Distributed Algorithms for Finding Central Paths in Tree Networks

نویسنده

  • Esther Jennings
چکیده

Given a graph G = (V,E) and a path P , let d(v, P ) be the distance from vertex v ∈ V to path P . A path-center is a path which minimizes the eccentricity e(P ) = maxv∈V d(v, P ) such that for every path P ′ in G, e(P ) ≤ e(P ′), and for every subpath P ′′ ⊂ P , e(P ) < e(P ′′). Similarly, a core is a path which minimizes the distance d(P ) = ∑v∈V d(v, P ) such that for every path P ′ in G, d(P ) ≤ d(P ′), and for every subpath P ′′ ⊂ P , d(P ) < d(P ′′). We present distributed algorithms for finding path-centers and cores in asynchronous tree networks. We then extend these to compute a subset-centrum path in trees which minimizes the distance with respect to a subset of vertices, dS(v, P ) = ∑ v∈S d(v, P ), where S ⊆ V . The time and communication complexities of these algorithms are O(D) and O(n) respectively, where D is the diameter and n is the number of vertices (edges) of the network. These algorithms are asymptotically optimal.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Algorithm to Obtain Possibly Critical Paths in Imprecise Project Networks

  We consider criticality in project networks having imprecise activity duration times. It is well known that finding all possibly critical paths of an imprecise project network is an NP-hard problem. Here, based on a method for finding critical paths of crisp networks by using only the forward recursion of critical path method, for the first time an algorithm is proposed which can find all pos...

متن کامل

Quasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks

Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...

متن کامل

Finding Minimum Energy Disjoint Paths in Wireless Ad-Hoc Networks

We develop algorithms for finding minimum energy disjoint paths in an all-wireless network, for both the node and link-disjoint cases. Our major results include a novel polynomial time algorithm that optimally solves the minimum energy 2 link-disjoint paths problem, as well as a polynomial time algorithm for the minimum energy k node-disjoint paths problem. In addition, we present efficient heu...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

Algorithms for Finding Disjoint Paths in Mobile Networks

Disjoint paths are useful in mobile networks for fault tolerance, increasing bandwidth, and achieving better load balance. Communication over multiple disjoint paths is a less expensive alternative to flooding the network. We present a distributed algorithm for finding k disjoint paths, for any given k, between a source S and a destination T in mobile networks where the links have uniform weigh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Comput. J.

دوره 42  شماره 

صفحات  -

تاریخ انتشار 1999