Skip to main content

A Divide-and-Conquer Algorithm for Computing a Most Reliable Source on an Unreliable Ring-Embedded Tree

  • Conference paper
Book cover Combinatorial Optimization and Applications (COCOA 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6509))

Abstract

Given an unreliable communication network, we seek a most reliable source (MRS) of the network, which maximizes the expected number of nodes that are reachable from it. The problem of computing an MRS in general graphs is #P-hard. However, this problem in tree networks has been solved in a linear time. A tree network has a weakness of low capability of failure tolerance. Embedding rings into it by adding some additional certain edges to it can enhance its failure tolerance, resulting in another class of sparse networks, called the ring-tree networks. This class of network also has an underlying tree-like topology, leading to its advantage of being easily administrated. This paper concerns with an important case whose underlying topology is a strip graph, called λ–rings network, and focuses on an unreliable λ–rings network where each link has an independent operational probability while all nodes are immune to failures. We apply the Divide-and-Conquer approach to design a fast algorithm for computing its an MRS, and employ a binary division tree (BDT) to analyze its time complexity to be \(O(\|\lambda\|^2_2+\lceil\mathrm{log}|\lambda|\rceil\cdot\|\lambda\|_1)\).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ball, M.O., Lin, F.L.: A Reliability Model Applied to Emergency Service Vehicle Location. Oper. Res. 41(1), 18–36 (1993)

    Article  MATH  Google Scholar 

  2. Ball, M.O., Provan, J.S., Shier, D.R.: Reliability Covering Problems. Networks 21(3), 345–357 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  3. Bondy, J.A., Murty, U.S.R.: Graph Theory with Application. Macmillan, London (1976)

    Book  MATH  Google Scholar 

  4. Colbourn, C.J.: The Combinatorics of Network Reliability. Oxford University Press, New York (1987)

    Google Scholar 

  5. Colbourn, C.J., Xue, G.: A Linear Time Algorithms for Computing the Most Reliable Source on a Series-Parallel Graph with Unreliable Edges. Theor. Comput. Sci. 209, 331–345 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  6. Ding, W.: Computing the Most Reliable Source on Stochastic Ring Networks. In: WRI World Congress on Software Engineering 2009, Xiamen, China, May 19-21, vol. 1, pp. 345–347 (2009)

    Google Scholar 

  7. Ding, W., Xue, G.: A Linear Time Algorithm for Computing a Most Reliable Source on a Tree Network with Faulty Nodes. Theor. Comput. Sci. (2009), doi:10.1016/j.tcs.2009.08.003

    Google Scholar 

  8. Eiselt, H.A., Gendreau, M., Laporte, G.: Location of Facilities on a Network Subject to a Single-Edge Failure. Networks 22(3), 231–246 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  9. Even, G., Naor, J.S., Rao, S., Schieber, B.: Divide-and-conquer approximation algorithms via spreading metrics. Journal of the ACM 47(4), 585–616 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  10. Hoare, C.A.R.: Quicksort. The Computer Journal 5(1), 10–16 (1962)

    Article  MathSciNet  MATH  Google Scholar 

  11. Melachrinoudis, E., Helander, M.E.: A Single Facility Location Problem on a Tree with Unreliable Edges. Networks 27(3), 219–237 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  12. Mirchandani, P.B., Odoni, A.R.: Locations of Medians on Stochastic Networks. Transport. Sci. 13, 85–97 (1979)

    Article  MathSciNet  Google Scholar 

  13. Nel, L.D., Colbourn, C.J.: Locating a Broadcast Facility in an Unreliable Network. INFOR. 28, 363–379 (1990)

    MATH  Google Scholar 

  14. Shier, D.R.: Network Reliability and Algebraic Structure. Oxford University Press, New York (1991)

    MATH  Google Scholar 

  15. West, D.B.: Introduction to Graph Theorey. Prentice Hall, Englewood Cliffs (2001)

    Google Scholar 

  16. Wu, I.-C., Kung, H.T.: Communication Complexity for Parallel Divide-and-Conquer. In: Proceedings of the 32nd Annual Symposium on Foundations of Computer Science (FOCS 1991), San Juan, Puerto Rico, pp. 151–162 (October 1991)

    Google Scholar 

  17. Xue, G.: Linear Time Algorithms for Computing the Most Reliable Source on an Unreliable Tree Network. Networks 30(1), 37–45 (1997)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ding, W., Xue, G. (2010). A Divide-and-Conquer Algorithm for Computing a Most Reliable Source on an Unreliable Ring-Embedded Tree. In: Wu, W., Daescu, O. (eds) Combinatorial Optimization and Applications. COCOA 2010. Lecture Notes in Computer Science, vol 6509. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17461-2_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17461-2_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17460-5

  • Online ISBN: 978-3-642-17461-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics