×

Graph vulnerability parameters, compression, and quasi-threshold graphs. (English) Zbl 1407.05199

Summary: A. K. Kelmans [Acta Math. Acad. Sci. Hung. 37, 77–88 (1981; Zbl 0503.05056)], and later independently Z. R. Bogdanowicz [Discrete Math. 309, No. 10, 3074–3082 (2009; Zbl 1202.05021)] and A. Satyanarayana et al. [Networks 22, No. 2, 209–216 (1992; Zbl 0756.90038)], showed that a graph operation which has come to be known as the compression of \(G\) from vertex \(u\) to vertex \(v\) could not increase, and typically decreased, both the number of spanning trees and the all-terminal reliability of a graph. Both these quantities are well-known vulnerability parameters, i.e., measures of the strength of a network, and subsequently a number of other prominent vulnerability parameters – including vertex connectivity, toughness, scattering number, edge connectivity, edge toughness, and binding number – have been shown to be affected by compression in a similar way. As a consequence threshold graphs are extremal for all of the parameters mentioned. In this paper we show that for the graph vulnerability parameters integrity, tenacity, and \(k\)-component order connectivity, if \(u\), \(v\) are adjacent then compression cannot increase, and typically decreases them. As a consequence, these parameters have quasi-threshold graphs as extremal graphs. We also show, however, that there are graphs with non-adjacent \(u\), \(v\) where compression increases these parameters. To the best of our knowledge, these parameters are the first identified that behave differently under compression depending upon which pairs of vertices are used in the compression.

MSC:

05C76 Graph operations (line graphs, products, etc.)
05C40 Connectivity
Full Text: DOI

References:

[1] Bagga, K. S.; Beineke, L. W.; Goddard, W. D.; Lipman, M. J.; Pippert, R. E., A survey of integrity, Discrete Appl. Math., 37, 13-28 (1992) · Zbl 0778.05041
[2] Barefoot, C. A.; Entringer, R.; Swart, H., Vulnerability in graphs—a comparative survey, J. Comb. Math. Comb. Comput., 1, 12-22 (1987) · Zbl 0646.05042
[3] Boesch, F.; Gross, D.; Suffel, C., Component order connectivity, in: Proceedings of the Twenty-ninth Southeastern International Conference on Combinatorics, Graph Theory and Computing, Boca Raton, FL, 1998, Congr. Numer., 131, 1998, 145-155 (1998) · Zbl 0951.05064
[4] Boesch, F.; Gross, D.; Suffel, C., Component order connectivity—a graph invariant related to operating component reliability, (Combinatorics, Graph Theory, and Algorithms, vol. I, II (Kalamazoo, MI, 1996) (1999), New Issues Press: New Issues Press Kalamazoo, MI), 109-116
[5] Boesch, F. T.; Satyanarayana, A.; Suffel, C. L., Least reliable networks and reliability domination, IEEE Trans. Commun., 38, 2004-2009 (1990) · Zbl 0735.90039
[6] Bogdanowicz, Z., Spanning trees in undirected simple graphs (1985), Stevens Institute of Technology, New Jersey, USA, (Ph.D. Dissertation)
[7] Bogdanowicz, Z., Undirected simple connected graphs with minimum number of spanning trees, Discrete Math., 309, 3074-3082 (2009) · Zbl 1202.05021
[8] Bollobás, B., (Modern Graph Theory. Modern Graph Theory, Graduate Texts in Mathematics, vol. 184 (2002), Springer-Verlag: Springer-Verlag New York) · Zbl 0902.05016
[9] Brown, J.; Colbourn, C.; Devitt, J., Network transformations and bounding network reliability, Networks, 23, 1-17 (1993) · Zbl 0780.90046
[10] Cozzens, M. B.; Moazzami, D.; Stueckle, S., The tenacity of the Harary graphs, J. Combin. Math. Combin. Comput., 16, 33-56 (1994) · Zbl 0814.05053
[11] Cozzens, M. B.; Moazzami, D.; Stueckle, S., (Alavi, Yousef; Schwenk, Allen, The Tenacity of a Graph. The Tenacity of a Graph, Graph Theory, Combinatorics, Algorithms (1995), Wiley: Wiley New York), 1111-1122 · Zbl 0845.05088
[12] Csikvári, P., On a conjecture of v nikiforov, Discrete Math., 309, 4522-4526 (2009) · Zbl 1194.05084
[13] Csikvári, P., Applications of the kelmans transformation: extremality of threshold graphs, Electron. J. Combin., 18, 182, 24 (2011) · Zbl 1337.05060
[14] Cutler, J.; Radcliffe, A. J., Extremal graphs for homomorphisms, J. Graph Theory, 67, 261-284 (2011) · Zbl 1231.05132
[15] Cutler, J.; Radcliffe, A. J., Extremal graphs for homomorphisms II, J. Graph Theory, 76, 42-59 (2014) · Zbl 1294.05116
[16] Gross, D.; Heinig, M.; Iswara, L.; Kazmierczak, L. W.; Luttrell, K.; Saccoman, J. T.; Suffel, C., A survey of component order connectivity models of graph theoretic networks, WSEAS Trans. Math., 12, 895-910 (2013)
[17] Gross, D.; Kahl, N.; Saccoman, J. T., Graphs with the maximum or minimum number of \(k\)-factors, Discrete Math., 310, 687-691 (2010) · Zbl 1214.05120
[18] N. Kahl, Graph vulnerability parameters, compression, and threshold graphs, submitted for publication.; N. Kahl, Graph vulnerability parameters, compression, and threshold graphs, submitted for publication.
[19] Kelmans, A. K., On graphs with randomly deleted edges, Acta Math. Acad. Sci. Hung., 37, 77-88 (1981) · Zbl 0503.05056
[20] Keough, L.; Radcliffe, A. J., Graphs with the fewest matchings, Combinatorica, 36, 703-723 (2016) · Zbl 1399.05109
[21] Li, Y.; Zhang, S.; Li, X., Rupture degree of graphs, Int. J. Comput. Math., 82, 793-803 (2005) · Zbl 1074.05053
[22] Mahadev, N. V.R.; Peled, U. N., (Threshold Graphs and Related Topics. Threshold Graphs and Related Topics, Annals of Discrete Math, vol. 56 (1995), North-Holland Publishing Co.: North-Holland Publishing Co. Amsterdam) · Zbl 0852.05001
[23] Moazzami, D., Stability measure fo a graph: a survey, Util. Math., 57, 171-191 (2000) · Zbl 0961.05045
[24] Satyanarayana, A.; Schoppmann, L.; Suffel, C., A reliability-improving graph transformation with applications to network reliability, Networks, 22, 209-216 (1992) · Zbl 0756.90038
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.