• 沒有找到結果。

平面網路上防疫問題之近似演算法

N/A
N/A
Protected

Academic year: 2022

Share "平面網路上防疫問題之近似演算法"

Copied!
28
0
0

加載中.... (立即查看全文)

全文

(1)

୯ҥᆵ᡼εᏢႝᐒၗૻᏢଣၗૻπำᏢࣴز܌

ᅺγፕЎ

Department of Computer Science and Information Engineering College of Electrical Engineering and Computer Science

National Taiwan University Master Thesis

ѳय़ᆛၡ΢ٛࣝୢᚒϐ߈՟ᄽᆉݤ

An Approximation Algorithm for the Inoculation Problem for Planar Networks

ߋ߷ഩ Kuan-Kai Chiu

ࡰᏤ௲௤ǺֈᏢ΋ റγ Advisor: Hsueh-I Lu, Ph.D.

ύ๮҇୯ 97 ԃ 7 Д

July, 2008

(2)

誌 謝

這篇論文之所以能夠完成, 首先要感謝我的指導教授呂學一老師 。 從一開始題目的挑 選 、 研究經驗的分享 , 一直到論文的寫法和架構 、 口試投影片的準備,老師都非常費心 地指導 , 讓我的研究成果得以清楚完整地呈現出來 。 不管是面對面還是透過電子郵件, 那 無數次的討論 ,現在回想起來都還是歷歷在目 。 最重要的 , 是能夠通過老師嚴格的督導 完成這篇論文 , 相信以後的我 , 不管遇到任何困難的事, 都絕對不會失去信心 。

感謝王大為老師和鍾國亮老師, 願意在百忙之中抽空擔任口試委員, 並對論文提供許 多寶貴的意見 , 使這篇論文更臻完善 。

再來, 我也很感謝這兩年來一起陪我努力的夥伴們 。 冠伶學姐的開導跟指點 ,讓我得 以保持信心繼續努力做研究 。 國煒學長的照顧跟搞笑 ,讓我由衷地感激和敬佩 。 還有宗 灝 、 昱豪 、 弘偉 、 柏穎 、 世鵬 、 雅斐 、 文良 、 偉揚 、 婕妤等實驗室的好朋友們 ,讓我在 這跌跌撞撞走來的兩年裡 , 充滿許多歡笑和回憶 。

最後想要感謝的, 是我的父母還有女朋友黃韻倩小姐, 對於他們無怨無悔地關心和支 持, 這篇論文對我而言, 是目前能夠回報他們最好的方式 。

能不能完成一件事情, 全端視自己有多渴望成功, 這是我在碩士生涯裡學會最重要的 一件事 。 僅以這篇論文 , 獻給所有在我拼了命努力研究的兩年裡,一直鼓勵和支持我的 人們 。

2008年7月 邱冠凱

(3)

平面網路上防疫問題之近似演算法

研究生 : 邱冠凱 指導教授 : 呂學一 博士

國立臺灣大學電機資訊學院資訊工程學研究所

摘 要

給兩個數字 ck ,以及 n 個點的一般網路 G ,防疫問題的定義為 :求出由 G 當中最 多 k 個點所組成的點集合 S ,使得 c · m + n1 

in2i 的值為最小, 其中 mS 的點個 數, niG \ S 的第i個連通單元 。 對於這個 NP-完備的問題 , 目前已知最好的結果是 由 Aspnes、Chang 和 Yampolskiy 提出的O(log1.5n) 倍比率的近似演算法 。 我們在本 篇論文中證明當G為平面網路時 , 這個問題仍是NP-完備 , 並且提出一個O(log n)倍比 率的近似演算法 。

(4)

An Approximation Algorithm for the Inoculation Problem for Planar Networks

Student : Kuan-Kai Chiu Advisor : Hsueh-I Lu, Ph.D.

Department of Computer Science and Information Engineering College of Electrical Engineering and Computer Science

National Taiwan University

Abstract

For numbers c and k and an n-node graph G, the inoculation problem is to compute an S consisting of at most k nodes of G such that c · m + n1 

in2i is minimized, wherem is the cardinality of S and ni is the number of nodes in thei-th connected component of G \ S. The best previously known result, due to Aspnes, Chang, and Yampolskiy, for this NP-complete problem is anO(log1.5n)-approximation algorithm. In the present article, we focus on the special case thatG is planar: We show that the problem remains NP-complete and give anO(log n)-approximation algorithm for the problem.

(5)

Contents

Acknowledgements i

Chinese Abstract ii

English Abstract iii

1 Introduction 1

2 Preliminaries 4

2.1 Hardness . . . 4

2.2 Minimum quotient cut . . . 5

3 Our algorithm 7 3.1 A reduction . . . 7

3.2 Finding a bicriterion approximate solution . . . 8

3.3 Finding a node set with good cost effectiveness . . . 12

3.4 Proving Theorem 1.1 . . . 16

4 Concluding remarks 17

(6)

Bibliography 18

(7)

List of Figures

1.1 IfG is the graph as shown in the left and S = {a, b, c}, then φ(S) = 23. . 2

(8)

Chapter 1

Introduction

For any setS, let |S| denote the cardinality of S. For any node subset S of G, let G \ S denote the graph obtained fromG by deleting the nodes in S and the edges incident to the nodes inS. For any node subset S of G, let

φ(S) =

i

n2i,

whereniis the number of nodes in thei-th connected component of G\S. See Figure 1.1 for an example.

Given ann-node graph G and two numbers c and k, the inoculation problem is to find a node subsetS of G with |S| ≤ k that minimizes

c · |S| + 1

n · φ(S).

To address a game-theoretical model of network security (see, e.g., [2, 3, 6–8, 10–18, 20]), Aspnes, Chang, and Yampolskiy [4] formulated the problem with k = n to describe the following scenario of virus attack. Suppose that each infected node incurs 1 unit of penalty and it takes c units of cost to secure a node by, say, installing an anti-virus

(9)

c b

a

Figure 1.1: IfG is the graph as shown in the left and S = {a, b, c}, then φ(S) = 23.

software. The virus spreads by infecting some initial node chosen uniformly at random.

An insecure node gets infected if any of its neighbors in the graph is infected. IfS consists of the secured nodes, thenc·|S| is the inoculation cost andn1·φ(S) is the expected penalty incurred by all infected nodes.

Aspnes et al. [4] ensured the NP-completeness of the problem. They also showed that it takes in ˜O(n4) time1to compute an O(log2n)-approximation solution for the problem with k = n. In the journal version [5], they further reduced the approximation ratio to O(log1.5n) while raised the time complexity ˜O(n6.5). Moscibroda, Schimid, and Watten- hofer [19] studied the problem for highly regular and low-dimensionalG.

The present article focuses on planar G, for which case we show that the problem remains NP-hard and obtain an approximation algorithm as summarized in the following theorem.

Theorem 1.1. For anyn-node planar graph G, any number c, and any positive constant

, it takes ˜O(n6+) time to compute an O(log n)-approximate solution for the inoculation problem withk = n.

Similar to the method of Aspnes, Chang, and Yampolskiy [4, 5], our approach repeat-

1The ˜O(·) notation suppresses the polylog(n) factors.

(10)

edly removes a near-optimal sparse vertex cut from some connected component of the current graph. The near-optimal sparse vertex cut causes a sufficient decrease of risk per removed node, quantified as its cost effectiveness. We compute a node set with sufficient cost effectiveness by resorting to the approximation algorithm of Amir, Krauthgamer, and Rao [1] that finds a near optimal solution for the minimum quotient vertex cut problem for planar graphs.

The rest of the paper is organized as follows. Chapter 2 gives the preliminaries. Chap- ter 3 gives our algorithm. Chapter 4 concludes the paper.

(11)

Chapter 2

Preliminaries

For the rest of the paper, letG be the input n-node planar graph.

2.1 Hardness

The following lemma ensures that the inoculation problem withk = n remains NP-hard even ifG is planar.

Lemma 2.1. The inoculation problem for an n-node planar graph G with k = n and

n1 < c < n3 is NP-hard.

Proof. The proof is modified from that of Aspnes et al. [5, Theorems 3 and 10]. Since computing the minimum cardinality of vertex cover for planar G is NP-complete [9], it suffices to show that the cardinality of any optimal solution for the inoculation problem withk = n and 1n < c < n3 forG is the same as the cardinality of any minimum vertex cover ofG. S is a minimum vertex cover for G if and optimal solution of the inoculation problem withc = n2.

(12)

Let S1 be a minimum vertex cover for G. Let S2 be an optimal solution for the inoculation problem for G with k = n and n1 < c < n3. Aspnes et al. [5, Theorem 10]

guarantees thatS2is a vertex cover ofG. Therefore,

|S1| ≤ |S2|. (2.1)

SinceS1 andS2 are both vertex covers ofG, we have

φ(S1) = n − |S1| (2.2)

φ(S2) = n − |S2|. (2.3)

SinceS1 is a feasible solution for the inoculation problem, we have

c · |S2| +φ(S2)

n ≤ c · |S1| +φ(S1) n . It follows fromc > n1 and Equations (2.2) and (2.3) that

|S2| ≤ |S1|. (2.4)

Combining Inequalities (2.1) and (2.4), we have|S1| = |S2|. The lemma is proved.

2.2 Minimum quotient cut

A, B, R is a cut of a graph H if A, B, and R with |A| ≤ |B| form a partition of the nodes of H such that H does not have any edge with one endpoint in A and the other endpoint inB. The quotient of A, B, R is

θH(A, B, R) = |R|

|A| + |R|.

The minimum quotient cut problem forH is to find a cut of H with minimum quotient.

(13)

Lemma 2.2 (Amir et al. [1]). For anyn-node planar graph H and any positive constant , it takesO(n4+) time to compute a 43(1 +1+ o(1))-approximate solution for the minimum quotient cut problem forH.

(14)

Chapter 3

Our algorithm

3.1 A reduction

For numbers α, β ≥ 1, a node subset S of G is a bicriterion (α, β)-approximate solution for the inoculation problem forG if the following conditions hold for S, α, and β:

Condition B1: |S| ≤ α · k.

Condition B2: φ(S) ≤ β · φ( ˆS) holds for any node subset ˆS of G with | ˆS| ≤ k.

Therefore, aβ-approximate solution for the problem is a (1, β)-approximate solution for the problem. Our result is based on the following reduction of Aspnes et al. [5], which ensures that it suffices to focus on finding an (α, β)-approximate solution for the problem withc = 0.

Lemma 3.1 (Aspnes et al. [5, Corollary 13]). If an (α, β)-approximate solution for the inoculation problem withc = 0 can be computed in O(f(n)) time, then it takes O(n·f(n))

(15)

time to compute a max(α, β)-approximate solution for the inoculation problem with k = n.

3.2 Finding a bicriterion approximate solution

Given a number γ ≥ 1, we show how to compute an (O(γ · log n), O(γ))-approximate solution for the inoculation problem with c = 0. Observe that if k ≥ n, then the node set ofG is a trivial (O(γ · log n), O(γ))-approximate solution. Therefore, the rest of the section assumesk < n. For any node subsets S and R of G, the cost effectiveness of R with respect toS is

μ(R, S) = φ(S) − φ(S ∪ R)

|R| .

With the following conditions, Algorithm 1 gives the main procedure.

Condition C1: μ(R, S) < (γ+1)k1 · φ(S).

Condition C2: |S ∪ R| ≥ min{n, (1 + (γ + 1) log2(n − k)) · k}.

Condition C3: μ(R, S) ≥ 1γ·μ( ˆS, S) holds for any node subset ˆS of G with | ˆS| ≤ k.

Observe that Algorithm 1 can only abnormally abort at the step of finding a node subset R of the current G \ S such that Condition C3 holds. If Algorithm 1 does not abnormally abort, then the following lemma ensures the correctness of Algorithm 1.

Lemma 3.2. If Algorithm 1 does not abnormally abort, then it takes Algorithm 1 at most n iterations to output an (O(γ · log n), O(γ))-approximate solution for the inoculation problem withc = 0.

(16)

Algorithm 1 main procedure

LetS initially be an arbitrary node subset of G with |S| = k. The algorithm proceeds in iterations, each of which computes a nonempty node subsetR of the current G \ S such that Condition C3 holds. If neither of Conditions C1 and C2 hold for the current S and R, then the algorithm lets S = S ∪ R and proceeds to the next iteration. Otherwise, the algorithm halts. The output depends on Condition C1 for the finalS and R:

• If Condition C1 holds, then the algorithm outputs the final S.

• If Condition C1 does not hold, then the algorithm outputs the final S ∪ R.

Proof. Observe that each iteration of Algorithm 1 increases the size ofS by at least one.

By definition of Condition C2, Algorithm 1 halts in at most n iterations. The rest of the proof argues that Algorithm 1 computes an (O(γ · log n), O(γ))-approximate solution.

Consider the finalS and R at the last iteration of Algorithm 1. We first show that

|S| = O(γ · log n) · k, (3.1)

which holds trivially if Algorithm 1 runs for exactly one iteration. If Algorithm 1 runs for at least two iterations, letS(respectively,R) be the setS (respectively, R) at the second- to-last iteration. Since Condition C2 does not hold forSandR, we obtain Equation (3.1) as follows.

|S| = |S∪ R| < min{n, (1 + (γ + 1) log2(n − k)) · k} = O(γ · log n) · k.

The following case analysis is according to whether Condition C1 holds forS and R.

Case 1: Condition C1 holds for the finalS and R. We prove the lemma by showing that Conditions B1 and B2 hold with S = S, α = O(γ · log n), and β = γ + 1. Note that

(17)

Condition B1 is immediate from Equation (3.1). To see thatφ(S) ≤ (γ + 1) · φ( ˆS) holds for any node subset ˆS of G with | ˆS| ≤ k, observe that Conditions C1 and C3 hold for S andR. Thus,

φ(S)

(γ + 1)k > μ(R, S) ≥ μ( ˆS, S)

γ = φ(S) − φ(S ∪ ˆS)

γ · | ˆS| φ(S) − φ( ˆS) γ · k . Therefore, we have Condition B2.

Case 2: Condition C1 does not hold for the finalS and R. By definition of Algorithm 1, Condition C2 holds for S and R. We prove the lemma by showing that Conditions B1 and B2 hold withS = S ∪ R, α = O(γ · log n), and β = 1. We first prove Condition B1, i.e.,|S ∪ R| = O(γ · log n) · k. By Equation (3.1), it remains to ensure |R| ≤ (γ + 1) · k as follows

φ(S)

|R| φ(S) − φ(S ∪ R)

|R| = μ(R, S) ≥ φ(S)

(γ + 1)k,

where the last inequality is by the assumption that Condition C1 does not hold for S and R.

We next prove Condition B2, i.e.,φ(S ∪ R) ≤ φ( ˆS) holds for any node subset ˆS of G with| ˆS| ≤ k. Let Si(respectively,Ri) be the setS (respectively, R) at the i-th iteration of Algorithm 1. Letδ be the number of iterations executed by Algorithm 1. For notational brevity, we defineSδ+1 to be the finalS ∪ R. For each i = 1, . . . , δ, one can verify that Si+1= Si∪ Ri, we have

μ(Ri, Si) = φ(Si) − φ(Si∪ Ri)

|Ri| = φ(Si) − φ(Si+1)

|Si+1| − |Si| . Since Condition C1 never holds throughout the execution, we have

φ(Si) − φ(Si+1)

|Si+1| − |Si| φ(Si) (γ + 1)k.

(18)

Thus,

φ(Si+1) ≤



1 − |Si+1| − |Si| (γ + 1)k



φ(Si). (3.2)

Note that Condition B2 holds trivially, if Condition C2 holds with |S ∪ R| = n. For the rest of the proof, we have Condition C2 holds with

|S ∪ R| ≥ (1 + (γ + 1) log2(n − k)) · k.

Since it may not disconnectG by removing S1 fromG with |S1| = k , we have φ(S1) ≤ (n − k)2. Since it may divideG into n − | ˆS| nodes by removing ˆS from G with | ˆS| ≤ k, we haveφ( ˆS) ≥ n − k. Thus, we have the following result.

φ(S ∪ R) = φ(Sδ+1)

≤ φ(S1) ·

δ i=1



1 −|Si+1| − |Si| (γ + 1)k



≤ (n − k)2·

δ i=1



1 −|Si+1| − |Si| (γ + 1)k



≤ (n − k)2·

δ i=1



1 − 1

(γ + 1)k

|Si+1|−|Si|

= (n − k)2·



1 − 1

(γ + 1)k

|Sδ+1|−|S1|

≤ (n − k)2·



1 − 1

(γ + 1)k

(γ+1)k log2(n−k)

< (n − k)2·

1 2

log2(n−k)

= (n − k)

≤ φ( ˆS),

where the first inequality is by Inequality (3.2). Therefore, we have Condition B2.

(19)

3.3 Finding a node set with good cost effectiveness

The following lemma ensures the feasiblity of each iteration of Algorithm 1.

Lemma 3.3. For any positive constant , if γ = 8(2 + 1), then each iteration of Algo- rithm 1 requiresO(n4+) time and does not abnormally abort.

Proof. Clearly, it suffices to focus on the step to compute a node subsetR of the current G \ S such that Condition C3 holds. At first, for each connected component H of G \ S, we compute a node subsetR of H such that the following condition holds.

Condition D1: μ(R, S) ≥ γ1 · μ( ˆR, S) holds for any node subset ˆR of H.

The detail is left to the second part. Then, by choosing the one with maximumμ(R, S) over allR, we can derive the node subset R such that Condition D1 holds with R = R for anyH of G \ S. Let VH be the node subset ofH. By definition of φ, we have

φ(S) − φ( ˆS) = 

H∈G\S

φ(S) − φ(S ∪ { ˆS ∩ VH}) ,

then

μ( ˆS, S) = φ(S) − φ(S ∪ ˆS)

| ˆS|

=



H∈G\S

φ(S) − φ(S ∪ { ˆS ∩ VH})

| ˆS|

=



H∈G\S

μ( ˆS ∩ VH, S) · | ˆS ∩ VH|

| ˆS| .

Since ˆS ∩ VH is a node subset of H, and Condition D1 holds with R = R for any H of

(20)

G \ S, Condition C3 holds by the follows

μ( ˆS, S) =



H∈G\S

μ( ˆS ∩ VH, S) · | ˆS ∩ VH|

| ˆS|



H∈G\S

γ · μ(R, S) · | ˆS ∩ VH|

| ˆS|

≤ γ · μ(R, S).

The rest of the proof proves that, for any connected component H of G \ S, it takes O(|VH|4+) time to compute a node subset R of H such that Condition D1 holds. There- fore, we can deriveR in O(n4+) time, which proves Lemma 3.3.

For any node subset ˆR of H, let  ˆA, ˆB, ˆR be a cut of H, and | ˆA| is maximized with respect to ˆR. We give the proof in three parts.

1. μ( ˆR, S) ≤ θ 3|VH|

H( ˆA, ˆB, ˆR).

2. A cut A, B, R with θH(A, B, R) ≤ 4(2+1)

3 · θH( ˆA, ˆB, ˆR) can be computed in O(|VH|4+) time.

3. θH(A, B, R) ≥ 2·μ(R,S)|VH| .

Combining the three statements, we can compute a node subset R of H in O(|VH|4+) time such that

μ( ˆR, S) ≤ 3|VH|

θH( ˆA, ˆB, ˆR) 4 2 + 1

|VH| θH(A, B, R) ≤ 8

 2 + 1





· μ(R, S) = γ · μ(R, S).

Therefore, we have Condition D1.

LetVHi be the node set of the i-th connected component of the remaining graph in- duced by removing ˆR from H. By definition of φ, we have

φ(S) − φ(S ∪ ˆR) = |VH|2

i

|VHi|2. (3.3)

(21)

SinceR is a node subset of H, Equation (3.3) also holds with ˆR = R for the rest of the proof.

The first statement can be proved by two cases of| ˆB|.

| ˆB| ≤ 2|V3H|. From Equation (3.3), we have μ( ˆR, S) = φ(S) − φ(S ∪ ˆR)

| ˆR|

= |VH|2

i|VHi|2

| ˆR|

|VH|2

i|VHi|

| ˆR|

= |VH|2− (| ˆA| + | ˆB|)

| ˆR|

= |VH|2− (|VH| − | ˆR|)

| ˆR|

= |VH|(|VH| − 1)

| ˆR| + 1

= |VH|(| ˆA| + | ˆB| + | ˆR| − 1)

| ˆR| + 1

= |VH|(| ˆA| + | ˆR|)

| ˆR| + |VH|(| ˆB| − 1)

| ˆR| + 1

|VH|

θH( ˆA, ˆB, ˆR) +2|VH|(|VH| − | ˆB|)

| ˆR|

= |VH|

θH( ˆA, ˆB, ˆR) +2|VH|(| ˆA| + | ˆR|)

| ˆR|

= |VH|

θH( ˆA, ˆB, ˆR) + 2|VH| θH( ˆA, ˆB, ˆR)

= 3|VH| θH( ˆA, ˆB, ˆR).

| ˆB| > 2|V3H|. We prove that there is only one connected component in ˆB. As- sume for contradiction that ˆB consists of more than one connected components.

The following two cases show that there exists a cut A, B, ˆR with |A| > | ˆA|, contradicting to that| ˆA| is maximized with respect to ˆR.

(22)

– If there exists a connected componentHb of ˆB with |Hb| ≤ |V3H|, we letA = min{ ˆA ∪ Hb, ˆB \ Hb}, then |A| > | ˆA|.

– Otherwise, we letA be any connected component of ˆB, then |A| > |V3H| >

| ˆA|.

Thus, we have

μ( ˆR, S) = φ(S) − φ(S ∪ ˆR)

| ˆR|

= |VH|2

i|VHi|2

| ˆR|

= |VH|2− | ˆB|2

VHi∈ ˆA|VHi|2

| ˆR|

|VH|2− | ˆB|2− | ˆA|

| ˆR|

= |VH|2− (|VH| − | ˆA| − | ˆR|)2− | ˆA|

| ˆR|

= 2|VH|(| ˆA| + | ˆR|) − (| ˆA| + | ˆR|)2− | ˆA|

| ˆR|

< 2|VH|(| ˆA| + | ˆR|)

| ˆR|

= 2|VH| θH( ˆA, ˆB, ˆR), where the second equality is by Equation (3.3).

The second statement follows immediately from Lemma 2.2. We then prove the third statement. Since|A| ≤ |B|, we have

|B| ≥ |A| + |B|

2 = |VH| − |R|

2 . (3.4)

(23)

From Equation (3.3) and Inequality (3.4), we have

μ(R, S) = φ(S) − φ(S ∪ R)

|R|

= |VH|2

i|VHi|2

|R|

|VH|2− |A|2 − |B|2

|R|

= (|A| + |B| + |R|)2− |A|2− |B|2

|R|

= 2|A||B| + 2|VH||R| − |R|2

|R|

2|A||B| + |VH||R|

|R|

|A|(|VH| − |R|) + |VH||R|

|R|

= |VH|(|A| + |R|)

|R| |A||R|

|R|

|VH|

θH(A, B, R) −|VH|(|A| + |R|) 2|R|

= |VH|

2 · θH(A, B, R).

3.4 Proving Theorem 1.1

Proof. Lemmas 3.2 and 3.3 together ensure that an (O(log n), O(1))-approximate solu- tion for the inoculation problem withc = 0 can be found in O(n5+) time. The theorem follows immediately from Lemma 3.1.

(24)

Chapter 4

Concluding remarks

We leave open the approximability of the inoculation problem for general parameter k.

It would be interesting to see if our techniques can be extended to work for this general version for planar graphs.

(25)

Bibliography

[1] E. Amir, R. Krauthgamer, and S. Rao. Constant factor approximation of vertex-cuts in planar graphs. In Proceedings of the 35th Annual ACM Symposium on Theory of Computing, pages 90–99, New York, NY, USA, 2003. ACM.

[2] R. Anderson and T. Moore. The economics of information security. Science Maga- zine, 314(5799):610–613, October 2006.

[3] R. Anderson and T. Moore. Information security economics - and beyond. In Pro- ceedings of the 27th Annual International Cryptology Conference, volume 4622 of Lecture Notes in Computer Science, pages 68–91. Springer, 2007.

[4] J. Aspnes, K. Chang, and A. Yampolskiy. Inoculation strategies for victims of viruses and the sum-of-squares partition problem. In Proceedings of the 16th Annual ACM-SIAM Symposium on Discrete Algorithms, pages 43–52, Vancouver, British Columbia, Canada, January 23-25 2005.

[5] J. Aspnes, K. Chang, and A. Yampolskiy. Inoculation strategies for victims of viruses and the sum-of-squares partition problem. Journal of Computer and Sys- tem Sciences, 72(6):1077–1093, 2006.

(26)

[6] N. Chen. On the approximability of influence in social networks. In Proceedings of the 19th Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1029–1037, Philadelphia, PA, USA, 2008. Society for Industrial and Applied Mathematics.

[7] R. Cole, Y. Dodis, and T. Roughgarden. Bottleneck links, variable demand, and the tragedy of the commons. In Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithm, pages 668–677, New York, NY, USA, 2006. ACM.

[8] R. Eidenbenz, Y. A. Oswald, S. Schmid, and R. Wattenhofer. Mechanism design by creditability. In Proceedings of the 1st International Conference on Combinatorial Optimization and Applications, volume 4616 of Lecture Notes in Computer Science, pages 208–219. Springer, 2007.

[9] M. R. Garey, D. S. Johnson, and L. Stockmeyer. Some simplified NP-complete prob- lems. In Proceedings of the 6th Annual ACM Symposium on Theory of Computing, pages 47–63, New York, NY, USA, 1974. ACM.

[10] M. Gelastou, M. Mavronicolas, V. G. Papadopoulou, A. Philippou, and P. G. Spi- rakis. The power of the defender. In Proceedings of the 26th IEEE International Conference on Distributed Computing System Workshops, page 37. IEEE Computer Society, 2006.

[11] G. Giakkoupis, A. Gionis, E. Terzi, and P. Tsaparas. Models and algorithms for network immunization.

[12] M. Mavronicolas, V. G. Papadopoulou, G. Persiano, A. Philippou, and P. G. Spi- rakis. The price of defence and fractional matchings. In Proceedings of the 8th

(27)

International Conference on Distributed Computing and Networking, volume 4308 of Lecture Notes in Computer Science, pages 115–126. Springer, 2006.

[13] M. Mavronicolas, V. G. Papadopoulou, A. Philippou, and P. G. Spirakis. A graph- theoretic network security game. In Proceedings of the 1st International Workshop on Internet and Network Economics, volume 3828 of Lecture Notes in Computer Science, pages 969–978. Springer, 2005.

[14] M. Mavronicolas, V. G. Papadopoulou, A. Philippou, and P. G. Spirakis. Network game with attacker and protector entities. In Proceedings of the 16th Annual In- ternational Symposium on Algorithms and Computation, volume 3827 of Lecture Notes in Computer Science, pages 288–297. Springer, 2005.

[15] M. Mavronicolas, V. G. Papadopoulou, A. Philippou, and P. G. Spirakis. A graph- theoretic network security game. International Journal of Autonomous and Adaptive Communications Systems, June 2008.

[16] M. Mavronicolas, V. G. Papadopoulou, A. Philippou, and P. G. Spirakis. A network game with attackers and a defender. Algorithmica, 51(3):315–341, June 2008.

[17] D. Meier, Y. A. Oswald, S. Schmid, and R. Wattenhofer. On the windfall of friend- ship: inoculation strategies on social networks. In Proceedings of the 9th ACM Conference on Electronic Commerce, 2008.

[18] T. Moscibroda. Locality, scheduling, and selfishness: algorithmic foundations of highly decentralized networks. PhD thesis, ETH Zurich, 2006.

(28)

[19] T. Moscibroda, S. Schmid, and R. Wattenhofer. When selfish meets evil: Byzantine players in a virus inoculation game. In Proceedings of the 25th Annual ACM Sym- posium on Principles of Distributed Computing, pages 35–44, New York, NY, USA, 2006. ACM.

[20] Z. Nikoloski. Defence strategies against network worms: formulation, evaluation, and comparison.

數據

Figure 1.1: If G is the graph as shown in the left and S = {a, b, c}, then φ(S) = 23.

參考文獻

相關文件

We present numerical results for Algorithm Elastic-Inexact applied to a set of 18 MPECs, showing the outcomes for each problem and analyzing whether exact complementarity,

Primal-dual approach for the mixed domination problem in trees Although we have presented Algorithm 3 for finding a minimum mixed dominating set in a tree, it is still desire to

• The solution to Schrödinger’s equation for the hydrogen atom yields a set of wave functions called orbitals..  Each orbital has a characteristic shape

Given a shift κ, if we want to compute the eigenvalue λ of A which is closest to κ, then we need to compute the eigenvalue δ of (11) such that |δ| is the smallest value of all of

Then, we tested the influence of θ for the rate of convergence of Algorithm 4.1, by using this algorithm with α = 15 and four different θ to solve a test ex- ample generated as

By exploiting the Cartesian P -properties for a nonlinear transformation, we show that the class of regularized merit functions provides a global error bound for the solution of

In this work, for a locally optimal solution to the NLSDP (2), we prove that under Robinson’s constraint qualification, the nonsingularity of Clarke’s Jacobian of the FB system

Specifically, for a locally optimal solution to the nonlinear second-order cone programming (SOCP), under Robinson’s constraint qualification, we establish the equivalence among