Stacs 2007
DOI: 10.1007/978-3-540-70918-3_4
|View full text |Cite
|
Sign up to set email alerts
|

Compact Forbidden-Set Routing

Abstract: We study labelling schemes for X-constrained path problems. Given a graph (V, E) and X ⊆ V , a path is X-constrained if all intermediate vertices avoid X. We study the problem of assigning labels J(x) to vertices so that given {J(x) : x ∈ X} for any X ⊆ V , we can route on the shortest X-constrained path between x, y ∈ X. This problem is motivated by Internet routing, where the presence of routing policies means that shortest-path routing is not appropriate. For graphs of tree width k, we give a routing scheme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
47
0

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 32 publications
(47 citation statements)
references
References 17 publications
0
47
0
Order By: Relevance
“…The exponent 2 k+1 is part of the large size of constants in FPT algorithms. [16,7,6,13] For every undirected graph G,…”
Section: Rank-widthmentioning
confidence: 99%
See 3 more Smart Citations
“…The exponent 2 k+1 is part of the large size of constants in FPT algorithms. [16,7,6,13] For every undirected graph G,…”
Section: Rank-widthmentioning
confidence: 99%
“…Here twd, cwd and mcwd denote respectively tree-width [17], clique-width [6] and m-clique-width (we recall below the definition of m-clique-width [7]). The following constants will be used: for A ⊆ L we let A be a constant denoting the graph G with single vertex x and δ G (x) = A.…”
Section: Proposition 21mentioning
confidence: 99%
See 2 more Smart Citations
“…If nodes or links fail in a network, then recomputation of the labels is generally required. Courcelle and Twigg studied in [4] the forbidden-set labelling problem, where in addition to source and destination, the query algorithm is given a set of failed nodes and edges and it must construct a path that avoids this set. These labels can be used to quickly recover from failures in a network.…”
mentioning
confidence: 99%