connected with T is denoted by κ T (G) and is referred to as the ertexconnectiity with T. Similarly, we can define the k-edge connectiity with trsted edges T e. Definition (k-edge Connected with T e ) For a gien T e E, G(V, E) is said to be k-edge connected with T e, if there does not exist a set of fewer than k edges in E \ T e whose remoal disconnects the graph. The maximm ale of k for which the graph is k-edge connected with T e is called the edge-connectiity with T e, and is denoted by λ T (G). Analogos to the node-independent paths, we define the notion of node-independent paths with T as follows: If T is the set of trsted nodes, then two paths are node-independent with T if the common inner ertices are only the trsted nodes. Similarly, for a gien set of trsted edges T e, two paths are edge-independent with T e if their common edges are only the trsted edges. For instance, in Figre (a), paths { 2, 2 x, x 3 } and { 2, 2 x, x 3 } are nodeindependent with T = {x}, and paths { 2, 2 x, xy, y 3 } and { 2, 2 x, xy, y 3 } in Figre (b) are edge-independent with T e = {xy}. 2 2 (a) x x y Fig.. (a) Node-independent paths with T. (b) Edge-independent paths with T e. A path with all trsted nodes (edges) is referred to as the node-trsted (edge-trsted) path. If for any pair of nodes, there exists a node trsted path between them, then G is referred to as completely ertex-connected with T. Similarly, G is completely edge-connected with T e if there exists an edge-trsted path between any two nodes. If a graph is completely ertex connected with T, we define its κ T =, and if the graph is completely edge-connected with T e, then we define its λ T =. 2 (b) 3 3
3 A. Vertex Connectiity with Trsted Nodes T Next, we compte and relate ertex connectiity with trsted nodes to the traditional notion of ertex connectiity. Let G (V, E ) be a graph obtained from G(V, E) as follows: for eery non-adjacent pair of nodes and, if there exists a trsted node, or a node-trsted path between them, then add an edge {}. An example is shown in Figre 2, where {,, z} is the set of trsted nodes in G. Since nodes and indce a node-trsted path in G, all neighbors of and are pair-wise adjacent in G. Similarly, neighbors of trsted node z are adjacent in G. z G G Fig. 2. G with the set of trsted nodes {,, z} and the reslting G. Proposition 3.: Let G(V, E) be a graph that is not completely ertex connected with T, then κ T (G) = κ(g ). Proof: Let κ T (G) = k. If nodes and are connected trogh a node-trsted path in G, then and are adjacent in G. Ths, if there is no sbset of k non-trsted nodes in G whose remoal disconnects the graph, then there is no sbset of any k nodes in G whose remoal disconnects G. Similarly, we obsere that eery ertex-ct in G consisting of only non-trsted nodes is also a ertex-ct in G. A direct conseqence of the aboe proposition and Theorem 2. is the following Menger s type reslt. Corollary 3.2: For a graph G(V, E) and T V, the following statements are eqialent: ) G is k-ertex connected with T. 2) For any two distinct, non-adjacent ertices, V; either there exists a node-trsted path between and, or there exists at least k paths between and that are ertex-independent with T. As an example, consider the 2-ertex connected graph in Figre 3(a), which becomes 4-ertex connected with two trsted nodes T = {6, 0} as shown in Figre 3(b) (a) (b) (c) Fig. 3. (a) Graph is 2-ertex and 2-edge connected. (b) The graph becomes 4-ertex connected with T = {6, 0}. Between nodes and 9, there are for ertex-independent paths with T, shown in red, ble, green and yellow. (c) The graph is 3-edge connected with T e = {4}. Three edge-independent paths with T e between nodes and 9 are highlighted To compte the ertex connectiity of G with T, we first obtain G as aboe, and then can se any algorithm to z compte the ertex connectiity of G. There is an extensie literatre on sch algorithms [4]. A typical approach is to tilize the max-flow-min-ct theorem (e.g., see [3]). The idea is to compte the local ertex connectiity between any two non-adjacent nodes s, t V in G, which is the minimm nmber of nodes that need to be remoed to disconnect s and t. The local ertex connectiity is eqal to the maximm flow between s and t in a particlar directed network H G obtained from G (e.g., see []). The ertex connectiity of G, and hence the ertex connectiity of G with T, is simply the minimm of the local ertex connectiities between any two non-adjacent nodes in G. The directed network H G reqired to compte local ertex connectiity between non-adjacent nodes s and t is obtained from G as follows []: For each ndirected edge, create two directed edges; one from to, and the other from to. Remoe all edges incoming to s and otgoing from t. For each node V \ {s, t}, create two nodes i and o, and add a directed edge from i to o. Next, make all incoming edges to as the incoming edges to i, and make all edges leaing from as the otgoing edges from o. Finally, assign a nit weight (capacity) to each directed edge and compte the maximm flow between s and t. In smmary, to compte the ertex connectiity of G with a gien T, following steps are performed, G G s,t V H G max flow(s,t). () κ T (G) is the minimm of the maximm flow between any two non-adjacent nodes s, t in G. In fact, the ertex connectiity of G with T can be compted by directly obtaining a directed network H G from G as described aboe. In other words, the G G transformation in () can be aoided. The only difference in the constrction of H G from aboe wold be that the edge weights (capacities) of all the edges incoming to and otgoing from the nodes corresponding to the trsted nodes in G wold be infinite (i.e., ery large), rather than one. The edge weights of all other edges wold remain to be one. To compte the ertex connectiity with T, maximm flow between all non adjacent nodes in G is then compted oer H G. An example is shown in Figre 4. s G s i o z t z i z o H G o i Fig. 4. For a gien G, T = {}, and non-adjacent nodes s, t, the constrction of a directed network H G B. Edge Connectiity with Trsted Edges T e Here, we discss the case of edge-connectiity with trsted edges, and ways to compte it. Let G(V, E) be a graph with t
4 trsted edges T e E, then we define G(Ṽ, Ẽ) be the graph obtained by identifying the end nodes of each trsted edge. Here, identifying two nodes, say and 2, means replacing them by a single node sch that an edge exists between some node x and in the new graph if and only if an edge exists between x and or between x and 2 in the original graph. We obtain G from G by identifying the end nodes of all trsted edges one by one. Note that G might hae mltiple edges between nodes, and hence G is a mltigraph. All self loops are ignored. An example is illstrated in Figre. 2 G 2 Fig.. The end nodes of trsted edges { 2 } and { 2 } in G are identified as and respectiely into G. We obsere that edge-trsted paths exist between nodes in G that are identified as a single node in G. Ths, if Ṽ =, it implies that G is completely edge-connected with T e. Since the end nodes of all trsted edges are identified in G, ths, if there is no set of k non-trsted edges that disconnects G, then there is no set of any k edges in G whose remoal disconnects G. Similarly, it is easy to obsere that any edgect of size k in G is also an edge-ct in G. Ths, we get the following: Proposition 3.3: Let G(V, E) be a graph that is not completely edge-connected with T e, then λ T (G) = λ( G). Gien a mltigraph G, if we replace each (edge in a) mltiple edge by a path of length two, then there is a one-toone relation between the paths in G and the reslting graph. Ths, the reslt in the Menger s theorem is immediately applicable to the reslting graph. We can state the following. Proposition 3.4: The edge-ersion of the Menger s theorem holds for mltigraphs. As a reslt, for the notion of edge connectiity with T e, the following Menger s type reslt is directly obtained. Corollary 3.: For a graph G(V, E) and T e E, the following statements are eqialent: ) G is k-edge connected with T e. 2) For any two distinct ertices and in G; either there exists an edge-trsted path between them, or there are at least k paths between them that are edgeindependent with T e. As an example, consider the 2-edge connected graph in Figre 3(a), which becomes 3-edge connected with a single trsted edge as shown in Figre 3(c). To compte the edge connectiity of G with T e, we can first obtain the mltigraph G and can then compte the edge connectiity of G sing known methods, for instance [3], [6], [7]. At the same time, as with the ertex connectiity with T, we can directly compte the edge connectiity of G with T e by first obtaining a directed graph D G with appropriate edge weights. D G is obtained from G by replacing each G ndirected edge in G by two directed edges, one from to and the other from to. All the directed edges corresponding to the trsted edges in G are assigned infinite weights (capacities), whereas all remaining directed edges are assigned nit weight. The edge connectiity of G with T e is simply the minimm of the maximm flow between any two nodes in D G. It is sfficient to compte the minimm of the maximm flow between a fixed node (randomly picked) and all other nodes [4]. IV. COMPUTING TRUSTED NODES AND EDGES In this section, we present heristics to select minimm set of trsted nodes T (trsted edges T e ) to achiee the desired ertex connectiity with T (edge connectiity with T e ). A. Problem Complexity First, we show that finding a minimm set of trsted nodes achieing a certain connectiity is a comptationally hard problem. We begin by formlating this as a decision problem. Definition (Trsted Node-Connectiity Agmentation Problem (TNCAP)) Gien a graph G(V, E), a desired connectiity k, and the nmber of trsted nodes T, determine if there exists a set of trsted nodes T of cardinality T sch that G is k -connected with T. Theorem 4.: TNCAP is NP-hard. We show that TNCAP is NP-hard sing a redction from a well-known NP-hard problem, the Set Coer Problem (SCP). Set Coer Problem (SCP) Gien a base set U, a family F of sbsets of U, and a threshold size t, determine if there exists a sbfamily C F of cardinality t whose nion is U. Proof: Gien an instance of SCP, we constrct an instance of TNCAP as follows: For each element U, create a node. Similarly, for each member F of the family F, create a node F. For each U and F F, create an edge (, F ) if F. For each F, F 2 F, F F 2, create an edge (F, F 2 ). Let nmber of trsted nodes be T = t, and let the desired connectiity be k = F. It is clear that the redction can be performed in polynomial time. As a conseqence, we only need to show that TNCAP has a soltion if and only if SCP does. First, let s sppose that there exists a set coer C of cardinality t. Then, let the set of trsted nodes be T = C. Since C is a set coer of U, eery node corresponding to an element of U is connected to a trsted node in T. Frther, eery node corresponding to a member of F \ C is also connected to a trsted node in T, and the trsted nodes are connected to each other. Conseqently, G cannot be separated by the remoal of any set of non-trsted nodes, which proes that T = C is a soltion for TNCAP. Second, let s sppose that there does not exist a set coer of cardinality t. Now, we will show that the graph G cannot be k -connected with any set of trsted nodes T of cardinality T = t. Let T be an arbitrary set of trsted
5 nodes of cardinality T, and consider the remoal of all non-trsted nodes corresponding to members of F. Since T F cannot be a set coer de to or spposition, there exists an element U that is connected only to nontrsted nodes. Conseqently, the remoal of the non-trsted nodes corresponding to members of F separates from the remainder of the graph, which proes that T cannot be a soltion for TNCAP. B. Heristics In a graph, complete connectiity with T is obtained wheneer any two nodes are connected throgh a nodetrsted path between them. A node trsted path exists between any pair of nodes if and only if T is a connected dominating set, which is defined as Definition (Connected Dominating Set) In a graph G(V, E), a sbset of nodes Γ V is a connected dominating set if and only if (i) for eery V, either Γ, or is adjacent to some Γ, and (ii) the nodes in Γ indce a connected sbgraph in G. The cardinality of the smallest connected dominating set is known as the connected domination nmber, denoted by γ G. For any k, the minimm size of trsted nodes reqired to achiee desired k-connectiity with T is bonded by γ G, T γ G. (2) Ths, starting with a T = Γ, we can iteratiely redce the size of T to get a minimal set of trsted nodes with which the graph remains k-ertex connected with T. The notion of connected dominating set in graphs has been extensiely stdied in both graph theory and sensor network literatre (e.g., see [8], [9]), wherein a wide ariety of applications along with arios distribted algorithms for constrcting small sized connected dominating sets hae been reported. Let V Conn Trst(G, T ) be the procedre to determine the ertex connectiity with a gien T, as otlined in Section III-A, and Conn Dom Set(G) be the procedre to determine the minimal connected dominating set. Then, a minimal T reqired to achiee the desired ertex connectiity k with trsted nodes can be obtained sing Algorithm gien below. Starting with a T = Γ, in each iteration, a node is remoed if the reslting connectiity is at least eqal to the desired ertex connectiity with T. Note that in Algorithm, O( Γ ) calls are made to the sb-rotine that comptes ertex connectiity with trsted nodes. Next, we present a heristic to compte a minimal set of trsted edges T e to achiee the desired edge connectiity with T e. As with the ertex connectiity case, complete edge connectiity with T e is obtained if and only if there exists an edge-trsted path between eery pair of nodes, which is tre if T e consists of edges in a spanning tree. Ths, to achiee complete edge connectiity with T e, we need T e = n, where n is the nmber of nodes in G. At the same time, we get an pper bond on the minimm size of T e to achiee desired k-edge connectiity with trsted edges for any k, Algorithm Trsted Nodes for Vertex Connectiity : Inpt: G(V, E), k 2: Otpt: T V 3: Γ Conn Dom Set(G) 4: T Γ : for i = to Γ do 6: V Conn Trst(G, T \ {Γ(i)}) 7: if k do 8: T T \ {Γ(i)} 9: end if 0: end for T e n. (3) Ths, to obtain a minimal T e to achiee desired edge connectiity with trsted edges, say k, we start with a T e consisting of edges in a spanning tree, and then iteratiely redce the size of T e. If E Conn Trst(G, T e ) is the rotine to compte edge-connectiity with T e, as discssed in Section III-B, and Min Span Tree(G) comptes edges in a spanning tree, then Algorithm 2 comptes a minimal T e to achiee the desired edge connectiity with trsted edges. Algorithm 2 Trsted Edges for Edge Connectiity : Inpt: G(V, E), k 2: Otpt: T e E 3: E Min Span Tree(G) 4: T e E : for i = to E do 6: e E Conn Trst(G, T e \ {E (i)}) 7: if e k do 8: T e T e \ {E (i)} 9: end if 0: end for If n is the nmber of nodes in the graph, then, in Algorithm 2, O(n) calls are made to the rotine that comptes edge connectiity with trsted edges. Next, we present a nmerical ealation of both the algorithms. V. NUMERICAL EVALUATION We ealate or reslts for three different types networks, inclding Preferential attachment networks, Erdős-Rényi networks, and Random geometric networks. These network are freqently sed to model arios networking phenomenon existing in natre and also for arios engineering applications. The details of networks considered for or simlations are stated below. - Preferential attachment (PA) networks with n = 00 nodes obtained by adding a node to an existing network one at a time. Each new node is connected to m = 3 existing nodes with the probability proportional to the degree of the nodes.
6 - Erdős-Rényi (ER) networks consisting of n = 00 nodes in which the probability of an edge between any two nodes is p = Random geometric (RG) networks consisting of n = 00 nodes that are distribted niformly at random in the nit area. An edge exists between any two nodes if the Eclidean distance between them is at most 0.8. Eery single point in the plots in Figres 6 (a) and (b) is an aerage of thirty randomly generated instances. The minimm nmber of trsted nodes (compted by the Algorithm ) sfficient to achiee the desired ertex connectiity with T, and the minimm nmber of trsted edges (compted by the Algorithm 2) sfficient to achiee the desired edge connectiity with T e, are plotted in Figres 6 (a) and (b) respectiely. In the case of the preferential attachment networks, the ertex connectiity with no trsted nodes is 3. To increase the ertex connectiity from 3 to 4, we obsere a big jmp in T, which is almost eqal to the size of the minimm connected dominating set. In the case of or preferential attachment networks, ertex connectiity with T is exhibited as an all-or-nothing type phenomenon, i.e., to increase the ertex connectiity een by one, the nmber of trsted nodes needed are sfficient to make the network completely ertex connected with T. Howeer, in the cases of Erdős-Rényi and random geometric networks, we obsere rather a continos increase in T. The plot of T is plateaed once T is eqal to the size of the connected dominating set. Similar patterns are obsered in the cases of edge connectiity with trsted edges. In the case of preferential attachment networks considered, to increase the edge connectiity from 3 to 4, the nmber of trsted edges needed increases from 0 to almost n/2. For the cases of Erdős- Rényi and random geometric networks, T e increases in a more continos manner to achiee higher ales of edge connectiity with T e. T PA PA ER 20 ER RG RG Vertex connectiity with T Edge connectiity with (a) Fig. 6. (a) Nmber of trsted nodes T as a fnction of the ertex connectiity with trsted nodes. (b) Nmber of trsted edges T e as a fnction of the edge connectiity with trsted edges. Te VI. CONCLUSIONS A typical approach to improing network connectiity is to add links in a strategic manner. We adapted a different approach to achiee any desired ale of ertex and edge connectiity. The basic idea was to make a small sbset (b) T e of nodes and edges trsted, i.e., inssceptible to failres. We then showed that existence of sch nodes and edges has an effect of haing a higher network connectiity. We also presented heristics to select a small sbset of trsted nodes and edges to achiee any desired ale of network connectiity. Using this approach, een the sparse networks can be made highly connected withot adding edges. As opposed to traditional way of improing connectiity by redndancy, or approach relies on making a portion of network more reliable and trsted, and thereby, achieing the desired connectiity. In ftre, we aim to combine both approaches to deise a more efficient strategy to improe connectiity. Moreoer, we wold like to generalize the notion of trstedness in the context of practical networks. ACKNOWLEDGMENTS This work was spported in part by the National Science Fondation (CNS-23899) and by the Air Force Research Laboratory (FA ). REFERENCES [] F. Pasqaletti, A. Bicchi, and F. Bllo, Consenss comptation in nreliable networks: A system theoretic approach, IEEE Transactions on Atomatic Control, ol. 7, no., pp , 202. [2] H. Keriin and A. R. Mahjob, Design of sriable networks: A srey, Networks, ol. 46, no., pp. 2, 200. [3] H. Nagamochi and T. Ibaraki, Algorithmic Aspects of Graph Connectiity. Cambridge Uniersity Press New York, 2008, ol. 23. [4] K. P. Eswaran and R. E. Tarjan, Agmentation problems, SIAM Jornal on Compting, ol., no. 4, pp , 976. [] J. Bang-Jensen, H. N. Gabow, T. Jordán, and Z. Szigeti, Edgeconnectiity agmentation with partition constraints, SIAM Jornal on Discrete Mathematics, ol. 2, no. 2, pp , 999. [6] B. Jackson and T. Jordán, A near optimal algorithm for ertex connectiity agmentation, in International Symposim on Algorithms and Comptation. Springer, 2000, pp [7] Z. Nto, Approximating node-connectiity agmentation problems, Algorithmica, ol. 63, no. -2, pp , 202. [8] A. Frank, Mathematical Programming: State of the Art 994. Ann Arbor, MI: Uniersity of Michigan, 994, ch. Connectiity agmentation problems in network design, pp [9] G. Kortsarz, R. Krathgamer, and J. R. Lee, Hardness of approximation for ertex-connectiity network design problems, SIAM Jornal on Compting, ol. 33, no. 3, pp , [0] K. Bhawalkar, J. Kleinberg, K. Lewi, T. Roghgarden, and A. Sharma, Preenting nraeling in social networks: the anchored k-core problem, SIAM Jornal on Discrete Mathematics, ol. 29, no. 3, 20. [] M. Dzibiński and S. Goyal, Network design and defence, Games and Economic Behaior, ol. 79, pp , 203. [2] K. Menger, Zr allgemeinen krentheorie, Fndamenta Mathematicae, ol. 0, no., pp. 96, 927. [3] O. R. Oellermann, Menger s theorem, in Topics in Strctral Graph Theory, L. W. Beineke and R. J. Wilson, Eds. Cambridge Uniersity Press, 203, pp [4] A.-H. Esfahanian, Connectiity algorithms, in Topics in Strctral Graph Theory, L. W. Beineke and R. J. Wilson, Eds. Cambridge Uniersity Press, 203, pp [] S. Een, Graph Algorithms. Compter Science Press, 979. [6] H. Nagamochi and T. Ibaraki, Compting edge-connectiity in mltigraphs and capacitated graphs, SIAM Jornal on Discrete Mathematics, ol., no., pp. 4 66, 992. [7] D. R. Karger, Minimm cts in near-linear time, Jornal of the ACM, ol. 47, no., pp , [8] S. Gha and S. Khller, Approximation algorithms for connected dominating sets, Algorithmica, ol. 20, no. 4, pp , 998. [9] P.-J. Wan, K. M. Alzobi, and O. Frieder, Distribted constrction of connected dominating set in wireless ad hoc networks, Mobile Networks and Applications, ol. 9, no. 2, pp. 4 49, 2004.
Maximal Cliques in Unit Disk Graphs: Polynomial Approximation
Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,
More informationv e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k
Approximation Algorithms for a Capacitated Network Design Problem R. Hassin 1? and R. Rai 2?? and F. S. Salman 3??? 1 Department of Statistics and Operations Research, Tel-Ai Uniersity, Tel Ai 69978, Israel.
More informationCOMPOSITION OF STABLE SET POLYHEDRA
COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining
More informationFaster Random Walks By Rewiring Online Social Networks On-The-Fly
1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed
More informationMinimal Edge Addition for Network Controllability
This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,
More informationReconstructing Generalized Staircase Polygons with Uniform Step Length
Jornal of Graph Algorithms and Applications http://jgaa.info/ ol. 22, no. 3, pp. 431 459 (2018) DOI: 10.7155/jgaa.00466 Reconstrcting Generalized Staircase Polygons with Uniform Step Length Nodari Sitchinaa
More informationPlanarity-Preserving Clustering and Embedding for Large Planar Graphs
Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD
More informationMobility Control and Its Applications in Mobile Ad Hoc Networks
Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized
More informationPushing squares around
Pshing sqares arond Adrian Dmitresc János Pach Ý Abstract We stdy dynamic self-reconfigration of modlar metamorphic systems. We garantee the feasibility of motion planning in a rectanglar model consisting
More informationFixed-Parameter Algorithms for Cluster Vertex Deletion
Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743
More informationFaster Random Walks By Rewiring Online Social Networks On-The-Fly
Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed
More informationOn Plane Constrained Bounded-Degree Spanners
On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,
More informationVertex Guarding in Weak Visibility Polygons
Vertex Garding in Weak Visibility Polygons Pritam Bhattacharya, Sbir Kmar Ghosh*, Bodhayan Roy School of Technology and Compter Science Tata Institte of Fndamental Research Mmbai 400005, India arxi:1409.46212
More informationChapter 7 TOPOLOGY CONTROL
Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE
More informationOn Plane Constrained Bounded-Degree Spanners
Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:
More informationFriend of My Friend: Network Formation with Two-Hop Benefit
Friend of My Friend: Network Formation with Two-Hop Benefit Elliot Ansheleich, Onkar Bhardwaj, and Michael Usher Rensselaer Polytechnic Institte, Troy NY, USA Abstract. How and why people form ties is
More informationOn shortest-path all-optical networks without wavelength conversion requirements
Research Collection Working Paper On shortest-path all-optical networks withot waelength conersion reqirements Athor(s): Erlebach, Thomas; Stefanakos, Stamatis Pblication Date: 2002 Permanent Link: https://doi.org/10.3929/ethz-a-004446054
More informationAdaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model
International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He
More informationAlliances and Bisection Width for Planar Graphs
Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.
More informationLemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b)
Trees Lemma Let the components of ppose "! be (a) $&%('*)+ - )+ / A tree is a graph which is (b) 0 %(')+ - 3)+ / 6 (a) (a) Connected and (b) has no cycles (acyclic) (b) roof Eery path 8 in which is not
More information5.0 Curve and Surface Theory
5. Cre and Srface Theor 5.1 arametric Representation of Cres Consider the parametric representation of a cre as a ector t: t [t t t] 5.1 The deriatie of sch a ector ealated at t t is gien b t [ t t t ]
More informationA Unified Energy-Efficient Topology for Unicast and Broadcast
A Unified Energy-Efficient Topology for Unicast and Broadcast Xiang-Yang Li Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA xli@cs.iit.ed Wen-Zhan Song School of Eng. & Comp.
More informationLocalized Delaunay Triangulation with Application in Ad Hoc Wireless Networks
1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL
More informationTowards applications based on measuring the orbital angular momentum of light
CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical
More informationOn the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM
ARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM Cecilia Cappellin 1, Peter Meincke 1, Sergey Pinenko 2, Erik Jørgensen 1 1 TICRA, Læderstræde 34, DK-1201 Copenhagen, Denmark 2 DTU Elektro,
More informationThe Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More informationSubgraph Matching with Set Similarity in a Large Graph Database
1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,
More informationMTL 776: Graph Algorithms. B S Panda MZ 194
MTL 776: Graph Algorithms B S Panda MZ 194 bspanda@maths.iitd.ac.in bspanda1@gmail.com Lectre-1: Plan Definitions Types Terminology Sb-graphs Special types of Graphs Representations Graph Isomorphism Definitions
More informationChapter 5. Plane Graphs and the DCEL
Chapter 5 Plane Graphs and the DCEL So far we hae been talking abot geometric strctres sch as trianglations of polygons and arrangements of line segments withot paying mch attention to how to represent
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationTri-Edge-Connectivity Augmentation for Planar Straight Line Graphs
Tri-Edge-Connectivity Agmentation for Planar Straight Line Graphs Marwan Al-Jbeh 1, Mashhood Ishaqe 1, Kristóf Rédei 1, Diane L. Sovaine 1, and Csaba D. Tóth 1,2 1 Department of Compter Science, Tfts University,
More informationDesign and Optimization of Multi-Faceted Reflectarrays for Satellite Applications
Design and Optimization of Mlti-Faceted Reflectarrays for Satellite Applications Min Zho, Stig B. Sørensen, Peter Meincke, and Erik Jørgensen TICRA, Copenhagen, Denmark ticra@ticra.com Abstract The design
More informationPrimary and Derived Variables with the Same Accuracy in Interval Finite Elements
Primary and Deried Variables with the Same Accracy in Interal inite Elements M. V. Rama Rao R. L. Mllen 2 and R. L. Mhanna 3 Vasai College of Engineering Hyderabad - 5 3 INDIA dr.mrr@gmail.com 2 Case Western
More informationMultiple Source Shortest Paths in a Genus g Graph
Mltiple Sorce Shortest Paths in a Gens g Graph Sergio Cabello Erin W. Chambers Abstract We gie an O(g n log n) algorithm to represent the shortest path tree from all the ertices on a single specified face
More informationMobility Control and Its Applications in Mobile Ad Hoc Networks
Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication
More informationAvailable online: 25 Oct To link to this article:
This article was downloaded by: [Whan Uniersity] On: 5 Febrary 202, At: 9:06 Pblisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Nmber: 072954 Registered office: Mortimer
More informationComplete Information Pursuit Evasion in Polygonal Environments
Complete Information Prsit Easion in Polygonal Enironments Kyle Klein and Sbhash Sri Department of Compter Science Uniersity of California Santa Barbara, CA 9306 Abstract Sppose an npredictable eader is
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More informationAugmenting the edge connectivity of planar straight line graphs to three
Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight
More informationNon-convex Representations of Graphs
Non-conex Representations of Graphs Giseppe Di Battista, Fabrizio Frati, and Marizio Patrignani Dip. di Informatica e Atomazione Roma Tre Uniersity Abstract. We sho that eery plane graph admits a planar
More informationMathematical model for storing and effective processing of directed graphs in semistructured data management systems
Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass
More informationRectangle-of-influence triangulations
CCCG 2016, Vancoer, British Colmbia, Ag 3 5, 2016 Rectangle-of-inflence trianglations Therese Biedl Anna Lbi Saeed Mehrabi Sander Verdonschot 1 Backgrond The concept of rectangle-of-inflence (RI) draings
More informationConstraint-Driven Communication Synthesis
Constraint-Drien Commnication Synthesis Alessandro Pinto Goqiang Wang Lca P. Carloni Abstract Constraint-drien Commnication Synthesis enables the atomatic design of the commnication architectre of a complex
More informationcircuit simulation NP-complete? backward retiming forward retiming f(x)
Optimal FPGA Mapping and Retiming with Ecient Initial State Comptation Jason Cong and Chang W Department of Compter Science Uniersity of California, Los Angeles, CA 995 Abstract For seqential circits with
More informationRepresenting a Cubic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions
Representing a Cbic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions ABSTRACT Abhijin Adiga Network Dynamics and Simlation Science Laboratory Virginia Bioinformatics Institte,
More informationarxiv: v4 [cs.ds] 29 Jul 2015
Efficient Farthest-Point Qeries in Two-Terminal Series-Parallel Networks Carsten Grimm 1, 1 Otto-on-Gericke-Uniersität Magdebrg, Magdebrg, Germany Carleton Uniersity, Ottawa, Ontario, Canada arxi:1503.017064
More informationCutting Cycles of Rods in Space: Hardness and Approximation
Ctting Cycles of Rods in Space: Hardness and pproximation oris rono ark de erg Chris Gray Elena mford bstract We stdy the problem of ctting a set of rods (line segments in R 3 ) into fragments, sing a
More informationWeek 9-10: Connectivity
Week 9-0: Connectiity October 3, 206 Vertex Connectiity Let G = (V, E) be a graph. Gien two ertices x, y V. Two (x, y)-path are said to be internally disjoint if they hae no internal ertices in common.
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More informationMinimum Spanning Trees Outline: MST
Minimm Spanning Trees Otline: MST Minimm Spanning Tree Generic MST Algorithm Krskal s Algorithm (Edge Based) Prim s Algorithm (Vertex Based) Spanning Tree A spanning tree of G is a sbgraph which is tree
More informationObject Pose from a Single Image
Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the
More informationAssigning AS Relationships to Satisfy the Gao-Rexford Conditions
Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Lca Cittadini, Giseppe Di Battista, Thomas Erlebach, Marizio Patrignani, and Massimo Rimondini Dept. of Compter Science and Atomation, Roma
More informationReal-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance
POSTPRINT OF: IEEE TRANS. SYST., MAN, CYBERN., B, 383), 28, 884 893. 1 Real-Time Robot Path Planning ia a Distance-Propagating Dynamic System with Obstacle Clearance Allan R. Willms, Simon X. Yang Member,
More informationAn Extended Fault-Tolerant Link-State Routing Protocol in the Internet
An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton,
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More informationDiscrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods
Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX
More informationCombinatorial and Geometric Properties of Planar Laman Graphs
Combinatorial and Geometric Properties of Planar Laman Graphs Stephen Koboro 1, Torsten Ueckerdt 2, and Kein Verbeek 3 1 Department of Compter Science, Uniersity of Arizona 2 Department of Applied Mathematics,
More information3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH
3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH Pablo d Angelo and Christian Wöhler DaimlerChrysler Research and Technology, Machine Perception
More informationCohesive Subgraph Mining on Attributed Graph
Cohesive Sbgraph Mining on Attribted Graph Fan Zhang, Ying Zhang, L Qin, Wenjie Zhang, Xemin Lin QCIS, University of Technology, Sydney, University of New Soth Wales fanzhang.cs@gmail.com, {Ying.Zhang,
More informationABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS
Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining
More informationTriple Connected Complementary Tree Domination Number of a Graph
International Mathematical Form, Vol. 8, 2013, no. 14, 659-670 HIKARI Ltd, www.m-hikari.com Triple Connected Complementar Tree Domination Nmber of a Graph G. Mahadevan 1, Selvam Avadaappan 2, N. Ramesh
More informationTriangle Contact Representations
Triangle Contact Representations Stean Felsner elsner@math.t-berlin.de Technische Uniersität Berlin, Institt ür Mathematik Strasse des 7. Jni 36, 0623 Berlin, Germany Abstract. It is conjectred that eery
More informationChapter 5 Network Layer
Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,
More informationImage Compression Compression Fundamentals
Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers
More informationBlind Compressive Sensing Framework for Collaborative Filtering
Blind Compressie Sensing ramewor for Collaboratie iltering Anpriya Gogna ECE Department III-Delhi Delhi, INDIA anpriyag@iiitd.ac.in Angshl Majmdar ECE Department III-Delhi Delhi, INDIA angshl@iiitd.ac.in
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationh-vectors of PS ear-decomposable graphs
h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,
More informationUPWARD PLANAR DRAWING OF SINGLE SOURCE ACYCLIC DIGRAPHS. MICHAEL D. HUTTON y AND ANNA LUBIW z
UPWARD PLANAR DRAWING OF SINGLE SOURCE ACYCLIC DIGRAPHS MICHAEL D. HUTTON y AND ANNA LUBIW z Abstract. An pward plane drawing of a directed acyclic graph is a plane drawing of the digraph in which each
More informationDynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un
Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark
More informationOn Bichromatic Triangle Game
On Bichromatic Triangle Game Gordana Manić Daniel M. Martin Miloš Stojakoić Agst 16, 2012 Abstract We stdy a combinatorial game called Bichromatic Triangle Game, defined as follows. Two players R and B
More informationarxiv: v1 [cs.cg] 27 Nov 2015
On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca
More informationImage Restoration Image Degradation and Restoration
Image Degradation and Restoration hxy Image Degradation Model: Spatial domain representation can be modeled by: g x y h x y f x y x y Freqency domain representation can be modeled by: G F N Prepared By:
More informationDirect Trimming of NURBS Surfaces on the GPU
Direct Trimming of NURBS Srfaces on the GPU Andre Schollmeyer Bernd Fro hlich Bahas-Uniersita t Weimar Abstract This paper presents a highly efficient direct trimming techniqe for NURBS srfaces, which
More information[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional
Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,
More informationarxiv: v1 [cs.cg] 31 Aug 2017
Lombardi Drawings of Knots and Links Philipp Kindermann 1, Stephen Koboro 2, Maarten Löffler 3, Martin Nöllenbrg 4, André Schlz 1, and Birgit Vogtenhber 5 arxi:1708.098191 [cs.cg] 31 Ag 2017 1 FernUniersität
More informationPARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT
PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies
More informationarxiv: v1 [cs.si] 27 Nov 2018
Flexible Attribted Network Embedding arxi:8.0789 [cs.si] 27 No 208 Enya Shen Tsingha Uniersity, China shenenya@tsingha.ed.cn Changqing Zo Uniersity of Maryland, College Park, US aaronzo25@gmail.com Abstract
More informationVisibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks
Athor manscript, pblished in "INFOCOM 2009 (2009)" Visibility-Graph-based Shortest-Path Geographic Roting in Sensor Networks Gang Tan Marin Bertier Anne-Marie Kermarrec INRIA/IRISA, Rennes, France. Email:
More informationp-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram
p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram Istanbl Technical University, Department of Electronics and Telecommnications Engineering, Istanbl, Trkey ABSTRACT We consider the imization
More informationAnalytical Solution of Kinematic Response of Batter Pile under P and SV Waves Earthquake
7 th SASTech 013, ran, Bandar-Abbas. 7-8 March, 013. Organized by Khaaran nstitte of igher Edcation Analytical Soltion of Kinematic Response of Batter ile nder and S Waes Earthqake M. Ghazai 1,. Raanshenas
More informationSTABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION
STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH
More informationAuthors. Tamilnadu, India 2.
International Jornal of Emerging Trends in Science and Technology Impact Factor: 2.838 DOI: http://dx.doi.org/10.18535/ijetst/3i03.04 Irredndant Complete Domination Nmber of Graphs Athors A.Nellai Mrgan
More informationHardware-Accelerated Free-Form Deformation
Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric
More informationarxiv: v1 [cs.cg] 12 Dec 2013
Smooth Orthogonal Drawings of Planar Graphs Md. Jawaherl Alam, Michael A. Bekos, Michael Kafmann, Philipp Kindermann, Stephen G. Koboro, and Alexander Wolff arxi:.58 [cs.cg] Dec 0 Department of Compter
More informationSelect-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks
Select-and-Protest-based Beaconless Georoting ith Garanteed Deliery in Wireless Sensor Netorks Hanna Kalosha, Amiya Nayak, Stefan Rührp, Ian Stojmenoić School of Information Technology and Engineering
More informationConstructing Multiple Light Multicast Trees in WDM Optical Networks
Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting
More informationDiscretized Approximations for POMDP with Average Cost
Discretized Approximations for POMDP with Average Cost Hizhen Y Lab for Information and Decisions EECS Dept., MIT Cambridge, MA 0239 Dimitri P. Bertsekas Lab for Information and Decisions EECS Dept., MIT
More informationToday. B-splines. B-splines. B-splines. Computergrafik. Curves NURBS Surfaces. Bilinear patch Bicubic Bézier patch Advanced surface modeling
Comptergrafik Matthias Zwicker Uniersität Bern Herbst 29 Cres Srfaces Parametric srfaces Bicbic Bézier patch Adanced srface modeling Piecewise Bézier cres Each segment spans for control points Each segment
More informationResolving Linkage Anomalies in Extracted Software System Models
Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program
More informationRevisiting Connected Dominating Sets: An Optimal Local Algorithm?
Reisiting Connected Dominating Sets: An Otimal Local Algorithm? Samir Khller Deartment of Comter Science Uniersity of Maryland College Park, MD 0740, USA Email: samir@md.ed Sheng Yang Deartment of Comter
More informationA Robust Video Watermarking Scheme using DWT and DCT Aditi Agarwal 1, Ruchika Bhadana 2 and Satishkumar Chavan 3
A Robst Video Watermarking Scheme sing DWT and DCT Aditi Agarwal 1, Rchika Bhadana and Satishkmar Chaan 3 1, Department of Compter Engineering, 3 Department of Electronics & Telecommnication Engineering,
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationEfficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling
More informationECE250: Algorithms and Data Structures Single Source Shortest Paths Dijkstra s Algorithm
ECE0: Algorithms and Data Strctres Single Sorce Shortest Paths Dijkstra s Algorithm Ladan Tahildari, PEng, SMIEEE Associate Professor Software Technologies Applied Research (STAR) Grop Dept. of Elect.
More informationMaximum Weight Independent Sets in an Infinite Plane
Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking
More informationFINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES
FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion
More informationBias of Higher Order Predictive Interpolation for Sub-pixel Registration
Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz
More informationQueries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti
Qeries Inf B: Ranking Qeries on the WWW Kyriakos Kalorkoti School of Informatics Uniersity of Edinbrgh Sppose e hae an Inerted Index for a set of ebpages. Disclaimer I Not really the scenario of Lectre.
More informationDigital Image Processing Chapter 5: Image Restoration
Digital Image Processing Chapter 5: Image Restoration Concept of Image Restoration Image restoration is to restore a degraded image back to the original image while image enhancement is to maniplate the
More information