Improving Network Connectivity Using Trusted Nodes and Edges

Size: px
Start display at page:

Download "Improving Network Connectivity Using Trusted Nodes and Edges"

Transcription

1 Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon of any networked system. A high connectiity is often desired within networks; for instance to increase robstness to failres, and resilience against attacks. A typical approach to increasing network connectiity is to strategically add links; howeer adding links is not always the most sitable option. In this paper, we propose an alternatie approach to improing network connectiity, that is by making a small sbset of nodes and edges trsted, which means that sch nodes and edges remain intact at all times and are inssceptible to failres. We then show that by controlling the nmber of trsted nodes and edges, any desired leel of network connectiity can be obtained. Along with characterizing network connectiity with trsted nodes and edges, we present heristics to compte a small nmber of sch nodes and edges. Finally, we illstrate or reslts on arios networks. I. INTRODUCTION Connectedness among arios components is a central theme and a characteristic phenomenon in any networked system. It signifies a large nmber of other network attribtes, sch as network reliability, robstness to failres, resilience against attacks, and other strctral properties of the network. As a reslt many notions defining connectedness hae been proposed. In particlar, network connectiity in terms of ertex and edge connectiities are one of the most widely considered concepts with significant ramifications. In essence, network connectiity captres the ability of the network to retain a connection between any two nodes nder a certain nmber of node or edge failres. A higher network connectiity is desirable in general to ensre that any two nodes remain connected een nder a large nmber of node or edge failres. Not only for strctral robstness, highly connected networks are more sitable to achiee arios other network objecties sch as information spread, resilient consenss [], and sriable network designs nder node or edge failres [2]. Network connectiity can be improed by strategically adding links (edges) between nodes, i.e., by incorporating redndancy, a techniqe commonly referred to as the connectiity agmentation [3], [4]. Althogh effectie, improing network connectiity by adding edges is not always practical de to economic and feasibility isses. Moreoer, adding more links also increases the attack srface for the potential attackers to case edge failres. These concerns inspire s to deise an alternatie strategy to improe network connectiity. Here, we propose an alternatie approach that does not inole strategic addition of edges or links to improe network connectiity. The basic idea is to ensre the aailability and operational integrity of a ery small sbset of nodes and edges at all times by protecting them from failres/attacks. We call sch a sbset of nodes and edges trsted. They correspond to the network components that are more reliable owing to more resorces and higher secrity measres. For instance, in terms of protection against physical attacks, defense mechanisms against jamming, protected memory, and sophisticated athentication mechanisms. We then show that the oerall network connectiity is significantly improed by making a ery small sbset of nodes and edges trsted, een if the original network is sparse. Moreoer, by controlling the nmber of trsted nodes, any desired leel of connectiity cold be obtained. Ths, instead of the idea of redndancy to improe connectiity, we exploit the notion of reliability (trstedness) of a small sbnetwork to improe connectiity. Or main contribtions are as follows: ) We propose and characterize the notion of network connectiity sing trsted nodes and edges, and show that network connectiity can be significantly improed by selecting a small sbset of trsted nodes or edges. 2) We proide ways to compte network connectiity in the presence of trsted nodes and edges, and also gie heristics to select the minimm set of trsted nodes and edges to achiee any desired ale of network connectiity. 3) Finally, we ealate or reslts nmerically on arios networks inclding Erdős-Rényi, preferential attachment, and random geometric networks. The problems related to adding the minimm nmber of edges to attain the desired network connectiity are referred to as the connectiity agmentation problems. The isse was inestigated in detail for the first time in [4]. Since then, new techniqes hae been deeloped to optimally increase the ertex and edge connectiities (e.g., [], [6], [7]). For a comprehensie list of papers in the area, we refer readers to an earlier srey by Frank [8] and Chapter 8 in a more recent work of Nagamochi and Ibaraki [3]. A closely related field is the area of sriable network design, in which the basic premise is to design and analyze algorithms that exploit strctral properties of the network to make them srie nder failre of network components (e.g., [2], [9]). To improe strctral properties of networks, adding protected resorces or defending a sbset of network components has been a sefl approach. Similar to trsted nodes, the notion of anchor nodes was sed in [0] in the context of maximizing the size of a special strctre, known as the k-core, in graphs. In a recent work, Dzibiński and Goyal [] explore trade-offs between the cost of adding links and defending nodes against attacks for network connectiity. II. PRELIMINARIES Let G(V, E) be an ndirected graph with a ertex set V and edge set E. An edge between ertices and is denoted by

2 U, and ertices and are called neighbors of each other. The neighborhood of a ertex, denoted by N, is the set of all neighbors of. The neighborhood of a sbset of ertices U V is N U = N. A path P of length n is a nonempty graph with the ertex set V = { 0, 2,, n }, and the edge set { 0, 2,, n n }. The ertices 0 and n are the end ertices, whereas, all remaining ertices are the inner ertices of the path. In a graph G, two paths are ertex-independent if they do not hae any common inner ertex. Similarly, two paths are edge-independent if they do not hae any common edge. We se the terms ertex and node interchangeably throghot the paper. If W is a sbset of ertices (edges), then G \ W is the sbgraph indced by the remaining ertices and edges of G. If G \ W has at least two components, then W separates G. Similarly, if and belong to two different components, then W separates and. Sch a set W is referred to as the ertex ct (edge ct). Next, we state the definitions of ertex and edge connectiity. A graph is k-ertex connected if there does not exist a set of k ertices whose remoal disconnects the graph. Likewise, the graph is k-edge connected if there is no sbset of k edges whose remoal disconnects the graph. Vertex connectiity of G, denoted by κ(g), is the maximm ale of k for which G is k-ertex connected. Similarly, the maximm ale of k for which G is k-edge connected is the edge connectiity of G, denoted by λ(g). The ertex connectiity of a complete graph with n nodes is defined to be n althogh no ertex ct exists. A classical theorem of Menger relates the notion of connectiity to the nmber of ertex and edge-independent paths between any two nodes. Theorem 2.: (Menger s theorem [2]) - Let and be distinct, non-adjacent ertices of G. The minimm size of a ertex ct separating and is eqal to the maximm nmber of ertex-independent paths between and. - Let and be distinct ertices of G. The minimm size of an edge ct that separates and is eqal to the maximm nmber of edge-independent paths between and. As a conseqence, for any k 2, a graph is k-ertex connected (k-edge connected) if and only if any two ertices hae k ertex-independent (k edge-independent) paths between them. Seeral ersions and proofs of this fndamental reslts hae been reported (e.g., see [3]). III. CONNECTIVITY WITH TRUSTED NODES AND EDGES In the traditional k-ertex (k-edge) connectiity notion, the idea is to ensre that the graph remains connected if any k nodes (k edges) are remoed from the network. By adding more edges between nodes, the ertex and edge connectiities can be improed. Howeer, if we fix a small sbset of nodes (edges) sch that they cannot be remoed from the network, then the minimm nmber of nodes (edges) from the remaining set that are reqired to disconnect the network also increases. Ths, instead of adding more edges or links, we get an alternatie way to improe network connectiity. A merit of this approach is that by making only a ery small fraction of the oerall nodes (edges) inssceptible to remoals, or as we call trsted, the oerall node (edge) connectiity can be significantly improed. In practice, trstedness can be achieed by making sch components more resorcefl and highly secre against physical attacks, tampering, and malicios intrsions throgh sophisticated secrity mechanisms. Next, we define the new notion of connectiity as follows: Definition (k-vertex Connected with T ) An ndirected graph G(V, E) is said to be k-ertex connected with T V, if there does not exist a set of fewer than k ertices in V \ T whose remoal disconnects the graph. The maximm ale of k for which the graph is k-ertex connected with T is denoted by κ T (G) and is referred to as the ertexconnectiity with T. Similarly, we can define the k-edge connectiity with trsted edges T e. Definition (k-edge Connected with T e ) For a gien T e E, G(V, E) is said to be k-edge connected with T e, if there does not exist a set of fewer than k edges in E \ T e whose remoal disconnects the graph. The maximm ale of k for which the graph is k-edge connected with T e is called the edge-connectiity with T e, and is denoted by λ T (G). Analogos to the node-independent paths, we define the notion of node-independent paths with T as follows: If T is the set of trsted nodes, then two paths are node-independent with T if the common inner ertices are only the trsted nodes. Similarly, for a gien set of trsted edges T e, two paths are edge-independent with T e if their common edges are only the trsted edges. For instance, in Figre (a), paths { 2, 2 x, x 3 } and { 2, 2 x, x 3 } are nodeindependent with T = {x}, and paths { 2, 2 x, xy, y 3 } and { 2, 2 x, xy, y 3 } in Figre (b) are edge-independent with T e = {xy}. 2 2 (a) x x y Fig.. (a) Node-independent paths with T. (b) Edge-independent paths with T e. A path with all trsted nodes (edges) is referred to as the node-trsted (edge-trsted) path. If for any pair of nodes, there exists a node trsted path between them, then G is referred to as completely ertex-connected with T. Similarly, G is completely edge-connected with T e if there exists an edge-trsted path between any two nodes. If a graph is completely ertex connected with T, we define its κ T =, and if the graph is completely edge-connected with T e, then we define its λ T =. 2 (b) 3 3

3 A. Vertex Connectiity with Trsted Nodes T Next, we compte and relate ertex connectiity with trsted nodes to the traditional notion of ertex connectiity. Let G (V, E ) be a graph obtained from G(V, E) as follows: for eery non-adjacent pair of nodes and, if there exists a trsted node, or a node-trsted path between them, then add an edge {}. An example is shown in Figre 2, where {,, z} is the set of trsted nodes in G. Since nodes and indce a node-trsted path in G, all neighbors of and are pair-wise adjacent in G. Similarly, neighbors of trsted node z are adjacent in G. z G G Fig. 2. G with the set of trsted nodes {,, z} and the reslting G. Proposition 3.: Let G(V, E) be a graph that is not completely ertex connected with T, then κ T (G) = κ(g ). Proof: Let κ T (G) = k. If nodes and are connected trogh a node-trsted path in G, then and are adjacent in G. Ths, if there is no sbset of k non-trsted nodes in G whose remoal disconnects the graph, then there is no sbset of any k nodes in G whose remoal disconnects G. Similarly, we obsere that eery ertex-ct in G consisting of only non-trsted nodes is also a ertex-ct in G. A direct conseqence of the aboe proposition and Theorem 2. is the following Menger s type reslt. Corollary 3.2: For a graph G(V, E) and T V, the following statements are eqialent: ) G is k-ertex connected with T. 2) For any two distinct, non-adjacent ertices, V; either there exists a node-trsted path between and, or there exists at least k paths between and that are ertex-independent with T. As an example, consider the 2-ertex connected graph in Figre 3(a), which becomes 4-ertex connected with two trsted nodes T = {6, 0} as shown in Figre 3(b) (a) (b) (c) Fig. 3. (a) Graph is 2-ertex and 2-edge connected. (b) The graph becomes 4-ertex connected with T = {6, 0}. Between nodes and 9, there are for ertex-independent paths with T, shown in red, ble, green and yellow. (c) The graph is 3-edge connected with T e = {4}. Three edge-independent paths with T e between nodes and 9 are highlighted To compte the ertex connectiity of G with T, we first obtain G as aboe, and then can se any algorithm to z compte the ertex connectiity of G. There is an extensie literatre on sch algorithms [4]. A typical approach is to tilize the max-flow-min-ct theorem (e.g., see [3]). The idea is to compte the local ertex connectiity between any two non-adjacent nodes s, t V in G, which is the minimm nmber of nodes that need to be remoed to disconnect s and t. The local ertex connectiity is eqal to the maximm flow between s and t in a particlar directed network H G obtained from G (e.g., see []). The ertex connectiity of G, and hence the ertex connectiity of G with T, is simply the minimm of the local ertex connectiities between any two non-adjacent nodes in G. The directed network H G reqired to compte local ertex connectiity between non-adjacent nodes s and t is obtained from G as follows []: For each ndirected edge, create two directed edges; one from to, and the other from to. Remoe all edges incoming to s and otgoing from t. For each node V \ {s, t}, create two nodes i and o, and add a directed edge from i to o. Next, make all incoming edges to as the incoming edges to i, and make all edges leaing from as the otgoing edges from o. Finally, assign a nit weight (capacity) to each directed edge and compte the maximm flow between s and t. In smmary, to compte the ertex connectiity of G with a gien T, following steps are performed, G G s,t V H G max flow(s,t). () κ T (G) is the minimm of the maximm flow between any two non-adjacent nodes s, t in G. In fact, the ertex connectiity of G with T can be compted by directly obtaining a directed network H G from G as described aboe. In other words, the G G transformation in () can be aoided. The only difference in the constrction of H G from aboe wold be that the edge weights (capacities) of all the edges incoming to and otgoing from the nodes corresponding to the trsted nodes in G wold be infinite (i.e., ery large), rather than one. The edge weights of all other edges wold remain to be one. To compte the ertex connectiity with T, maximm flow between all non adjacent nodes in G is then compted oer H G. An example is shown in Figre 4. s G s i o z t z i z o H G o i Fig. 4. For a gien G, T = {}, and non-adjacent nodes s, t, the constrction of a directed network H G B. Edge Connectiity with Trsted Edges T e Here, we discss the case of edge-connectiity with trsted edges, and ways to compte it. Let G(V, E) be a graph with t

4 trsted edges T e E, then we define G(Ṽ, Ẽ) be the graph obtained by identifying the end nodes of each trsted edge. Here, identifying two nodes, say and 2, means replacing them by a single node sch that an edge exists between some node x and in the new graph if and only if an edge exists between x and or between x and 2 in the original graph. We obtain G from G by identifying the end nodes of all trsted edges one by one. Note that G might hae mltiple edges between nodes, and hence G is a mltigraph. All self loops are ignored. An example is illstrated in Figre. 2 G 2 Fig.. The end nodes of trsted edges { 2 } and { 2 } in G are identified as and respectiely into G. We obsere that edge-trsted paths exist between nodes in G that are identified as a single node in G. Ths, if Ṽ =, it implies that G is completely edge-connected with T e. Since the end nodes of all trsted edges are identified in G, ths, if there is no set of k non-trsted edges that disconnects G, then there is no set of any k edges in G whose remoal disconnects G. Similarly, it is easy to obsere that any edgect of size k in G is also an edge-ct in G. Ths, we get the following: Proposition 3.3: Let G(V, E) be a graph that is not completely edge-connected with T e, then λ T (G) = λ( G). Gien a mltigraph G, if we replace each (edge in a) mltiple edge by a path of length two, then there is a one-toone relation between the paths in G and the reslting graph. Ths, the reslt in the Menger s theorem is immediately applicable to the reslting graph. We can state the following. Proposition 3.4: The edge-ersion of the Menger s theorem holds for mltigraphs. As a reslt, for the notion of edge connectiity with T e, the following Menger s type reslt is directly obtained. Corollary 3.: For a graph G(V, E) and T e E, the following statements are eqialent: ) G is k-edge connected with T e. 2) For any two distinct ertices and in G; either there exists an edge-trsted path between them, or there are at least k paths between them that are edgeindependent with T e. As an example, consider the 2-edge connected graph in Figre 3(a), which becomes 3-edge connected with a single trsted edge as shown in Figre 3(c). To compte the edge connectiity of G with T e, we can first obtain the mltigraph G and can then compte the edge connectiity of G sing known methods, for instance [3], [6], [7]. At the same time, as with the ertex connectiity with T, we can directly compte the edge connectiity of G with T e by first obtaining a directed graph D G with appropriate edge weights. D G is obtained from G by replacing each G ndirected edge in G by two directed edges, one from to and the other from to. All the directed edges corresponding to the trsted edges in G are assigned infinite weights (capacities), whereas all remaining directed edges are assigned nit weight. The edge connectiity of G with T e is simply the minimm of the maximm flow between any two nodes in D G. It is sfficient to compte the minimm of the maximm flow between a fixed node (randomly picked) and all other nodes [4]. IV. COMPUTING TRUSTED NODES AND EDGES In this section, we present heristics to select minimm set of trsted nodes T (trsted edges T e ) to achiee the desired ertex connectiity with T (edge connectiity with T e ). A. Problem Complexity First, we show that finding a minimm set of trsted nodes achieing a certain connectiity is a comptationally hard problem. We begin by formlating this as a decision problem. Definition (Trsted Node-Connectiity Agmentation Problem (TNCAP)) Gien a graph G(V, E), a desired connectiity k, and the nmber of trsted nodes T, determine if there exists a set of trsted nodes T of cardinality T sch that G is k -connected with T. Theorem 4.: TNCAP is NP-hard. We show that TNCAP is NP-hard sing a redction from a well-known NP-hard problem, the Set Coer Problem (SCP). Set Coer Problem (SCP) Gien a base set U, a family F of sbsets of U, and a threshold size t, determine if there exists a sbfamily C F of cardinality t whose nion is U. Proof: Gien an instance of SCP, we constrct an instance of TNCAP as follows: For each element U, create a node. Similarly, for each member F of the family F, create a node F. For each U and F F, create an edge (, F ) if F. For each F, F 2 F, F F 2, create an edge (F, F 2 ). Let nmber of trsted nodes be T = t, and let the desired connectiity be k = F. It is clear that the redction can be performed in polynomial time. As a conseqence, we only need to show that TNCAP has a soltion if and only if SCP does. First, let s sppose that there exists a set coer C of cardinality t. Then, let the set of trsted nodes be T = C. Since C is a set coer of U, eery node corresponding to an element of U is connected to a trsted node in T. Frther, eery node corresponding to a member of F \ C is also connected to a trsted node in T, and the trsted nodes are connected to each other. Conseqently, G cannot be separated by the remoal of any set of non-trsted nodes, which proes that T = C is a soltion for TNCAP. Second, let s sppose that there does not exist a set coer of cardinality t. Now, we will show that the graph G cannot be k -connected with any set of trsted nodes T of cardinality T = t. Let T be an arbitrary set of trsted

5 nodes of cardinality T, and consider the remoal of all non-trsted nodes corresponding to members of F. Since T F cannot be a set coer de to or spposition, there exists an element U that is connected only to nontrsted nodes. Conseqently, the remoal of the non-trsted nodes corresponding to members of F separates from the remainder of the graph, which proes that T cannot be a soltion for TNCAP. B. Heristics In a graph, complete connectiity with T is obtained wheneer any two nodes are connected throgh a nodetrsted path between them. A node trsted path exists between any pair of nodes if and only if T is a connected dominating set, which is defined as Definition (Connected Dominating Set) In a graph G(V, E), a sbset of nodes Γ V is a connected dominating set if and only if (i) for eery V, either Γ, or is adjacent to some Γ, and (ii) the nodes in Γ indce a connected sbgraph in G. The cardinality of the smallest connected dominating set is known as the connected domination nmber, denoted by γ G. For any k, the minimm size of trsted nodes reqired to achiee desired k-connectiity with T is bonded by γ G, T γ G. (2) Ths, starting with a T = Γ, we can iteratiely redce the size of T to get a minimal set of trsted nodes with which the graph remains k-ertex connected with T. The notion of connected dominating set in graphs has been extensiely stdied in both graph theory and sensor network literatre (e.g., see [8], [9]), wherein a wide ariety of applications along with arios distribted algorithms for constrcting small sized connected dominating sets hae been reported. Let V Conn Trst(G, T ) be the procedre to determine the ertex connectiity with a gien T, as otlined in Section III-A, and Conn Dom Set(G) be the procedre to determine the minimal connected dominating set. Then, a minimal T reqired to achiee the desired ertex connectiity k with trsted nodes can be obtained sing Algorithm gien below. Starting with a T = Γ, in each iteration, a node is remoed if the reslting connectiity is at least eqal to the desired ertex connectiity with T. Note that in Algorithm, O( Γ ) calls are made to the sb-rotine that comptes ertex connectiity with trsted nodes. Next, we present a heristic to compte a minimal set of trsted edges T e to achiee the desired edge connectiity with T e. As with the ertex connectiity case, complete edge connectiity with T e is obtained if and only if there exists an edge-trsted path between eery pair of nodes, which is tre if T e consists of edges in a spanning tree. Ths, to achiee complete edge connectiity with T e, we need T e = n, where n is the nmber of nodes in G. At the same time, we get an pper bond on the minimm size of T e to achiee desired k-edge connectiity with trsted edges for any k, Algorithm Trsted Nodes for Vertex Connectiity : Inpt: G(V, E), k 2: Otpt: T V 3: Γ Conn Dom Set(G) 4: T Γ : for i = to Γ do 6: V Conn Trst(G, T \ {Γ(i)}) 7: if k do 8: T T \ {Γ(i)} 9: end if 0: end for T e n. (3) Ths, to obtain a minimal T e to achiee desired edge connectiity with trsted edges, say k, we start with a T e consisting of edges in a spanning tree, and then iteratiely redce the size of T e. If E Conn Trst(G, T e ) is the rotine to compte edge-connectiity with T e, as discssed in Section III-B, and Min Span Tree(G) comptes edges in a spanning tree, then Algorithm 2 comptes a minimal T e to achiee the desired edge connectiity with trsted edges. Algorithm 2 Trsted Edges for Edge Connectiity : Inpt: G(V, E), k 2: Otpt: T e E 3: E Min Span Tree(G) 4: T e E : for i = to E do 6: e E Conn Trst(G, T e \ {E (i)}) 7: if e k do 8: T e T e \ {E (i)} 9: end if 0: end for If n is the nmber of nodes in the graph, then, in Algorithm 2, O(n) calls are made to the rotine that comptes edge connectiity with trsted edges. Next, we present a nmerical ealation of both the algorithms. V. NUMERICAL EVALUATION We ealate or reslts for three different types networks, inclding Preferential attachment networks, Erdős-Rényi networks, and Random geometric networks. These network are freqently sed to model arios networking phenomenon existing in natre and also for arios engineering applications. The details of networks considered for or simlations are stated below. - Preferential attachment (PA) networks with n = 00 nodes obtained by adding a node to an existing network one at a time. Each new node is connected to m = 3 existing nodes with the probability proportional to the degree of the nodes.

6 - Erdős-Rényi (ER) networks consisting of n = 00 nodes in which the probability of an edge between any two nodes is p = Random geometric (RG) networks consisting of n = 00 nodes that are distribted niformly at random in the nit area. An edge exists between any two nodes if the Eclidean distance between them is at most 0.8. Eery single point in the plots in Figres 6 (a) and (b) is an aerage of thirty randomly generated instances. The minimm nmber of trsted nodes (compted by the Algorithm ) sfficient to achiee the desired ertex connectiity with T, and the minimm nmber of trsted edges (compted by the Algorithm 2) sfficient to achiee the desired edge connectiity with T e, are plotted in Figres 6 (a) and (b) respectiely. In the case of the preferential attachment networks, the ertex connectiity with no trsted nodes is 3. To increase the ertex connectiity from 3 to 4, we obsere a big jmp in T, which is almost eqal to the size of the minimm connected dominating set. In the case of or preferential attachment networks, ertex connectiity with T is exhibited as an all-or-nothing type phenomenon, i.e., to increase the ertex connectiity een by one, the nmber of trsted nodes needed are sfficient to make the network completely ertex connected with T. Howeer, in the cases of Erdős-Rényi and random geometric networks, we obsere rather a continos increase in T. The plot of T is plateaed once T is eqal to the size of the connected dominating set. Similar patterns are obsered in the cases of edge connectiity with trsted edges. In the case of preferential attachment networks considered, to increase the edge connectiity from 3 to 4, the nmber of trsted edges needed increases from 0 to almost n/2. For the cases of Erdős- Rényi and random geometric networks, T e increases in a more continos manner to achiee higher ales of edge connectiity with T e. T PA PA ER 20 ER RG RG Vertex connectiity with T Edge connectiity with (a) Fig. 6. (a) Nmber of trsted nodes T as a fnction of the ertex connectiity with trsted nodes. (b) Nmber of trsted edges T e as a fnction of the edge connectiity with trsted edges. Te VI. CONCLUSIONS A typical approach to improing network connectiity is to add links in a strategic manner. We adapted a different approach to achiee any desired ale of ertex and edge connectiity. The basic idea was to make a small sbset (b) T e of nodes and edges trsted, i.e., inssceptible to failres. We then showed that existence of sch nodes and edges has an effect of haing a higher network connectiity. We also presented heristics to select a small sbset of trsted nodes and edges to achiee any desired ale of network connectiity. Using this approach, een the sparse networks can be made highly connected withot adding edges. As opposed to traditional way of improing connectiity by redndancy, or approach relies on making a portion of network more reliable and trsted, and thereby, achieing the desired connectiity. In ftre, we aim to combine both approaches to deise a more efficient strategy to improe connectiity. Moreoer, we wold like to generalize the notion of trstedness in the context of practical networks. ACKNOWLEDGMENTS This work was spported in part by the National Science Fondation (CNS-23899) and by the Air Force Research Laboratory (FA ). REFERENCES [] F. Pasqaletti, A. Bicchi, and F. Bllo, Consenss comptation in nreliable networks: A system theoretic approach, IEEE Transactions on Atomatic Control, ol. 7, no., pp , 202. [2] H. Keriin and A. R. Mahjob, Design of sriable networks: A srey, Networks, ol. 46, no., pp. 2, 200. [3] H. Nagamochi and T. Ibaraki, Algorithmic Aspects of Graph Connectiity. Cambridge Uniersity Press New York, 2008, ol. 23. [4] K. P. Eswaran and R. E. Tarjan, Agmentation problems, SIAM Jornal on Compting, ol., no. 4, pp , 976. [] J. Bang-Jensen, H. N. Gabow, T. Jordán, and Z. Szigeti, Edgeconnectiity agmentation with partition constraints, SIAM Jornal on Discrete Mathematics, ol. 2, no. 2, pp , 999. [6] B. Jackson and T. Jordán, A near optimal algorithm for ertex connectiity agmentation, in International Symposim on Algorithms and Comptation. Springer, 2000, pp [7] Z. Nto, Approximating node-connectiity agmentation problems, Algorithmica, ol. 63, no. -2, pp , 202. [8] A. Frank, Mathematical Programming: State of the Art 994. Ann Arbor, MI: Uniersity of Michigan, 994, ch. Connectiity agmentation problems in network design, pp [9] G. Kortsarz, R. Krathgamer, and J. R. Lee, Hardness of approximation for ertex-connectiity network design problems, SIAM Jornal on Compting, ol. 33, no. 3, pp , [0] K. Bhawalkar, J. Kleinberg, K. Lewi, T. Roghgarden, and A. Sharma, Preenting nraeling in social networks: the anchored k-core problem, SIAM Jornal on Discrete Mathematics, ol. 29, no. 3, 20. [] M. Dzibiński and S. Goyal, Network design and defence, Games and Economic Behaior, ol. 79, pp , 203. [2] K. Menger, Zr allgemeinen krentheorie, Fndamenta Mathematicae, ol. 0, no., pp. 96, 927. [3] O. R. Oellermann, Menger s theorem, in Topics in Strctral Graph Theory, L. W. Beineke and R. J. Wilson, Eds. Cambridge Uniersity Press, 203, pp [4] A.-H. Esfahanian, Connectiity algorithms, in Topics in Strctral Graph Theory, L. W. Beineke and R. J. Wilson, Eds. Cambridge Uniersity Press, 203, pp [] S. Een, Graph Algorithms. Compter Science Press, 979. [6] H. Nagamochi and T. Ibaraki, Compting edge-connectiity in mltigraphs and capacitated graphs, SIAM Jornal on Discrete Mathematics, ol., no., pp. 4 66, 992. [7] D. R. Karger, Minimm cts in near-linear time, Jornal of the ACM, ol. 47, no., pp , [8] S. Gha and S. Khller, Approximation algorithms for connected dominating sets, Algorithmica, ol. 20, no. 4, pp , 998. [9] P.-J. Wan, K. M. Alzobi, and O. Frieder, Distribted constrction of connected dominating set in wireless ad hoc networks, Mobile Networks and Applications, ol. 9, no. 2, pp. 4 49, 2004.

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k Approximation Algorithms for a Capacitated Network Design Problem R. Hassin 1? and R. Rai 2?? and F. S. Salman 3??? 1 Department of Statistics and Operations Research, Tel-Ai Uniersity, Tel Ai 69978, Israel.

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly 1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

Reconstructing Generalized Staircase Polygons with Uniform Step Length

Reconstructing Generalized Staircase Polygons with Uniform Step Length Jornal of Graph Algorithms and Applications http://jgaa.info/ ol. 22, no. 3, pp. 431 459 (2018) DOI: 10.7155/jgaa.00466 Reconstrcting Generalized Staircase Polygons with Uniform Step Length Nodari Sitchinaa

More information

Planarity-Preserving Clustering and Embedding for Large Planar Graphs

Planarity-Preserving Clustering and Embedding for Large Planar Graphs Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized

More information

Pushing squares around

Pushing squares around Pshing sqares arond Adrian Dmitresc János Pach Ý Abstract We stdy dynamic self-reconfigration of modlar metamorphic systems. We garantee the feasibility of motion planning in a rectanglar model consisting

More information

Fixed-Parameter Algorithms for Cluster Vertex Deletion

Fixed-Parameter Algorithms for Cluster Vertex Deletion Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,

More information

Vertex Guarding in Weak Visibility Polygons

Vertex Guarding in Weak Visibility Polygons Vertex Garding in Weak Visibility Polygons Pritam Bhattacharya, Sbir Kmar Ghosh*, Bodhayan Roy School of Technology and Compter Science Tata Institte of Fndamental Research Mmbai 400005, India arxi:1409.46212

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:

More information

Friend of My Friend: Network Formation with Two-Hop Benefit

Friend of My Friend: Network Formation with Two-Hop Benefit Friend of My Friend: Network Formation with Two-Hop Benefit Elliot Ansheleich, Onkar Bhardwaj, and Michael Usher Rensselaer Polytechnic Institte, Troy NY, USA Abstract. How and why people form ties is

More information

On shortest-path all-optical networks without wavelength conversion requirements

On shortest-path all-optical networks without wavelength conversion requirements Research Collection Working Paper On shortest-path all-optical networks withot waelength conersion reqirements Athor(s): Erlebach, Thomas; Stefanakos, Stamatis Pblication Date: 2002 Permanent Link: https://doi.org/10.3929/ethz-a-004446054

More information

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b)

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b) Trees Lemma Let the components of ppose "! be (a) $&%('*)+ - )+ / A tree is a graph which is (b) 0 %(')+ - 3)+ / 6 (a) (a) Connected and (b) has no cycles (acyclic) (b) roof Eery path 8 in which is not

More information

5.0 Curve and Surface Theory

5.0 Curve and Surface Theory 5. Cre and Srface Theor 5.1 arametric Representation of Cres Consider the parametric representation of a cre as a ector t: t [t t t] 5.1 The deriatie of sch a ector ealated at t t is gien b t [ t t t ]

More information

A Unified Energy-Efficient Topology for Unicast and Broadcast

A Unified Energy-Efficient Topology for Unicast and Broadcast A Unified Energy-Efficient Topology for Unicast and Broadcast Xiang-Yang Li Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA xli@cs.iit.ed Wen-Zhan Song School of Eng. & Comp.

More information

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks 1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL

More information

Towards applications based on measuring the orbital angular momentum of light

Towards applications based on measuring the orbital angular momentum of light CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

ARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM

ARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM ARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM Cecilia Cappellin 1, Peter Meincke 1, Sergey Pinenko 2, Erik Jørgensen 1 1 TICRA, Læderstræde 34, DK-1201 Copenhagen, Denmark 2 DTU Elektro,

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

MTL 776: Graph Algorithms. B S Panda MZ 194

MTL 776: Graph Algorithms. B S Panda MZ 194 MTL 776: Graph Algorithms B S Panda MZ 194 bspanda@maths.iitd.ac.in bspanda1@gmail.com Lectre-1: Plan Definitions Types Terminology Sb-graphs Special types of Graphs Representations Graph Isomorphism Definitions

More information

Chapter 5. Plane Graphs and the DCEL

Chapter 5. Plane Graphs and the DCEL Chapter 5 Plane Graphs and the DCEL So far we hae been talking abot geometric strctres sch as trianglations of polygons and arrangements of line segments withot paying mch attention to how to represent

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Tri-Edge-Connectivity Augmentation for Planar Straight Line Graphs

Tri-Edge-Connectivity Augmentation for Planar Straight Line Graphs Tri-Edge-Connectivity Agmentation for Planar Straight Line Graphs Marwan Al-Jbeh 1, Mashhood Ishaqe 1, Kristóf Rédei 1, Diane L. Sovaine 1, and Csaba D. Tóth 1,2 1 Department of Compter Science, Tfts University,

More information

Design and Optimization of Multi-Faceted Reflectarrays for Satellite Applications

Design and Optimization of Multi-Faceted Reflectarrays for Satellite Applications Design and Optimization of Mlti-Faceted Reflectarrays for Satellite Applications Min Zho, Stig B. Sørensen, Peter Meincke, and Erik Jørgensen TICRA, Copenhagen, Denmark ticra@ticra.com Abstract The design

More information

Primary and Derived Variables with the Same Accuracy in Interval Finite Elements

Primary and Derived Variables with the Same Accuracy in Interval Finite Elements Primary and Deried Variables with the Same Accracy in Interal inite Elements M. V. Rama Rao R. L. Mllen 2 and R. L. Mhanna 3 Vasai College of Engineering Hyderabad - 5 3 INDIA dr.mrr@gmail.com 2 Case Western

More information

Multiple Source Shortest Paths in a Genus g Graph

Multiple Source Shortest Paths in a Genus g Graph Mltiple Sorce Shortest Paths in a Gens g Graph Sergio Cabello Erin W. Chambers Abstract We gie an O(g n log n) algorithm to represent the shortest path tree from all the ertices on a single specified face

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication

More information

Available online: 25 Oct To link to this article:

Available online: 25 Oct To link to this article: This article was downloaded by: [Whan Uniersity] On: 5 Febrary 202, At: 9:06 Pblisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Nmber: 072954 Registered office: Mortimer

More information

Complete Information Pursuit Evasion in Polygonal Environments

Complete Information Pursuit Evasion in Polygonal Environments Complete Information Prsit Easion in Polygonal Enironments Kyle Klein and Sbhash Sri Department of Compter Science Uniersity of California Santa Barbara, CA 9306 Abstract Sppose an npredictable eader is

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Augmenting the edge connectivity of planar straight line graphs to three

Augmenting the edge connectivity of planar straight line graphs to three Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight

More information

Non-convex Representations of Graphs

Non-convex Representations of Graphs Non-conex Representations of Graphs Giseppe Di Battista, Fabrizio Frati, and Marizio Patrignani Dip. di Informatica e Atomazione Roma Tre Uniersity Abstract. We sho that eery plane graph admits a planar

More information

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass

More information

Rectangle-of-influence triangulations

Rectangle-of-influence triangulations CCCG 2016, Vancoer, British Colmbia, Ag 3 5, 2016 Rectangle-of-inflence trianglations Therese Biedl Anna Lbi Saeed Mehrabi Sander Verdonschot 1 Backgrond The concept of rectangle-of-inflence (RI) draings

More information

Constraint-Driven Communication Synthesis

Constraint-Driven Communication Synthesis Constraint-Drien Commnication Synthesis Alessandro Pinto Goqiang Wang Lca P. Carloni Abstract Constraint-drien Commnication Synthesis enables the atomatic design of the commnication architectre of a complex

More information

circuit simulation NP-complete? backward retiming forward retiming f(x)

circuit simulation NP-complete? backward retiming forward retiming f(x) Optimal FPGA Mapping and Retiming with Ecient Initial State Comptation Jason Cong and Chang W Department of Compter Science Uniersity of California, Los Angeles, CA 995 Abstract For seqential circits with

More information

Representing a Cubic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions

Representing a Cubic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions Representing a Cbic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions ABSTRACT Abhijin Adiga Network Dynamics and Simlation Science Laboratory Virginia Bioinformatics Institte,

More information

arxiv: v4 [cs.ds] 29 Jul 2015

arxiv: v4 [cs.ds] 29 Jul 2015 Efficient Farthest-Point Qeries in Two-Terminal Series-Parallel Networks Carsten Grimm 1, 1 Otto-on-Gericke-Uniersität Magdebrg, Magdebrg, Germany Carleton Uniersity, Ottawa, Ontario, Canada arxi:1503.017064

More information

Cutting Cycles of Rods in Space: Hardness and Approximation

Cutting Cycles of Rods in Space: Hardness and Approximation Ctting Cycles of Rods in Space: Hardness and pproximation oris rono ark de erg Chris Gray Elena mford bstract We stdy the problem of ctting a set of rods (line segments in R 3 ) into fragments, sing a

More information

Week 9-10: Connectivity

Week 9-10: Connectivity Week 9-0: Connectiity October 3, 206 Vertex Connectiity Let G = (V, E) be a graph. Gien two ertices x, y V. Two (x, y)-path are said to be internally disjoint if they hae no internal ertices in common.

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Minimum Spanning Trees Outline: MST

Minimum Spanning Trees Outline: MST Minimm Spanning Trees Otline: MST Minimm Spanning Tree Generic MST Algorithm Krskal s Algorithm (Edge Based) Prim s Algorithm (Vertex Based) Spanning Tree A spanning tree of G is a sbgraph which is tree

More information

Object Pose from a Single Image

Object Pose from a Single Image Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the

More information

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Lca Cittadini, Giseppe Di Battista, Thomas Erlebach, Marizio Patrignani, and Massimo Rimondini Dept. of Compter Science and Atomation, Roma

More information

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance POSTPRINT OF: IEEE TRANS. SYST., MAN, CYBERN., B, 383), 28, 884 893. 1 Real-Time Robot Path Planning ia a Distance-Propagating Dynamic System with Obstacle Clearance Allan R. Willms, Simon X. Yang Member,

More information

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton,

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

Combinatorial and Geometric Properties of Planar Laman Graphs

Combinatorial and Geometric Properties of Planar Laman Graphs Combinatorial and Geometric Properties of Planar Laman Graphs Stephen Koboro 1, Torsten Ueckerdt 2, and Kein Verbeek 3 1 Department of Compter Science, Uniersity of Arizona 2 Department of Applied Mathematics,

More information

3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH

3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH 3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH Pablo d Angelo and Christian Wöhler DaimlerChrysler Research and Technology, Machine Perception

More information

Cohesive Subgraph Mining on Attributed Graph

Cohesive Subgraph Mining on Attributed Graph Cohesive Sbgraph Mining on Attribted Graph Fan Zhang, Ying Zhang, L Qin, Wenjie Zhang, Xemin Lin QCIS, University of Technology, Sydney, University of New Soth Wales fanzhang.cs@gmail.com, {Ying.Zhang,

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

Triple Connected Complementary Tree Domination Number of a Graph

Triple Connected Complementary Tree Domination Number of a Graph International Mathematical Form, Vol. 8, 2013, no. 14, 659-670 HIKARI Ltd, www.m-hikari.com Triple Connected Complementar Tree Domination Nmber of a Graph G. Mahadevan 1, Selvam Avadaappan 2, N. Ramesh

More information

Triangle Contact Representations

Triangle Contact Representations Triangle Contact Representations Stean Felsner elsner@math.t-berlin.de Technische Uniersität Berlin, Institt ür Mathematik Strasse des 7. Jni 36, 0623 Berlin, Germany Abstract. It is conjectred that eery

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

Blind Compressive Sensing Framework for Collaborative Filtering

Blind Compressive Sensing Framework for Collaborative Filtering Blind Compressie Sensing ramewor for Collaboratie iltering Anpriya Gogna ECE Department III-Delhi Delhi, INDIA anpriyag@iiitd.ac.in Angshl Majmdar ECE Department III-Delhi Delhi, INDIA angshl@iiitd.ac.in

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

UPWARD PLANAR DRAWING OF SINGLE SOURCE ACYCLIC DIGRAPHS. MICHAEL D. HUTTON y AND ANNA LUBIW z

UPWARD PLANAR DRAWING OF SINGLE SOURCE ACYCLIC DIGRAPHS. MICHAEL D. HUTTON y AND ANNA LUBIW z UPWARD PLANAR DRAWING OF SINGLE SOURCE ACYCLIC DIGRAPHS MICHAEL D. HUTTON y AND ANNA LUBIW z Abstract. An pward plane drawing of a directed acyclic graph is a plane drawing of the digraph in which each

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

On Bichromatic Triangle Game

On Bichromatic Triangle Game On Bichromatic Triangle Game Gordana Manić Daniel M. Martin Miloš Stojakoić Agst 16, 2012 Abstract We stdy a combinatorial game called Bichromatic Triangle Game, defined as follows. Two players R and B

More information

arxiv: v1 [cs.cg] 27 Nov 2015

arxiv: v1 [cs.cg] 27 Nov 2015 On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca

More information

Image Restoration Image Degradation and Restoration

Image Restoration Image Degradation and Restoration Image Degradation and Restoration hxy Image Degradation Model: Spatial domain representation can be modeled by: g x y h x y f x y x y Freqency domain representation can be modeled by: G F N Prepared By:

More information

Direct Trimming of NURBS Surfaces on the GPU

Direct Trimming of NURBS Surfaces on the GPU Direct Trimming of NURBS Srfaces on the GPU Andre Schollmeyer Bernd Fro hlich Bahas-Uniersita t Weimar Abstract This paper presents a highly efficient direct trimming techniqe for NURBS srfaces, which

More information

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,

More information

arxiv: v1 [cs.cg] 31 Aug 2017

arxiv: v1 [cs.cg] 31 Aug 2017 Lombardi Drawings of Knots and Links Philipp Kindermann 1, Stephen Koboro 2, Maarten Löffler 3, Martin Nöllenbrg 4, André Schlz 1, and Birgit Vogtenhber 5 arxi:1708.098191 [cs.cg] 31 Ag 2017 1 FernUniersität

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

arxiv: v1 [cs.si] 27 Nov 2018

arxiv: v1 [cs.si] 27 Nov 2018 Flexible Attribted Network Embedding arxi:8.0789 [cs.si] 27 No 208 Enya Shen Tsingha Uniersity, China shenenya@tsingha.ed.cn Changqing Zo Uniersity of Maryland, College Park, US aaronzo25@gmail.com Abstract

More information

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks Athor manscript, pblished in "INFOCOM 2009 (2009)" Visibility-Graph-based Shortest-Path Geographic Roting in Sensor Networks Gang Tan Marin Bertier Anne-Marie Kermarrec INRIA/IRISA, Rennes, France. Email:

More information

p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram

p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram Istanbl Technical University, Department of Electronics and Telecommnications Engineering, Istanbl, Trkey ABSTRACT We consider the imization

More information

Analytical Solution of Kinematic Response of Batter Pile under P and SV Waves Earthquake

Analytical Solution of Kinematic Response of Batter Pile under P and SV Waves Earthquake 7 th SASTech 013, ran, Bandar-Abbas. 7-8 March, 013. Organized by Khaaran nstitte of igher Edcation Analytical Soltion of Kinematic Response of Batter ile nder and S Waes Earthqake M. Ghazai 1,. Raanshenas

More information

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH

More information

Authors. Tamilnadu, India 2.

Authors.   Tamilnadu, India 2. International Jornal of Emerging Trends in Science and Technology Impact Factor: 2.838 DOI: http://dx.doi.org/10.18535/ijetst/3i03.04 Irredndant Complete Domination Nmber of Graphs Athors A.Nellai Mrgan

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

arxiv: v1 [cs.cg] 12 Dec 2013

arxiv: v1 [cs.cg] 12 Dec 2013 Smooth Orthogonal Drawings of Planar Graphs Md. Jawaherl Alam, Michael A. Bekos, Michael Kafmann, Philipp Kindermann, Stephen G. Koboro, and Alexander Wolff arxi:.58 [cs.cg] Dec 0 Department of Compter

More information

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks Select-and-Protest-based Beaconless Georoting ith Garanteed Deliery in Wireless Sensor Netorks Hanna Kalosha, Amiya Nayak, Stefan Rührp, Ian Stojmenoić School of Information Technology and Engineering

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

Discretized Approximations for POMDP with Average Cost

Discretized Approximations for POMDP with Average Cost Discretized Approximations for POMDP with Average Cost Hizhen Y Lab for Information and Decisions EECS Dept., MIT Cambridge, MA 0239 Dimitri P. Bertsekas Lab for Information and Decisions EECS Dept., MIT

More information

Today. B-splines. B-splines. B-splines. Computergrafik. Curves NURBS Surfaces. Bilinear patch Bicubic Bézier patch Advanced surface modeling

Today. B-splines. B-splines. B-splines. Computergrafik. Curves NURBS Surfaces. Bilinear patch Bicubic Bézier patch Advanced surface modeling Comptergrafik Matthias Zwicker Uniersität Bern Herbst 29 Cres Srfaces Parametric srfaces Bicbic Bézier patch Adanced srface modeling Piecewise Bézier cres Each segment spans for control points Each segment

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

Revisiting Connected Dominating Sets: An Optimal Local Algorithm?

Revisiting Connected Dominating Sets: An Optimal Local Algorithm? Reisiting Connected Dominating Sets: An Otimal Local Algorithm? Samir Khller Deartment of Comter Science Uniersity of Maryland College Park, MD 0740, USA Email: samir@md.ed Sheng Yang Deartment of Comter

More information

A Robust Video Watermarking Scheme using DWT and DCT Aditi Agarwal 1, Ruchika Bhadana 2 and Satishkumar Chavan 3

A Robust Video Watermarking Scheme using DWT and DCT Aditi Agarwal 1, Ruchika Bhadana 2 and Satishkumar Chavan 3 A Robst Video Watermarking Scheme sing DWT and DCT Aditi Agarwal 1, Rchika Bhadana and Satishkmar Chaan 3 1, Department of Compter Engineering, 3 Department of Electronics & Telecommnication Engineering,

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks 1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling

More information

ECE250: Algorithms and Data Structures Single Source Shortest Paths Dijkstra s Algorithm

ECE250: Algorithms and Data Structures Single Source Shortest Paths Dijkstra s Algorithm ECE0: Algorithms and Data Strctres Single Sorce Shortest Paths Dijkstra s Algorithm Ladan Tahildari, PEng, SMIEEE Associate Professor Software Technologies Applied Research (STAR) Grop Dept. of Elect.

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

Queries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti

Queries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti Qeries Inf B: Ranking Qeries on the WWW Kyriakos Kalorkoti School of Informatics Uniersity of Edinbrgh Sppose e hae an Inerted Index for a set of ebpages. Disclaimer I Not really the scenario of Lectre.

More information

Digital Image Processing Chapter 5: Image Restoration

Digital Image Processing Chapter 5: Image Restoration Digital Image Processing Chapter 5: Image Restoration Concept of Image Restoration Image restoration is to restore a degraded image back to the original image while image enhancement is to maniplate the

More information