2012
DOI: 10.1002/net.21469
|View full text |Cite
|
Sign up to set email alerts
|

Balancing profits and costs on trees

Abstract: We consider a rooted tree graph with costs associated with the edges and profits associated with the vertices. Every subtree containing the root incurs the sum of the costs of its edges, and collects the sum of the profits of its nodes; the goal is the simultaneous minimization of the total cost and maximization of the total profit. This problem is related to the TSP with profits on graphs with a tree metric. We analyze the problem from a biobjective point of view. We show that finding all extreme supported ef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(16 citation statements)
references
References 36 publications
0
16
0
Order By: Relevance
“…Observation 3.1 answers an open question in the last section of [15], where it is asked whether or not the LST-Tree Problem can be solved in polynomial time (we presume) for general edge lengths. Observation 3.1 is similar to [7,Theorem 2], where also a star is considered to show that their SubtreeE is as hard as Knapsack.…”
Section: Complexity Of Cyber-attack Problemsmentioning
confidence: 55%
See 2 more Smart Citations
“…Observation 3.1 answers an open question in the last section of [15], where it is asked whether or not the LST-Tree Problem can be solved in polynomial time (we presume) for general edge lengths. Observation 3.1 is similar to [7,Theorem 2], where also a star is considered to show that their SubtreeE is as hard as Knapsack.…”
Section: Complexity Of Cyber-attack Problemsmentioning
confidence: 55%
“…Also, the results of fixed costs, in our case Theorem 4.1 and in their case [7,Theorem 3], the problems are shown to be solvable in O(n) time, given certain conditions. Theorem 4.1, however, provides a precise accounting for the time complexity and for certain values of m, defined there, our algorithm would be faster than that given in [7]. Their work is not in the context of cyber-security, and does not handle cases as general as this work.…”
Section: Cyber Attacks With Constant Penetration Costsmentioning
confidence: 70%
See 1 more Smart Citation
“…Remark: Observation 3.1 answers an open question in the last section of [15], where it is asked whether or not the LST-Tree Problem can be solved in polynomial time (we presume) for general edge lengths. Observation 3.1 is similar to [7,Theorem 2], where also a star is considered to show that their SubtreeE is as hard as Knapsack.…”
Section: And Vice Versa Each Collection Of Verticesmentioning
confidence: 55%
“…As a result, quite a bit of work has been done where cybersecurity systems, or more generally layered computer systems, are modeled as a fixed weighted trees. For example, in [1,3,4,8,10,12] the authors consider finding weight-constrained, maximum-density subtrees and similar structures given a fixed weighting of a tree as part of the input. In these cases weights are specified on both vertices and edges.…”
Section: Introductionmentioning
confidence: 99%