A Self-Stabilizing Algorithm for a Maximal 2-Packing in a Cactus Graph Under Any Scheduler

2017 ◽  
Vol 28 (08) ◽  
pp. 1021-1045
Author(s):  
Joel Antonio Trejo-Sánchez ◽  
José Alberto Fernández-Zepeda ◽  
Julio César Ramírez-Pacheco

In this paper, we present a self-stabilizing algorithm that computes a maximal 2-packing set in a cactus under the adversarial scheduler. The cactus is a network topology such that any edge belongs to at most one cycle. The cactus has important applications in telecommunication networks, location problems, and biotechnology, among others. We assume that the value of each vertex identifier can take any value of length [Formula: see text] bits. The execution time of this algorithm is [Formula: see text] rounds or [Formula: see text] time steps. Our algorithm matches the state of the art results for this problem, following an entirely different approach. Our approach allows the computation of the maximum 2-packing when the cactus is a ring.

2013 ◽  
Vol 15 (03) ◽  
pp. 1340015 ◽  
Author(s):  
VITO FRAGNELLI ◽  
STEFANO GAGLIARDO

Location problems describe those situations in which one or more facilities have to be placed in a region trying to optimize a suitable objective function. Game theory has been used as a tool to solve location problems and this paper is devoted to describe the state-of-the-art of the research on location problems through the tools of game theory. Particular attention is given to the problems that are still open in the field of cooperative location game theory.


Entropy ◽  
2021 ◽  
Vol 23 (6) ◽  
pp. 771
Author(s):  
Qiang Wei ◽  
Guangmin Hu

Collected network data are often incomplete, with both missing nodes and missing edges. Thus, network completion that infers the unobserved part of the network is essential for downstream tasks. Despite the emerging literature related to network recovery, the potential information has not been effectively exploited. In this paper, we propose a novel unified deep graph convolutional network that infers missing edges by leveraging node labels, features, and distances. Specifically, we first construct an estimated network topology for the unobserved part using node labels, then jointly refine the network topology and learn the edge likelihood with node labels, node features and distances. Extensive experiments using several real-world datasets show the superiority of our method compared with the state-of-the-art approaches.


2020 ◽  
Vol 27 (3) ◽  
pp. 343-354 ◽  
Author(s):  
Tsung-Ting Kuo ◽  
Jihoon Kim ◽  
Rodney A Gabriel

Abstract Objective To facilitate clinical/genomic/biomedical research, constructing generalizable predictive models using cross-institutional methods while protecting privacy is imperative. However, state-of-the-art methods assume a “flattened” topology, while real-world research networks may consist of “network-of-networks” which can imply practical issues including training on small data for rare diseases/conditions, prioritizing locally trained models, and maintaining models for each level of the hierarchy. In this study, we focus on developing a hierarchical approach to inherit the benefits of the privacy-preserving methods, retain the advantages of adopting blockchain, and address practical concerns on a research network-of-networks. Materials and Methods We propose a framework to combine level-wise model learning, blockchain-based model dissemination, and a novel hierarchical consensus algorithm for model ensemble. We developed an example implementation HierarchicalChain (hierarchical privacy-preserving modeling on blockchain), evaluated it on 3 healthcare/genomic datasets, as well as compared its predictive correctness, learning iteration, and execution time with a state-of-the-art method designed for flattened network topology. Results HierarchicalChain improves the predictive correctness for small training datasets and provides comparable correctness results with the competing method with higher learning iteration and similar per-iteration execution time, inherits the benefits of the privacy-preserving learning and advantages of blockchain technology, and immutable records models for each level. Discussion HierarchicalChain is independent of the core privacy-preserving learning method, as well as of the underlying blockchain platform. Further studies are warranted for various types of network topology, complex data, and privacy concerns. Conclusion We demonstrated the potential of utilizing the information from the hierarchical network-of-networks topology to improve prediction.


Author(s):  
P. Khanduri ◽  
A. Wood ◽  
D. Cohen ◽  
I. Birkeli ◽  
F. Sem-Jacobsen

Hierarchical switching networks connecting hundreds to thousands of servers are common in most large corporations. The state-of-the-art switches used in those networks are usually implemented by interconnecting a set of line cards that connect to hosts with a set of fabric cards that connect to other switches. This paper presents a new approach to implementing those switches using innovative packaging techniques that permit the 3-dimensional line/fabric card structure to be flattened into a 2-dimensional array of switch chips packaged on a PCB. The result of this flattening is a non-hierarchical network topology that we call a “flat tree”. This new approach reduces cost and complexity while improving performance and signal integrity.


Author(s):  
T. A. Welton

Various authors have emphasized the spatial information resident in an electron micrograph taken with adequately coherent radiation. In view of the completion of at least one such instrument, this opportunity is taken to summarize the state of the art of processing such micrographs. We use the usual symbols for the aberration coefficients, and supplement these with £ and 6 for the transverse coherence length and the fractional energy spread respectively. He also assume a weak, biologically interesting sample, with principal interest lying in the molecular skeleton remaining after obvious hydrogen loss and other radiation damage has occurred.


2003 ◽  
Vol 48 (6) ◽  
pp. 826-829 ◽  
Author(s):  
Eric Amsel
Keyword(s):  

1968 ◽  
Vol 13 (9) ◽  
pp. 479-480
Author(s):  
LEWIS PETRINOVICH
Keyword(s):  

1984 ◽  
Vol 29 (5) ◽  
pp. 426-428
Author(s):  
Anthony R. D'Augelli

1991 ◽  
Vol 36 (2) ◽  
pp. 140-140
Author(s):  
John A. Corson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document