Computing 2-twinless blocks
نویسندگان
چکیده
Let $G=(V,E))$ be a directed graph. A $2$-twinless block in $G$ is maximal vertex set $B\subseteq V$ of size at least $2$ such that for each pair distinct vertices $x,y \in B$, and $w\in V\setminus\left\lbrace x,y \right\rbrace $, the $x,y$ are same twinless strongly connected component $G\setminus\left \lbrace w $. In this paper we present algorithms computing blocks
منابع مشابه
Computing the 2-blocks of directed graphs
Let G be a directed graph. A 2-directed block in G is a maximal vertex set C ⊆ V with |C2d| ≥ 2 such that for each pair of distinct vertices x, y ∈ C, there exist two vertex-disjoint paths from x to y and two vertex-disjoint paths from y to x in G. In contrast to the 2-vertex-connected components of G, the subgraphs induced by the 2-directed blocks may consist of few or no edges. In this paper ...
متن کاملTwinless Strongly Connected Components
Tarjan [9], describes how depth first search can be used to identify Strongly Connected Components (SCC) of a directed graph in linear time. It is standard to study Tarjan’s SCC algorithm in most senior undergraduate or introductory graduate computer science algorithms courses. In this paper we introduce the concept of a twinless strongly connected component (TSCC) of a directed graph. Loosely ...
متن کاملGordon Bell: Building Blocks of Computing
G ordon Bell has had a long and varied career: early employee of Digital Equipment Corporation (DEC), designer of many of DEC’s PDP series of minicomputers, leader in computer science at the National Science Foundation, long-time proponent of the Computer History Museum in Mountain View, California, and creator and funder of the Gordon Bell Prize, which ACM awards for improvements to parallel a...
متن کاملComputing Branchwidth Via Efficient Triangulations and Blocks
Minimal triangulations and potential maximal cliques are the main ingredients for a number of polynomial time algorithms on different graph classes computing the treewidth of a graph. Potential maximal cliques are also the main engine of the fastest so far exact (exponential) treewidth algorithm. Based on the recent results of Mazoit, we define the structures that can be regarded as minimal tri...
متن کاملFailure-Oblivious Computing and Boundless Memory Blocks
Memory errors are a common cause of incorrect software execution and security vulnerabilities. We have developed two new techniques that help software continue to execute successfully through memory errors: failure-oblivious computing and boundless memory blocks. The foundation of both techniques is a compiler that generates code that checks accesses via pointers to detect out of bounds accesse...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Discrete mathematics letters
سال: 2021
ISSN: ['2664-2557']
DOI: https://doi.org/10.47443/dml.2020.0037