4.3 Article

The 4-set tree connectivity of (n, k)-star networks

Journal

THEORETICAL COMPUTER SCIENCE
Volume 844, Issue -, Pages 81-86

Publisher

ELSEVIER
DOI: 10.1016/j.tcs.2020.08.004

Keywords

Network; Fault-tolerance; (n, k)-Star graph; Generalized connectivity; Tree

Ask authors/readers for more resources

The tree connectivity, as a generalization of the traditional connectivity, can serve to measure the capability of connection for vertices in a network. The (n, k)-star graph S-n,S-k can be used to model the topological structure of a large-scale parallel processing system. We show in this article that the 4-set tree connectivity of S-n,S-k is n - 2, that is, there exist (n - 2) internally disjoint trees connecting x, y, z and w in S-n,S-k for four arbitrary vertices x, y, z and w of S-n,S-k. Two known results about the 3-set tree connectivity of star graphs and (n, k)-star graphs are immediate consequences of our result. (C) 2020 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
Article Computer Science, Theory & Methods

Revisiting maximum satisfiability and related problems in data streams

Hoa T. Vu

Summary: This paper addresses the maximum satisfiability problem in the data stream model. It presents algorithms that achieve approximations to the optimum value and corresponding Boolean assignments in sublinear space complexity. The paper also discusses related problems and provides approximation algorithms and space complexity for them.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Distributed half-integral matching and beyond

Sameep Dahal, Jukka Suomela

Summary: This research demonstrates that finding a maximal fractional matching in distributed graph algorithms requires the use of fine-grained fractional values, and gives a specific characterization of the small value requirements, with a denominator of at least 2d. It also provides a new algorithm to meet these requirements.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

The computational complexity of Holant problems on 3-regular graphs

Peng Yang, Yuan Huang, Zhiguo Fu

Summary: This paper investigates the computational complexity classification of Holant problems on 3-regular graphs and provides corresponding conclusions.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

The energy complexity of diameter and minimum cut computation in bounded-genus networks

Yi-Jun Chang

Summary: This paper investigates the energy complexity of distributed graph problems in multi-hop radio networks. Recent studies have shown that some problems can be solved with energy-efficient algorithms, while others require significant energy consumption. To improve energy efficiency, this paper focuses on bounded-genus graphs and proposes corresponding algorithms.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Algorithms for 2-club cluster deletion problems using automated generation of branching rules

Dekel Tsur

Summary: This paper proposes algorithms for 2-CLUB CLUSTER VERTEX DELETION and 2-CLUB CLUSTER EDGE DELETION problems. The algorithms have running times of O*(3.104k) and O*(2.562k) respectively, and were obtained using automated generation of branching rules. These results improve upon previous algorithms for the same problems.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

An approximation algorithm for diversity-aware fair k-supplier problem

Xianrun Chen, Sai Ji, Chenchen Wu, Yicheng Xu, Yang Yang

Summary: This paper introduces the diversity-aware fair k-supplier problem and presents an efficient 5-approximation algorithm to address the fairness and over-representation issues in facility selection.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Computational complexity of jumping block puzzles

Masaaki Kanzaki, Yota Otachi, Giovanni Viglietta, Ryuhei Uehara

Summary: Sliding block puzzles play a crucial role in computational complexity, with their complexity varying depending on the rules and set of pieces. In this study, we explore the computational complexities of jumping block puzzles, a newer concept in the puzzle community. We analyze different variants of these puzzles based on real puzzles and a natural model, and determine their complexities. Our findings show that these puzzles are generally PSPACE-complete, with additional cases being NP-complete or solvable in polynomial-time.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Popular critical matchings in the many-to-many setting

Meghana Nasre, Prajakta Nimbhorkar, Keshav Ranjan, Ankita Sarkar

Summary: This paper studies the many-to-many bipartite matching problem with two-sided preferences and two-sided lower quotas. By defining the concept of critical matching, the goal is to find a popular matching in the set of critical matchings, and an efficient algorithm is proposed to compute a popular matching of the largest size.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Space efficient algorithm for solving reachability using tree decomposition and separators

Rahul Jain, Raghunath Tewari

Summary: To solve the reachability problem is to determine if there is a path between two vertices in a graph. This paper studies space-efficient algorithms that run in polynomial time to decide reachability. An algorithm is presented that solves reachability in directed graphs using O(n log n) space.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

A tour of general Hanoi graphs

Daniel Berend, Liat Cohen, Omrit Filtser

Summary: The Tower of Hanoi puzzle has been a fascination for mathematicians and theoretical computer scientists for over a century. By using graph theory, we can study connectivity, shortest paths, and other properties of the Hanoi puzzle. Additionally, the Hanoi graphs are related to interesting structures such as the Sierpinski gasket and Gray codes.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Selfish bin packing with punishment

Ling Gai, Weiwei Zhang, Zhao Zhang

Summary: This paper studies the problem of selfish bin packing with punishment. Different types of punishments are considered, and it is shown that punishment based on the result can achieve better performance with an upper bound of approximately 1.48 compared to the optimal solution.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Gradient complexity and non-stationary views of differentially private empirical risk minimization

Di Wang, Jinhui Xu

Summary: This paper studies the problem of Differentially Private Empirical Risk Minimization (DP-ERM) with both convex and non-convex loss functions. Several new methods are proposed for DP-ERM with smooth convex loss functions, achieving near-optimal expected excess risks while reducing gradient complexity. For DP-ERM with non-convex loss functions, both low and high dimensional spaces are explored, and utility measurements are introduced using different norms and error bounds. The paper reveals that certain non-convex loss functions can be reduced to a level similar to convex loss functions.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Weights of formal languages based on geometric series with an application to automatic grading

Florian Bruse, Maurice Herwig, Martin Lange

Summary: This paper presents a weight measure for formal languages based on the summands of a geometric series discounted by the fraction of words of certain length in the language. It shows that this weight measure is computable for regular languages. As an application, a distance metric between languages is derived as the weight of their symmetric difference, which can be used in automatic grading of standard exercises in formal language theory classes.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Almost disjoint paths and separating by forbidden pairs

Oliver Bachtler, Tim Bergner, Sven O. Krumke

Summary: By studying the almost disjoint paths problem and the separating by forbidden pairs problem, this paper reveals that they have an unbounded duality gap and analyzes their complexity. In addition, for a fixed value of k, an efficient algorithm is proposed to solve the ADP problem.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

From multivalued to Boolean functions: Preservation of soft nested canalization

Elisabeth Remy, Paul Ruet

Summary: This paper studies the extension of the nested canalization property to multivalued functions and investigates the effect of the Van Ham mapping on this property. The study finds that the Van Ham mapping transforms softly nested canalizing multivalued functions into nested canalization Boolean functions, a property that is also relevant in the modeling of gene regulatory networks.

THEORETICAL COMPUTER SCIENCE (2024)