Critical nodes for distance-based connectivity and related problems in graphs

被引:65
作者
Veremyev, Alexander [1 ]
Prokopyev, Oleg A. [2 ]
Pasiliao, Eduardo L. [3 ]
机构
[1] Univ Florida, Ind & Syst Engn, Gainesville, FL 32611 USA
[2] Univ Pittsburgh, Ind Engn, Pittsburgh, PA 15261 USA
[3] Air Force Res Lab, Munit Directorate, Eglin AFB, FL 32542 USA
关键词
critical node detection; distance-based metrics; graph efficiency; Harary index; Wiener index; s-club; network interdiction; integer programming; centrality measures; social networks; ATTACK TOLERANCE; ALGORITHM; NETWORKS; ERROR; CENTRALITY; BILEVEL; MODELS; MATRIX; LINKS; CLUBS;
D O I
10.1002/net.21622
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This study considers a class of critical node detection problems that involves minimization of a distance-based connectivity measure of a given unweighted graph via the removal of a subset of nodes (referred to as critical nodes) subject to a budgetary constraint. The distance-based connectivity measure of a graph is assumed to be a function of the actual pairwise distances between nodes in the remaining graph (e.g., graph efficiency, Harary index, characteristic path length, residual closeness) rather than simply whether nodes are connected or not, a typical assumption in the literature. We derive linear integer programming (IP) formulations, along with additional enhancements, aimed at improving the performance of standard solvers. For handling larger instances, we develop an effective exact algorithm that iteratively solves a series of simpler IPs to obtain an optimal solution for the original problem. The edge-weighted generalization is also considered, which results in some interesting implications for distance-based clique relaxations, namely, s -clubs. Finally, we conduct extensive computational experiments with real-world and randomly generated network instances under various settings that reveal interesting insights and demonstrate the advantages and limitations of the proposed approach. In particular, one important conclusion of our work is that vulnerability of real-world networks to targeted attacks can be significantly more pronounced than what can be estimated by centrality-based heuristic methods commonly used in the literature. (c) 2015 Wiley Periodicals, Inc. NETWORKS, Vol. 66(3), 170-195 2015
引用
收藏
页码:170 / 195
页数:26
相关论文
共 73 条
[1]   Efficiency and cost of economical brain functional networks [J].
Achard, Sophie ;
Bullmore, Edward T. .
PLOS COMPUTATIONAL BIOLOGY, 2007, 3 (02) :174-183
[2]   Identifying critical nodes in undirected graphs: Complexity results and polynomial algorithms for the case of bounded treewidth [J].
Addis, Bernardetta ;
Di Summa, Marco ;
Grosso, Andrea .
DISCRETE APPLIED MATHEMATICS, 2013, 161 (16-17) :2349-2360
[3]  
Ahuja R., 1993, NETWORK FLOWS THEORY
[4]   Statistical mechanics of complex networks [J].
Albert, R ;
Barabási, AL .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :47-97
[5]   Error and attack tolerance of complex networks [J].
Albert, R ;
Jeong, H ;
Barabási, AL .
NATURE, 2000, 406 (6794) :378-382
[6]   An analytical comparison of the LP relaxations of integer models for the k-club problem [J].
Almeida, Maria Teresa ;
Carvalho, Filipa D. .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2014, 232 (03) :489-498
[7]  
[Anonymous], 1996, UCINET IV: Network Analysis Software
[8]  
Reference Manual
[9]  
[Anonymous], 2002, 1 MONDAY
[10]  
[Anonymous], 1979, Computers and Intractablity: A Guide to the Theory of NP-Completeness