×

Graph vulnerability parameters, compression, and threshold graphs. (English) Zbl 1466.05189

Summary: Given a simple graph \(G\) and vertices \(u, v \in V(G)\), let \(N_G (u)\) and \(N_G (v)\) denote the neighborhoods in \(G\) of \(u\) and \(v\) respectively. The compression of \(G\) from \(u\) to \(v\) produces a new graph \(G_{u \to v}\) by, for each \(x \in N_G (u) - N_G (v) - \{v\}\), removing edges from \(G\) of the form \(ux\) and replacing them with corresponding edges of the form \(vx\). A. Kelmans [“Operations on graphs increasing some graph parameters”, Preprint, arXiv:1109.4622], and independently A. Satyanarayana et al. [Networks 22, No. 2, 209–216 (1992; Zbl 0756.90038)], showed that for any graph \(G\) and any \(u, v \in V (G)\), compression from \(u\) to \(v\) could not increase, and typically decreased, both the number of spanning trees and the all-terminal reliability of \(G\). Both the number of spanning trees and all-terminal reliability are vulnerability parameters, i.e., measures of the strength of a network. We show that a number of other prominent vulnerability parameters – including vertex connectivity, toughness, scattering number, edge connectivity, edge toughness, and binding number – are affected by compression in the same way as number of spanning trees and all-terminal reliability. As a consequence, as with the number of spanning trees and the all-terminal reliability, threshold graphs are extremal graphs for all of the vulnerability parameters considered.

MSC:

05C76 Graph operations (line graphs, products, etc.)
05C69 Vertex subsets with special properties (dominating sets, independent sets, cliques, etc.)
Full Text: DOI

References:

[1] Boesch, F. T.; Satyanarayana, A.; Suffel, C. L., Least reliable networks and reliability domination, IEEE Trans. Commun., 38, 2004-2009 (1990) · Zbl 0735.90039
[2] Bogdanowicz, Z., Undirected simple connected graphs with minimum number of spanning trees, Discrete Math., 309, 3074-3082 (2009) · Zbl 1202.05021
[3] Bogdanowicz, Z., Chordal 2-connected graphs and spanning trees, J. Graph Theory, 76, 224-235 (2014) · Zbl 1296.05112
[4] Bollobás, B., (Modern Graph Theory. Modern Graph Theory, Graduate Texts in Mathematics, vol. 184 (2002), Springer-Verlag: Springer-Verlag New York) · Zbl 0902.05016
[5] Brown, J.; Colbourn, C.; Devitt, J., Network transformations and bounding network reliability, Networks, 23, 1-17 (1993) · Zbl 0780.90046
[6] Chvátal, V., On hamilton’s ideals, J. Combin. Theory Ser. B, 12, 163-168 (1972) · Zbl 0213.50803
[7] Csikvári, P., On a conjecture of v, Nikiforov. Disc. Math., 309, 4522-4526 (2009) · Zbl 1194.05084
[8] Csikvári, P., Applications of the kelmans transformation: extremality of threshold graphs, Electron. J. Combin., 18, 24 (2011), Paper 182 · Zbl 1337.05060
[9] Cutler, J.; Radcliffe, A. J., Extremal graphs for homomorphisms, J. Graph Theory, 67, 261-284 (2011) · Zbl 1231.05132
[10] Cutler, J.; Radcliffe, A. J., Extremal graphs for homomorphisms II, J. Graph Theory, 76, 42-59 (2014) · Zbl 1294.05116
[11] Gross, D.; Kahl, N.; Saccoman, J. T., Graphs with the maximum or minimum number of \(k\)-factors, Discrete Math., 310, 687-691 (2010) · Zbl 1214.05120
[12] Gusfield, D., Connectivity and edge-disjoint spanning trees, Inform. Process. Lett., 16, 87-89 (1983) · Zbl 0507.05030
[13] Jung, H. A., On a class of posets and the corresponding comparability graphs, J. Combin. Theory Ser. B, 24, 125-133 (1978) · Zbl 0382.05045
[14] Kahl, N., Graph vulnerability parameters, compression, and quasi-threshold graphs, Discrete Appl. Math., 259, 119-126 (2019) · Zbl 1407.05199
[15] Kelmans, A. K., On graphs with randomly deleted edges, Acta. Math. Acad. Sci. Hung., 37, 77-88 (1981) · Zbl 0503.05056
[16] Kelmans, A. K., Operations on graphs increasing some graph parameters (2013), arXiv:1109.4622
[17] Keough, L.; Radcliffe, A. J., Graphs with the fewest matchings, Combinatorica, 36, 703-723 (2016) · Zbl 1399.05109
[18] Mahadev, N. V.R.; Peled, U. N., (Threshold Graphs and Related Topics. Threshold Graphs and Related Topics, Annals of Discrete Math, vol. 56 (1995), North-Holland Publishing Co: North-Holland Publishing Co Amsterdam) · Zbl 0852.05001
[19] Satyanarayana, A.; Schoppmann, L.; Suffel, C., A reliability-improving graph transformation with applications to network reliability, Networks, 22, 209-216 (1992) · Zbl 0756.90038
[20] Woodall, D. R., The binding number of a graph and its Anderson number, J. Combin. Theory Ser. B, 15, 225-255 (1973) · Zbl 0253.05139
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.