2013
DOI: 10.1002/net.21490
|View full text |Cite
|
Sign up to set email alerts
|

Shortest paths avoiding forbidden subpaths

Abstract: Abstract. In this paper we study a variant of the shortest path problem in graphs: given a weighted graph G and vertices s and t, and given a set X of forbidden paths in G, find a shortest s-t path P such that no path in X is a subpath of P . Path P is allowed to repeat vertices and edges. We call each path in X an exception, and our desired path a shortest exception avoiding path. We formulate a new version of the problem where the algorithm has no a priori knowledge of X, and finds out about an exception x ∈… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 24 publications
0
12
0
Order By: Relevance
“…Memory based shortest path searching methods considering constraint conditions [4][5] have been proposed. Ahmed et al [4] proposed an incremental algorithm for constructing shortest path searching tree that reflects constraint paths.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Memory based shortest path searching methods considering constraint conditions [4][5] have been proposed. Ahmed et al [4] proposed an incremental algorithm for constructing shortest path searching tree that reflects constraint paths.…”
Section: Related Workmentioning
confidence: 99%
“…Ahmed et al [4] proposed an incremental algorithm for constructing shortest path searching tree that reflects constraint paths. Villeneuve et al [5] proposed a method to avoid the constraint path by pre-computing k-shortest paths.…”
Section: Related Workmentioning
confidence: 99%
“…Walk‐restricted graphs can provide insight on structural properties of the underlying unrestricted graph (see, eg, [3] where antidirected walks are used to study 2‐detachments), or can be used to model practical situations. For example, forbidden‐transition graphs are used to solve routing problems in telecommunication networks [1] or in road networks [7] and edge‐coloured graphs are used in bioinformatics in [12]. In [19], Sudakov discusses how to measure the robustness of certain graph properties such as Hamiltonicity or connectivity and shows that it can sometimes be done by determining how many restrictions have to be put on the walks in a graph for the graph to lose the property.…”
Section: Introductionmentioning
confidence: 99%
“…Depending on the applications, we sometimes need to express stronger constraints than what the standard definitions allow for. Indeed, in many practical cases, including optical networks, road networks or public transit systems among others, the set of possible walks a user can take is much more complex than the set of walks in a graph (see [1] or [2] for examples). To model a situation where a driver coming from a given road may not turn left while both the road he comes from and the road on the left exists, we have to define the permitted walks by taking into account not only the edges of the graph that a walk may use but also the transitions.…”
Section: Introductionmentioning
confidence: 99%