On balanced edge connectivity and applications to some bottleneck augmentation problems in networks
نویسنده
چکیده
Let w i : V V ! Q, i = 1; 2 be two weight functions on the possible edges of a directed or undirected graph with vertex set V such that for the cut function, the inequality w2 (T) := X i2T j6 2T w 2 (ij) 0; holds for every T 2 2 V. We consider the computation of the value ~ (w 1 ; w 2 ; k) deened by ~ (w 1 ; w 2 ; k) := minfl j w1 (T) + l w2 (T) k 8 ; T V g : We show that the associated decision problem is NP-complete, but for a class of instances we can give a polynomial time algorithm. This class is closely related to the following bottleneck augmentation problem. Consider a network N = (V; E; c) with a rational valued capacity function c: V V ! Q + , and let k be a positive, rational number. Consider the problem of nding a capacity function c 0 : V V ! Q + such that, in the resulting network N 0 = (V; E; c + c 0) the edge connectivity number c+c 0 is at least k, and the maximal increase c 0 (ij) is minimal. We give an algorithm which computes such an augmentation in strongly polynomial time.
منابع مشابه
A Survey on Complexity of Integrity Parameter
Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including toughness, binding number, rate of disruption, neighbor-connectivity, integrity, mean integrity, edgeconnectivity vector, l-connectivity and tenacity. In this paper we discuss Integrity and its properties in vulnerability calculation. The integrity of a graph G, I(G), is defined t...
متن کاملRepresenting a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors
Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...
متن کاملA Survey On the Vulnerability Parameters of Networks
The analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. One is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. In terms of a graph, the concept of connectedness is used in dierent forms to study many of the measures of vulnerability. When certain vert...
متن کاملRepresenting a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors
Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...
متن کاملEdge-Connectivity Augmentation Problems
The problem in which the object is to add a minimum weight set of edges to a graph so as to satisfy a given condition is called the augmentation problem. This problem has a wide variety [3-5, 10, 11, 14-201. If such a given condition is concerned with the vertexor edge-connectivity of a graph then the problem is referred to as the (vertexor edge-) connectivity augmentation problem. Frank and Ch...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Math. Meth. of OR
دوره 43 شماره
صفحات -
تاریخ انتشار 1996