-
Complexity Dichotomies for the Minimum F-Overlay Problem
Authors:
Nathann Cohen,
Frédéric Havet,
Dorian Mazauric,
Ignasi Sau,
Rémi Watrigant
Abstract:
For a (possibly infinite) fixed family of graphs F, we say that a graph G overlays F on a hypergraph H if V(H) is equal to V(G) and the subgraph of G induced by every hyperedge of H contains some member of F as a spanning subgraph.While it is easy to see that the complete graph on |V(H)| overlays F on a hypergraph H whenever the problem admits a solution, the Minimum F-Overlay problem asks for suc…
▽ More
For a (possibly infinite) fixed family of graphs F, we say that a graph G overlays F on a hypergraph H if V(H) is equal to V(G) and the subgraph of G induced by every hyperedge of H contains some member of F as a spanning subgraph.While it is easy to see that the complete graph on |V(H)| overlays F on a hypergraph H whenever the problem admits a solution, the Minimum F-Overlay problem asks for such a graph with the minimum number of edges.This problem allows to generalize some natural problems which may arise in practice. For instance, if the family F contains all connected graphs, then Minimum F-Overlay corresponds to the Minimum Connectivity Inference problem (also known as Subset Interconnection Design problem) introduced for the low-resolution reconstruction of macro-molecular assembly in structural biology, or for the design of networks.Our main contribution is a strong dichotomy result regarding the polynomial vs. NP-hard status with respect to the considered family F. Roughly speaking, we show that the easy cases one can think of (e.g. when edgeless graphs of the right sizes are in F, or if F contains only cliques) are the only families giving rise to a polynomial problem: all others are NP-complete.We then investigate the parameterized complexity of the problem and give similar sufficient conditions on F that give rise to W[1]-hard, W[2]-hard or FPT problems when the parameter is the size of the solution.This yields an FPT/W[1]-hard dichotomy for a relaxed problem, where every hyperedge of H must contain some member of F as a (non necessarily spanning) subgraph.
△ Less
Submitted 15 March, 2017;
originally announced March 2017.
-
Extracting the Groupwise Core Structural Connectivity Network: Bridging Statistical and Graph-Theoretical Approaches
Authors:
Nahuel Lascano,
Guillermo Gallardo,
Rachid Deriche,
Dorian Mazauric,
Demian Wassermann
Abstract:
Finding the common structural brain connectivity network for a given population is an open problem, crucial for current neuro-science. Recent evidence suggests there's a tightly connected network shared between humans. Obtaining this network will, among many advantages , allow us to focus cognitive and clinical analyses on common connections, thus increasing their statistical power. In turn, knowl…
▽ More
Finding the common structural brain connectivity network for a given population is an open problem, crucial for current neuro-science. Recent evidence suggests there's a tightly connected network shared between humans. Obtaining this network will, among many advantages , allow us to focus cognitive and clinical analyses on common connections, thus increasing their statistical power. In turn, knowledge about the common network will facilitate novel analyses to understand the structure-function relationship in the brain. In this work, we present a new algorithm for computing the core structural connectivity network of a subject sample combining graph theory and statistics. Our algorithm works in accordance with novel evidence on brain topology. We analyze the problem theoretically and prove its complexity. Using 309 subjects, we show its advantages when used as a feature selection for connectivity analysis on populations, outperforming the current approaches.
△ Less
Submitted 9 January, 2017; v1 submitted 5 January, 2017;
originally announced January 2017.
-
Energy Efficient Routing by Switching-Off Network Interfaces
Authors:
Frédéric Giroire,
Dorian Mazauric,
Joanna Moulierac
Abstract:
Several studies exhibit that the traffic load of the routers only has a small influence on their energy consumption. Hence, the power consumption in networks is strongly related to the number of active network elements, such as interfaces, line cards, base chassis,... The goal thus is to find a routing that minimizes the (weighted) number of active network elements used when routing. In this paper…
▽ More
Several studies exhibit that the traffic load of the routers only has a small influence on their energy consumption. Hence, the power consumption in networks is strongly related to the number of active network elements, such as interfaces, line cards, base chassis,... The goal thus is to find a routing that minimizes the (weighted) number of active network elements used when routing. In this paper, we consider a simplified architecture where a connection between two routers is represented as a link joining two network interfaces. When a connection is not used, both network interfaces can be turned off. Therefore, in order to reduce power consumption, the goal is to find the routing that minimizes the number of used links while satisfying all the demands. We first define formally the problem and we model it as an integer linear program. Then, we prove that this problem is not in APX, that is there is no polynomial-time constant-factor approximation algorithm. We propose a heuristic algorithm for this problem and we also prove some negative results about basic greedy and probabilistic algorithms. Thus we present a study on specific topologies, such as trees, grids and complete graphs, that provide bounds and results useful for real topologies. We then exhibit the gain in terms of number of network interfaces (leading to a global reduction of approximately 33 MWh for a medium-sized backbone network) for a set of existing network topologies: we see that for almost all topologies more than one third of the network interfaces can be spared for usual ranges of operation. Finally, we discuss the impact of energy efficient routing on the stretch factor and on fault tolerance.
△ Less
Submitted 4 October, 2014;
originally announced October 2014.
-
Can Selfish Groups be Self-Enforcing?
Authors:
Guillaume Ducoffe,
Dorian Mazauric,
Augustin Chaintreau
Abstract:
Algorithmic graph theory has thoroughly analyzed how, given a network describing constraints between various nodes, groups can be formed among these so that the resulting configuration optimizes a \emph{global} metric. In contrast, for various social and economic networks, groups are formed \emph{de facto} by the choices of selfish players. A fundamental problem in this setting is the existence an…
▽ More
Algorithmic graph theory has thoroughly analyzed how, given a network describing constraints between various nodes, groups can be formed among these so that the resulting configuration optimizes a \emph{global} metric. In contrast, for various social and economic networks, groups are formed \emph{de facto} by the choices of selfish players. A fundamental problem in this setting is the existence and convergence to a \emph{self-enforcing} configuration: assignment of players into groups such that no player has an incentive to move into another group than hers. Motivated by information sharing on social networks -- and the difficult tradeoff between its benefits and the associated privacy risk -- we study the possible emergence of such stable configurations in a general selfish group formation game.
Our paper considers this general game for the first time, and it completes its analysis. We show that convergence critically depends on the level of \emph{collusions} among the players -- which allow multiple players to move simultaneously as long as \emph{all of them} benefit. Solving a previously open problem we exactly show when, depending on collusions, convergence occurs within polynomial time, non-polynomial time, and when it never occurs. We also prove that previously known bounds on convergence time are all loose: by a novel combinatorial analysis of the evolution of this game we are able to provide the first \emph{asymptotically exact} formula on its convergence. Moreover, we extend these results by providing a complete analysis when groups may \emph{overlap}, and for general utility functions representing \emph{multi-modal} interactions. Finally, we prove that collusions have a significant and \emph{positive} effect on the \emph{efficiency} of the equilibrium that is attained.
△ Less
Submitted 12 February, 2014; v1 submitted 16 December, 2012;
originally announced December 2012.
-
A distributed algorithm for computing and updating the process number of a forest
Authors:
David Coudert,
Florian Huc,
Dorian Mazauric
Abstract:
In this paper, we present a distributed algorithm to compute various parameters of a tree such as the process number, the edge search number or the node search number and so the pathwidth. This algorithm requires n steps, an overall computation time of O(n log(n)), and n messages of size log_3(n)+3. We then propose a distributed algorithm to update the process number (or the node search number,…
▽ More
In this paper, we present a distributed algorithm to compute various parameters of a tree such as the process number, the edge search number or the node search number and so the pathwidth. This algorithm requires n steps, an overall computation time of O(n log(n)), and n messages of size log_3(n)+3. We then propose a distributed algorithm to update the process number (or the node search number, or the edge search number) of each component of a forest after adding or deleting an edge. This second algorithm requires O(D) steps, an overall computation time of O(D log(n)), and O(D) messages of size log_3(n)+3, where D is the diameter of the modified connected component. Finally, we show how to extend our algorithms to trees and forests of unknown size using messages of less than 2a+4+e bits, where a is the parameter to be determined and e=1 for updates algorithms.
△ Less
Submitted 27 June, 2008; v1 submitted 17 June, 2008;
originally announced June 2008.