-
Anomaly Detection Within Mission-Critical Call Processing
Authors:
Sean Doris,
Iosif Salem,
Stefan Schmid
Abstract:
With increasingly larger and more complex telecommunication networks, there is a need for improved monitoring and reliability. Requirements increase further when working with mission-critical systems requiring stable operations to meet precise design and client requirements while maintaining high availability.
This paper proposes a novel methodology for developing a machine learning model that c…
▽ More
With increasingly larger and more complex telecommunication networks, there is a need for improved monitoring and reliability. Requirements increase further when working with mission-critical systems requiring stable operations to meet precise design and client requirements while maintaining high availability.
This paper proposes a novel methodology for developing a machine learning model that can assist in maintaining availability (through anomaly detection) for client-server communications in mission-critical systems. To that end, we validate our methodology for training models based on data classified according to client performance. The proposed methodology evaluates the use of machine learning to perform anomaly detection of a single virtualized server loaded with simulated network traffic (using SIPp) with media calls. The collected data for the models are classified based on the round trip time performance experienced on the client side to determine if the trained models can detect anomalous client side performance only using key performance indicators available on the server.
We compared the performance of seven different machine learning models by testing different trained and untrained test stressor scenarios. In the comparison, five models achieved an F1-score above 0.99 for the trained test scenarios. Random Forest was the only model able to attain an F1-score above 0.9 for all untrained test scenarios with the lowest being 0.980. The results suggest that it is possible to generate accurate anomaly detection to evaluate degraded client-side performance.
△ Less
Submitted 26 August, 2024;
originally announced August 2024.
-
Toward Self-Adjusting k-ary Search Tree Networks
Authors:
Evgenii Feder,
Anton Paramonov,
Pavel Mavrin,
Iosif Salem,
Stefan Schmid,
Vitaly Aksenov
Abstract:
Datacenter networks are becoming increasingly flexible with the incorporation of new networking technologies, such as optical circuit switches. These technologies allow for programmable network topologies that can be reconfigured to better serve network traffic, thus enabling a trade-off between the benefits (i.e., shorter routes) and costs of reconfigurations (i.e., overhead). Self-Adjusting Netw…
▽ More
Datacenter networks are becoming increasingly flexible with the incorporation of new networking technologies, such as optical circuit switches. These technologies allow for programmable network topologies that can be reconfigured to better serve network traffic, thus enabling a trade-off between the benefits (i.e., shorter routes) and costs of reconfigurations (i.e., overhead). Self-Adjusting Networks (SANs) aim at addressing this trade-off by exploiting patterns in network traffic, both when it is revealed piecewise (online dynamic topologies) or known in advance (offline static topologies). In this paper, we take the first steps toward Self-Adjusting k-ary tree networks. These are more powerful generalizations of existing binary search tree networks (like SplayNets), which have been at the core of SAN designs. k-ary search tree networks are a natural generalization offering nodes of higher degrees, reduced route lengths for a fixed number of nodes, and local routing in spite of reconfigurations. We first compute an offline (optimal) static network for arbitrary traffic patterns in $O(n^3 \cdot k)$ time via dynamic programming, and also improve the bound to $O(n^2 \cdot k)$ for the special case of uniformly distributed traffic. Then, we present a centroid-based topology of the network that can be used both in the offline static and the online setting. In the offline uniform-workload case, we construct this quasi-optimal network in linear time $O(n)$ and, finally, we present online self-adjusting k-ary search tree versions of SplayNet. We evaluate experimentally our new structure for $k=2$ (allowing for a comparison with existing SplayNets) on real and synthetic network traces. Our results show that this approach works better than SplayNet in most of the real network traces and in average to low locality synthetic traces, and is only little inferior to SplayNet in all remaining traces.
△ Less
Submitted 26 June, 2024; v1 submitted 25 February, 2023;
originally announced February 2023.
-
XR-RF Imaging Enabled by Software-Defined Metasurfaces and Machine Learning: Foundational Vision, Technologies and Challenges
Authors:
C. Liaskos,
A. Tsioliaridou,
K. Georgopoulos,
G. Morianos,
S. Ioannidis,
I. Salem,
D. Manessis,
S. Schmid D. Tyrovolas,
S. A. Tegos,
P. -V. Mekikis,
P. D. Diamantoulakis,
A. Pitilakis,
N. Kantartzis,
G. K. Karagiannidis A. Tasolamprou,
O. Tsilipakos,
M. Kafesaki,
I. F. Akyildiz,
A. Pitsillides,
M. Pateraki,
M. Vakalellis,
I. Spais
Abstract:
We present a new approach to Extended Reality (XR), denoted as iCOPYWAVES, which seeks to offer naturally low-latency operation and cost-effectiveness, overcoming the critical scalability issues faced by existing solutions. iCOPYWAVES is enabled by emerging PWEs, a recently proposed technology in wireless communications. Empowered by intelligent (meta)surfaces, PWEs transform the wave propagation…
▽ More
We present a new approach to Extended Reality (XR), denoted as iCOPYWAVES, which seeks to offer naturally low-latency operation and cost-effectiveness, overcoming the critical scalability issues faced by existing solutions. iCOPYWAVES is enabled by emerging PWEs, a recently proposed technology in wireless communications. Empowered by intelligent (meta)surfaces, PWEs transform the wave propagation phenomenon into a software-defined process. We leverage PWEs to i) create, and then ii) selectively copy the scattered RF wavefront of an object from one location in space to another, where a machine learning module, accelerated by FPGAs, translates it to visual input for an XR headset using PWEdriven, RF imaging principles (XR-RF). This makes for an XR system whose operation is bounded in the physical layer and, hence, has the prospects for minimal end-to-end latency. Over large distances, RF-to-fiber/fiber-to-RF is employed to provide intermediate connectivity. The paper provides a tutorial on the iCOPYWAVES system architecture and workflow. A proof-of-concept implementation via simulations is provided, demonstrating the reconstruction of challenging objects in iCOPYWAVES produced computer graphics.
△ Less
Submitted 28 September, 2022;
originally announced September 2022.
-
Self-Adjusting Linear Networks with Ladder Demand Graph
Authors:
Anton Paramonov,
Iosif Salem,
Stefan Schmid,
Vitaly Aksenov
Abstract:
Self-adjusting networks (SANs) have the ability to adapt to communication demand by dynamically adjusting the workload (or demand) embedding, i.e., the mapping of communication requests into the network topology. SANs can thus reduce routing costs for frequently communicating node pairs by paying a cost for adjusting the embedding. This is particularly beneficial when the demand has structure, whi…
▽ More
Self-adjusting networks (SANs) have the ability to adapt to communication demand by dynamically adjusting the workload (or demand) embedding, i.e., the mapping of communication requests into the network topology. SANs can thus reduce routing costs for frequently communicating node pairs by paying a cost for adjusting the embedding. This is particularly beneficial when the demand has structure, which the network can adapt to. Demand can be represented in the form of a demand graph, which is defined by the set of network nodes (vertices) and the set of pairwise communication requests (edges). Thus, adapting to the demand can be interpreted by embedding the demand graph to the network topology. This can be challenging both when the demand graph is known in advance (offline) and when it revealed edge-by-edge (online). The difficulty also depends on whether we aim at constructing a static topology or a dynamic (self-adjusting) one that improves the embedding as more parts of the demand graph are revealed. Yet very little is known about these self-adjusting embeddings.
In this paper, the network topology is restricted to a line and the demand graph to a ladder graph, i.e., a $2^n$ grid, including all possible subgraphs of the ladder. We present an online self-adjusting network that matches the known lower bound asymptotically and is $12$-competitive in terms of request cost. As a warm up result, we present an asymptotically optimal algorithm for the cycle demand graph. We also present an oracle-based algorithm for an arbitrary demand graph that has a constant overhead.
△ Less
Submitted 23 February, 2023; v1 submitted 8 July, 2022;
originally announced July 2022.
-
Wiser: Increasing Throughput in Payment Channel Networks with Transaction Aggregation
Authors:
Samarth Tiwari,
Michelle Yeo,
Zeta Avarikioti,
Iosif Salem,
Krzysztof Pietrzak,
Stefan Schmid
Abstract:
Payment channel networks (PCNs) are one of the most prominent solutions to the limited transaction throughput of blockchains. Nevertheless, PCNs suffer themselves from a throughput limitation due to the capital constraints of their channels. A similar dependence on high capital is also found in inter-bank payment settlements, where the so-called netting technique is used to mitigate liquidity dema…
▽ More
Payment channel networks (PCNs) are one of the most prominent solutions to the limited transaction throughput of blockchains. Nevertheless, PCNs suffer themselves from a throughput limitation due to the capital constraints of their channels. A similar dependence on high capital is also found in inter-bank payment settlements, where the so-called netting technique is used to mitigate liquidity demands.
In this work, we alleviate this limitation by introducing the notion of transaction aggregation: instead of executing transactions sequentially through a PCN, we enable senders to aggregate multiple transactions and execute them simultaneously to benefit from several amounts that may "cancel out". Two direct advantages of our proposal is the decrease in intermediary fees paid by senders as well as the obfuscation of the transaction data from the intermediaries.
We formulate the transaction aggregation as a computational problem, a generalization of the Bank Clearing Problem. We present a generic framework for the transaction aggregation execution, and thereafter we propose Wiser as an implementation of this framework in a specific hub-based setting. To overcome the NP-hardness of the transaction aggregation problem, in Wiser we propose a fixed-parameter linear algorithm for a special case of transaction aggregation as well as the Bank Clearing Problem. Wiser can also be seen as a modern variant of the Hawala money transfer system, as well as a decentralized implementation of the overseas remittance service of Wise.
△ Less
Submitted 23 May, 2022;
originally announced May 2022.
-
Deterministic Self-Adjusting Tree Networks Using Rotor Walks
Authors:
Chen Avin,
Marcin Bienkowski,
Iosif Salem,
Robert Sama,
Stefan Schmid,
Paweł Schmidt
Abstract:
We revisit the design of self-adjusting single-source tree networks. The problem can be seen as a generalization of the classic list update problem to trees, and finds applications in reconfigurable datacenter networks. We are given a fixed balanced binary tree T connecting n nodes V = {v_1, ... , v_n}. A source node v_0, attached to the root of the tree, issues communication requests to nodes in…
▽ More
We revisit the design of self-adjusting single-source tree networks. The problem can be seen as a generalization of the classic list update problem to trees, and finds applications in reconfigurable datacenter networks. We are given a fixed balanced binary tree T connecting n nodes V = {v_1, ... , v_n}. A source node v_0, attached to the root of the tree, issues communication requests to nodes in V, in an online and adversarial manner; the access cost of a request to a node v, is given by the current depth of v in T. The online algorithm can try to reduce the access cost by performing swap operations, with which the position of a node is exchanged with the position of its parent in the tree; a swap operation costs one unit. The objective is to design an online algorithm which minimizes the total access cost plus adjustment cost (swapping). Avin et al. recently presented Random-Push, a constant competitive online algorithm for this problem, based on random walks, together with an analysis exploiting the most recently used (MRU) property of random walks.
We study analytically and empirically, online algorithms for this problem. In particular, we explore how to derandomize Random-Push. We consider a simple derandomized algorithm which we call Rotor-Push, as its behavior is reminiscent of rotor walks. We first prove that Rotor-Push is constant competitive: its competitive ratio is 12 and hence by a factor of five lower than the best existing competitive ratio. In contrast to Random-Push, the algorithm does not feature the MRU property, which requires a new analysis. We present a significantly improved and simpler analysis for the randomized algorithm, showing that it is 16-competitive. We compare empirically all self-adjusting single-source tree networks, using synthetic and real data with varying locality and observe that Rotor-Push and Random-Push have almost identical performance.
△ Less
Submitted 22 April, 2022;
originally announced April 2022.
-
HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks
Authors:
Zeta Avarikioti,
Krzysztof Pietrzak,
Iosif Salem,
Stefan Schmid,
Samarth Tiwari,
Michelle Yeo
Abstract:
Payment channels effectively move the transaction load off-chain thereby successfully addressing the inherent scalability problem most cryptocurrencies face. A major drawback of payment channels is the need to ``top up'' funds on-chain when a channel is depleted. Rebalancing was proposed to alleviate this issue, where parties with depleting channels move their funds along a cycle to replenish thei…
▽ More
Payment channels effectively move the transaction load off-chain thereby successfully addressing the inherent scalability problem most cryptocurrencies face. A major drawback of payment channels is the need to ``top up'' funds on-chain when a channel is depleted. Rebalancing was proposed to alleviate this issue, where parties with depleting channels move their funds along a cycle to replenish their channels off-chain. Protocols for rebalancing so far either introduce local solutions or compromise privacy.
In this work, we present an opt-in rebalancing protocol that is both private and globally optimal, meaning our protocol maximizes the total amount of rebalanced funds. We study rebalancing from the framework of linear programming. To obtain full privacy guarantees, we leverage multi-party computation in solving the linear program, which is executed by selected participants to maintain efficiency. Finally, we efficiently decompose the rebalancing solution into incentive-compatible cycles which conserve user balances when executed atomically.
Keywords: Payment Channel Networks, Privacy and Rebalancing.
△ Less
Submitted 17 October, 2021;
originally announced October 2021.
-
LightPIR: Privacy-Preserving Route Discovery for Payment Channel Networks
Authors:
Krzysztof Pietrzak,
Iosif Salem,
Stefan Schmid,
Michelle Yeo
Abstract:
Payment channel networks are a promising approach to improve the scalability of cryptocurrencies: they allow to perform transactions in a peer-to-peer fashion, along multi-hop routes in the network, without requiring consensus on the blockchain. However, during the discovery of cost-efficient routes for the transaction, critical information may be revealed about the transacting entities.
This pa…
▽ More
Payment channel networks are a promising approach to improve the scalability of cryptocurrencies: they allow to perform transactions in a peer-to-peer fashion, along multi-hop routes in the network, without requiring consensus on the blockchain. However, during the discovery of cost-efficient routes for the transaction, critical information may be revealed about the transacting entities.
This paper initiates the study of privacy-preserving route discovery mechanisms for payment channel networks. In particular, we present LightPIR, an approach which allows a source to efficiently discover a shortest path to its destination without revealing any information about the endpoints of the transaction. The two main observations which allow for an efficient solution in LightPIR are that: (1) surprisingly, hub labelling algorithms - which were developed to preprocess "street network like" graphs so one can later efficiently compute shortest paths - also work well for the graphs underlying payment channel networks, and that (2) hub labelling algorithms can be directly combined with private information retrieval.
LightPIR relies on a simple hub labeling heuristic on top of existing hub labeling algorithms which leverages the specific topological features of cryptocurrency networks to further minimize storage and bandwidth overheads. In a case study considering the Lightning network, we show that our approach is an order of magnitude more efficient compared to a privacy-preserving baseline based on using private information retrieval on a database that stores all pairs shortest paths.
△ Less
Submitted 9 April, 2021;
originally announced April 2021.
-
Optimizing Virtual Payment Channel Establishment in the Face of On-Path Adversaries
Authors:
Lukas Aumayr,
Esra Ceylan,
Yannik Kopyciok,
Matteo Maffei,
Pedro Moreno-Sanchez,
Iosif Salem,
Stefan Schmid
Abstract:
Payment channel networks (PCNs) are among the most promising solutions to the scalability issues in permissionless blockchains, by allowing parties to pay each other off-chain through a path of payment channels (PCs). However, routing transactions comes at a cost which is proportional to the number of intermediaries, since each charges a fee for the routing service. Furthermore, analogous to other…
▽ More
Payment channel networks (PCNs) are among the most promising solutions to the scalability issues in permissionless blockchains, by allowing parties to pay each other off-chain through a path of payment channels (PCs). However, routing transactions comes at a cost which is proportional to the number of intermediaries, since each charges a fee for the routing service. Furthermore, analogous to other networks, malicious intermediaries in the payment path can lead to security and privacy threats. Virtual channels (VCs), i.e., bridges over PC paths, mitigate the above PCN issues, as an intermediary participates only once to set up the VC and is then excluded from every future VC transaction. However, similar to PCs, creating a VC has a cost that must be paid out of the bridged PCs' balance. Currently, we are missing guidelines to where and how many VCs to set up. Ideally, VCs should minimize transaction costs while mitigating security and privacy threats from on-path adversaries.
In this work, we address for the first time the VC setup problem, formalizing it as an optimization problem. We present an integer linear program (ILP) to compute the globally optimal VC setup strategy in terms of transaction costs, security, and privacy. We then accompany the computationally heavy ILP with a fast local greedy algorithm. Our model and algorithms can be used with any on-path adversary, given that its strategy can be expressed as a set of corrupted nodes that is estimated by the honest nodes. We conduct an evaluation of the greedy algorithm over a snapshot of the Lightning Network (LN), the largest Bitcoin-based PCN. Our results confirm on real-world data that our greedy strategy minimizes costs while protecting against security and privacy threats of on-path adversaries. These findings may serve the LN community as guidelines for the deployment of VCs.
△ Less
Submitted 9 May, 2024; v1 submitted 29 November, 2020;
originally announced November 2020.
-
An Online Matching Model for Self-Adjusting ToR-to-ToR Networks
Authors:
Chen Avin,
Chen Griner,
Iosif Salem,
Stefan Schmid
Abstract:
This is a short note that formally presents the matching model for the theoretical study of self-adjusting networks as initially proposed in [1].
This is a short note that formally presents the matching model for the theoretical study of self-adjusting networks as initially proposed in [1].
△ Less
Submitted 19 June, 2020;
originally announced June 2020.
-
Practically-Self-Stabilizing Vector Clocks in the Absence of Execution Fairness
Authors:
Iosif Salem,
Elad Michael Schiller
Abstract:
Vector clock algorithms are basic wait-free building blocks that facilitate causal ordering of events. As wait-free algorithms, they are guaranteed to complete their operations within a finite number of steps. Stabilizing algorithms allow the system to recover after the occurrence of transient faults, such as soft errors and arbitrary violations of the assumptions according to which the system was…
▽ More
Vector clock algorithms are basic wait-free building blocks that facilitate causal ordering of events. As wait-free algorithms, they are guaranteed to complete their operations within a finite number of steps. Stabilizing algorithms allow the system to recover after the occurrence of transient faults, such as soft errors and arbitrary violations of the assumptions according to which the system was designed to behave. We present the first, to the best of our knowledge, stabilizing vector clock algorithm for asynchronous crash-prone message-passing systems that can recover in a wait-free manner after the occurrence of transient faults. In these settings, it is challenging to demonstrate a finite and wait-free recovery from (communication and crash failures as well as) transient faults, bound the message and storage sizes, deal with the removal of all stale information without blocking, and deal with counter overflow events (which occur at different network nodes concurrently).
We present an algorithm that never violates safety in the absence of transient faults and provides bounded time recovery during fair executions that follow the last transient fault. The novelty is that in the absence of execution fairness, the algorithm guarantees a bound on the number of times in which the system might violate safety (while existing algorithms might block forever due to the presence of both transient faults and crash failures).
Since vector clocks facilitate a number of elementary synchronization building blocks (without requiring remote replica synchronization) in asynchronous systems, we believe that our analytical insights are useful for the design of other systems that cannot guarantee execution fairness.
△ Less
Submitted 21 December, 2017;
originally announced December 2017.
-
Renaissance: A Self-Stabilizing Distributed SDN Control Plane using In-band Communications
Authors:
Marco Canini,
Iosif Salem,
Liron Schiff,
Elad Michael Schiller,
Stefan Schmid
Abstract:
By introducing programmability, automated verification, and innovative debugging tools, Software-Defined Networks (SDNs) are poised to meet the increasingly stringent dependability requirements of today's communication networks. However, the design of fault-tolerant SDNs remains an open challenge. This paper considers the design of dependable SDNs through the lenses of self-stabilization - a very…
▽ More
By introducing programmability, automated verification, and innovative debugging tools, Software-Defined Networks (SDNs) are poised to meet the increasingly stringent dependability requirements of today's communication networks. However, the design of fault-tolerant SDNs remains an open challenge. This paper considers the design of dependable SDNs through the lenses of self-stabilization - a very strong notion of fault-tolerance. In particular, we develop algorithms for an in-band and distributed control plane for SDNs, called Renaissance, which tolerate a wide range of failures. Our self-stabilizing algorithms ensure that after the occurrence of arbitrary failures, (i) every non-faulty SDN controller can reach any switch (or another controller) within a bounded communication delay (in the presence of a bounded number of failures) and (ii) every switch is managed by a controller. We evaluate Renaissance through a rigorous worst-case analysis as well as a prototype implementation (based on OVS and Floodlight, and Mininet).
△ Less
Submitted 29 March, 2022; v1 submitted 20 December, 2017;
originally announced December 2017.
-
Cluster Decay Half-Lives of 5d Transition Metal Nuclei Using the Coulomb and Proximity Potential Model
Authors:
K. E. Abd El Mageed,
L. I. Abou Salem,
K. A. Gado,
Asmaa G. Shalaby
Abstract:
We have applied the Coulomb and proximity potential model,CPPM to calculate the half lives for various clusters decay of the selected even-even isotopes of the chosen nuclei. These nuclei are Hf, W, Os, Pt, and Hg in the 5d transition metal region in the periodic table with atomic number 72 greater or equal Z less than or equal 80. Furthermore, the half-lives are calculated using the universal for…
▽ More
We have applied the Coulomb and proximity potential model,CPPM to calculate the half lives for various clusters decay of the selected even-even isotopes of the chosen nuclei. These nuclei are Hf, W, Os, Pt, and Hg in the 5d transition metal region in the periodic table with atomic number 72 greater or equal Z less than or equal 80. Furthermore, the half-lives are calculated using the universal formula for cluster decay. The calculated half-lives of alpha decay for the chosen isotopes are in good agreement with the experimental data, especially with the CPPM results. The alpha and cluster decays are more probable from the parents in the heavier mass number A equal 168,180 than from the parents in the lighter mass number A equal 156, 166.
△ Less
Submitted 11 January, 2016;
originally announced January 2016.
-
Shared-object System Equilibria: Delay and Throughput Analysis
Authors:
Iosif Salem,
Elad M. Schiller,
Marina Papatriantafilou,
Philippas Tsigas
Abstract:
We consider shared-object systems that require their threads to fulfill the system jobs by first acquiring sequentially the objects needed for the jobs and then holding on to them until the job completion. Such systems are in the core of a variety of shared-resource allocation and synchronization systems. This work opens a new perspective to study the expected job delay and throughput analytically…
▽ More
We consider shared-object systems that require their threads to fulfill the system jobs by first acquiring sequentially the objects needed for the jobs and then holding on to them until the job completion. Such systems are in the core of a variety of shared-resource allocation and synchronization systems. This work opens a new perspective to study the expected job delay and throughput analytically, given the possible set of jobs that may join the system dynamically.
We identify the system dependencies that cause contention among the threads as they try to acquire the job objects. We use these observations to define the shared-object system equilibria. We note that the system is in equilibrium whenever the rate in which jobs arrive at the system matches the job completion rate. These equilibria consider not only the job delay but also the job throughput, as well as the time in which each thread blocks other threads in order to complete its job. We then further study in detail the thread work cycles and, by using a graph representation of the problem, we are able to propose procedures for finding and estimating equilibria, i.e., discovering the job delay and throughput, as well as the blocking time.
To the best of our knowledge, this is a new perspective, that can provide better analytical tools for the problem, in order to estimate performance measures similar to ones that can be acquired through experimentation on working systems and simulations, e.g., as job delay and throughput in (distributed) shared-object systems.
△ Less
Submitted 2 November, 2015; v1 submitted 7 August, 2015;
originally announced August 2015.
-
The equation of state for non-ideal quark gluon plasma
Authors:
N. M. El Naggar,
L. I. Abou Salem,
A. G. Shalaby,
M. A. Bourham
Abstract:
The mass spectra of quarkonium systems at temperature equal zero are analyzed by solving the non-relativistic radial wave equation using the internal energy potential. The QGP matter is studied through the dissociations of quarkonium systems. A modified form of the internal energy potential function is used to determine the EoS at different number of quark flavors by using Mayer s cluster expansio…
▽ More
The mass spectra of quarkonium systems at temperature equal zero are analyzed by solving the non-relativistic radial wave equation using the internal energy potential. The QGP matter is studied through the dissociations of quarkonium systems. A modified form of the internal energy potential function is used to determine the EoS at different number of quark flavors by using Mayer s cluster expansion theory and phenomenological thermodynamic model. The thermodynamic model gives a good agreement with the lattice results rather than Mayer s cluster expansion theory. One can conclude that, the Mayer s cluster expansion theory may be more suitable to study a weakly coupled plasma while, the QGP may be considered as a strongly interacting plasma.
△ Less
Submitted 25 October, 2013; v1 submitted 2 September, 2013;
originally announced September 2013.
-
Effective Computation of Immersion Obstructions for Unions of Graph Classes
Authors:
Archontia C. Giannopoulou,
Iosif Salem,
Dimitris Zoros
Abstract:
In the final paper of the Graph Minors series N. Robertson and P. Seymour proved that graphs are well-quasi-ordered under the immersion ordering. A direct implication of this theorem is that each class of graphs that is closed under taking immersions can be fully characterized by forbidding a finite set of graphs (immersion obstruction set). However, as the proof of the well-quasi-ordering theorem…
▽ More
In the final paper of the Graph Minors series N. Robertson and P. Seymour proved that graphs are well-quasi-ordered under the immersion ordering. A direct implication of this theorem is that each class of graphs that is closed under taking immersions can be fully characterized by forbidding a finite set of graphs (immersion obstruction set). However, as the proof of the well-quasi-ordering theorem is non-constructive, there is no generic procedure for computing such a set. Moreover, it remains an open issue to identify for which immersion-closed graph classes the computation of those sets can become effective. By adapting the tools that were introduced by I. Adler, M. Grohe and S. Kreutzer, for the effective computation of minor obstruction sets, we expand the horizon of computability to immersion obstruction sets. In particular, our results propagate the computability of immersion obstruction sets of immersion-closed graph classes to immersion obstruction sets of finite unions of immersion closed graph classes.
△ Less
Submitted 24 July, 2012;
originally announced July 2012.