Skip to main content

Showing 1–9 of 9 results for author: Johnson, M P

Searching in archive cs. Search in all archives.
.
  1. arXiv:1807.08065  [pdf, other

    cs.DS

    Red-Blue-Partitioned MST, TSP, and Matching

    Authors: Matthew P. Johnson

    Abstract: Arkin et al.~\cite{ArkinBCCJKMM17} recently introduced \textit{partitioned pairs} network optimization problems: given a metric-weighted graph on $n$ pairs of nodes, the task is to color one node from each pair red and the other blue, and then to compute two separate \textit{network structures} or disjoint (node-covering) subgraphs of a specified sort, one on the graph induced by the red nodes and… ▽ More

    Submitted 25 July, 2018; v1 submitted 20 July, 2018; originally announced July 2018.

    Comments: full version (conference version in CCCG 2018)

  2. arXiv:1807.00030  [pdf, other

    cs.DS

    Deciding the Closure of Inconsistent Rooted Triples is NP-Complete

    Authors: Matthew P. Johnson

    Abstract: Interpreting three-leaf binary trees or {\em rooted triples} as constraints yields an entailment relation, whereby binary trees satisfying some rooted triples must also thus satisfy others, and thence a closure operator, which is known to be polynomial-time computable. This is extended to inconsistent triple sets by defining that a triple is entailed by such a set if it is entailed by any consiste… ▽ More

    Submitted 29 June, 2018; originally announced July 2018.

  3. arXiv:1510.07358  [pdf, ps, other

    cs.GT

    Selfish Knapsack

    Authors: Itai Feigenbaum, Matthew P. Johnson

    Abstract: We consider a selfish variant of the knapsack problem. In our version, the items are owned by agents, and each agent can misrepresent the set of items she owns---either by avoiding reporting some of them (understating), or by reporting additional ones that do not exist (overstating). Each agent's objective is to maximize, within the items chosen for inclusion in the knapsack, the total valuation o… ▽ More

    Submitted 27 February, 2016; v1 submitted 25 October, 2015; originally announced October 2015.

  4. arXiv:1303.3660  [pdf, other

    cs.NI cs.DS

    Computing Traversal Times on Dynamic Markovian Paths

    Authors: Philippe Nain, Don Towsley, Matthew P. Johnson, Prithwish Basu, Amotz Bar-Noy, Feng Yu

    Abstract: In source routing, a complete path is chosen for a packet to travel from source to destination. While computing the time to traverse such a path may be straightforward in a fixed, static graph, doing so becomes much more challenging in dynamic graphs, in which the state of an edge in one time slot (i.e., its presence or absence) is random, and may depend on its state in the previous time step. The… ▽ More

    Submitted 14 March, 2013; originally announced March 2013.

    Comments: 11 pages, 1 figure

  5. arXiv:1212.6176  [pdf, other

    cs.DS

    Secluded Connectivity Problems

    Authors: Shiri Chechik, M. P. Johnson, Merav Parter, David Peleg

    Abstract: Consider a setting where possibly sensitive information sent over a path in a network is visible to every {neighbor} of the path, i.e., every neighbor of some node on the path, thus including the nodes on the path itself. The exposure of a path $P$ can be measured as the number of nodes adjacent to it, denoted by $N[P]$. A path is said to be secluded if its exposure is small. A similar measure can… ▽ More

    Submitted 26 December, 2012; originally announced December 2012.

  6. arXiv:1108.0894  [pdf, other

    cs.SI

    Evader Interdiction and Collateral Damage

    Authors: Matthew P. Johnson, Alexander Gutfraind

    Abstract: In network interdiction problems, evaders (e.g., hostile agents or data packets) may be moving through a network towards targets and we wish to choose locations for sensors in order to intercept the evaders before they reach their destinations. The evaders might follow deterministic routes or Markov chains, or they may be reactive}, i.e., able to change their routes in order to avoid sensors place… ▽ More

    Submitted 3 August, 2011; originally announced August 2011.

    Comments: Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS) 2011

    Report number: LA-UR-11-10123 ACM Class: E.1; F.2; G.1.2

  7. arXiv:1107.4624  [pdf, ps, other

    cs.CG cs.DM cs.DS math.CO

    Computing the obstacle number of a plane graph

    Authors: Matthew P. Johnson, Deniz Sarioz

    Abstract: An obstacle representation of a plane graph G is V(G) together with a set of opaque polygonal obstacles such that G is the visibility graph on V(G) determined by the obstacles. We investigate the problem of computing an obstacle representation of a plane graph (ORPG) with a minimum number of obstacles. We call this minimum size the obstacle number of G. First, we show that ORPG is NP-hard by red… ▽ More

    Submitted 12 August, 2011; v1 submitted 22 July, 2011; originally announced July 2011.

    Comments: 7 pages, 3 figures

    MSC Class: 68R10; 05C10; 05C62; 65D18 ACM Class: F.2.2; G.2.2

  8. arXiv:1107.2432  [pdf, ps, other

    cs.GT cs.DM

    Funding Games: the Truth but not the Whole Truth

    Authors: Amotz Bar-Noy, Yi Gai, Matthew P. Johnson, Bhaskar Krishnamachari, George Rabanca

    Abstract: We introduce the Funding Game, in which $m$ identical resources are to be allocated among $n$ selfish agents. Each agent requests a number of resources $x_i$ and reports a valuation $\tilde{v}_i(x_i)$, which verifiably {\em lower}-bounds $i$'s true value for receiving $x_i$ items. The pairs $(x_i, \tilde{v}_i(x_i))$ can be thought of as size-value pairs defining a knapsack problem with capacity… ▽ More

    Submitted 15 November, 2012; v1 submitted 12 July, 2011; originally announced July 2011.

  9. arXiv:1012.0260  [pdf, other

    cs.NI cs.DM cs.SI physics.soc-ph

    Modeling and Analysis of Time-Varying Graphs

    Authors: Prithwish Basu, Amotz Bar-Noy, Ram Ramanathan, Matthew P. Johnson

    Abstract: We live in a world increasingly dominated by networks -- communications, social, information, biological etc. A central attribute of many of these networks is that they are dynamic, that is, they exhibit structural changes over time. While the practice of dynamic networks has proliferated, we lag behind in the fundamental, mathematical understanding of network dynamism. Existing research on time-v… ▽ More

    Submitted 1 December, 2010; originally announced December 2010.

    Comments: 11 pages, Twocolumn, 10pt font, 8 figures, 1 table