2011
DOI: 10.1007/978-3-642-22685-4_49
|View full text |Cite
|
Sign up to set email alerts
|

Finding Paths with Minimum Shared Edges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Problem 1 (Unweighted Uncapacitated Minimum Vulnerability problem (Uumv) [4,29,38]) The input to this problem a graph G = (V, E), two nodes s, t ∈ V , and two positive integers 0 < r < κ. The goal is to find a set of κ paths between s and t that minimizes the number of "shared edges", where an edge is called shared if it is in more than r of these κ paths between s and t.…”
Section: Network Design Application: Minimizing Bottleneck Edgesmentioning
confidence: 99%
See 1 more Smart Citation
“…Problem 1 (Unweighted Uncapacitated Minimum Vulnerability problem (Uumv) [4,29,38]) The input to this problem a graph G = (V, E), two nodes s, t ∈ V , and two positive integers 0 < r < κ. The goal is to find a set of κ paths between s and t that minimizes the number of "shared edges", where an edge is called shared if it is in more than r of these κ paths between s and t.…”
Section: Network Design Application: Minimizing Bottleneck Edgesmentioning
confidence: 99%
“…Uumv has applications in several communication network design problems (see [36][37][38] for further details). The following computational complexity results are known regarding Uumv and Mse for a graph with n nodes and m edges (see [4,29]):…”
Section: Network Design Application: Minimizing Bottleneck Edgesmentioning
confidence: 99%
“…We wish to find n paths from s to t with minimum number of critical edges. One motivation for this problem, adapted from [1,3], is as follows. We need to make a sensitive shipment from s to t. In the planning stage, n paths are chosen and prepared.…”
Section: Introductionmentioning
confidence: 99%
“…Following [1], for 1 ≤ k ≤ n, call an edge k-vulnerable if it used by at least k of the n paths. In [3] it was shown that finding n paths with minimum number of 2-vulnerable edges is NP-hard, and in [1] it was shown that for fixed n and k, finding n paths with minimum number of k-vulnerable edges can be done in polynomial time.…”
Section: Introductionmentioning
confidence: 99%
“…On the positive side, we show that there exists a (k − 1)-approximation algorithm for the problem, using an adaption of a network flow algorithm. We design heuristics to improve the quality of the output, and provide empirical results [123,121].…”
Section: New Resultsmentioning
confidence: 99%