Skip to main content
Erschienen in: Journal of Combinatorial Optimization 1/2014

01.07.2014

An integer programming framework for critical elements detection in graphs

verfasst von: Alexander Veremyev, Oleg A. Prokopyev, Eduardo L. Pasiliao

Erschienen in: Journal of Combinatorial Optimization | Ausgabe 1/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This study presents an integer programming framework for minimizing the connectivity and cohesiveness properties of a given graph by removing nodes and edges subject to a joint budgetary constraint. The connectivity and cohesiveness metrics are assumed to be general functions of sizes of the remaining connected components and node degrees, respectively. We demonstrate that our approach encompasses, as special cases (possibly, under some mild conditions), several other models existing in the literature, including minimization of the total number of connected node pairs, minimization of the largest connected component size, and maximization of the number of connected components. We discuss computational complexity issues, derive linear mixed integer programming (MIP) formulations, and describe additional modeling enhancements aimed at improving the performance of MIP solvers. We also conduct extensive computational experiments with real-life and randomly generated network instances under various settings that reveal interesting insights and demonstrate advantages and limitations of the proposed framework.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Addis B, Di Summa M, Grosso A (2013) Identifying critical nodes in undirected graphs: Complexity results and polynomial algorithms for the case of bounded treewidth. Discrete Applied Mathematics 161(16/17):2349–2360CrossRefMATHMathSciNet Addis B, Di Summa M, Grosso A (2013) Identifying critical nodes in undirected graphs: Complexity results and polynomial algorithms for the case of bounded treewidth. Discrete Applied Mathematics 161(16/17):2349–2360CrossRefMATHMathSciNet
Zurück zum Zitat Arulselvan A, Commander CW, Elefteriadou L, Pardalos PM (2009) Detecting critical nodes in sparse graphs. Computers & Operations Research 36(7):2193–2200CrossRefMATHMathSciNet Arulselvan A, Commander CW, Elefteriadou L, Pardalos PM (2009) Detecting critical nodes in sparse graphs. Computers & Operations Research 36(7):2193–2200CrossRefMATHMathSciNet
Zurück zum Zitat Arulselvan A, Commander CW, Pardalos PM, Shylo O (2007) Managing network risk via critical node identification, Risk Management in Telecommunication Networks. Springer, Heidelberg Arulselvan A, Commander CW, Pardalos PM, Shylo O (2007) Managing network risk via critical node identification, Risk Management in Telecommunication Networks. Springer, Heidelberg
Zurück zum Zitat Arulselvan A, Commander CW, Shylo O, Pardalos PM (2011) Cardinality-constrained critical node detection problem. In: Gulpinar N, Harrison P, Rustem B (eds) Performance Models and Risk Management in Communications Systems, Springer Optimization and Its Applications, vol 46. Springer, New York, pp 79–91 Arulselvan A, Commander CW, Shylo O, Pardalos PM (2011) Cardinality-constrained critical node detection problem. In: Gulpinar N, Harrison P, Rustem B (eds) Performance Models and Risk Management in Communications Systems, Springer Optimization and Its Applications, vol 46. Springer, New York, pp 79–91
Zurück zum Zitat Bodlaender HL, Hendriks A, Grigoriev A, Grigorieva NV (2010) The valve location problem in simple network topologies. INFORMS Journal on Computing 22(3):433–442CrossRefMATHMathSciNet Bodlaender HL, Hendriks A, Grigoriev A, Grigorieva NV (2010) The valve location problem in simple network topologies. INFORMS Journal on Computing 22(3):433–442CrossRefMATHMathSciNet
Zurück zum Zitat Borgatti SP (2006) Identifying sets of key players in a social network. Computational & Mathematical Organization Theory 12(1):21–34CrossRefMATH Borgatti SP (2006) Identifying sets of key players in a social network. Computational & Mathematical Organization Theory 12(1):21–34CrossRefMATH
Zurück zum Zitat Chung F, Lu L (2002) Connected components in random graphs with given expected degree sequences. Annals of Combinatorics 6(2):125–145CrossRefMATHMathSciNet Chung F, Lu L (2002) Connected components in random graphs with given expected degree sequences. Annals of Combinatorics 6(2):125–145CrossRefMATHMathSciNet
Zurück zum Zitat Chung F, Lu L (2006) The volume of the giant component of a random graph with given expected degrees. SIAM Journal on Discrete Mathematics 20(2):395–411CrossRefMATHMathSciNet Chung F, Lu L (2006) The volume of the giant component of a random graph with given expected degrees. SIAM Journal on Discrete Mathematics 20(2):395–411CrossRefMATHMathSciNet
Zurück zum Zitat Davis TA, Hu Y (2011) The university of florida sparse matrix collection. ACM Transactions on Mathematical Software 38(1):1–25MathSciNet Davis TA, Hu Y (2011) The university of florida sparse matrix collection. ACM Transactions on Mathematical Software 38(1):1–25MathSciNet
Zurück zum Zitat Di Summa M, Grosso A, Locatelli M (2012) Branch and cut algorithms for detecting critical nodes in undirected graphs. Computational Optimization and Applications 53(3):649–680CrossRefMATHMathSciNet Di Summa M, Grosso A, Locatelli M (2012) Branch and cut algorithms for detecting critical nodes in undirected graphs. Computational Optimization and Applications 53(3):649–680CrossRefMATHMathSciNet
Zurück zum Zitat Dinh TN, Xuan Y, Thai MT, Pardalos PM, Znati T (2012) On new approaches of assessing network vulnerability: hardness and approximation. IEEE/ACM Transactions on Networking 20(2):609–619CrossRef Dinh TN, Xuan Y, Thai MT, Pardalos PM, Znati T (2012) On new approaches of assessing network vulnerability: hardness and approximation. IEEE/ACM Transactions on Networking 20(2):609–619CrossRef
Zurück zum Zitat Dinh T.N., Xuan Y., Thai M.T., Park E.K., Znati T. On approximation of new optimization methods for assessing network vulnerability. In INFOCOM, 2010 Proceedings IEEE, pages 1–9, March 2010. Dinh T.N., Xuan Y., Thai M.T., Park E.K., Znati T. On approximation of new optimization methods for assessing network vulnerability. In INFOCOM, 2010 Proceedings IEEE, pages 1–9, March 2010.
Zurück zum Zitat Erdős P, Rényi A (1959) On random graphs. Publicationes Mathematicae Debrecen 6:290–297MathSciNet Erdős P, Rényi A (1959) On random graphs. Publicationes Mathematicae Debrecen 6:290–297MathSciNet
Zurück zum Zitat Faloutsos M., Faloutsos P., Faloutsos C. (1999 ) On power-law relationships of the internet topology. In Proceedings of the ACM-SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer, Communication, pp. 251–262 Faloutsos M., Faloutsos P., Faloutsos C. (1999 ) On power-law relationships of the internet topology. In Proceedings of the ACM-SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer, Communication, pp. 251–262
Zurück zum Zitat Garey M, Johnson D (1979) Computers and Intractability: A Guide to the Theory of NP-completeness. Freeman and Co., New YorkMATH Garey M, Johnson D (1979) Computers and Intractability: A Guide to the Theory of NP-completeness. Freeman and Co., New YorkMATH
Zurück zum Zitat Hewett R. (2011) Toward identification of key breakers in social cyber-physical networks. In Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on, pages 2731–2736, Hewett R. (2011) Toward identification of key breakers in social cyber-physical networks. In Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on, pages 2731–2736,
Zurück zum Zitat Houck DJ, Kim E, O’Reilly GP, Picklesimer DD, Uzunalioglu H (2004) A network survivability model for critical national infrastructures. Bell Labs Technical Journal 8(4):153–172CrossRef Houck DJ, Kim E, O’Reilly GP, Picklesimer DD, Uzunalioglu H (2004) A network survivability model for critical national infrastructures. Bell Labs Technical Journal 8(4):153–172CrossRef
Zurück zum Zitat Köppe Matthias, Louveaux Quentin, Weismantel Robert (2008) Intermediate integer programming representations using value disjunctions. Discrete Optimization 5(2):293–313CrossRefMATHMathSciNet Köppe Matthias, Louveaux Quentin, Weismantel Robert (2008) Intermediate integer programming representations using value disjunctions. Discrete Optimization 5(2):293–313CrossRefMATHMathSciNet
Zurück zum Zitat Lusseau D, Schneider K, Boisseau OJ, Haase P, Slooten E, Dawson SM (2003) The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations. Behavioral Ecology and Sociobiology 54(4):396–405CrossRef Lusseau D, Schneider K, Boisseau OJ, Haase P, Slooten E, Dawson SM (2003) The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations. Behavioral Ecology and Sociobiology 54(4):396–405CrossRef
Zurück zum Zitat Matisziw TC, Murray AT (2009) Modeling \(s-t\) path availability to support disaster vulnerability assessment of network infrastructure. Computers & Operations Research 36(1):16–26CrossRefMATH Matisziw TC, Murray AT (2009) Modeling \(s-t\) path availability to support disaster vulnerability assessment of network infrastructure. Computers & Operations Research 36(1):16–26CrossRefMATH
Zurück zum Zitat Myung Y-S, Kim H-J (2004) A cutting plane algorithm for computing k-edge survivability of a network. European Journal of Operational Research 156(3):579–589CrossRefMATHMathSciNet Myung Y-S, Kim H-J (2004) A cutting plane algorithm for computing k-edge survivability of a network. European Journal of Operational Research 156(3):579–589CrossRefMATHMathSciNet
Zurück zum Zitat Oosten M, Rutten JHGC, Spieksma FCR (2007) Disconnecting graphs by removing vertices: a polyhedral approach. Statistica Neerlandica 61(1):35–60CrossRefMATHMathSciNet Oosten M, Rutten JHGC, Spieksma FCR (2007) Disconnecting graphs by removing vertices: a polyhedral approach. Statistica Neerlandica 61(1):35–60CrossRefMATHMathSciNet
Zurück zum Zitat Ortiz-Arroyo D., Hussain D.M. (2008) An information theory approach to identify sets of key players. In Proceedings of the 1st European Conference on Intelligence and Security Informatics, EuroISI ’08, pages 15–26, Berlin, Heidelberg, Springer-Verlag. Ortiz-Arroyo D., Hussain D.M. (2008) An information theory approach to identify sets of key players. In Proceedings of the 1st European Conference on Intelligence and Security Informatics, EuroISI ’08, pages 15–26, Berlin, Heidelberg, Springer-Verlag.
Zurück zum Zitat Resende MGC, Pardalos PM (eds) (2006) Handbook of optimization in telecommunications. Springer, Resende MGC, Pardalos PM (eds) (2006) Handbook of optimization in telecommunications. Springer,
Zurück zum Zitat Shen S, Smith JC (2012) Polynomial-time algorithms for solving a class of critical node problems on trees and series-parallel graphs. Networks 60(2):103–119MATHMathSciNet Shen S, Smith JC (2012) Polynomial-time algorithms for solving a class of critical node problems on trees and series-parallel graphs. Networks 60(2):103–119MATHMathSciNet
Zurück zum Zitat Shen S, Smith JC, Goli R (2012a) Exact interdiction models and algorithms for disconnecting networks via node deletions. Discrete Optimization 9(3):172–188 Shen S, Smith JC, Goli R (2012a) Exact interdiction models and algorithms for disconnecting networks via node deletions. Discrete Optimization 9(3):172–188
Zurück zum Zitat Shen Y., Nguyen N.P., Xuan Y., Thai M.T. (2012b) On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability. IEEE Transactions on Networking, to appear, Shen Y., Nguyen N.P., Xuan Y., Thai M.T. (2012b) On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability. IEEE Transactions on Networking, to appear,
Zurück zum Zitat Ventresca M (2012) Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem. Computers & Operations Research 39(11):2763–2775CrossRefMATHMathSciNet Ventresca M (2012) Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem. Computers & Operations Research 39(11):2763–2775CrossRefMATHMathSciNet
Zurück zum Zitat Ventresca M, Aleman D (2014) A derandomized approximation algorithm for the critical node detection problem. Computers & Operations Research 43:261–270CrossRefMathSciNet Ventresca M, Aleman D (2014) A derandomized approximation algorithm for the critical node detection problem. Computers & Operations Research 43:261–270CrossRefMathSciNet
Zurück zum Zitat Veremyev A., Boginski V., Pasiliao E.L. (2013) Exact identification of critical nodes in sparse networks via new compact formulations. Optimization Letters, pages 1–15 Veremyev A., Boginski V., Pasiliao E.L. (2013) Exact identification of critical nodes in sparse networks via new compact formulations. Optimization Letters, pages 1–15
Zurück zum Zitat Walteros JL, Pardalos PM (2012) Selected topics in critical element detection. In: Daras Nicholas J (ed) Applications of Mathematics and Informatics in Military Science, Springer Optimization and Its Applications, vol 71. Springer, New York, pp 9–26CrossRef Walteros JL, Pardalos PM (2012) Selected topics in critical element detection. In: Daras Nicholas J (ed) Applications of Mathematics and Informatics in Military Science, Springer Optimization and Its Applications, vol 71. Springer, New York, pp 9–26CrossRef
Zurück zum Zitat Yannakakis M. Node-and edge-deletion np-complete problems. In Proceedings of the tenth annual ACM symposium on Theory of computing, STOC ’78, pages 253–264, New York, NY, USA, 1978. ACM. Yannakakis M. Node-and edge-deletion np-complete problems. In Proceedings of the tenth annual ACM symposium on Theory of computing, STOC ’78, pages 253–264, New York, NY, USA, 1978. ACM.
Zurück zum Zitat Zachary WW (1977) An information flow model for conflict and fission in small groups. Journal of Anthropological Research 33:452–473 Zachary WW (1977) An information flow model for conflict and fission in small groups. Journal of Anthropological Research 33:452–473
Zurück zum Zitat Zwaan R, Berger A, Grigoriev A (2011) How to cut a graph into many pieces. In: Ogihara Mitsunori, Tarui Jun (eds) Theory and Applications of Models of Computation, Lecture Notes in Computer Science, vol 6648. Springer, Berlin Heidelberg, pp 184–194CrossRef Zwaan R, Berger A, Grigoriev A (2011) How to cut a graph into many pieces. In: Ogihara Mitsunori, Tarui Jun (eds) Theory and Applications of Models of Computation, Lecture Notes in Computer Science, vol 6648. Springer, Berlin Heidelberg, pp 184–194CrossRef
Metadaten
Titel
An integer programming framework for critical elements detection in graphs
verfasst von
Alexander Veremyev
Oleg A. Prokopyev
Eduardo L. Pasiliao
Publikationsdatum
01.07.2014
Verlag
Springer US
Erschienen in
Journal of Combinatorial Optimization / Ausgabe 1/2014
Print ISSN: 1382-6905
Elektronische ISSN: 1573-2886
DOI
https://doi.org/10.1007/s10878-014-9730-4

Weitere Artikel der Ausgabe 1/2014

Journal of Combinatorial Optimization 1/2014 Zur Ausgabe

Premium Partner