Searching for Snake-In-The-Box Codes with Evolved Pruning Models

Total Page:16

File Type:pdf, Size:1020Kb

Searching for Snake-In-The-Box Codes with Evolved Pruning Models Searching for Snake-in-the-Box Codes with Evolved Pruning Models Daniel R. Tuohy Walter D. Potter and Darren A. Casella Stottler Henke Associates, Inc. Artficial Intelligence Center San Mateo, CA University of Georgia Athens, GA 0111 Abstract We present a method for searching for 0101 achordal open paths (snakes) in n-dimensional hyper- cube graphs (the box). Our technique first obtains a set 0011 0001 of exemplary snakes using an evolutionary algorithm. 1101 1111 These snakes are then analyzed to define a pruning 1001 1011 model that constrains the search space. A depth-first search of the constrained solution space has established 1100 1110 new lower bounds for the length of the longest snakes in 1000 1010 the 9 and 10 dimensional hypercube graphs. 0100 0110 Keywords: Search, Genetic Algorithms, Mathematics 0000 0010 Figure 1: A maximal length snake in Q4 1 Introduction The snake-in-the-box problem is that of discovering 4. We perform a depth first search of all snakes, the longest path in a hypercube graph such that pruning and backtracking whenever any at- the path is not adjacent to itself at any node. The tribute of the current snake escapes the model. longest such path for the dimension-4 hypercube is illustrated in Figure 1. The reader should note that we are not con- cerned with time efficiency. We are interested only For dimensions one through seven, longest max- in obtaining snakes which are longer than the cur- imal snakes have been found by exhaustive search rent theoretical lower bound, and therefore have techniques [7][15]. In higher dimensions, those not yet been discovered either through computa- greater than seven, the solution space is intractable. tional search or mathematical construction. We Several non-exhaustive computational search tech- have achieved this objective for the 9 and 10 di- niques have been employed to discover lengthy mensional hypercube graphs. snakes in these dimensions, including genetic algo- rithms [16], distributed computing [11], neural net- works [4], and other evolutionary algorithms [6]. 2 Applications We have developed a hybrid method described by this sequence of steps: The snake-in-the-box problem was first described in a paper by Kautz in the late 1950s, and was noted 1. An evolutionary algorithm is used to generate for its relevance to coding theory [12]. Snake-in- a set of very long snakes. the-box codes are useful because they are “spread 2” gray codes. This means that any two codewords 2. We compute several attributes of each snake are at least two entries apart in the list of codewords at each node in the snake. or that they differ in at least two positions. Conse- quently, errors at only one position (the most com- 3. The upper and lower bounds of these at- mon case) are easily detectable because they will tributes define a pruning model. reference code words at positions in the list which are more obviously inappropriate [10]. Snakes have Dimension n-snake n-coil been put to use in disjunctive normal form simplifi- cation, electronic combination locking mechanisms, Q1 1 2 disk sector encoding, and analog-to-digital conver- Q2 2 4 sion [14][13][5][15][8]. Q3 4 6 The specific use of snake-in-the-box codes in Q4 7 8 these domains is often error-detection and correc- Q5 13 14 tion, and the longest snakes are the most useful for Q6 26 26 this purpose. Consequently, methods for discov- Q7 50 48 ering the longest snakes in dimensions eight and Q8 97 96 above have been the subject of much research in Q9 186 180 both mathematics and computer science (See refer- Q10 358 344 ences). Q11 680 630 Q12 1260 1238 3 Background and Terminol- Table 1: Longest snakes and coils in Qn. For n≥8, ogy solutions are only the current best-known. Following standard convention, we use Qn to de- “n-coil” to coils of maximal length in Qn. The note the n-dimensional hypercube, which is defined terms “snake” and “n-snake” are used in exactly inductively as the Cartesian product of Q1 and the same way to designate induced open paths. Qn−1. It is useful to think of Q1 as a line (two The lengths of n-snakes and n-coils up to n = 6 constituent nodes), Q2 as a square (four), Q3 as were computed via exhaustive search by Davies [7]. a cube (eight), and Q4 as the sixteen-node graph Those for n = 7 were determined by the Genetic > in Figure 1. For n 4, meaningful visualisation is Algorithm of Potter [16] and later the exhaustive tricky. n technique of Kochut [15], which we will be building There are 2 nodes in Qn that can be represented upon. Table 1 shows the lengths of the n-snakes as vectors of binary digits. The nodes are labeled and n-coils for n≤7, as well as current best-known in such a way that the binary vectors of adjacent lengths of longest snakes and coils in dimensions 8 nodes always differ by exactly one bit, as in Figure through 12 [2][6][7][9][15][16]. 1. An induced path in Qn, as defined in [9], is a sequence of nodes P such that for any u,v∈P, if u 4 PBSHC: An Evolutionary and v are adjacent in Qn then they are also adjacent in P. Algorithm for Obtaining A path is expressed in node sequence representa- Model Snakes tion if it is a vector of base-10 integers correspond- ing to the binary labels on each node in the path. A Population-Based Stochastic Hill-Climber (PB- The node sequence of the snake in Figure 1 is {0 1 SHC) was used to generate our model snakes. This 376141213}. algorithm is described in more detail in [6]. The A path is expressed in transition sequence rep- PBSHC evolves a population of snakes from a zero resentation if it is a vector of integers in the range or small initial length to some maximum length. 0..n-1 [1]. These integers correspond to the index Each individual in the population consists of a of the bit in the bit string that was flipped to grow sequence of integers that represents the node se- the snake from one node to the next. The index of quence of a snake, or valid path through the hyper- the least significant bit is 0 and that of the most cube, in the dimension being searched. These in- significant bit is n-1. The transition sequence of the dividuals are initialized as either a snake of length snake in Figure 1 is {0120310}. zero, that is consisting of only the zero node, or The term “Snake in the Box” (derived from the seeded with a pre-existing snake of choice. Follow- visualization of a chain as a unit-radius tube) orig- ing initialization, the evolutionary cycle begins its inally designated induced cycles, or closed paths first generation. Each generation begins with a fit- (also called closed chains), in a graph [12]. We ness evaluation. The fitness function used is based adopt the terminology introduced in [9], who as- on both the length and the ‘tightness’ of the snake. sign the term “coil” to simple cycles and the term The tightness of a snake, as defined for the PBSHC, is a measure of how many nodes are left available sion eight, unidirectional growth was chosen for this in the hypercube after subtracting all those nodes implementation to best allocate computational re- that are disqualified either by already being in the sources. This operator can be seen to perform a snake or by being adjacent to another node in the stochastic hill-climbing process on each snake in the snake. The choice of tightness as a component of population as the choice of which adjacent node the fitness function was inspired by the idea that to connect to is based on random selection from tighter snakes, since they make more efficient use the available nodes. A choice was made early to of nodes, might have more room to grow. grow all snakes in the population instead of only Initial attempts of integrating both length and the snake of best fitness (note: enhancing the best tightness into a fitness function met with limited individual in a population is a common approach success. Many combinations of linear and non- in hybrid genetic algorithms). This choice was also linear factors of length and tightness for the fitness based on results of a comparison of these two ap- function were tried. While they each performed proaches in an earlier GA implementation. Grow- well in some periods of evolution, they would in- ing all the individuals within the population also evitably perform worse in others. Once the average works well in conjunction with the fitness function fitness of the population slowed, the diversity of the which requires that all snakes in the population of population would fall and the fitness function would a given generation be of the same length in order to converge to a local optimum. Our first attempt at function properly. The fitness function consists of solving this problem was to develop an adaptive fit- the sum of the snake’s length and normalized tight- ness function that would balance between the im- ness. This results in the fitness function simplifying portance of tightness and length, using the diver- to a function of tightness alone as the length compo- sity of the population as the balancing factor. This nent of the fitness value will dominate for snakes of technique also met with limited success, reacting to different lengths, yet cancel for snakes of the same changes in diversity too quickly in some cases and length.
Recommended publications
  • The Strong Perfect Graph Theorem
    Annals of Mathematics, 164 (2006), 51–229 The strong perfect graph theorem ∗ ∗ By Maria Chudnovsky, Neil Robertson, Paul Seymour, * ∗∗∗ and Robin Thomas Abstract A graph G is perfect if for every induced subgraph H, the chromatic number of H equals the size of the largest complete subgraph of H, and G is Berge if no induced subgraph of G is an odd cycle of length at least five or the complement of one. The “strong perfect graph conjecture” (Berge, 1961) asserts that a graph is perfect if and only if it is Berge. A stronger conjecture was made recently by Conforti, Cornu´ejols and Vuˇskovi´c — that every Berge graph either falls into one of a few basic classes, or admits one of a few kinds of separation (designed so that a minimum counterexample to Berge’s conjecture cannot have either of these properties). In this paper we prove both of these conjectures. 1. Introduction We begin with definitions of some of our terms which may be nonstandard. All graphs in this paper are finite and simple. The complement G of a graph G has the same vertex set as G, and distinct vertices u, v are adjacent in G just when they are not adjacent in G.Ahole of G is an induced subgraph of G which is a cycle of length at least 4. An antihole of G is an induced subgraph of G whose complement is a hole in G. A graph G is Berge if every hole and antihole of G has even length. A clique in G is a subset X of V (G) such that every two members of X are adjacent.
    [Show full text]
  • A New Approach to the Snake-In-The-Box Problem
    462 ECAI 2012 Luc De Raedt et al. (Eds.) © 2012 The Author(s). This article is published online with Open Access by IOS Press and distributed under the terms of the Creative Commons Attribution Non-Commercial License. doi:10.3233/978-1-61499-098-7-462 A New Approach to the Snake-In-The-Box Problem David Kinny1 Abstract. The “Snake-In-The-Box” problem, first described more Research on the SIB problem initially focused on applications in than 50 years ago, is a hard combinatorial search problem whose coding [14]. Coils are spread-k circuit codes for k =2, in which solutions have many practical applications. Until recently, techniques n-words k or more positions apart in the code differ in at least k based on Evolutionary Computation have been considered the state- bit positions [12]. (The well-known Gray codes are spread-1 circuit of-the-art for solving this deterministic maximization problem, and codes.) Longest snakes and coils provide the maximum number of held most significant records. This paper reviews the problem and code words for a given word size (i.e., hypercube dimension). prior solution techniques, then presents a new technique, based on A related application is in encoding schemes for analogue-to- Monte-Carlo Tree Search, which finds significantly better solutions digital converters including shaft (rotation) encoders. Longest SIB than prior techniques, is considerably faster, and requires no tuning. codes provide greatest resolution, and single bit errors are either recognised as such or map to an adjacent codeword causing an off- 1 INTRODUCTION by-one error.
    [Show full text]
  • Degree in Mathematics
    Degree in Mathematics Title: An Experimental Study of the Minimum Linear Colouring Arrangement Problem. Author: Montserrat Brufau Vidal Advisor: Maria José Serna Iglesias Department: Computer Science Department Academic year: 2016-2017 ii An experimental study of the Minimum Linear Colouring Arrangement Problem Author: Montserrat Brufau Vidal Advisor: Maria Jos´eSerna Iglesias Facultat de Matem`atiquesi Estad´ıstica Universitat Polit`ecnicade Catalunya 26th June 2017 ii Als meus pares; a la Maria pel seu suport durant el projecte; al meu poble, Men`arguens. iii iv Abstract The Minimum Linear Colouring Arrangement problem (MinLCA) is a variation from the Min- imum Linear Arrangement problem (MinLA) and the Colouring problem. The objective of the MinLA problem is finding the best way of labelling each vertex of a graph in such a manner that the sum of the induced distances between two adjacent vertices is the minimum. In our case, instead of labelling each vertex with a different integer, we group them with the condition that two adjacent vertices cannot be in the same group, or equivalently, by allowing the vertex labelling to be a proper colouring of the graph. In this project, we undertake the task of broadening the previous studies for the MinLCA problem. The main goal is developing some exact algorithms based on backtracking and some heuristic algorithms based on a maximal independent set approach and testing them with dif- ferent instances of graph families. As a secondary goal we are interested in providing theoretical results for particular graphs. The results will be made available in a simple, open-access bench- marking platform.
    [Show full text]
  • The Snake-In-The-Box Problem: a Primer
    THE SNAKE-IN-THE-BOX PROBLEM: A PRIMER by THOMAS E. DRAPELA (Under the Direction of Walter D. Potter) ABSTRACT This thesis is a primer designed to introduce novice and expert alike to the Snake-in-the- Box problem (SIB). Using plain language, and including explanations of prerequisite concepts necessary for understanding SIB throughout, it introduces the essential concepts of SIB, its origin, evolution, and continued relevance, as well as methods for representing, validating, and evaluating snake and coil solutions in SIB search. Finally, it is structured to serve as a convenient reference for those exploring SIB. INDEX WORDS: Snake-in-the-Box, Coil-in-the-Box, Hypercube, Snake, Coil, Graph Theory, Constraint Satisfaction, Canonical Ordering, Canonical Form, Equivalence Class, Disjunctive Normal Form, Conjunctive Normal Form, Heuristic Search, Fitness Function, Articulation Points THE SNAKE-IN-THE-BOX PROBLEM: A PRIMER by THOMAS E. DRAPELA B.A., George Mason University, 1991 A Thesis Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE ATHENS, GEORGIA 2015 © 2015 Thomas E. Drapela All Rights Reserved THE SNAKE-IN-THE-BOX PROBLEM: A PRIMER by THOMAS E. DRAPELA Major Professor: Walter D. Potter Committee: Khaled Rasheed Pete Bettinger Electronic Version Approved: Julie Coffield Interim Dean of the Graduate School The University of Georgia May 2015 DEDICATION To my dearest Kristin: For loving me enough to give me a shove. iv ACKNOWLEDGEMENTS I wish to express my deepest gratitude to Dr. Potter for introducing me to the Snake-in-the-Box problem, for giving me the freedom to get lost in it, and finally, for helping me to find my way back.
    [Show full text]
  • An Archive of All Submitted Project Proposals
    CS 598 JGE ] Fall 2017 One-Dimensional Computational Topology Project Proposals Theory 0 Bhuvan Venkatesh: embedding graphs into hypercubes ....................... 1 Brendan Wilson: anti-Borradaile-Klein? .................................. 4 Charles Shang: vertex-disjoint paths in planar graphs ......................... 6 Hsien-Chih Chang: bichromatic triangles in pseudoline arrangements ............. 9 Sameer Manchanda: one more shortest-path tree in planar graphs ............... 11 Implementation 13 Jing Huang: evaluation of image segmentation algorithms ..................... 13 Shailpik Roy: algorithm visualization .................................... 15 Qizin (Stark) Zhu: evaluation of r-division algorithms ........................ 17 Ziwei Ba: algorithm visualization ....................................... 20 Surveys 22 Haizi Yu: topological music analysis ..................................... 22 Kevin Hong: topological data analysis .................................... 24 Philip Shih: planarity testing algorithms .................................. 26 Ross Vasko: planar graph clustering ..................................... 28 Yasha Mostofi: image processing via maximum flow .......................... 31 CS 598JGE Project Proposal Name and Netid: Bhuvan Venkatesh: bvenkat2 Introduction Embedding arbitrary graphs into Hypercubes has been the study of research for many practical implementation purposes such as interprocess communication or resource. A hypercube graph is any graph that has a set of 2d vertexes and all the vertexes are
    [Show full text]
  • Eindhoven University of Technology BACHELOR on the K-Independent
    Eindhoven University of Technology BACHELOR On the k-Independent Set Problem Koerts, Hidde O. Award date: 2021 Link to publication Disclaimer This document contains a student thesis (bachelor's or master's), as authored by a student at Eindhoven University of Technology. Student theses are made available in the TU/e repository upon obtaining the required degree. The grade received is not published on the document as presented in the repository. The required complexity or quality of research of student theses may vary by program, and the required minimum study period may vary in duration. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain On the k-Independent Set Problem Hidde Koerts Supervised by Aida Abiad February 1, 2021 Hidde Koerts Supervised by Aida Abiad Abstract In this thesis, we study several open problems related to the k-independence num- ber, which is defined as the maximum size of a set of vertices at pairwise dis- tance greater than k (or alternatively, as the independence number of the k-th graph power). Firstly, we extend the definitions of vertex covers and cliques to allow for natural extensions of the equivalencies between independent sets, ver- tex covers, and cliques.
    [Show full text]
  • Connectivity 1
    Ma/CS 6b Class 5: Graph Connectivity By Adam Sheffer A Connectivity Problem Prove. The vertices of a connected graph 퐺 can always be ordered as 푣1, 푣2, … , 푣푛 such that for every 1 < 푖 ≤ 푛, if we remove 푣푖, 푣푖+1, … , 푣푛 and the edges adjacent to these vertices, 퐺 remains connected. 푣3 푣4 푣1 푣2 푣5 Proof Pick any vertex as 푣1. Pick a vertex that is connected to 푣1 in 퐺 and set it as 푣2. Pick a vertex that is connected either to 푣1 or to 푣2 in 퐺 and set it as 푣3. … Communications Network We are given a set of routers and wish to connect pairs of them to obtain a connected communications network. The network should be reliable – a few malfunctioning routers should not disable the entire network. ◦ What condition should we require from the network? ◦ That after removing any 푘 routers, the network remains connected. 푘-connected Graphs An graph 퐺 = (푉, 퐸) is said to be 푘- connected if 푉 > 푘 and we cannot obtain a non-connected graph by removing 푘 − 1 vertices from 푉. Is the graph in the figure ◦ 1-connected? Yes. ◦ 2-connected? Yes. ◦ 3-connected? No! Connectivity Which graphs are 1-connected? ◦ These are exactly the connected graphs. The connectivity of a graph 퐺 is the maximum integer 푘 such that 퐺 is 푘- connected. What is the connectivity of the complete graph 퐾푛? 푛 − 1. The graph in the figure has a connectivity of 2. Hypercube A hypercube is a generalization of the cube into any dimension.
    [Show full text]
  • Induced Path Factors of Regular Graphs Arxiv:1809.04394V3 [Math.CO] 1
    Induced path factors of regular graphs Saieed Akbari∗ Daniel Horsley† Ian M. Wanless† Abstract An induced path factor of a graph G is a set of induced paths in G with the property that every vertex of G is in exactly one of the paths. The induced path number ρ(G) of G is the minimum number of paths in an induced path factor of G. We show that if G is a connected cubic graph on n > 6 vertices, then ρ(G) 6 (n − 1)=3. Fix an integer k > 3. For each n, define Mn to be the maximum value of ρ(G) over all connected k-regular graphs G on n vertices. As n ! 1 with nk even, we show that ck = lim(Mn=n) exists. We prove that 5=18 6 c3 6 1=3 and 3=7 6 c4 6 1=2 and that 1 1 ck = 2 − O(k− ) for k ! 1. Keywords: Induced path, path factor, covering, regular graph, subcubic graph. Classifications: 05C70, 05C38. 1 Introduction We denote the path of order n by Pn. A subgraph H of a graph G is said to be induced if, for any two vertices x and y of H, x and y are adjacent in H if and only if they are adjacent in G. An induced path factor (IPF) of a graph G is a set of induced paths in G with the property that every vertex of G is in exactly one of the paths. We allow paths of any length in an IPF, including the trivial path P1.
    [Show full text]
  • Layout Volumes of the Hypercube∗
    Layout Volumes of the Hypercube¤ Lubomir Torok Institute of Mathematics and Computer Science Severna 5, 974 01 Banska Bystrica, Slovak Republic Imrich Vrt'o Department of Informatics Institute of Mathematics, Slovak Academy of Sciences Dubravska 9, 841 04 Bratislava, Slovak Republic Abstract We study 3-dimensional layouts of the hypercube in a 1-active layer and general model. The problem can be understood as a graph drawing problem in 3D space and was addressed at Graph Drawing 2003 [5]. For both models we prove general lower bounds which relate volumes of layouts to a graph parameter cutwidth. Then we propose tight bounds on volumes of layouts of N-vertex hypercubes. Especially, we 2 3 3 have VOL (Q ) = N 2 log N + O(N 2 ); for even log N and VOL(Q ) = p 1¡AL log N 3 log N 3 2 6 2 4=3 9 N + O(N log N); for log N divisible by 3. The 1-active layer layout can be easily extended to a 2-active layer (bottom and top) layout which improves a result from [5]. 1 Introduction The research on three-dimensional circuit layouts started in seminal works [15, 17] as a response to advances in VLSI technology. Their model of a 3-dimensional circuit was a natural generalization of the 2-dimensional model [18]. Several basic results have been proved since then which show that the 3-dimensional layout may essentially reduce ma- terial, measured as volume [6, 12]. The problem may be also understood as a special 3-dimensional orthogonal drawing of graphs, see e.g., [9].
    [Show full text]
  • Polynomial-Time Algorithms for the Longest Induced Path and Induced Disjoint Paths Problems on Graphs of Bounded Mim-Width∗†
    Polynomial-Time Algorithms for the Longest Induced Path and Induced Disjoint Paths Problems on Graphs of Bounded Mim-Width∗† Lars Jaffke‡1, O-joung Kwon§2, and Jan Arne Telle3 1 Department of Informatics, University of Bergen, Norway [email protected] 2 Logic and Semantics, Technische Universität Berlin, Berlin, Germany [email protected] 3 Department of Informatics, University of Bergen, Norway [email protected] Abstract We give the first polynomial-time algorithms on graphs of bounded maximum induced matching width (mim-width) for problems that are not locally checkable. In particular, we give nO(w)-time algorithms on graphs of mim-width at most w, when given a decomposition, for the following problems: Longest Induced Path, Induced Disjoint Paths and H-Induced Topological Minor for fixed H. Our results imply that the following graph classes have polynomial-time algorithms for these three problems: Interval and Bi-Interval graphs, Circular Arc, Per- mutation and Circular Permutation graphs, Convex graphs, k-Trapezoid, Circular k-Trapezoid, k-Polygon, Dilworth-k and Co-k-Degenerate graphs for fixed k. 1998 ACM Subject Classification F.2.2 Nonnumerical Algorithms and Problems, Computations on discrete structures, G.2.2 Graph Theory, Graph algorithms Keywords and phrases graph width parameters, dynamic programming, graph classes, induced paths, induced topological minors Digital Object Identifier 10.4230/LIPIcs.IPEC.2017.21 1 Introduction Ever since the definition of the tree-width of graphs emerged from the Graph Minors project of Robertson and Seymour, bounded-width structural graph decompositions have been a successful tool in designing fast algorithms for graph classes on which the corresponding width-measure is small.
    [Show full text]
  • Long Induced Paths in Graphs∗ Arxiv:1602.06836V2 [Math.CO] 1
    Long induced paths in graphs∗ Louis Esperety Laetitia Lemoinez Fr´ed´ericMaffrayx December 2, 2016 Abstract We prove that every 3-connected planar graph on n vertices contains an induced path on Ω(log n) vertices, which is best possible and improves the best known lower bound by a multiplicative factor of log log n. We deduce that any planar graph (or more generally, any graph embeddable on a fixed surface) with a path on n vertices, also contains an induced path on Ω(plog n) vertices. We conjecture that for any k, there is a positive constant c(k) such that any k-degenerate graph with a path on n vertices also contains an induced path on Ω((log n)c(k)) vertices. We provide examples showing that this order of magnitude would be best possible (already for chordal graphs), and prove the conjecture in the case of interval graphs. 1 Introduction A graph contains a long induced path (i.e., a long path as an induced subgraph) only if it contains a long path. However, this necessary condition is not sufficient, as shown by complete graphs and complete bipartite graphs. On the other hand, it was proved by Atminas, Lozin and Ragzon [2] that if a graph G contains a long path, but does not contain a large complete graph or complete bipartite graph, then G contains a long induced path. Their proof uses several applications of Ramsey theory, and the resulting bound on the size of a long induced path is thus quantitatively weak. The specific case of k-degenerate graphs (graphs such that any subgraph contains a arXiv:1602.06836v2 [math.CO] 1 Dec 2016 vertex of degree at most k) was considered by Neˇsetˇriland Ossona de Mendez in [6].
    [Show full text]
  • PERFECT DOMINATING SETS Ý Marilynn Livingston£ Quentin F
    In Congressus Numerantium 79 (1990), pp. 187-203. PERFECT DOMINATING SETS Ý Marilynn Livingston£ Quentin F. Stout Department of Computer Science Elec. Eng. and Computer Science Southern Illinois University University of Michigan Edwardsville, IL 62026-1653 Ann Arbor, MI 48109-2122 Abstract G G A dominating set Ë of a graph is perfect if each vertex of is dominated by exactly one vertex in Ë . We study the existence and construction of PDSs in families of graphs arising from the interconnection networks of parallel computers. These include trees, dags, series-parallel graphs, meshes, tori, hypercubes, cube-connected cycles, cube-connected paths, and de Bruijn graphs. For trees, dags, and series-parallel graphs we give linear time algorithms that determine if a PDS exists, and generate a PDS when one does. For 2- and 3-dimensional meshes, 2-dimensional tori, hypercubes, and cube-connected paths we completely characterize which graphs have a PDS, and the structure of all PDSs. For higher dimensional meshes and tori, cube-connected cycles, and de Bruijn graphs, we show the existence of a PDS in infinitely many cases, but our characterization d is not complete. Our results include distance d-domination for arbitrary . 1 Introduction = ´Î; Eµ Î E i Suppose G is a graph with vertex set and edge set . A vertex is said to dominate a E i j i = j Ë Î vertex j if contains an edge from to or if . A set of vertices is called a dominating G Ë G set of G if every vertex of is dominated by at least one member of .
    [Show full text]