Detecting critical nodes in sparse graphs

被引:246
作者
Arulselvan, Ashwin [2 ]
Commander, Clayton W. [1 ]
Elefteriadou, Lily [3 ]
Pardalos, Panos M. [2 ]
机构
[1] Univ Florida, Munit Directorate, Air Force Res Lab, Gainesville, FL 32611 USA
[2] Univ Florida, Dept Ind & Syst Engn, Ctr Appl Optimizat, Gainesville, FL 32611 USA
[3] Univ Florida, Dept Civil & Coastal Engn, Gainesville, FL USA
基金
美国国家科学基金会;
关键词
Critical node detection; Heuristics; Integer linear programming; NP-complete; Combinatorial optimization;
D O I
10.1016/j.cor.2008.08.016
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Identifying critical nodes in a graph is important to understand the structural characteristics and the connectivity properties of the network. In this paper, we focus on detecting critical nodes, or nodes whose deletion results in the minimum pair-wise connectivity among the remaining nodes. This problem, known as the CRITICAL NODE PROBLEM has applications in several fields including biomedicine, telecommunications, and military strategic planning. We show that the recognition version of the problem is NP-complete and derive a mathematical formulation based on integer linear programming. In addition, we propose a heuristic for the problem which exploits the combinatorial structure of the graph. The heuristic is then enhanced by the application of a local improvement method. A computational study is presented in which we apply the integer programming formulation and the heuristic to real and randomly generated data sets. For all instances tested. the heuristic is able to efficiently provide optimal solutions in a fraction of the time required by a commercial software package. Published by Elsevier Ltd.
引用
收藏
页码:2193 / 2200
页数:8
相关论文
共 25 条
  • [1] Ahuja RK, 1995, NETWORK FLOWS THEORY
  • [2] [Anonymous], 1948, Social Networks: Critical Concepts in Sociology, DOI DOI 10.17730/HUMO.7.3.F4033344851GL053
  • [3] [Anonymous], 1 MONDAY
  • [4] [Anonymous], HDB TRANSPORTATION E
  • [5] Emergence of scaling in random networks
    Barabási, AL
    Albert, R
    [J]. SCIENCE, 1999, 286 (5439) : 509 - 512
  • [6] Identifying sets of key players in a social network
    Borgatti S.P.
    [J]. Computational & Mathematical Organization Theory, 2006, 12 (1) : 21 - 34
  • [7] Butenko S., 2003, Ph.D. thesis
  • [8] Efficient immunization strategies for computer networks and populations
    Cohen, R
    Havlin, S
    ben-Avraham, D
    [J]. PHYSICAL REVIEW LETTERS, 2003, 91 (24)
  • [9] The wireless network jamming problem
    Commander, ClaytonW.
    Pardalos, Panos M.
    Ryabchenko, Valeriy
    Uryasev, Stan
    Zrazhevsky, Grigoriy
    [J]. JOURNAL OF COMBINATORIAL OPTIMIZATION, 2007, 14 (04) : 481 - 498
  • [10] Cormen T.H., 2001, Introduction To Algorithms, Vsecond