Labeling Schemes with Forbidden-Sets

Slides:



Advertisements
Similar presentations
Distance and Routing Labeling Schemes in Graphs
Advertisements

COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Compact Routing in Theory and Practice Lenore J. Cowen Tufts University.
Restoration by Path Concatenation: Fast Recovery of MPLS Paths Anat Bremler-Barr Yehuda Afek Haim Kaplan Tel-Aviv University Edith Cohen Michael Merritt.
Compact Routing Theory and Practice Can we route within Internet with tables of 8 entries ? Cyril Gavoille, Christian Glacet, Nicolas Hanusse, David Ilcinkas.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
Midwestern State University Department of Computer Science Dr. Ranette Halverson CMPS 2433 CHAPTER 4 - PART 2 GRAPHS 1.
Management Science 461 Lecture 2b – Shortest Paths September 16, 2008.
Distributed Data Structures: A Survey Cyril Gavoille (LaBRI, University of Bordeaux)
C++ Programming: Program Design Including Data Structures, Third Edition Chapter 21: Graphs.
Advanced Topics in Algorithms and Data Structures 1 Rooting a tree For doing any tree computation, we need to know the parent p ( v ) for each node v.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
CS Lecture 9 Storeing and Querying Large Web Graphs.
Global Approximate Inference Eran Segal Weizmann Institute.
CS728 Lecture 16 Web indexes II. Last Time Indexes for answering text queries –given term produce all URLs containing –Compact representations for postings.
Traveling with a Pez Dispenser (Or, Routing Issues in MPLS) Anupam Gupta Amit Kumar FOCS 2001 Rajeev Rastogi Iris Reinbacher COMP670P
Greedy Algorithms Reading Material: Chapter 8 (Except Section 8.5)
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Greedy Algorithms Like dynamic programming algorithms, greedy algorithms are usually designed to solve optimization problems Unlike dynamic programming.
Abstract Shortest distance query is a fundamental operation in large-scale networks. Many existing methods in the literature take a landmark embedding.
CECS 474 Computer Network Interoperability WAN Technologies & Routing
May 5, 2015Applied Discrete Mathematics Week 13: Boolean Algebra 1 Dijkstra’s Algorithm procedure Dijkstra(G: weighted connected simple graph with vertices.
TEDI: Efficient Shortest Path Query Answering on Graphs Author: Fang Wei SIGMOD 2010 Presentation: Dr. Greg Speegle.
Graph Coalition Structure Generation Maria Polukarov University of Southampton Joint work with Tom Voice and Nick Jennings HUJI, 25 th September 2011.
Graph Theory Topics to be covered:
CSCE350 Algorithms and Data Structure Lecture 17 Jianjun Hu Department of Computer Science and Engineering University of South Carolina
May 1, 2002Applied Discrete Mathematics Week 13: Graphs and Trees 1News CSEMS Scholarships for CS and Math students (US citizens only) $3,125 per year.
1 Exact Top-k Nearest Keyword Search in Large Networks Minhao Jiang†, Ada Wai-Chee Fu‡, Raymond Chi-Wing Wong† † The Hong Kong University of Science and.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Vertices and Edges Introduction to Graphs and Networks Mills College Spring 2012.
Fast, precise and dynamic distance queries Yair BartalHebrew U. Lee-Ad GottliebWeizmann → Hebrew U. Liam RodittyBar Ilan Tsvi KopelowitzBar Ilan → Weizmann.
1 Some Results in Interval Routing Francis C.M. Lau HKU and ITCS Tsinghua December 2, 2007.
Efficient Route Computation on Road Networks Based on Hierarchical Communities Qing Song, Xiaofan Wang Department of Automation, Shanghai Jiao Tong University,
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
Graphs A ‘Graph’ is a diagram that shows how things are connected together. It makes no attempt to draw actual paths or routes and scale is generally inconsequential.
Distance and Routing Labeling Schemes in Graphs with Applications in Cellular and Sensor Networks Feodor F. Dragan Computer Science Department Kent State.
1/16/20161 Introduction to Graphs Advanced Programming Concepts/Data Structures Ananda Gunawardena.
Graph Data Management Lab, School of Computer Science Branch Code: A Labeling Scheme for Efficient Query Answering on Tree
Data Structures Lakshmish Ramaswamy. Tree Hierarchical data structure Several real-world systems have hierarchical concepts –Physical and biological systems.
NPC.
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
Stephen Alstrup (U. Copenhagen) Esben Bistrup Halvorsen (U. Copenhagen) Holger Petersen (-) Aussois – ANR DISPLEXITY - March 2015 Cyril Gavoille (LaBRI,
Data Structures for Emergency Planning Cyril Gavoille (LaBRI, University of Bordeaux) 8 th FoIKS Bordeaux – March 3, 2014.
Succinct Routing Tables for Planar Graphs Compact Routing for Graphs Excluding a Fixed Minor Ittai Abraham (Hebrew Univ. of Jerusalem) Cyril Gavoille (LaBRI,
2016/7/2Appendices A and B1 Introduction to Distributed Algorithm Appendix A: Pseudocode Conventions Appendix B: Graphs and Networks Teacher: Chun-Yuan.
Fully Dynamic Approximate Distance Oracles for Planar Graphs via Forbidden-Set Distance Labels Presented by: Shiri Chechik (Weizmann Institute) Joint with:
Introduction to Graph & Network Theory Thinking About Networks: From Metabolism to the Genome to Social Conflict Summer Workshop for Teachers June 27 th.
A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF.
Forbidden-Set Distance Labels for Graphs of Bounded Doubling Dimension
Ch 13 WAN Technologies and Routing
Progress and Challenges for Labeling Schemes
Improved Randomized Algorithms for Path Problems in Graphs
Probabilistic Data Management
Routing.
Localized Data Structures
Finding Fastest Paths on A Road Network with Speed Patterns
Distance and Routing Labeling Schemes in Graphs
Elementary graph algorithms Chapter 22
Near-Optimal (Euclidean) Metric Compression
Yan Shi CS/SE 2630 Lecture Notes
Compact Routing Schemes
Routing Chapter 4 Shortest path routing Gossip
Compact routing schemes with improved stretch
Lecture 15: Least Square Regression Metric Embeddings
Elementary graph algorithms Chapter 22
Routing.
Lecture 10 Graph Algorithms
Routing in Networks with Low Doubling Dimension
Forbidden-set labelling in graphs
Distance and Routing Labeling Schemes in Graphs with Applications in Cellular and Sensor Networks Feodor F. Dragan Computer Science Department Kent State.
Presentation transcript:

Labeling Schemes with Forbidden-Sets Cyril Gavoille (LaBRI, University of Bordeaux) 20th Sirocco Ischia, Italy – July 2, 2013

Information & Locality Understanding what information are needed to achieve a computational task is a central question not only in DC (eg., data-structure theory, communication complexity,…) The ultimate goal in Labeling Schemes is to understand how localized and how much information are required to solve a given task on a network.

Task1: Routing in a physical network x y Routing query: next hop to go from x to y? pre-processing to compute routing information a node x stores only routing information involving x  distributed data-structure

Task2: Ancestry in rooted trees Motivation: [Abiteboul,Kaplan,Milo ’01] The <TAG> … </TAG> structure of a huge XML data-base is a rooted tree. Some queries are ancestry relations in this tree. Use compact index for fast query XML search engine. Here the constants do matter. Saving 1 byte of fast memory on each entry of the index table is important. Here n is large, ~ 109. Ex: Is <“distributed computing”> descendant of <booktitle>?

Folklore solution: DFS labeling 1 L(x)=[2,18] 3 4 5 6 7 8 9 10 L(y)=[13,18] 18 L(w)=[22,27] 24 27 12 11 14 16 23 26 25 17 15 21 20 19 [a,b] [c,d]? 2logn bit labels

logn + θ(loglogn) bit labels Best solution: logn + θ(loglogn) bit labels [Alstrup,Rauhe – Siam J.Comp. ’06] [Fraigniaud,Korman – STOC’10]

A distributed data-structure Get the labels of nodes involved in the query Compute/decode the answer from the labels No other source of information is required

Some labeling schemes Adjacency Distance (exact or approximate) First edge on a (near) shortest path Ancestry, parent, nca, sibling relations in trees Edge/vertex connectivity, flow Proof labeling systems …

Forbidden-set labeling scheme (extension of labeling scheme) Goal: to treat more elaborated queries Given (u,v,w): is there a path from u to v in G\{w}? [this particular task reduces to classical nca-labeling scheme for the bicomponent/cutvertex tree:  O(logn) bit labels] Challenge: Given (u,v,w1,…,wk): is there a path from u to v in G\{w1,…,wk}? u v

Emergency planning for connectivity [Patrascu,Thorup - FOCS’07] Motivation: parallel attack (link/node failure in IP blackbone, earthquake on road networks, malicious attack from worms or viruses,…) conn(u,v)  constant time (after pre-processing G) conn(u,v,w)  constant time (after pre-proc. G) conn(u,v,w1,…,wk)  O(k) or Õ(k) time? (after pre-proc. G), and constant time? (after pre-proc. w1…wk) Note: O(n+m) time is too much. Need a query time depending only on the #nodes involved in the query.

Forbidden-set labeling scheme [Courcelle,Twigg - STACS’07] Let P be a graph property defined on pairs of vertices, and let F be a graph family. A P –forbidden-set labeling scheme for F is a pair ‹L,f› s.t.  G F, u,v  G,  X  G: L(u,G) is a binary string f(L(u,G),L(v,G),L(X,G)) = P (u,v,X,G) where L(X,G):={L(w,G):w  X}

FS connectivity labeling [Courcelle,G.,Kanté,Twigg – TGGT’08] [Borradaile,Pettie,Wulff-Nilsen – SWAT’12] Connectivity in planar graphs: O(logn) bit labels [O(loglogn) query time after O(klogk) time for query pre-processing] Meta-Theorem: [Courcelle,Twigg – STACS’07] If G has “clique-width” at most cw (generalization of tree-width) and if predicate P is expressed in MSO-logic (like distances, connectivity, …), then labels of O(cw2 log2n)-bit suffice. Notes: same (optimal) bounds for distances in trees for the static case, but do not include planar …

Routing with forbidden-sets Design a routing scheme for G s.t. for every subset X of “forbidden” nodes (crashes, malicious, …) routing tables can be updated efficiently provided X.  This capture routing policies router: x FS-routing table(x) @(y) next-hop to y in G\{w1…wk} L(w1) … L(wk)

Some results for FS routing [Courcelle,Twigg – STACS’07] Clique-width cw: O(cw2log2n) bit labels and routing tables for shortest path routing. [Abraham,Chechik,G.,Peleg – PODC’10] Doubling dimension-: O(1+-1)2 log2n bit labels and routing tables for stretch 1+ routing (wrt. shortest path) [Abraham,Chechik,G. – STOC’12] Planar: O(-1 log3n) bit routing tables and O(-2 log5n) bit labels for stretch 1+ routing

How does it work? Query: dist(u,v) in G\{w1…wk} given L(u),L(v),L(w1),…,L(wk) From the labels of the query, construct a sketch graph H Run Dijkstra from u to v in H that has size Õ(k) u

How does it work? Query: dist(u,v) in G\{w1…wk} given L(u),L(v),L(w1),…,L(wk) From the labels of the query, construct a sketch graph H Run Dijkstra from u to v in H that has size Õ(k) u v

How does it work? Query: dist(u,v) in G\{w1…wk} given L(u),L(v),L(w1),…,L(wk) From the labels of the query, construct a sketch graph H Run Dijkstra from u to v in H that has size Õ(k) u

How does it work? Query: dist(u,v) in G\{w1…wk} given L(u),L(v),L(w1),…,L(wk) From the labels of the query, construct a sketch graph H Run Dijkstra from u to v in H that has size Õ(k) u v

How does it work? Query: dist(u,v) in G\{w1…wk} given L(u),L(v),L(w1),…,L(wk) From the labels of the query, construct a sketch graph H Run Dijkstra from u to v in H that has size Õ(k) u v

How does it work? Query: dist(u,v) in G\{w1…wk} given L(u),L(v),L(w1),…,L(wk) From the labels of the query, construct a sketch graph H Run Dijkstra from u to v in H that has size Õ(k) u v

How does it work? Query: dist(u,v) in G\{w1…wk} given L(u),L(v),L(w1),…,L(wk) From the labels of the query, construct a sketch graph H Run Dijkstra from u to v in H that has size Õ(k) u v

How does it work? Query: dist(u,v) in G\{w1…wk} given L(u),L(v),L(w1),…,L(wk) From the labels of the query, construct a sketch graph H Run Dijkstra from u to v in H that has size Õ(k) u v

How does it work? Query: dist(u,v) in G\{w1…wk} given L(u),L(v),L(w1),…,L(wk) From the labels of the query, construct a sketch graph H Run Dijkstra from u to v in H that has size Õ(k) u v

How does it work? Query: dist(u,v) in G\{w1…wk} given L(u),L(v),L(w1),…,L(wk) From the labels of the query, construct a sketch graph H Run Dijkstra from u to v in H that has size Õ(k) u v

How does it work? Query: dist(u,v) in G\{w1…wk} given L(u),L(v),L(w1),…,L(wk) From the labels of the query, construct a sketch graph H Run Dijkstra from u to v in H that has size Õ(k) u v

First Sirocco, 1994