Design of a d-connected digraph with a minimum number of edges and a quasiminimal diameter
Discrete Applied Mathematics
Augmenting graphs to meet edge-connectivity requirements
SIAM Journal on Discrete Mathematics
Edge-Connectivity Augmentation Preserving Simplicity
SIAM Journal on Discrete Mathematics
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Simpler and faster biconnectivity augmentation
Journal of Algorithms
On the Minimum Augmentation of an l-Connected Graph to a k-Connected Graph
SWAT '00 Proceedings of the 7th Scandinavian Workshop on Algorithm Theory
Fault Tolerant Networks of Specified Diameter
WG '88 Proceedings of the 14th International Workshop on Graph-Theoretic Concepts in Computer Science
Two Edge-Disjoint Hop-Constrained Paths and Polyhedra
SIAM Journal on Discrete Mathematics
Networks
The two-edge connected hop-constrained network design problem: Valid inequalities and branch-and-cut
Networks - Special Issue on Multicommodity Flows and Network Design
Edge-Connectivity augmentation and network matrices
WG'04 Proceedings of the 30th international conference on Graph-Theoretic Concepts in Computer Science
On the k edge-disjoint 2-hop-constrained paths polytope
Operations Research Letters
The k edge-disjoint 3-hop-constrained paths polytope
Discrete Optimization
Operations Research Letters
On the directed hop-constrained shortest path problem
Operations Research Letters
Benders Decomposition for the Hop-Constrained Survivable Network Design Problem
INFORMS Journal on Computing
Hi-index | 0.00 |
We consider the problems of minimum-cost design and augmentation of directed network clusters that have diameter 2 and maintain the same diameter after the deletion of up to R elements (nodes or arcs) anywhere in the cluster. The property of a network to maintain not only the overall connectivity, but also the same diameter after the deletion of multiple nodes/arcs is referred to as strong attack tolerance. This paper presents the proof of NP-completeness of the decision version of the problem, derives tight theoretical bounds, as well as develops a heuristic algorithm for the considered problems, which are extremely challenging to solve to optimality even for small networks. Computational experiments suggest that the proposed heuristic algorithm does identify high-quality near-optimal solutions; moreover, in the special case of undirected networks with identical arc construction costs, the algorithm provably produces an exact optimal solution to strongly attack-tolerant two-hop network design problem, regardless of the network size.