Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links
|
|
- Roland Harris
- 5 years ago
- Views:
Transcription
1 Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links Ding-Zhu Du 1,MyT.Thai 1,YingshuLi 2,DanLiu 1, and Shiwei Zhu 1 1 Department of Computer Science and Engineering, University of Minnesota, 200 Union Street, Minneapolis, MN 55455, USA {dzd, mythai, danliu, zhu}@cs.umn.edu 2 Department of Computer Science, Georgia State University, 34 Peachtree Street, Atlanta, GA 30303, USA yli@cs.gsu.edu Abstract. A Connected Dominating Set (CDS) can serve as a virtual backbone for a wireless sensor network since there is no fixed infrastructure or centralized management in wireless sensor networks. With the help of CDS, routing is easier and can adapt quickly to network topology changes. The CDS problem has been studied extensively in undirected graphs, especially in unit disk graphs, in which each sensor node has the same transmission range. However, in practice, the transmission ranges of all nodes are not necessarily to be equal. In this paper, we model a network as a disk graph where unidirectional links are considered and introduce the Strongly Connected Dominating Set (SCDS) problem in disk graphs. We propose two constant approximation algorithms for the SCDS problem and compare their performances through the theoretical analysis. Keywords: Strongly Connected Dominating Set, Disk Graph, Wireless Sensor Network, Virtual Backbone, Directed Graph. 1 Introduction Recent advances in technology have made possible the creation of Wireless Sensor Networks (WSNs). WSNs can be used in a wide-range of potential applications both in military and people s daily lives. In WSNs, there is no fixed or pre-defined infrastructure. Nodes in WSNs communicate via a shared medium, either through a single hop or multiple hops. Although there is no physical backbone infrastructure, a virtual backbone can be formed by constructing a Connected Dominating Set (CDS). Given an undirected graph G =(V,E), a subset V V is a CDS of G if for each node u V, u is either in V or there exists a node v V such that uv E and the subgraph induced by V, i.e., G(V ), is connected. The nodes in the CDS are called dominators, other nodes are called dominatees. With the help of CDS, routing is easier and can adapt quickly to network topology changes. To reduce the traffic during communication and simplify the connectivity management, it is desirable to construct a Minimum CDS (MCDS). X. Zhou et al. (Eds.): APWeb 2006, LNCS 3841, pp , c Springer-Verlag Berlin Heidelberg 2006
2 14 D.-Z. Du et al. Fig. 1. A Disk Graph Representing a Network The CDS problem has been studied intensively in Unit Disk Graph (UDG), in which each node has a same transmission range. The MCDS problem in UDG has been shown to be NP-hard. To build a CDS, most of the current algorithms first find a Maximal Independent Set (MIS) I of G and then connect all the nodes in I to have a CDS. The independent set I is a subset of V such that for any two nodes u, v I, uv / E. In other words, the nodes in I are pairwise nonadjacent. A maximal independent set is an independent set such that no more nodes can be added to remain the non-adjacency property. The most relevant related work using this scheme are in [3] and [4]. In [3], Wan et al. proposed the first distributed algorithm with the performance ratio of 8. Later, Li et al. proposed a better algorithm with the performance ratio of (4.8 + ln 5) by constructing a Steiner tree when connecting all the nodes in I [4]. However, in practice, the transmission ranges of all the nodes are not necessarily to be equal. In this case, a wireless ad hoc network can be modelled using a directed graph G =(V,E). The nodes in V are located in a Euclidean plane and each node v i V has a transmission range r i [r min,r max ]. A directed edge (v i,v j ) E if and only if d(v i,v j ) r i where d(v i,v j ) denotes the Euclidean distance between v i and v j. Such graphs are called Disk Graphs (DG). An edge (v i,v j ) is unidirectional if (v i,v j ) E and (v j,v i ) / E. Anedge(v i,v j ) is bidirectional if both (v i,v j )and(v j,v i )areine, i.e., d(v i,v j ) min{r i,r j }. In other words, the edge (v i,v j ) is bidirectional if v i is in the disk D j centered at v j with radius r j and v j is in the disk D i centered at v i with radius r i.figure1 gives an example of a DG representing a network. In Figure 1, the dotted circles represent the transmission ranges and the directed edges represent the unidirectional links in G while the undirected edges represent the bidirectional links. In this paper, we study the Strongly Connected Dominating Set (SCDS) problem in directed disk graphs. Given a directed graph G =(V,E), a subset S V is a Dominating Set (DS) of G if for any node u V, u S or there exists v S such that (v, u) E. S is strongly connected if for every pair u and v S, there exists a directed path from u to v in the directed graph induced by S, i.e., G(S). Formally, the SCDS problem can be defined as follows: Definition 1. Strongly Connected Dominating Set (SCDS) Problem: Given a directed disk graph G =(V,E), find a subset S V with minimum size, such that the subgraph induced by S, calledg(s) is strongly connected and S forms a dominating set in G.
3 Strongly Connected Dominating Sets in Wireless Sensor Networks 15 The SCDS problem is NP-hard since the MCDS problem in UDG is NPhard and UDG is a special case of DG. Note that in directed graphs, an MIS is not necessary a DS. Hence we cannot find an MIS and connect it to construct a SCDS. Instead, we need to find a DS directly and then connect it to form a SCDS. Based on this approach, we present two constant approximation algorithms for computing a minimum SCDS in DG, called Connected Dominating Set using the Breath First Search tree (CDS-BFS) and Connected Dominating Set using the Minimum Nodes Steiner tree (CDS-MNS) algorithms. The main differences of these two algorithm are the construction to connect the obtained dominating set. To guarantee that the graph G has a solution for the SCDS problem, we assume that G is a strongly connected graph. The remainder of this paper is organized as follows. Section 2 describes the related research work on the CDS problem, both in undirected and directed graphs. The CDS-BFS algorithm and its theoretical analysis are discussed in section 3. Section 4 presents the CDS-MNS algorithm as well as shows the performance ratio of CDS-MNS and its improvements over the previous algorithm. Finally, Section 5 ends the paper with conclusions and some future work. 2 Related Work The CDS problem in wireless sensor networks has been studied extensively in undirected graphs. Algorithms that construct a CDS can be divided into two categories based on their algorithm designs: centralized algorithms and decentralized algorithms. The centralized algorithms usually yield a smaller CDS with a better performance ratio than that of decentralized algorithms. The decentralized algorithms can be further divided into two categories: distributed algorithms and localized algorithms. In distributed algorithms, the decision process is decentralized. In the localized algorithms, the decision process is not only distributed but also requires only a constant number of communication rounds. Based on the network models, these algorithms can be classified into two types: directed graphs and undirected graphs. For undirected graphs, they can be further divided into three categories: general undirected graphs, unit disk graphs, anddisk graphs. When modelling a network as a general undirected graph G, the algorithm s performance ratio is related to where is the maximum degree of G. When modelling a network as a unit disk graph, the performance ratio is constant due to the special geometric structure of UDG. In directed graphs, to our knowledge, there is only one work to find a SCDS [10]. In [10], the authors presented a localized algorithm to construct a SCDS using the marking process. The authors did not present the analysis of the performance ratio. In undirected graphs, several work have been studied in recent research literature. In [6], Guha and Khuller first proposed two polynomial time algorithms to construct a CDS in a general undirected graph G. These algorithms are greedy and centralized. The first one has an approximation ratio of 2(H( )+1)where H is a harmonic function. The idea of this algorithm is to build a spanning tree
4 16 D.-Z. Du et al. T rooted at the node that has a maximum degree and grow T until all nodes are added to T. The non-leaf nodes in T form a CDS. In particular, all the nodes in a given network are white initially. The greedy function that the algorithm uses to add the nodes into T is the number of the white neighbors of each node or a pair of nodes. The one with the largest such number is marked black and its neighbors are marked grey. These nodes (black and grey nodes) are then added into T.The algorithm stops when no white node exists in G. The second algorithm is an improvement of the first one. This algorithm consist of two phases. The first phase is to construct a dominating set and the second phase is to connect the dominating set using a Steinter tree algorithm. With such improvement, the second algorithm has a performance ratio of H( ) + 2. In [7], Ruan et al. introduced another centralized and greedy algorithm of which the approximation ratio is (2 + ln ). For the localized algorithms, Wu and Li [8] proposed a simple algorithm that can quickly determine a CDS based on the connectivity information within the 2-hops neighbors. This approach uses a marking process. In particular, each node is marked true if it has two unconnected neighbors. All the marked nodes form a CDS. The authors also introduced some dominant pruning rules to reduce the size of the CDS. In [3], the authors showed that the performance ratio of [8] is within a factor of O(n) wheren is the number of the nodes in a network. For UDG, most of the proposed algorithms are distributed algorithms, of which the main approach is to find a Maximal Independent Set (MIS) and then to connect this set. Note that in an undirected graph, an MIS is also a dominating set (DS). In [3], the authors proposed a distributed algorithm for a CDS problem in UDG. This algorithm consists of two phases and has a constant approximation ratio of 8. The algorithm first constructs a spanning tree. Then each node in a tree is examined to find an MIS for the first phase. All the nodes in an MIS are colored black. At the second phase, more nodes are added (color blue) to connect those black nodes. Later, Cardei et al. presented another 2-phase distributed algorithm for a CDS in UDG. This algorithm has the same performance ratio of 8. However, the improvement over [3] is the message complexity. The root does not need to wait for the COMPLETE message from the furthest nodes. Recently, Li et al. proposed another distributed algorithm with a better approximation ratio, which is (4.8 + ln 5) [4]. This algorithm also has two phases. At the first phase, an MIS is found. At the second phase, a Steiner tree algorithm is used to connect the MIS. The Steiner tree algorithm takes the property which is that any node in UDG is adjacent to at most 5 independent nodes into consideration. For the localized algorithms, in [9], Alzoubi et al. proposed a localized 2-phase algorithms with the performance ratio of 192. At the first phase, an MIS is constructed using the one-hop neighbors information. Specifically, once a node knows that it has the smallest ID within its neighbors, it becomes a dominator. At the second phase, the dominators are responsible for identifying a path to connect the MIS. In [2], Li et al. proposed another localized algorithm with the performance ratio of 172. This localized algorithm has only 1 phase. A node marks itself as a dominator if it can cover the most white nodes compared to its 2-hop neighbors.
5 Strongly Connected Dominating Sets in Wireless Sensor Networks 17 For undirected disk graphs, Thai et al. recently have proposed three constant centralized algorithms which can be implemented as distributed algorithms [1]. These algorithms use a similar approach as in UDG, that is to find an MIS and then to connect it. However, the authors in [1] took the different transmission rages of nodes in networks into consideration. None of the above work has studied the SCDS problem in directed disk graphs. The SCDS problem in directed disk graphs is very practical since nodes in wireless ad hoc networks usually have different transmission ranges. Hence a node u in a given network can communicate directly with node v but node v might not be able to communicate directly with node u. Motivated by this, we study the SCDS problem and present two approximation algorithms in the next two sections. 3 The CDS-BFS Algorithm In this section, we introduce the Connected Dominating Set using Breath First Search tree (CDS-BFS) algorithm to construct a SCDS of a directed disk graph G =(V,E). We then analyze its performance ratio based on the geometric characteristics of disk graphs. Let us first begin this section with some graph theoretic notations that are used throughout this paper. For an arbitrary vertex v V, let N (v) be the set of its incoming neighbors, i.e., N (v) ={u (u, v) E}. Let N [v] =N (v) {v} be the set of closed in-coming neighbors of v. Likewise, let N + (v) be the set of its outgoing neighbors, i.e., N + (v) ={u (v, u) E} and N + [v] denote the set of the closed out-going neighbors of v. 3.1 Algorithm Description The CDS-BFS algorithm has two stages. At the first stage, we find the Dominating Set (DS) S of G using a greedy method shown in Algorithm 1. Specifically, as described in Algorithm 1, at each iteration, we find a node u which has the largest transmission range in V and color it black. Remove the closed out-going neighbors of u from V, i.e, V = V N + [u]. Note that a node u is added to S if and only if the constructed S so far does not dominate u yet. Clearly, the set of black nodes S forms a DS of G. At the second stage, two Breath First Search (BFS) trees are constructed to connect S. Lets denote a node with the largest transmission range in S and v i,i=1...p be the other nodes in S. LetT f (s) =(V f,e f ) denote a forward tree rooted at s such that there exists a directed path from s to all v i,i=1...p. Also let T b (s) =(V b,e b ) denote a backward tree rooted at s such that for any node v i,i =1...p, there exists a directed path from v i to s. Note that the graph H that is the union of two such trees is a feasible solution to our SCDS problem. In other words, the graph H containing all the nodes in S and H is strongly connected. First, construct a BFS tree T 1 of G rooted at s. LetL j,j =1...l be the set of nodes at level j in T 1 where l is the depth of T 1.NotethatL 0 = {s}. Ateach
6 18 D.-Z. Du et al. Algorithm 1 Find a Dominating Set 1: INPUT: A directed disk graph G =(V,E) 2: OUTPUT: A dominating set S 3: S = 4: while V do 5: Find a node u V with the largest radius r u and color u black 6: S = S {u} 7: V = V N + [u] 8: end while 9: Return S level j, lets j be the black nodes in L j, i.e, S j = L j S, and S j be the non-black nodes in L j, i.e., S j = L j S j.weconstructt f (s) as follows. Initially, T f (s) has only one node s. At each iteration j, for each node u S j, we find a node v such that v N (u) L j 1.Ifv is not black, color it blue. In other words, we need to find a node v such that v is an in-coming neighbor of u in G and v is in the previous level of u in T 1.Addv to T f (s) wherev is the parent of u. This process stops when j = l. Next, we need to identify the parents of all the blue nodes. Similarly, at each iteration j, for each blue node u S j, find a node v N (u) S j 1 and set v as the parent of u in T f (s). If no such black v exists, select a blue node in N (u) S j 1.ThusT f (s) consists of all the black and blue nodes and there is a directed path from s to all the other nodes in S. Now, we need to find the T b (s). First, construct a graph G =(V,E )where E = {(u, v) (v, u) E}. In other words, we reverse all the edges in G to obtain G. Next, we build the second BFS tree T 2 of G rooted at s. Then follow the above procedure to find a T f (s) such that there exists a directed path from s to all the other nodes in S. Then reverse all the edges in T f (s) backtotheir original directions, we have T b (s). Hence H = T f (s) T b (s) is the strongly connected subgraph where all the nodes in H form a SCDS. The construction of the CDS-BFS tree is described in Algorithm Theoretical Analysis Lemma 1. For any two black nodes u and v in S, d(u, v) >r min. Proof. This is trivial. Without loss of generality, assume that r u >r v >= r min. Algorithm 1 would mark u as a black node before v. Assume that d(u, v) r min, then v N + (u). Hence v cannot be black, contradicting our assumption. Lemma 2. In a directed disk graph G =(V,E), the size of any dominating set S is upper bounded by where k = r max r min 2.4(k )2 opt +3.7(k )2 and opt is the size of the optimal solution of the SCDS problem.
7 Strongly Connected Dominating Sets in Wireless Sensor Networks 19 Algorithm 2 CDS-BFS 1: INPUT: A directed disk graph G =(V,E) 2: OUTPUT: A Strongly Connected Dominating Set C 3: Find a DS S using Algorithm 1 4: Choose node s S such that r s is maximum 5: Construct a BFS tree T 1 of G rooted at s 6: Construct a tree T f (s) such that there exists a directed path in T f (s) froms to all other nodes in S as follows: 7: for j =1tol do 8: L j is a set of nodes in T 1 at level j 9: S j = L j S; S j = L j S j; T f (s) ={s} 10: for each node u S j do 11: select v (N (u) L j 1) andsetv as a parent of u. Ifv is not black, color v blue 12: end for 13: end for 14: for j =1tol do 15: for each blue node u S j do 16: if N (u) S j 1 then 17: select v (N (u) S j 1) andsetv as a parent of u. 18: else 19: select v (N (u) S j 1) andsetv as a parent of u. 20: end if 21: end for 22: end for 23: Reverse all edges in G to obtain G 24: Construct a BFS tree T 2 of G rooted at s 25: Construct a tree T f (s) such that there exists a directed path in T f (s) froms to all other nodes in S 26: Reverse all edges back to their original directions, then T f (s) becomet b (s) where there exists a directed path from all other nodes in S to s 27: H = T f (s) T b (s) 28: Return all nodes in H Proof. Due to space limitation, the detailed proof is omitted. The basic idea of this proof is as follows. From Lemma 1, the set of all the disks centered at the nodes in S with radius r min /2 are disjoint. Thus the size of any DS bounded by the maximum number of disks with radius r min /2packingintheareacovered by the optimal SCDS. Theorem 1. The CDS-BFS algorithm produces a SCDS with the size bounded by 12(k )2 opt +18.5(k )2 where k = rmax r min. Proof. Let C denote the SCDS obtained from the CDS-BFS algorithm. Let B T f and B T b bethebluenodesint f (s) andt b (s) respectively. We have:
8 20 D.-Z. Du et al. C = B T f + B T b + S 5 S C 5[2.4(k )2 opt +3.7(k )2 ] C 12(k )2 opt +18.5(k )2 Corollary 1. If the maximum and minimum transmission ranges are bounded, then the CDS-BFS algorithm has an approximation factor of O(1). 4 The CDS-MSN Algorithm In the previous section, we use the bread first search tree to construct the tree interconnecting all the black nodes in S. This scheme is simple and fast. However, we can reduce the size of the obtained SCDS further by reducing the number of the blue nodes which are used to connect all the black nodes. In other words, we need to construct a tree with the minimum number of blue nodes to interconnect all the black nodes. The problem can be formally defined as follows: Definition 2. Directed Steiner tree with Minimum Steiner Nodes (DSMSN): GivenadirectedgraphG = (V,E) and a set of nodes S V called terminals, construct a directed Steiner tree T rooted at s V such that there exists a directed path from s to all the terminals in T and the number of the Steiner nodes is minimum. Note that a Steiner node is a node in T but not a terminal. In the SCDS problem context, Steiner nodes are also the blue nodes. Once we solve the DSMSN problem, we can use this solution to solve the SCDS problem. Initially, all the nodes in S are black and the other nodes in V are white. First, let us introduce the following definitions. Definition 3. Spider: A spider is defined as a directed tree having at most one white node of out-degree more than two and the other nodes are either black or blue. Such a white node is called a root of the spider. A v-spider is a spider rooted at a white node v. Each directed path from v to a leaf is called a leg. Note that all the nodes in each leg except v are either blue or black. Definition 4. Contracting Operation: Let U be a set of out-going neighbors of all the black and blue nodes in a v-spider. To contract a v-spider, for each white node u U, create a directed edge (v, u). We then delete all the black and blue nodes in the v-spider and color v blue. Figure 2 shows an example of a spider contracting operation. To solve the DSMSN problem, we repeatedly find a v-spider such that this spider has a maximum number of black and blue nodes and then contract this spider. The detail of this algorithm is described in Algorithm 3. The correctness of Algorithm 3 is obvious. Since this algorithm is a solution of the DSMSN problem, we are now ready to introduce the CDS-MSN algorithm.
9 Strongly Connected Dominating Sets in Wireless Sensor Networks 21 s s 1 v 1 v Contracting Fig. 2. A Spider Contracting Operation Algorithm 3 DSMSN(G, s, S) 1: INPUT: Graph G =(V,E), a root s, a set of black nodes S 2: OUTPUT: A tree T rooted at s interconnecting all nodes in S 3: T = ; 4: while The number black and blue nodes in G>1 do 5: Find a white node v such that v-spider has the most number of black and blue nodes 6: Contracting this v-spider and update G 7: end while 8: Construct T from the set of black and blue nodes 4.1 Algorithm Description The CDS-MSN algorithm consists of two stages. Similar to the CDS-BFS algorithm, the CDS-MSN constructs the dominating set S using Algorithm 1 at the first stage. At the second stage, the DSMSN algorithm as shown in Algorithm 3 is deployed to find a strongly connected dominating set. Choose s S such that r s is the largest. Note that all the nodes in S except s are black and the other nodes in V are white. Similar to the CDS-BFS algorithm, we need to construct T f (s) andt b (s). Let S = S {s}. T f (s) is constructed by calling algorithm DSMSN(G, s, S ). Next, construct a graph G =(V,E ) such that an edge (u, v) isine if and only if the edge (v, u) isine. Thenwe call the algorithm DSMSN(G,s,S )toobtainatreet f (s). Then reverse all the edges in T f (s) back to their original directions, we have a tree T b (s). The union of these two trees is our solution to the SCDS problem. The main steps of the CDS-MSN algorithm are described in Algorithm Theoretical Analysis Lemma 3. Given a directed disk graph G = (V,E), for any arbitrary node v V, we have N + (v) S (2k +1) 2 where k = r max /r min.
10 22 D.-Z. Du et al. Algorithm 4 CDS-MSN 1: INPUT: A directed graph G =(V,E) 2: OUTPUT: A strongly connected dominating set C 3: Find a DS S using Algorithm 1 4: Choose node s S that r s is maximum 5: S = S {s} 6: All nodes in S are black, others are white 7: T f (s) =DSMSN(G, s, S ) 8: Reverse all edges in G to obtain G 9: All nodes in S are black, others are white 10: T f (s) =DSMSN(G,s,S ) 11: Reverse all edges in T f (s) toobtaint b (s) 12: H = T f (s) T b (s) 13: Return all nodes in H Proof. Recall that N + (v) is a set of out-going neighbors of v and S is a dominating set of G. Letv be a node with the largest transmission range. From Lemma 1, we have d(u, v) r min where u, v S. Hence the size of N + (v) S is bounded by the maximum number of disjoint disks with radius r min /2packing in the disk centered at v with radius of r max + r min /2. We have: N + (v) S π(r max + r min /2) 2 π(r min /2) 2 (2k +1) 2 Let T be an optimal tree when connecting a given set S and C(T )isthe number of the Steiner nodes in T.AlsoletB be a set of blue nodes in T where T is the solution of the DSMSN problem obtained from Algorithm 3, we have the following lemma: Lemma 4. The size of B is at most (1 + 2 ln(2k +1))C(T ) Proof. Let n = S and p = B. LetG i be the graph G at the iteration i after a spider contracting operation. Let v i,i=1...p be the blue nodes in the order of appearance in Algorithm 3 and let a i be the number of the black and blue nodes in G i.alsoletc(ti ) be the optimal solution of G i.ifn = 1, then the lemma is trivial. Assume that n 2, thus C(T ) 1. Since at each iteration i, wepicka white node v such that the v-spider has the maximum number of black and blue a nodes, the number of black and blue nodes in v-spider must be at least i C(Ti ). Thus we have: a i+1 a i a i C(Ti ) a i a i C(T ) Note that a p = 1 hence a p C(T ). Also, initially, a 0 = n>c(t ). Then there exists h, 1 h p such that a h C(T )anda h+1 <C(T ). Thus we have:
11 Strongly Connected Dominating Sets in Wireless Sensor Networks 23 a h a h 1 a ( h 1 C(T ) a h ) ( C(T a h ) 2 ) C(T... ) ( a h a ) h C(T a 0 e h C(T ) ) The last step uses the fact that ln(1 x) x. Therefore, e h a C(T ) 0 h C(T ) ln a 0 n ln a h C(T 2ln(2k +1) ) The last step uses Lemma 3. We conclude that B = p h + a h+1 (1 + 2 ln(2k +1))C(T ) Theorem 2. The CDS-MNS algorithm produces a SCDS with size bounded by: (2.4(k )2 +2+4ln(2k +1))opt +3.7(k )2 where k = rmax r min Proof. Let C denote the SCDS obtained from the CDS-BFS algorithm. Let B T f and B T b bethebluenodesint f (s) andt b (s) respectively. From Lemma 3 and 4, we have: C = S + B T f + B T b 2.4(k )2 opt +3.7(k )2 +2(1+2ln(2k +1))opt a h C (2.4(k )2 +2+4ln(2k +1))opt +3.7(k )2 Corollary 2. If the maximum and minimum transmission ranges are bounded, then the CDS-MSN algorithm has an approximation factor of O(1). 5 Conclusions In this paper, we have studied the Strongly Connected Dominating Set (SCDS) problem in directed disk graphs where both unidirectional and bidirectional links are considered. The directed disk graphs can be used to model wireless sensor networks where nodes have different transmission ranges. We have proposed two approximation algorithms and shown that the obtained SCDS is within a constant factor of the optimal SCDS. The main approach in our algorithms is to construct a dominating set and then connect them. Through the theoretical analysis, we have shown that using a Steiner tree with the minimum number of Steiner nodes to interconnect the dominating set can help to reduce the size of the SCDS. In order for a node u to send data using the SCDS C, a node u is not only dominated by some nodes in C but also has an out-going neighbor in C. Thus we are interested to study this problem in the future.
12 24 D.-Z. Du et al. References 1. M. T. Thai, F. Wang, D. Liu, S. Zhu, and D.-Z. Du, Connected Dominating Sets in Wireless Networks with Different Transmission Ranges, Manuscript, Y. Li, S. Zhu, M. T. Thai, and D.-Z. Du, Localized Construction of Connected Dominating Set in Wireless Networks, NSF International Workshop on Thoretical Aspects of Wireless Ad Hoc, Sensor and Peer-to-Peer Networks, P.-J. Wan, K. M. Alzoubi, and O. Frieder, Distributed Construction on Connected Dominating Set in Wireless Ad Hoc Networks, Proceedings of the Conference of the IEEE Communications Society (INFOCOM), Y.Li,M.T.Thai,F.Wang,C.-W.Yi,P.-J.Wang,andD.-Z.Du, OnGreedy Construction of Connected Dominating Sets in Wireless Networks, Special issue of Wireless Communications and Mobile Computing (WCMC), M. Cardei, M.X. Cheng, X. Cheng, and D.-Z. Du, Connected Domination in Ad Hoc Wireless Networks, Proceedings of the Sixth International Conference on Computer Science and Informatics (CSI), S. Guha and S. Khuller, Approximation Algorithms for Connected Dominating Sets, Algorithmica, vol. 20, pp , L. Ruan, H. Du, X. Jia, W. Wu, Y. Li, and L.-I. Ko, A Greedy Approximation for Minimum Connected Dominating Sets, Theoretical Computer Science, To appear 8. J. Wu and H. Li, On Calculating Connected Dominating Sets for Efficient Routing in Ad Hoc Wireless Networks, Proceedings of the Third International Workshop Discrete Algorithms and Methods for Mobile Computing and Comm., K.M. Alzoubi, P.-J. Wang, and O. Frieder, Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks, Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), F. Dai and J. Wu, An Extended Localized Algorithms for Connected Dominating Set Formation in Ad Hoc Wireless Networks, IEEE Transactions on Parallel and Distributed Systems, vol. 15, no. 10, October 2004
Connected Dominating Sets in Wireless Networks with Different Transmission Ranges
1 Connected Dominating Sets in Wireless Networks with Different Transmission Ranges My T. Thai Feng Wang Dan Liu Shiwei Zhu Ding-Zhu Du Dept. of Computer Science & Enginering University of Minnesota Minneapolis,
More informationConstructing Connected Dominating Sets with Bounded Diameters in Wireless Networks
Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng
More informationAlgorithms for Minimum m-connected k-dominating Set Problem
Algorithms for Minimum m-connected k-dominating Set Problem Weiping Shang 1,2, Frances Yao 2,PengjunWan 3, and Xiaodong Hu 1 1 Institute of Applied Mathematics, Chinese Academy of Sciences, Beijing, China
More informationAlgorithms for minimum m-connected k-tuple dominating set problem
Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong
More informationOn minimum m-connected k-dominating set problem in unit disc graphs
J Comb Optim (2008) 16: 99 106 DOI 10.1007/s10878-007-9124-y On minimum m-connected k-dominating set problem in unit disc graphs Weiping Shang Frances Yao Pengjun Wan Xiaodong Hu Published online: 5 December
More informationIN WIRELESS SENSOR NETWORKS
CONSTRUCTING K-CONNECTED M-DOMINATING SETS IN WIRELESS SENSOR NETWORKS Yiwei Wu, Feng Wang,MyT.Thai and Yingshu Li Department of Computer Science, Georgia State University, {wyw, yli}@cs.gsu.edu Department
More informationConnected Dominating Sets in Wireless Networks with Different Transmission Ranges
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 6, NO. 7, JULY 2007 1 Connected Dominating Sets in Wireless Networks with Different Transmission Ranges My T. Thai, Member, IEEE, Feng Wang, Member, IEEE, Dan
More informationAn Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks
An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks Xiuzhen Cheng, Min Ding Department of Computer Science The George Washington University Washington, DC 20052, USA {cheng,minding}@gwu.edu
More informationA Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks
A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks Kamrul Islam, Selim G Akl, and Henk Meijer School of Computing, Queen s University Kingston,
More informationMinimum connected dominating sets and maximal independent sets in unit disk graphs
Theoretical Computer Science 352 (2006) 1 7 www.elsevier.com/locate/tcs Minimum connected dominating sets and maximal independent sets in unit disk graphs Weili Wu a,,1, Hongwei Du b, Xiaohua Jia b, Yingshu
More informationApproximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks
Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Thomas Erlebach Department of Computer Science University of Leicester, UK te17@mcs.le.ac.uk Ambreen Shahnaz Department of Computer
More informationConstructing weakly connected dominating set for secure clustering in distributed sensor network
J Comb Optim (01) 3:301 307 DOI 10.1007/s10878-010-9358-y Constructing weakly connected dominating set for secure clustering in distributed sensor network Hongjie Du Weili Wu Shan Shan Donghyun Kim Wonjun
More informationAgreedy approximation for minimum connected dominating sets
Theoretical Computer Science 329 2004) 325 330 www.elsevier.com/locate/tcs Note Agreedy approximation for minimum connected dominating sets Lu Ruan a, Hongwei Du b, Xiaohua Jia b,,1, Weili Wu c,1,2, Yingshu
More informationExtended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication
Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Jie Wu, Mihaela Cardei, Fei Dai, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic
More informationApproximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks
Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1
More informationChapter 8 DOMINATING SETS
Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationRandomized Algorithms for Approximating a Connected Dominating Set in Wireless Sensor Networks
Randomized Algorithms for Approximating a Connected Dominating Set in Wireless Sensor Networks Akshaye Dhawan, Michelle Tanco, Aaron Yeiser Department of Mathematics and Computer Science Ursinus College
More informationChapter 8 DOMINATING SETS
Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationMessage-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Khaled M. Alzoubi Department of Computer Science Illinois Institute of Technology Chicago, IL 6066 alzoubi@cs.iit.edu Peng-Jun Wan Department
More informationConnected Dominating Set in Sensor Networks and MANETs
Handbook of Combinatorial Optimization D.-Z. Du and P. Pardalos (Eds.) pp. 329-369 c 2004 Kluwer Academic Publishers Connected Dominating Set in Sensor Networks and MANETs Jeremy Blum Min Ding Andrew Thaeler
More informationDistributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks
Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Peng-Jun Wan Khaled M. Alzoubi Ophir Frieder Abstract Connected dominating set (CDS) has been proposed as virtual backbone
More informationChapter 6 DOMINATING SETS
Chapter 6 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2003 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationGATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani
GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,
More informationOn connected domination in unit ball graphs
Noname manuscript No. (will be inserted by the editor) On connected domination in unit ball graphs Sergiy Butenko Sera Kahruman-Anderoglu Oleksii Ursulenko Received: date / Accepted: date Abstract Given
More informationA DISTRIBUTED TOPOLOGY CONTROL ALGORITHM FOR MANETS
A DISTRIBUTED TOPOLOGY CONTROL ALGORITHM FOR MANETS S. Venkatesan Department of Computer Science University of Texas at Dallas Richardson, TX 75083-0688 venky@utdallas.edu C. David Young Rockwell Collins,
More informationPolynomial-Time Approximation Scheme for Minimum Connected Dominating Set in Ad Hoc Wireless Networks. Technical Report
Polynomial-Time Approximation Scheme for Minimum Connected Dominating Set in Ad Hoc Wireless Networks Technical Report Department of Computer Science and Engineering University of Minnesota 4-192 EECS
More informationarxiv: v2 [cs.ds] 25 Jan 2017
d-hop Dominating Set for Directed Graph with in-degree Bounded by One arxiv:1404.6890v2 [cs.ds] 25 Jan 2017 Joydeep Banerjee, Arun Das, and Arunabha Sen School of Computing, Informatics and Decision System
More informationGenetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks
Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li Department of Computer Science Georgia State University,
More informationDistributed Data Aggregation Scheduling in Wireless Sensor Networks
Distributed Data Aggregation Scheduling in Wireless Sensor Networks Bo Yu, Jianzhong Li, School of Computer Science and Technology, Harbin Institute of Technology, China Email: bo yu@hit.edu.cn, lijzh@hit.edu.cn
More informationEFFICIENT DISTRIBUTED ALGORITHMS FOR TOPOLOGY CONTROL PROBLEM WITH SHORTEST PATH CONSTRAINTS
Discrete Mathematics, Algorithms and Applications Vol. 1, No. 4 (2009) 437 461 c World Scientific Publishing Company EFFICIENT DISTRIBUTED ALGORITHMS FOR TOPOLOGY CONTROL PROBLEM WITH SHORTEST PATH CONSTRAINTS
More informationAlgorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees
Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees Wei Wang joint with Zishen Yang, Xianliang Liu School of Mathematics and Statistics, Xi an Jiaotong University Dec 20, 2016
More informationThe Impact of Clustering on the Average Path Length in Wireless Sensor Networks
The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia
More informationCommunication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1
Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a
More informationDesign and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks
Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Bo Han and Weijia Jia Department of Computer Science, City University of Hong Kong 3 Tat Chee
More informationThe Dominating Set Problem: (a few) variants and results
The Dominating Set Problem: (a few) variants and results Gerasimos G. Pollatos gpol@di.uoa.gr 23 November 2007 Definition and preliminaries Input: Graph G = (V, E), V = n and E = m. Output: Subset DS of
More informationThe 3-Steiner Root Problem
The 3-Steiner Root Problem Maw-Shang Chang 1 and Ming-Tat Ko 2 1 Department of Computer Science and Information Engineering National Chung Cheng University, Chiayi 621, Taiwan, R.O.C. mschang@cs.ccu.edu.tw
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More informationSolution for Homework set 3
TTIC 300 and CMSC 37000 Algorithms Winter 07 Solution for Homework set 3 Question (0 points) We are given a directed graph G = (V, E), with two special vertices s and t, and non-negative integral capacities
More informationImplementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point
International Journal of Computational Engineering Research Vol, 03 Issue5 Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point Shalu Singh
More informationLearning Automata Based Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs
Learning Automata Based Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs Javad Akbari Torkestani Department of Computer Engineering, Islamic Azad University, Arak Branch,
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationWeakly-Connected Dominating Sets and Sparse Spanners in Wireless Ad Hoc Networks
Weakly-Connected Dominating Sets and Sparse Spanners in Wireless Ad Hoc Networks Khaled M. Alzoubi Peng-Jun Wan Ophir Frieder Department of Computer Science Illinois Institute of Technology Chicago, IL
More informationDistributed approximation algorithms in unit-disk graphs
Distributed approximation algorithms in unit-disk graphs A. Czygrinow 1 and M. Hańćkowiak 2 1 Department of Mathematics and Statistics Arizona State University Tempe, AZ 85287-1804, USA andrzej@math.la.asu.edu
More informationFault Tolerant Topology Control for One-to-All Communications in Symmetric Wireless Networks
Fault Tolerant Topology Control for One-to-All Communications in Symmetric Wireless Networks F. Wang* Department of Computer Science and Engineering, University of Minnesota, USA E-mail: fwang@cs.umn.edu
More informationEdge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks
Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Quan Chen, Hong Gao, Yingshu Li, Siyao Cheng, and Jianzhong Li Harbin Institute of Technology, China Quan Chen@ Harbin Institute
More information2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006
2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,
More informationAlgorithmic Problems Related to Internet Graphs
Algorithmic Problems Related to Internet Graphs Thomas Erlebach Based on joint work with: Zuzana Beerliova, Pino Di Battista, Felix Eberhard, Alexander Hall, Michael Hoffmann, Matúš Mihal ák, Alessandro
More informationComputing optimal total vertex covers for trees
Computing optimal total vertex covers for trees Pak Ching Li Department of Computer Science University of Manitoba Winnipeg, Manitoba Canada R3T 2N2 Abstract. Let G = (V, E) be a simple, undirected, connected
More informationDual Power Management for Network Connectivity in Wireless Sensor Networks
Dual Power Management for Network Connectivity in Wireless Sensor Networks Yanxia Rong, Hongsik Choi and Hyeong-Ah Choi Department of Computer Science George Washington University Washington DC Department
More informationAn approximation algorithm for a bottleneck k-steiner tree problem in the Euclidean plane
Information Processing Letters 81 (2002) 151 156 An approximation algorithm for a bottleneck k-steiner tree problem in the Euclidean plane Lusheng Wang,ZimaoLi Department of Computer Science, City University
More information1 The Traveling Salesperson Problem (TSP)
CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation
More informationTotal dominating set based algorithm for connected dominating set in Ad hoc wireless networks
Total dominating set based algorithm for connected dominating set in Ad hoc wireless networks S. BALAJI Department of Mathematics SASTRA University Thanjavur - 613 401 INDIA balaji maths@yahoo.com K. KANNAN
More informationDual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems
Dual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems Benjamin Grimmer bdg79@cornell.edu arxiv:1508.05567v2 [cs.ds] 20 Jul 2017 Abstract We consider a variety of NP-Complete network
More informationRevisiting Connected Dominating Sets: An Optimal Local Algorithm?
Revisiting Connected Dominating Sets: An Optimal Local Algorithm? Samir Khuller and Sheng Yang Dept. of Computer Science University of Maryland, College Park, USA samir@cs.umd.edu Dept. of Computer Science
More informationConstructing a Load-Balanced Virtual Backbone in Wireless Sensor Networks
International Conference on Computing, Networking and Communications, Wireless Ad Hoc and Sensor Networks Symposium Constructing a Load-Balanced Virtual Backbone in Wireless Sensor Networks Jing (Selena)
More informationANALYZE AND EVALUATE THE IMPLEMENTATION OF CDS ALGORITHMS USING THE MOBILE AGENT.. 1 RAFAT AHMED ALHANANI, 2 JAAFAR ABOUCHABAKA, 3 RAFALIA NAJAT
ANALYZE AND EVALUATE THE IMPLEMENTATION OF CDS ALGORITHMS USING THE MOBILE AGENT.. 1 RAFAT AHMED ALHANANI, 2 JAAFAR ABOUCHABAKA, 3 RAFALIA NAJAT 1 2 3 Department of Computer Science, IBN Tofail University,
More informationFOUR EDGE-INDEPENDENT SPANNING TREES 1
FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem
More informationLecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1
CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) January 11, 2018 Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 In this lecture
More informationSensor Scheduling for k-coverage in Wireless Sensor Networks
Sensor Scheduling for k-coverage in Wireless Sensor Networks Shan Gao, Chinh T. Vu, and Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 333, USA {sgao, chinhvtr, yli}@cs.gsu.edu
More informationNumber Theory and Graph Theory
1 Number Theory and Graph Theory Chapter 6 Basic concepts and definitions of graph theory By A. Satyanarayana Reddy Department of Mathematics Shiv Nadar University Uttar Pradesh, India E-mail: satya8118@gmail.com
More informationFast Connected Dominating Set Construction in Mobile Ad Hoc Networks
Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks Kazuya Sakai Department of CSSE Auburn University Auburn, AL 36849, USA Min-Te Sun Department of CSIE National Central University Jhongli
More informationOn Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks
On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless
More informationComplementary Graph Coloring
International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Complementary Graph Coloring Mohamed Al-Ibrahim a*,
More informationAn improved energy Minimum Connected Dominating Sets Construction Algorithm in MANET Zifen YANG 1, a, Guoqiang LI 1, b Li LIU 1, c
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) An improved energy Minimum Connected Dominating Sets Construction Algorithm in MANET Zifen YANG 1,
More informationEfficient Self Protection Algorithms for Wireless Sensor Networks
Efficient Self Protection Algorithms for Wireless Sensor Networks Yu Wang Dept. of Computer Science University of North Carolina at Charlotte Charlotte, NC 28223, USA Email: ywang32@uncc.edu Xiang-Yang
More informationAn Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks
Georgia State University ScholarWorks @ Georgia State University Computer Science Theses Department of Computer Science 12-4-2006 An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks
More informationThese notes present some properties of chordal graphs, a set of undirected graphs that are important for undirected graphical models.
Undirected Graphical Models: Chordal Graphs, Decomposable Graphs, Junction Trees, and Factorizations Peter Bartlett. October 2003. These notes present some properties of chordal graphs, a set of undirected
More informationBottleneck Steiner Tree with Bounded Number of Steiner Vertices
Bottleneck Steiner Tree with Bounded Number of Steiner Vertices A. Karim Abu-Affash Paz Carmi Matthew J. Katz June 18, 2011 Abstract Given a complete graph G = (V, E), where each vertex is labeled either
More informationFlexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract
Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,
More informationOn approximate optimal dual power assignment for biconnectivity and edge-biconnectivity
Theoretical Computer Science 396 (2008) 180 190 www.elsevier.com/locate/tcs On approximate optimal dual power assignment for biconnectivity and edge-biconnectivity Chen Wang a,, Myung-Ah Park b, James
More informationAnonymous Self-Stabilizing Distributed Algorithms for Connected Dominating Set in a Network Graph
Anonymous Self-Stabilizing Distributed Algorithms for Connected Dominating Set in a Network Graph Wayne Goddard and Pradip K Srimani School of Computing Clemson University Clemson, SC 29634 0974 {goddard,
More informationTheorem 2.9: nearest addition algorithm
There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used
More informationAn Eternal Domination Problem in Grids
Theory and Applications of Graphs Volume Issue 1 Article 2 2017 An Eternal Domination Problem in Grids William Klostermeyer University of North Florida, klostermeyer@hotmail.com Margaret-Ellen Messinger
More informationNetwork monitoring: detecting node failures
Network monitoring: detecting node failures 1 Monitoring failures in (communication) DS A major activity in DS consists of monitoring whether all the system components work properly To our scopes, we will
More informationA 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition
A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition Wenjun Li a, Binhai Zhu b, a Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, Changsha
More informationMatching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.
18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have
More informationCME 305: Discrete Mathematics and Algorithms Instructor: Reza Zadeh HW#3 Due at the beginning of class Thursday 02/26/15
CME 305: Discrete Mathematics and Algorithms Instructor: Reza Zadeh (rezab@stanford.edu) HW#3 Due at the beginning of class Thursday 02/26/15 1. Consider a model of a nonbipartite undirected graph in which
More informationEfficient Aggregation Scheduling in Multihop Wireless Sensor Networks with SINR Constraints
1 Efficient Aggregation Scheduling in Multihop Wireless Sensor Networks with SINR Constraints Xiaohua Xu, Xiang-Yang Li, Senior Member, IEEE, and Min Song, Senior Member, IEEE Abstract We study delay efficient
More informationAn Extended Localized Algorithm for Connected Dominating Set Formation in Ad Hoc Wireless Networks
An Extended Localized Algorithm for Connected Dominating Set Formation in Ad Hoc Wireless Networks Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton,
More informationClustering Using Graph Connectivity
Clustering Using Graph Connectivity Patrick Williams June 3, 010 1 Introduction It is often desirable to group elements of a set into disjoint subsets, based on the similarity between the elements in the
More informationProgress Towards the Total Domination Game 3 4 -Conjecture
Progress Towards the Total Domination Game 3 4 -Conjecture 1 Michael A. Henning and 2 Douglas F. Rall 1 Department of Pure and Applied Mathematics University of Johannesburg Auckland Park, 2006 South Africa
More informationApproximability Results for the p-center Problem
Approximability Results for the p-center Problem Stefan Buettcher Course Project Algorithm Design and Analysis Prof. Timothy Chan University of Waterloo, Spring 2004 The p-center
More informationDiscrete mathematics
Discrete mathematics Petr Kovář petr.kovar@vsb.cz VŠB Technical University of Ostrava DiM 470-2301/02, Winter term 2018/2019 About this file This file is meant to be a guideline for the lecturer. Many
More informationAlgorithmic aspects of k-domination in graphs
PREPRINT 國立臺灣大學數學系預印本 Department of Mathematics, National Taiwan University www.math.ntu.edu.tw/~mathlib/preprint/2012-08.pdf Algorithmic aspects of k-domination in graphs James K. Lan and Gerard Jennhwa
More informationMaintaining CDS in Mobile Ad Hoc Networks
Maintaining CDS in Mobile Ad Hoc Networks Kazuya Sakai 1, Min-Te Sun 2, Wei-Shinn Ku 1,andHiromiOkada 3 1 Auburn University, Auburn, AL 36849-5347, USA {sakaika,weishinn}@auburn.edu 2 National Central
More informationOutline. Introduction. Outline. Introduction (Cont.) Introduction (Cont.)
An Energy-Efficient Distributed Algorithm for Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks Yingshu Li, Longjiang Guo, and Sushil K. Prasad Department of Computer Science, Georgia
More informationOn 2-Subcolourings of Chordal Graphs
On 2-Subcolourings of Chordal Graphs Juraj Stacho School of Computing Science, Simon Fraser University 8888 University Drive, Burnaby, B.C., Canada V5A 1S6 jstacho@cs.sfu.ca Abstract. A 2-subcolouring
More informationOn Two Combinatorial Optimization Problems in Graphs: Grid Domination and Robustness
On Two Combinatorial Optimization Problems in Graphs: Grid Domination and Robustness by Elaheh Fata A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree
More informationEfficient Directional Network Backbone Construction in Mobile Ad Hoc Networks
Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks Shuhui Yang, Jie Wu, and Fei Dai Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 12180 Department
More informationOn the Parameterized Max-Leaf Problems: Digraphs and Undirected Graphs
On the Parameterized Max-Leaf Problems: Digraphs and Undirected Graphs Jianer Chen and Yang Liu Department of Computer Science Texas A&M University College Station, TX 77843, USA {chen,yangliu}@cs.tamu.edu
More informationDistributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-hoc Sensor Networks
2014 IEEE 17th International Conference on Computational Science and Engineering Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-hoc Sensor
More informationThe geometric generalized minimum spanning tree problem with grid clustering
4OR (2006) 4:319 329 DOI 10.1007/s10288-006-0012-6 REGULAR PAPER The geometric generalized minimum spanning tree problem with grid clustering Corinne Feremans Alexander Grigoriev René Sitters Received:
More informationChordal Graphs: Theory and Algorithms
Chordal Graphs: Theory and Algorithms 1 Chordal graphs Chordal graph : Every cycle of four or more vertices has a chord in it, i.e. there is an edge between two non consecutive vertices of the cycle. Also
More informationGraph Representations and Traversal
COMPSCI 330: Design and Analysis of Algorithms 02/08/2017-02/20/2017 Graph Representations and Traversal Lecturer: Debmalya Panigrahi Scribe: Tianqi Song, Fred Zhang, Tianyu Wang 1 Overview This lecture
More informationSharp lower bound for the total number of matchings of graphs with given number of cut edges
South Asian Journal of Mathematics 2014, Vol. 4 ( 2 ) : 107 118 www.sajm-online.com ISSN 2251-1512 RESEARCH ARTICLE Sharp lower bound for the total number of matchings of graphs with given number of cut
More informationAdvanced Methods in Algorithms HW 5
Advanced Methods in Algorithms HW 5 Written by Pille Pullonen 1 Vertex-disjoint cycle cover Let G(V, E) be a finite, strongly-connected, directed graph. Let w : E R + be a positive weight function dened
More informationAn efficient implementation of the greedy forwarding strategy
An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at
More informationEfficient Algorithm for the Paired-Domination Problem in Convex Bipartite Graphs
Efficient Algorithm for the Paired-Domination Problem in Convex Bipartite Graphs Ruo-ei Hung, Chi-Hyi Laio, and Chun-Kai ang Abstract Let G =(V,E) be a graph without isolated vertices. A matching in G
More informationPERFECT MATCHING THE CENTRALIZED DEPLOYMENT MOBILE SENSORS THE PROBLEM SECOND PART: WIRELESS NETWORKS 2.B. SENSOR NETWORKS OF MOBILE SENSORS
SECOND PART: WIRELESS NETWORKS 2.B. SENSOR NETWORKS THE CENTRALIZED DEPLOYMENT OF MOBILE SENSORS I.E. THE MINIMUM WEIGHT PERFECT MATCHING 1 2 ON BIPARTITE GRAPHS Prof. Tiziana Calamoneri Network Algorithms
More informationByzantine Consensus in Directed Graphs
Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory
More information