Sensitivity Analysis of Minimum Spanning Trees in Sub-Inverse-Ackermann Time
نویسندگان
چکیده
منابع مشابه
Sensitivity Analysis of Minimum Spanning Trees in Sub-inverse-Ackermann Time
We present a deterministic algorithm for computing the sensitivity of a minimum spanning tree (MST) or shortest path tree in O(m logα(m,n)) time, where α is the inverse-Ackermann function. This improves upon a long standing bound of O(mα(m,n)) established by Tarjan. Our algorithms are based on an efficient split-findmin data structure, which maintains a collection of sequences of weighted eleme...
متن کاملVerification and Sensitivity Analysis of Minimum Spanning Trees in Linear Time
Koml os has devised a way to use a linear number of binary comparisons to test whether a given spanning tree of a graph with edge costs is a minimum spanning tree. The total computational work required by his method is much larger than linear, however. We describe a linear-time algorithm for verifying a minimum spanning tree. Our algorithm combines the result of Koml os with a preprocessing and...
متن کاملAn Inverse-Ackermann Type Lower Bound For Online Minimum Spanning Tree Verification
Given a spanning tree T of some graph G, the problem of minimum spanning tree verification is to decide whether T = MST (G). A celebrated result of Komlós shows that this problem can be solved with a linear number of comparisons. Somewhat unexpectedly, MST verification turns out to be useful in actually computing minimum spanning trees from scratch. It is this application that has led some to w...
متن کاملGeometric Minimum Spanning Trees
Let S be a set of n points in < d. We present an algorithm that uses the well-separated pair decomposition and computes the minimum spanning tree of S under any Lp or polyhedral metric. It has an expected running time of O(n logn) for uniform distributions. Experimentalresults show that this approachis practical. Under a variety of input distributions, the resultingimplementation is robust and ...
متن کاملMinimum Spanning Trees∗
1 Background Members of some secret party want to shutdown some high risk communication channals, while preserving low risk channals to ensure that members are still connected in the secret network.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Graph Algorithms and Applications
سال: 2015
ISSN: 1526-1719
DOI: 10.7155/jgaa.00365