Diameter-related properties of graphs and applications to network reliability theory

نویسنده

  • LOUIS PETINGI
چکیده

Given an undirected graph G = (V,E), two distinguished vertices s and t of G, and a diameter bound D, a D-s, t-path is a path between s and t composed of at most D edges. An edge e is called D-irrelevant if does not belong to any D-s, t-path of G. In this paper we study the problem of efficiently detecting D-irrelevant edges and also study the computational complexity of diameter-related problems in graphs. Detection and subsequent deletion ofD-irrelevant edges have been shown to be fundamental in reducing the computational effort to evaluate the Source-to-terminal Diameter-Constrained reliability of a graph G, R{s,t}(G,D), which is defined as the probability that at least a path between s and t, with at most D edges, survives after deletion of the failed edges (under the assumption that edges fail independently and nodes are perfectly reliable). Among other results, we present sufficient conditions to efficiently recognize irrelevant edges and we present computational results illustrating the importance of embedding a procedure to detect irrelevant edges based on these conditions, within the frame of an algorithm to calculate R{s,t}(G,D), built on a theorem of Moskowitz. These results yield a research path for the theoretical study of the problem of determining families of topologies in which R{s,t}(G,D) can be computed in polynomial time, as the general problem of evaluating this reliability measure is NP-Hard. Key–Words: Network reliability, diameter constraint, paths, factoring, topological reductions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Combinatorial and Computational Properties of a Diameter Constrained Network Reliability Model

This paper is intended as a summary of combinatorial and computational properties of a Diameterconstrained network reliability model. Classical network reliability models are based on the existence of end-toend paths between network nodes, not taking into account the length of these paths; for many applications this is inadequate because the connection will only be established or attain the req...

متن کامل

A Diameter-Constrained Network Reliability model to determine the Probability that a Communication Network meets Delay Constraints

In this paper we provide a summary of results and applications pertaining a Diameter-constrained Network reliability model. Classical network reliability models measure the probability that there exist end-toend paths between network nodes, not taking into account the length of these paths. For many applications this is inadequate because the connection will only be established or attain the re...

متن کامل

finding influential individual in Social Network graphs using CSCS algorithm and shapley value in game theory

In recent years, the social networks analysis gains great deal of attention. Social networks have various applications in different areas namely predicting disease epidemic, search engines and viral advertisements. A key property of social networks is that interpersonal relationships can influence the decisions that they make. Finding the most influential nodes is important in social networks b...

متن کامل

Cayley graph associated to a semihypergroup

The purpose of this paper is the study of Cayley graph associated to a semihypergroup(or hypergroup). In this regards first  we associate a Cayley graph to every semihypergroup and then we study theproperties of this graph, such as  Hamiltonian cycles in this  graph.  Also, by some of examples we will illustrate  the properties and behavior of  these Cayley  graphs, in particulars we show that ...

متن کامل

Interconnection Topologies and Routing for Parallel Processing Systems

The major aims of this work is to give a comparative survey of static interconnection topologies and to discuss their properties with respect to their use as interconnection topolo gies in message passing multi computer systems i e each processing element has its own local memory there is no common memory and the processing elements communicate via message passing To this end it was necessary t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013