Stéphane Pérennes’s research while affiliated with French National Centre for Scientific Research and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (193)


Scheduling Machine Learning Compressible Inference Tasks with Limited Energy Budget
  • Conference Paper

August 2024

·

10 Reads

·

1 Citation

Tiago Da Silva Barros

·

Davide Ferre

·

Frederic Giroire

·

[...]

·

Stephane Perennes


A Random Growth Model with any Real or Theoretical Degree Distribution

October 2022

·

11 Reads

·

1 Citation

Theoretical Computer Science

The degree distributions of complex networks are usually considered to follow a power law distribution. However, it is not the case for a large number of them. We thus propose a new model able to build random growing networks with (almost) any wanted degree distribution. The degree distribution can either be theoretical or extracted from a real-world network. The main idea is to invert the recurrence equation commonly used to compute the degree distribution in order to find a convenient attachment function for node connections - commonly chosen as linear. We compute this attachment function for some classical distributions, as the power-law, the broken power-law, and the geometric distributions. We also use the model on an undirected version of the Twitter network, for which the degree distribution has an unusual shape. We finally show that the divergence of chosen attachment functions is directly linked to the heavy-tailed property of the obtained degree distributions.


Biased Majority Opinion Dynamics: Exploiting Graph k-domination

July 2022

·

3 Reads

·

9 Citations

We study opinion dynamics in multi-agent networks where agents hold binary opinions and are influenced by their neighbors while being biased towards one of the two opinions, called the superior opinion. The dynamics is modeled by the following process: at each round, a randomly selected agent chooses the superior opinion with some probability α, and with probability 1-α it conforms to the opinion manifested by the majority of its neighbors. In this work, we exhibit classes of network topologies for which we prove that the expected time for consensus on the superior opinion can be exponential. This answers an open conjecture in the literature. In contrast, we show that in all cubic graphs, convergence occurs after a polynomial number of rounds for every α. We rely on new structural graph properties by characterizing the opinion formation in terms of multiple domination, stable and decreasing structures in graphs, providing an interplay between bias, consensus and network structure. Finally, we provide both theoretical and experimental evidence for the existence of decreasing structures and relate it to the rich behavior observed on the expected convergence time of the opinion diffusion model.


Interest clustering coefficient: a new metric for directed networks like Twitter

December 2021

·

19 Reads

·

13 Citations

Journal of Complex Networks

The clustering coefficient has been introduced to capture the social phenomena that a friend of a friend tends to be my friend. This metric has been widely studied and has shown to be of great interest to describe the characteristics of a social graph. But, the clustering coefficient is originally defined for a graph in which the links are undirected, such as friendship links (Facebook) or professional links (LinkedIn). For a graph in which links are directed from a source of information to a consumer of information, it is no more adequate. We show that former studies have missed much of the information contained in the directed part of such graphs. In this article, we introduce a new metric to measure the clustering of directed social graphs with interest links, namely the interest clustering coefficient. We compute it (exactly and using sampling methods) on a very large social graph, a Twitter snapshot with 505 million users and 23 billion links, as well as other various datasets. We additionally provide the values of the formerly introduced directed and undirected metrics, a first on such a large snapshot. We observe a higher value of the interest clustering coefficient than classic directed clustering coefficients, showing the importance of this metric. By studying the bidirectional edges of the Twitter graph, we also show that the interest clustering coefficient is more adequate to capture the interest part of the graph while classic ones are more adequate to capture the social part. We also introduce a new model able to build random networks with a high value of interest clustering coefficient. We finally discuss the interest of this new metric for link recommendation.


P11⊠P11\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_{11}\boxtimes P_{11}$$\end{document} where the squares are vertices and two squares sharing a side and/or a corner are adjacent. Example of a configuration CH(X)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$C_H(X)$$\end{document} where X=(b=2,a1=2,a2=1,a3=an-23=3)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$X=(b=2,a_1=2,a_2=1,a_3=a_{\frac{n-2}{3}}=3)$$\end{document}, there is one guard at each square in gray, and the white squares contain no guards
P11⊠P33\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_{11}\boxtimes P_{33}$$\end{document} where the squares are vertices. Example of a diagonal attack at the red square. The guards occupy a configuration CV(Y)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$C_V(Y)$$\end{document} where k=11\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k=11$$\end{document}, Y=(X1,X2,X3)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Y=(X^1,X^2,X^3)$$\end{document}, X1=(2,2,1,3)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$X^1=(2,2,1,3)$$\end{document}, X2=(1,1,3,2)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$X^2=(1,1,3,2)$$\end{document}, X3=(3,3,3,1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$X^3=(3,3,3,1)$$\end{document}, there are k-23+1=4\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\frac{k-2}{3}+1=4$$\end{document} guards at each square in dark gray, 1 guard at each square in light gray, and the white squares contain no guards. The arrows (in blue) show the movements of the guards in response to the attack. The arrow in black is to differentiate between the different guards jumping
P17⊠P17\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_{17}\boxtimes P_{17}$$\end{document} where the squares are vertices. Example of how the guards jump in Lemma 12. The vertices of U={u1,u2,u3,u4}\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$U=\{u_1,u_2,u_3,u_4\}$$\end{document} are in blue and the vertices of W={w1,w2,w3,w4}\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$W=\{w_1,w_2,w_3,w_4\}$$\end{document} are in red. Note that |U|=|W|=β=α\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|U|=|W|=\beta =\alpha$$\end{document}. The arrows (in blue) show the vertex-disjoint paths P1,…,Pβ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_1,\ldots ,P_{\beta }$$\end{document} that allow the guards to jump from U to W. There is 1 guard at each square in light gray and each vertex of U (in blue), and the white squares contain no guards
P17⊠P28\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_{17}\boxtimes P_{28}$$\end{document} where the squares are vertices. Example of a diagonal attack at the red square when at most one guard may occupy a vertex. There is 1 guard at each square in light gray, and the white squares contain no guards. The arrows (in blue) show the movements of the guards in response to the attack
Schematic representation of moving (i-1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(i-1)$$\end{document}-blocks inside an i-block

+8

Eternal Domination: D-Dimensional Cartesian and Strong Grids and Everything in Between
  • Article
  • Publisher preview available

May 2021

·

41 Reads

·

3 Citations

Algorithmica

In the eternal domination game played on graphs, an attacker attacks a vertex at each turn and a team of guards must move a guard to the attacked vertex to defend it. The guards may only move to adjacent vertices on their turn. The goal is to determine the eternal domination number γall\gamma ^{\infty }_{all} of a graph, which is the minimum number of guards required to defend against an infinite sequence of attacks. This paper first continues the study of the eternal domination game on strong grids PnPmP_n\boxtimes P_m. Cartesian grids PnPmP_n \square P_m have been vastly studied with tight bounds existing for small grids such as k×nk\times n grids for k{2,3,4,5}k\in \{2,3,4,5\}. It was recently proven that γall(PnPm)=γ(PnPm)+O(n+m)\gamma ^{\infty }_{all}(P_n \square P_m)=\gamma (P_n \square P_m)+O(n+m) where γ(PnPm)\gamma (P_n \square P_m) is the domination number of PnPmP_n \square P_m which lower bounds the eternal domination number [Lamprou et al. Eternally dominating large grids. Theoretical Computer Science, 794:27–46, 2019]. We prove that, for all n,mNn,m\in \mathbb {N^*} such that mnm\ge n, n3m3+Ω(n+m)=γall(PnPm)=n3m3+O(mn)\lfloor \frac{n}{3} \rfloor \lfloor \frac{m}{3} \rfloor +\Omega (n+m)=\gamma _{all}^{\infty } (P_{n}\boxtimes P_{m})=\lceil \frac{n}{3} \rceil \lceil \frac{m}{3} \rceil + O(m\sqrt{n}) (note that n3m3\lceil \frac{n}{3} \rceil \lceil \frac{m}{3} \rceil is the domination number of PnPmP_n\boxtimes P_m). We then generalise our technique to prove that γall(G)=γ(G)+o(γ(G))\gamma _{all}^{\infty }(G)=\gamma (G)+o(\gamma (G)) for all graphs GFG\in {\mathcal {F}}, where F{\mathcal {F}} is a large family of D-dimensional grids which are supergraphs of the D-dimensional Cartesian grid and subgraphs of the D-dimensional strong grid. In particular, F{\mathcal {F}} includes both the D-dimensional Cartesian grid and the D-dimensional strong grid.

View access options

Design of Robust Programmable Networks with Bandwidth-optimal Failure Recovery Scheme 1

April 2021

·

13 Reads

·

6 Citations

Computer Networks

More than ever, data networks have demonstrated their central role in the world economy, but also in the well-being of humanity that needs fast and reliable networks. In parallel, with the emergence of Network Function Virtualization (NFV) and Software Defined Networking (SDN), efficient network algorithms considered too hard to be put in practice in the past now have a second chance to be considered again. In this context, as new networks will be deployed and current ones get significant upgrades, it is thus time to rethink the network dimensioning problem with protection against failures. In this paper, we consider a path-based protection scheme with the global rerouting strategy in which, for each failure situation, there may be a new routing of all the demands. Our optimization task is to minimize the needed amount of bandwidth. After discussing the hardness of the problem, we develop two scalable mathematical models that we handle using both Column Generation and Benders Decomposition techniques. Through extensive simulations on real-world IP network topologies and on randomly generated instances, we show the effectiveness of our methods: they lead to savings of 40 to 48% of the bandwidth to be installed in a network to protect against failures compared to traditional schemes. Finally, our implementation in OpenDaylight demonstrates the feasibility of the approach. Its evaluation with Mininet shows that our solution provides sub-second recovery times, but the way it is implemented may greatly impact the amount of signaling traffic exchanged. In our evaluations, the recovery phase requires only a few tens of milliseconds for the fastest implementation, compared to a few hundreds of milliseconds for the slowest one.


A Random Growth Model with Any Real or Theoretical Degree Distribution

January 2021

·

9 Reads

Studies in Computational Intelligence

The degree distributions of complex networks are usually considered to be power law. However, it is not the case for a large number of them. We thus propose a new model able to build random growing networks with (almost) any wanted degree distribution. The degree distribution can either be theoretical or extracted from a real-world network. The main idea is to invert the recurrence equation commonly used to compute the degree distribution in order to find a convenient attachment function for node connections - commonly chosen as linear. We compute this attachment function for some classical distributions, as the power-law, broken power-law, geometric and Poisson distributions. We also use the model on an undirected version of the Twitter network, for which the degree distribution has an unusual shape.


Interest Clustering Coefficient: A New Metric for Directed Networks Like Twitter

January 2021

·

33 Reads

·

9 Citations

Studies in Computational Intelligence

We study here the clustering of directed social graphs. The clustering coefficient has been introduced to capture the social phenomena that a friend of a friend tends to be my friend. This metric has been widely studied and has shown to be of great interest to describe the characteristics of a social graph. In fact, the clustering coefficient is adapted for a graph in which the links are undirected, such as friendship links (Facebook) or professional links (LinkedIn). For a graph in which links are directed from a source of information to a consumer of information, it is no longer adequate. We show that former studies have missed much of the information contained in the directed part of such graphs. We thus introduce a new metric to measure the clustering of a directed social graph with interest links, namely the interest clustering coefficient. We compute it (exactly and using sampling methods) on a very large social graph, a Twitter snapshot with 505 million users and 23 billion links. We additionally provide the values of the formerly introduced directed and undirected metrics, a first on such a large snapshot. We exhibit that the interest clustering coefficient is larger than classic directed clustering coefficients introduced in the literature. This shows the relevancy of the metric to capture the informational aspects of directed graphs.


A graph G (left) and an isometric subgraph H of G (right)
Example of a graph G constructed from an instance of 3DM in the proof of Theorem 3.3. A thin line between one vertex and one rectangle represents all edges between this vertex and every vertex in the rectangle. The instance of 3DM is encoded by the edges between the vertices in Si\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$S^i$$\end{document} (representing the sets) and the vertices in Xi\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$X^i$$\end{document}, for every 1≤i≤k+2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$1\le i\le k+2$$\end{document}
Example of a tree T constructed from an instance of Hitting Set in the proof of Theorem 4.3. In this example, the elements bi′,bi′′\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$b_{i'},b_{i''}$$\end{document}, and bn\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$b_n$$\end{document} belong to the set S1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$S_1$$\end{document} (but not the elements b1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$b_1$$\end{document} and bi\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$b_i$$\end{document}) as figured by the three stars at level 2. The elements bi\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$b_i$$\end{document} and bi′′\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$b_{i''}$$\end{document} belong to Sj\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$S_j$$\end{document} (stars at level 2j) but not the elements b1,bi′\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$b_1,b_{i'}$$\end{document}, and bn\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$b_n$$\end{document}
A tree (T,r)∈T\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(T,r) \in {{\mathcal {T}}}$$\end{document} rooted at r. The eight children of r are v1,…,v8\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$v_{1}, \ldots , v_{8}$$\end{document}. The pair (λkL(Tvi),π(Tvi))\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(\lambda _k^L(T_{v_{i}}),\pi (T_{v_{i}}))$$\end{document} for each Tvi\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{v_i}$$\end{document} is written below the corresponding subtree. In the figure, one (two, three, resp.) x\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textcircled {x}$$\end{document} in a subtree corresponds to one (two, three, resp.) node (nodes) of this subtree being probed during step x
Sequential Metric Dimension

October 2020

·

92 Reads

·

9 Citations

Algorithmica

In the localization game, introduced by Seager in 2013, an invisible and immobile target is hidden at some vertex of a graph G. At every step, one vertex v of G can be probed which results in the knowledge of the distance between v and the secret location of the target. The objective of the game is to minimize the number of steps needed to locate the target whatever be its location. We address the generalization of this game where k1k\ge 1 vertices can be probed at every step. Our game also generalizes the notion of the metric dimension of a graph. Precisely, given a graph G and two integers k,1k,\ell \ge 1, the Localization problem asks whether there exists a strategy to locate a target hidden in G in at most \ell steps and probing at most k vertices per step. We first show that, in general, this problem is NP-complete for every fixed k1k \ge 1 (resp., 1\ell \ge 1). We then focus on the class of trees. On the negative side, we prove that the Localization problem is NP-complete in trees when k and \ell are part of the input. On the positive side, we design a (+1)(+\,1)-approximation algorithm for the problem in n-node trees, i.e., an algorithm that computes in time O(nlogn)O(n \log n) (independent of k) a strategy to locate the target in at most one more step than an optimal strategy. This algorithm can be used to solve the Localization problem in trees in polynomial time if k is fixed. We also consider some of these questions in the context where, upon probing the vertices, the relative distances to the target are retrieved. This variant of the problem generalizes the notion of the centroidal dimension of a graph.


Citations (77)


... Existing works largely focus on inference serving in public clouds or other settings which support hardware scaling [8], [9], [10], [11], [12], [13], [2]. A few recent works have proposed accuracy scaling as an alternative approach when resource elasticity is unavailable [14], [7], [15], [16]. ...

Reference:

SneakPeek: Data-Aware Model Selection and Scheduling for Inference Serving on the Edge
Scheduling with Fully Compressible Tasks: Application to Deep Learning Inference with Neural Network Compression
  • Citing Conference Paper
  • May 2024

... These techniques include adaptive sampling, task scheduling, predictive behavior modeling, and federated learning. By analyzing their implementation and effectiveness, this review highlights best practices for energy saving while maintaining the core functionalities of mHealth applications by analyzing their implementation and effectiveness, particularly in the context of chronic disease management (Almotiri et al., 2016;Basaklar et al., 2024;Da Silva Barros et al., 2024;Hashmi et al., 2024;Islam et al., 2023;Kwak et al., 2023;Lee-Kan et al., 2024;Mazumder et al., 2024;Rehman et al., 2021;Sadeghian et al., 2024;Torkamaan & Ziegler, 2022;Wu & Solangi, 2024;Zheng et al., 2023). ...

Scheduling Machine Learning Compressible Inference Tasks with Limited Energy Budget
  • Citing Conference Paper
  • August 2024

... The evaluation indicators based on the complex network topology structure include betweenness centrality (BC), efficiency of a network [48], degree and degree distribution [49,50], clustering coefficient [51], maximum connected subgraph [52], connectivity [53], etc. These indicators mainly evaluate the importance of network components (nodes, sections, etc.) from the perspective of complex network geometry and topology, with particular emphasis on the adjacency status and the spatial distance between elements. ...

A Random Growth Model with any Real or Theoretical Degree Distribution
  • Citing Article
  • October 2022

Theoretical Computer Science

... Particularly, the majority-based models, where each node chooses the most frequent color among its neighbors, have received a substantial amount of attention, cf. [14,22,25,32,49]. This imitating behavior can be explained in several ways: an agent that sees a majority agreeing on an opinion might think that her neighbors have access to some information unknown to her and hence they have made the better choice; also agents can directly benefit from adopting the same behavior as their friends (e.g., prices going down). ...

Biased Majority Opinion Dynamics: Exploiting Graph k-domination
  • Citing Conference Paper
  • July 2022

... Shared Risk Link Groups (SRLGs) help to express the relationships of complex failures. The research work [39] addressed the problem of various SRLG failure scenarios. Along with SRLGs constraints, this paper is the first attempt to provide the protection mechanisms against failures in the SDN/NFV environment. ...

Design of Robust Programmable Networks with Bandwidth-optimal Failure Recovery Scheme 1
  • Citing Article
  • April 2021

Computer Networks

... Since then, several results have focused on finding bounds on γ ∞ m under different conditions or graph classes. Among the studied graph classes are trees [12,8,14], grids [4,18,16,10,5,9,15], and interval graphs [2,17]. For a good survey of other related results and topics, see Klostermeyer and Mynhardt [13]. ...

Eternal Domination: D-Dimensional Cartesian and Strong Grids and Everything in Between

Algorithmica

... Different from previous studies on failure recovery, we present a simple and bandwidth-optimal approach based on multiple backup paths to protect the network against SRLG failures where SDN switches are deployed. Our concept was previously introduced in [20,21]. ...

Bandwidth-optimal Failure Recovery Scheme for Robust Programmable Networks
  • Citing Conference Paper
  • November 2019

... Metric Dimension was introduced in the 1970s independently by Harary and Melter [53] and Slater [88] as a network monitoring problem. Metric Dimension and its variants (see, e.g., [10,11,36,46,52,61,87,89]) are very well-studied and have numerous applications such as in graph isomorphism testing [6], network discovery [8], image processing [77], chemistry [59], graph reconstruction [76] or genomics [90]. In fact, Metric Dimension was first shown to be NP-complete in general graphs in Garey and Johnson's book [49], and this was later extended to unit disk graphs [56], split graphs, bipartite graphs, co-bipartite graphs, and line graphs of bipartite graphs [35], bounded-degree planar graphs [28], and interval and permutation graphs of diameter 2 [44]. ...

Sequential Metric Dimension

Algorithmica