Skip to main content

Showing 1–34 of 34 results for author: Georgiadis, L

.
  1. arXiv:2311.00854  [pdf, other

    cs.DS

    $2$-Fault-Tolerant Strong Connectivity Oracles

    Authors: Loukas Georgiadis, Evangelos Kosinas, Daniel Tsokaktsis

    Abstract: We study the problem of efficiently answering strong connectivity queries under two vertex failures. Given a directed graph $G$ with $n$ vertices, we provide a data structure with $O(nh)$ space and $O(h)$ query time, where $h$ is the height of a decomposition tree of $G$ into strongly connected subgraphs. This immediately implies data structures with $O(n \log{n})$ space and $O(\log{n})$ query tim… ▽ More

    Submitted 2 December, 2023; v1 submitted 1 November, 2023; originally announced November 2023.

    Comments: Conference version to appear in the proceedings of ALENEX 2024

  2. arXiv:2302.02215  [pdf, other

    cs.DS math.CO

    On 2-strong connectivity orientations of mixed graphs and related problems

    Authors: Loukas Georgiadis, Dionysios Kefallinos, Evangelos Kosinas

    Abstract: A mixed graph $G$ is a graph that consists of both undirected and directed edges. An orientation of $G$ is formed by orienting all the undirected edges of $G$, i.e., converting each undirected edge $\{u,v\}$ into a directed edge that is either $(u,v)$ or $(v,u)$. The problem of finding an orientation of a mixed graph that makes it strongly connected is well understood and can be solved in linear t… ▽ More

    Submitted 12 April, 2024; v1 submitted 4 February, 2023; originally announced February 2023.

  3. arXiv:2211.06521  [pdf, other

    cs.DS

    On maximal k-edge-connected subgraphs of undirected graphs

    Authors: Loukas Georgiadis, Giuseppe F. Italiano, Evangelos Kosinas, Debasish Pattanayak

    Abstract: We show how to find and efficiently maintain maximal k-edge-connected subgraphs in undirected graphs. In particular, we provide the following results. (1) A general framework for maintaining the maximal k-edge-connected subgraphs upon insertions of edges or vertices, by successively partitioning the graph into its k-edge-connected components. This defines a decomposition tree, which can be maintai… ▽ More

    Submitted 29 April, 2023; v1 submitted 11 November, 2022; originally announced November 2022.

  4. arXiv:2108.08558  [pdf, other

    cs.DS

    Improved Linear-Time Algorithm for Computing the $4$-Edge-Connected Components of a Graph

    Authors: Loukas Georgiadis, Giuseppe F. Italiano, Evangelos Kosinas

    Abstract: We present an improved algorithm for computing the $4$-edge-connected components of an undirected graph in linear time. The new algorithm uses only elementary data structures, and it is simple to describe and to implement in the pointer machine model of computation.

    Submitted 19 August, 2021; originally announced August 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2105.02910

  5. arXiv:2105.02910  [pdf, other

    cs.DS

    Computing the $4$-Edge-Connected Components of a Graph in Linear Time

    Authors: Loukas Georgiadis, Giuseppe F. Italiano, Evangelos Kosinas

    Abstract: We present the first linear-time algorithm that computes the $4$-edge-connected components of an undirected graph. Hence, we also obtain the first linear-time algorithm for testing $4$-edge connectivity. Our results are based on a linear-time algorithm that computes the $3$-edge cuts of a $3$-edge-connected graph $G$, and a linear-time procedure that, given the collection of all $3$-edge cuts, par… ▽ More

    Submitted 6 May, 2021; originally announced May 2021.

  6. arXiv:2007.03933  [pdf, other

    cs.DS

    Linear-Time Algorithms for Computing Twinless Strong Articulation Points and Related Problems

    Authors: Loukas Georgiadis, Evangelos Kosinas

    Abstract: A directed graph $G=(V,E)$ is twinless strongly connected if it contains a strongly connected spanning subgraph without any pair of antiparallel (or twin) edges. The twinless strongly connected components (TSCCs) of a directed graph $G$ are its maximal twinless strongly connected subgraphs. These concepts have several diverse applications, such as the design of telecommunication networks and the s… ▽ More

    Submitted 21 September, 2020; v1 submitted 8 July, 2020; originally announced July 2020.

  7. arXiv:1907.03444  [pdf, other

    cs.IT eess.SP

    Capacity and Algorithms for a Cognitive Network with Primary-Secondary User Cooperation

    Authors: Athanasios Papadopoulos, Nestor D. Chatzidiamantis, Leonidas Georgiadis

    Abstract: In this work, we examine cognitive radio networks, where secondary users may act as relays for messages sent by the primary user, hence offering performance improvement of primary transmissions, while at the same time obtaining more transmission opportunities for their own data. In particular, assuming the broadcast packet erasure model with feedback, we investigate the capacity of the fundamental… ▽ More

    Submitted 28 August, 2019; v1 submitted 8 July, 2019; originally announced July 2019.

  8. arXiv:1808.00263  [pdf, ps, other

    eess.SP

    Network Coding Techniques in Cooperative Cognitive Networks

    Authors: Athanasios Papadopoulos, Nestor D. Chatzidiamantis, Leonidas Georgiadis

    Abstract: In this paper, we investigate transmission techniques for a fundamental cooperative cognitive radio network, i.e., a radio system where a Secondary user may act as relay for messages sent by the Primary user, hence offering performance improvement of Primary user transmissions, while at the same time obtaining more transmission opportunities for its own transmissions. Specifically, we examine the… ▽ More

    Submitted 1 August, 2018; originally announced August 2018.

  9. arXiv:1807.05803  [pdf, other

    cs.DS

    Faster Algorithms for All-Pairs Bounded Min-Cuts

    Authors: Amir Abboud, Loukas Georgiadis, Giuseppe F. Italiano, Robert Krauthgamer, Nikos Parotsidis, Ohad Trabelsi, Przemysław Uznański, Daniel Wolleb-Graf

    Abstract: The All-Pairs Min-Cut problem (aka All-Pairs Max-Flow) asks to compute a minimum $s$-$t$ cut (or just its value) for all pairs of vertices $s,t$. We study this problem in directed graphs with unit edge/vertex capacities (corresponding to edge/vertex connectivity). Our focus is on the $k$-bounded case, where the algorithm has to find all pairs with min-cut value less than $k$, and report only those… ▽ More

    Submitted 21 February, 2019; v1 submitted 16 July, 2018; originally announced July 2018.

  10. arXiv:1802.10189  [pdf, other

    cs.DS

    Incremental Strong Connectivity and 2-Connectivity in Directed Graphs

    Authors: Loukas Georgiadis, Giuseppe F. Italiano, Nikos Parotsidis

    Abstract: In this paper, we present new incremental algorithms for maintaining data structures that represent all connectivity cuts of size one in directed graphs (digraphs), and the strongly connected components that result by the removal of each of those cuts. We give a conditional lower bound that provides evidence that our algorithms may be tight up to sub-polynomial factors. As an additional result, wi… ▽ More

    Submitted 27 February, 2018; originally announced February 2018.

    Comments: Accepted to the 13th Latin American Theoretical INformatics Symposium (LATIN 2018)

  11. Decremental Data Structures for Connectivity and Dominators in Directed Graphs

    Authors: Loukas Georgiadis, Thomas Dueholm Hansen, Giuseppe F. Italiano, Sebastian Krinninger, Nikos Parotsidis

    Abstract: We introduce a new dynamic data structure for maintaining the strongly connected components (SCCs) of a directed graph (digraph) under edge deletions, so as to answer a rich repertoire of connectivity queries. Our main technical contribution is a decremental data structure that supports sensitivity queries of the form "are $ u $ and $ v $ strongly connected in the graph $ G \setminus w $?", for an… ▽ More

    Submitted 26 April, 2017; originally announced April 2017.

    Comments: Accepted to the 44th International Colloquium on Automata, Languages, and Programming (ICALP 2017)

  12. arXiv:1703.09669  [pdf, other

    cs.GT

    On the Efficiency of Sharing Economy Networks

    Authors: Leonidas Georgiadis, George Iosifidis, Leandros Tassiulas

    Abstract: We consider a sharing economy network where agents embedded in a graph share their resources. This is a fundamental model that abstracts numerous emerging applications of collaborative consumption systems. The agents generate a random amount of spare resource that they can exchange with their one-hop neighbours, seeking to maximize the amount of desirable resource items they receive in the long ru… ▽ More

    Submitted 28 March, 2017; originally announced March 2017.

    Comments: working paper

  13. arXiv:1612.08075  [pdf, other

    cs.DS

    All-Pairs 2-Reachability in $\mathcal{O}(n^ω\log n)$ Time

    Authors: Loukas Georgiadis, Daniel Graf, Giuseppe F. Italiano, Nikos Parotsidis, Przemysław Uznański

    Abstract: In the $2$-reachability problem we are given a directed graph $G$ and we wish to determine if there are two (edge or vertex) disjoint paths from $u$ to $v$, for a given pair of vertices $u$ and $v$. In this paper, we present an algorithm that computes $2$-reachability information for all pairs of vertices in $\mathcal{O}(n^ω\log n)$ time, where $n$ is the number of vertices and $ω$ is the matrix m… ▽ More

    Submitted 26 July, 2017; v1 submitted 23 December, 2016; originally announced December 2016.

    Comments: 27 pages. Full version of ICALP'17 abstract

  14. arXiv:1608.06462  [pdf, other

    cs.DS

    On Low-High Orders of Directed Graphs: Incremental Algorithms and Applications

    Authors: Loukas Georgiadis, Aikaterini Karanasiou, Giannis Konstantinos, Luigi Laura

    Abstract: A flow graph $G=(V,E,s)$ is a directed graph with a distinguished start vertex $s$. The dominator tree $D$ of $G$ is a tree rooted at $s$, such that a vertex $v$ is an ancestor of a vertex $w$ if and only if all paths from $s$ to $w$ include $v$. The dominator tree is a central tool in program optimization and code generation and has many applications in other diverse areas including constraint pr… ▽ More

    Submitted 23 August, 2016; originally announced August 2016.

  15. arXiv:1607.07073  [pdf, other

    cs.DS

    Incremental $2$-Edge-Connectivity in Directed Graphs

    Authors: Loukas Georgiadis, Giuseppe F. Italiano, Nikos Parotsidis

    Abstract: In this paper, we initiate the study of the dynamic maintenance of $2$-edge-connectivity relationships in directed graphs. We present an algorithm that can update the $2$-edge-connected blocks of a directed graph with $n$ vertices through a sequence of $m$ edge insertions in a total of $O(mn)$ time. After each insertion, we can answer the following queries in asymptotically optimal time: (i) Test… ▽ More

    Submitted 24 July, 2016; originally announced July 2016.

    Comments: Full version of paper presented at ICALP 2016

  16. arXiv:1604.02711  [pdf, other

    cs.DS

    An Experimental Study of Dynamic Dominators

    Authors: Loukas Georgiadis, Giuseppe F. Italiano, Luigi Laura, Federico Santaroni

    Abstract: Motivated by recent applications of dominator computations, we consider the problem of dynamically maintaining the dominators of flow graphs through a sequence of insertions and deletions of edges. Our main theoretical contribution is a simple incremental algorithm that maintains the dominator tree of a flow graph with $n$ vertices through a sequence of $k$ edge insertions in $O(m\min\{n,k\}+kn)$… ▽ More

    Submitted 10 April, 2016; originally announced April 2016.

    Comments: A preliminary version of this paper appeared in Proc. ESA 2012

  17. arXiv:1511.07741  [pdf, ps, other

    cs.DS

    A Note on Fault Tolerant Reachability for Directed Graphs

    Authors: Loukas Georgiadis, Robert E. Tarjan

    Abstract: In this note we describe an application of low-high orders in fault-tolerant network design. Baswana et al. [DISC 2015] study the following reachability problem. We are given a flow graph $G = (V, A)$ with start vertex $s$, and a spanning tree $T =(V, A_T)$ rooted at $s$. We call a set of arcs $A'$ valid if the subgraph $G' = (V, A_T \cup A')$ of $G$ has the same dominators as $G$. The goal is to… ▽ More

    Submitted 24 November, 2015; originally announced November 2015.

  18. arXiv:1511.02913  [pdf, other

    cs.DS

    Strong Connectivity in Directed Graphs under Failures, with Application

    Authors: Loukas Georgiadis, Giuseppe F. Italiano, Nikos Parotsidis

    Abstract: In this paper, we investigate some basic connectivity problems in directed graphs (digraphs). Let $G$ be a digraph with $m$ edges and $n$ vertices, and let $G\setminus e$ be the digraph obtained after deleting edge $e$ from $G$. As a first result, we show how to compute in $O(m+n)$ worst-case time: $(i)$ The total number of strongly connected components in $G\setminus e$, for all edges $e$ in $G$.… ▽ More

    Submitted 6 May, 2019; v1 submitted 9 November, 2015; originally announced November 2015.

    Comments: An extended abstract of this work appeared in the SODA 2017

  19. arXiv:1509.02841  [pdf, other

    cs.DS

    Approximating the Smallest Spanning Subgraph for 2-Edge-Connectivity in Directed Graphs

    Authors: Loukas Georgiadis, Giuseppe F. Italiano, Charis Papadopoulos, Nikos Parotsidis

    Abstract: Let $G$ be a strongly connected directed graph. We consider the following three problems, where we wish to compute the smallest strongly connected spanning subgraph of $G$ that maintains respectively: the $2$-edge-connected blocks of $G$ (\textsf{2EC-B}); the $2$-edge-connected components of $G$ (\textsf{2EC-C}); both the $2$-edge-connected blocks and the $2$-edge-connected components of $G$ (\tex… ▽ More

    Submitted 9 September, 2015; originally announced September 2015.

  20. arXiv:1504.02052  [pdf, ps, other

    cs.GT

    Exchange of Services in Networks: Competition, Cooperation, and Fairness

    Authors: Leonidas Georgiadis, George Iosifidis, Leandros Tassiulas

    Abstract: Exchange of services and resources in, or over, networks is attracting nowadays renewed interest. However, despite the broad applicability and the extensive study of such models, e.g., in the context of P2P networks, many fundamental questions regarding their properties and efficiency remain unanswered. We consider such a service exchange model and analyze the users' interactions under three diffe… ▽ More

    Submitted 8 April, 2015; originally announced April 2015.

    Comments: to appear in ACM Sigmetrics 2015

  21. arXiv:1409.6277  [pdf, other

    cs.DS

    2-Vertex Connectivity in Directed Graphs

    Authors: Loukas Georgiadis, Giuseppe F. Italiano, Luigi Laura, Nikos Parotsidis

    Abstract: We complement our study of 2-connectivity in directed graphs, by considering the computation of the following 2-vertex-connectivity relations: We say that two vertices v and w are 2-vertex-connected if there are two internally vertex-disjoint paths from v to w and two internally vertex-disjoint paths from w to v. We also say that v and w are vertex-resilient if the removal of any vertex different… ▽ More

    Submitted 19 February, 2015; v1 submitted 22 September, 2014; originally announced September 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1407.3041

  22. arXiv:1407.3041  [pdf, other

    cs.DS

    2-Edge Connectivity in Directed Graphs

    Authors: Loukas Georgiadis, Giuseppe F. Italiano, Luigi Laura, Nikos Parotsidis

    Abstract: Edge and vertex connectivity are fundamental concepts in graph theory. While they have been thoroughly studied in the case of undirected graphs, surprisingly not much has been investigated for directed graphs. In this paper we study $2$-edge connectivity problems in directed graphs and, in particular, we consider the computation of the following natural relation: We say that two vertices $v$ and… ▽ More

    Submitted 31 July, 2014; v1 submitted 11 July, 2014; originally announced July 2014.

  23. arXiv:1311.7245  [pdf, other

    cs.IT

    Multiuser Broadcast Erasure Channel with Feedback and Side Information, and Related Index Coding Results

    Authors: A. Papadopoulos, L. Georgiadis

    Abstract: We consider the N-user broadcast erasure channel with public feedback and side information. Before the beginning of transmission, each receiver knows a function of the messages of some of the other receivers. This situation arises naturally in wireless and in particular cognitive networks where a node may overhear transmitted messages destined to other nodes before transmission over a given broadc… ▽ More

    Submitted 13 June, 2014; v1 submitted 28 November, 2013; originally announced November 2013.

    Comments: In the replacement version we modified slightly the title and the abstract of the original submission, in order to reflect better the content of the paper

  24. arXiv:1310.5468  [pdf, other

    cs.IT cond-mat.stat-mech cs.NI

    Message-Passing Algorithms for Optimal Utilization of Cognitive Radio Networks

    Authors: Hamed Mahmoudi, Georgios Rodolakis, Leonidas Georgiadis, David Saad

    Abstract: Cognitive Radio has been proposed as a key technology to significantly improve spectrum usage in wireless networks by enabling unlicensed users to access unused resource. We present new algorithms that are needed for the implementation of opportunistic scheduling policies that maximize the throughput utilization of resources by secondary users, under maximum interference constraints imposed by exi… ▽ More

    Submitted 21 October, 2013; originally announced October 2013.

  25. arXiv:1310.2118  [pdf, ps, other

    cs.DS

    Finding Dominators via Disjoint Set Union

    Authors: Wojciech Fraczak, Loukas Georgiadis, Andrew Miller, Robert E. Tarjan

    Abstract: The problem of finding dominators in a directed graph has many important applications, notably in global optimization of computer code. Although linear and near-linear-time algorithms exist, they use sophisticated data structures. We develop an algorithm for finding dominators that uses only a "static tree" disjoint set data structure in addition to simple lists and maps. The algorithm runs in nea… ▽ More

    Submitted 8 October, 2013; originally announced October 2013.

  26. arXiv:1307.5613  [pdf, ps, other

    cs.NI eess.SY

    Optimal Primary-Secondary user Cooperation Policies in Cognitive Radio Networks

    Authors: Nestor Chatzidiamantis, Evangelia Matskani, Leonidas Georgiadis, Iordanis Koutsopoulos, Leandros Tassiulas

    Abstract: In cognitive radio networks, secondary users (SUs) may cooperate with the primary user (PU), so that the success probability of PU transmissions are improved, while SUs obtain more transmission opportunities. Thus, SUs have to take intelligent decisions on whether to cooperate or not and with what power level, in order to maximize their throughput subject to average power constraints. Cooperation… ▽ More

    Submitted 22 December, 2014; v1 submitted 22 July, 2013; originally announced July 2013.

  27. Stable XOR-based Policies for the Broadcast Erasure Channel with Feedback

    Authors: Sophia Athanasiadou, Marios Gatzianas, Leonidas Georgiadis, Leandros Tassiulas

    Abstract: In this paper we describe a network coding scheme for the Broadcast Erasure Channel with multiple unicast stochastic flows, in the case of a single source transmitting packets to $N$ users, where per-slot feedback is fed back to the transmitter in the form of ACK/NACK messages. This scheme performs only binary (XOR) operations and involves a network of queues, along with special rules for coding a… ▽ More

    Submitted 30 August, 2014; v1 submitted 22 November, 2012; originally announced November 2012.

    Comments: 40 pages, submitted to IEEE Transactions on Networking

  28. arXiv:1211.4660  [pdf, ps, other

    cs.NI

    Minimal Evacuation Times and Stability

    Authors: Leonidas Georgiadis, Georgios S. Paschos, Lavy Libman, Leandros Tassiulas

    Abstract: We consider a system where packets (jobs) arrive for processing using one of the policies in a given class. We study the connection between the minimal evacuation times and the stability region of the system under the given class of policies. The result is used to establish the equality of information theoretic capacity region and system stability region for the multiuser broadcast erasure channel… ▽ More

    Submitted 19 November, 2012; originally announced November 2012.

  29. arXiv:1210.8303  [pdf, ps, other

    cs.DS

    Dominator Tree Certification and Independent Spanning Trees

    Authors: Loukas Georgiadis, Robert E. Tarjan

    Abstract: How does one verify that the output of a complicated program is correct? One can formally prove that the program is correct, but this may be beyond the power of existing methods. Alternatively one can check that the output produced for a particular input satisfies the desired input-output relation, by running a checker on the input-output pair. Then one only needs to prove the correctness of the c… ▽ More

    Submitted 7 March, 2013; v1 submitted 31 October, 2012; originally announced October 2012.

    Comments: Rewritten abstract and introduction. Added references

    ACM Class: D.3.4; E.1; F.2.2; G.2.2

  30. arXiv:1104.0645  [pdf, other

    cs.NI

    NCRAWL: Network Coding for Rate Adaptive Wireless Links

    Authors: Ioannis Broustis, Georgios Paschos, Dimitris Syrivelis, Leonidas Georgiadis, Leandros Tassiulas

    Abstract: Intersession network coding (NC) can provide significant performance benefits via mixing packets at wireless routers; these benefits are especially pronounced when NC is applied in conjunction with intelligent link scheduling. NC however imposes certain processing operations, such as encoding, decoding, copying and storage. When not utilized carefully, all these operations can induce tremendous pr… ▽ More

    Submitted 4 April, 2011; originally announced April 2011.

  31. arXiv:1012.4938  [pdf, ps, other

    cs.DS

    Join-Reachability Problems in Directed Graphs

    Authors: Loukas Georgiadis, Stavros D. Nikolopoulos, Leonidas Palios

    Abstract: For a given collection G of directed graphs we define the join-reachability graph of G, denoted by J(G), as the directed graph that, for any pair of vertices a and b, contains a path from a to b if and only if such a path exists in all graphs of G. Our goal is to compute an efficient representation of J(G). In particular, we consider two versions of this problem. In the explicit version we wish to… ▽ More

    Submitted 22 December, 2010; originally announced December 2010.

  32. Multiuser broadcast erasure channel with feedback - capacity and algorithms

    Authors: Marios Gatzianas, Leonidas Georgiadis, Leandros Tassiulas

    Abstract: We consider the $N$-user broadcast erasure channel with $N$ unicast sessions (one for each user) where receiver feedback is regularly sent to the transmitter in the form of ACK/NACK messages. We first provide a generic outer bound to the capacity of this system; we then propose a virtual-queue-based inter-session mixing coding algorithm, determine its rate region and show that it achieves capacity… ▽ More

    Submitted 28 August, 2012; v1 submitted 7 September, 2010; originally announced September 2010.

    Comments: 54 pages, 3 figures, 3 tables, submitted to IEEE Transactions on Information Theory. Updated version to match reviewer comments

  33. arXiv:0711.1682  [pdf, ps, other

    cs.DS

    Data Structures for Mergeable Trees

    Authors: Loukas Georgiadis, Haim Kaplan, Nira Shafrir, Robert E. Tarjan, Renato F. Werneck

    Abstract: Motivated by an application in computational topology, we consider a novel variant of the problem of efficiently maintaining dynamic rooted trees. This variant requires merging two paths in a single operation. In contrast to the standard problem, in which only one tree arc changes at a time, a single merge operation can change many arcs. In spite of this, we develop a data structure that support… ▽ More

    Submitted 11 November, 2007; originally announced November 2007.

    ACM Class: F.2.2

  34. arXiv:cs/0207061  [pdf, ps, other

    cs.DS

    Linear-Time Pointer-Machine Algorithms for Path-Evaluation Problems on Trees and Graphs

    Authors: Adam L. Buchsbaum, Loukas Georgiadis, Haim Kaplan, Anne Rogers, Robert E. Tarjan, Jeffery R. Westbrook

    Abstract: We present algorithms that run in linear time on pointer machines for a collection of problems, each of which either directly or indirectly requires the evaluation of a function defined on paths in a tree. These problems previously had linear-time algorithms but only for random-access machines (RAMs); the best pointer-machine algorithms were super-linear by an inverse-Ackermann-function factor.… ▽ More

    Submitted 14 November, 2006; v1 submitted 15 July, 2002; originally announced July 2002.

    Comments: 41 pages; 10 figures; 1 table; 65 references. This work is partially covered by the extended abstracts, ``Linear-Time Pointer-Machine Algorithms for Least Common Ancestors, MST Verification, and Dominators,'' Proc. 30th ACM Symp. on Theory of Computing, pp. 279-888, 1998, and ``Finding Dominators Revisited,'' Proc. 15th ACM-SIAM Symp. on Discrete Algorithms, pp. 862-871, 2004

    ACM Class: D.3.4; E.1; F.1.1; F.2.2; G.2.2