Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/952532.952678acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Greedy heuristics and an evolutionary algorithm for the bounded-diameter minimum spanning tree problem

Published: 09 March 2003 Publication History

Abstract

Given a connected, weighted, undirected graph G and a bound D, the bounded-diameter minimum spanning tree problem seeks a spanning tree on G of lowest weight in which no path between two vertices contains more than D edges. This problem is NP-hard for 4 < D < n - 1, where n is the number of vertices in G. An existing greedy heuristic for the problem, called OTTC, is based on Prim's algorithm. OTTC usually yields poor results on instances in which the triangle inequality approximately holds; it always uses the lowest-weight edges that it can, but such edges do not in general connect the interior nodes of low-weight bounded-diameter trees. A new randomized greedy heuristic builds a bounded-diameter spanning tree from its center vertex or vertices. It chooses each next vertex at random but attaches the vertex with the lowest-weight eligible edge. This algorithm is faster than OTTC and yields substantially better solutions on Euclidean instances. An evolutionary algorithm encodes spanning trees as lists of their edges, augmented with their center vertices. It applies operators that maintain the diameter bound and always generate valid offspring trees. These operators are efficient, so the algorithm scales well to larger problem instances. On 25 Euclidean instances of up to 1000 vertices, the EA improved substantially on solutions found by the randomized greedy heuristic.

References

[1]
A. Abdalla, N. Deo, and P. Gupta. Random-tree diameter and the diameter constrained MST. Congressus Numerantium, 144:161--182, 2000.]]
[2]
K. Bala, K. Petropoulos, and T. E. Stern. Multicasting in a linear lightwave network. In IEEE INFOCOM'93, pages 1350--1358, 1993.]]
[3]
A. Bookstein and S. T. Klein. Compression of correlated bit-vectors. Information Systems, 16(4):110--118, 1996.]]
[4]
G. Chartrand and O. Oellermann. Applied and Algorithmic Graph Theory. McGraw-Hill, New York, 1993.]]
[5]
G. Dahl. The 2-hop spanning tree problem. Technical Report 250, University of Oslo, 1997.]]
[6]
N. Deo and A. Abdalla. Computing a diameter-constrained minimum spanning tree in parallel. In G. Bongiovanni, G. Gambosi, and R. Petreschi, editors, Algorithms and Complexity, number 1767 in LNCS, pages 17--31. Springer, Berlin, 2000.]]
[7]
M. R. Garey and D. S. Johnson. Computers and Intractibility: A Guide to the Theory of NP-Completeness. W. H. Freeman, New York, 1979.]]
[8]
J. Gottlieb, B. A. Julstrom, F. Rothlauf, and G. R. Raidl. Prüfer numbers: A poor representation of spanning trees for evolutionary search. In L. Spector, E. Goodman, A. Wu, W. Langdon, H.-M. Voigt, M. Gen, S. Sen, M. Dorigo, S. Pezeshk, M. Garzon, and E. Burke, editors, Proceedings of the 2001 Genetic and Evolutionary Computation Conference, pages 343--350. Morgan Kaufmann, 2000.]]
[9]
C. Jordan. Sur les assemblages des lignes. J. Reine Angew. Math., 70:185--190, 1869.]]
[10]
B. A. Julstrom. Encoding rectilinear Steiner trees as lists of edges. In G. Lamont, J. Carroll, H. Haddad, D. Morton, G. Papadopoulos, R. Sincovec, and A. Yfantis, editors, Proceedings of the 16th ACM Symposium on Applied Computing, pages 356--360. ACM Press, 2001.]]
[11]
G. Kortsarz and D. Peleg. Approximating shallow-light trees. In Proceedings of the 8th Symposium on Discrete Algorithms, pages 103--110, 1997.]]
[12]
G. Kortsarz and D. Peleg. Approximating the weight of shallow Steiner trees. Discrete Applied Mathematics, 93:265--285, 1999.]]
[13]
C. C. Palmer and A. Kershenbaum. Representing trees in genetic algorithms. In D. Schaffer, H.-P. Schwefel, and D. B. Fogel, editors, Proceedings of the First IEEE Conference on Evolutionary Computation, pages 379--384. IEEE Press, 1994.]]
[14]
R. C. Prim. Shortest connection networks and some generalizations. Bell System Technical Journal, 36:1389--1401, 1957.]]
[15]
G. R. Raidl. An efficient evolutionary algorithm for the degree-constrained minimum spanning tree problem. In C. Fonseca, J.-H. Kim, and A. Smith, editors, Proceedings of the 2000 IEEE Congress on Evolutionary Computation, pages 104--111. IEEE Press, 2000.]]
[16]
G. R. Raidl and B. A. Julstrom. Edge-sets: An effective evolutionary coding of spanning trees. IEEE Transactions on Evolutionary Computation. To appear.]]
[17]
K. Raymond. A tree-based algorithm for distributed mutual exclusion. ACM Transactions on Computer Systems, 7(1):61--77, 1989.]]
[18]
F. Rothlauf, D. Goldberg, and A. Heinzl. Network random keys - a tree network representation scheme for genetic and evolutionary algorithms. Evolutionary Computation, 10(1):75--97, 2002.]]

Cited By

View all
  • (2024)Common-Flow Formulations for the Diameter Constrained Spanning and Steiner Tree ProblemsCombinatorial Optimization and Applications10.1007/978-3-031-57603-4_3(37-58)Online publication date: 28-Jun-2024
  • (2023)Simulated Annealing Algorithm for the Bounded Diameter Minimum Spanning Tree ProblemProceedings of the Companion Conference on Genetic and Evolutionary Computation10.1145/3583133.3590575(215-218)Online publication date: 15-Jul-2023
  • (2022)Flooding Topology Algorithms for Computer Networks2022 International Conference on Modern Network Technologies (MoNeTec)10.1109/MoNeTec55448.2022.9960759(1-12)Online publication date: 27-Oct-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '03: Proceedings of the 2003 ACM symposium on Applied computing
March 2003
1268 pages
ISBN:1581136242
DOI:10.1145/952532
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 March 2003

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bounded-diameter spanning tree
  2. edge-list encoding
  3. greedy heuristics
  4. local improvement
  5. randomized heuristics

Qualifiers

  • Article

Conference

SAC03
Sponsor:
SAC03: ACM Symposium on Applied Computing
March 9 - 12, 2003
Florida, Melbourne

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Common-Flow Formulations for the Diameter Constrained Spanning and Steiner Tree ProblemsCombinatorial Optimization and Applications10.1007/978-3-031-57603-4_3(37-58)Online publication date: 28-Jun-2024
  • (2023)Simulated Annealing Algorithm for the Bounded Diameter Minimum Spanning Tree ProblemProceedings of the Companion Conference on Genetic and Evolutionary Computation10.1145/3583133.3590575(215-218)Online publication date: 15-Jul-2023
  • (2022)Flooding Topology Algorithms for Computer Networks2022 International Conference on Modern Network Technologies (MoNeTec)10.1109/MoNeTec55448.2022.9960759(1-12)Online publication date: 27-Oct-2022
  • (2021)A Crossover Algebra for Solving Minimum Spanning Tree in Network Design with Diameter ConstraintsJournal of Physics: Conference Series10.1088/1742-6596/1927/1/0120241927:1(012024)Online publication date: 1-May-2021
  • (2021)Time complexity analysis of evolutionary algorithms for 2-hop (1,2)-minimum spanning tree problemTheoretical Computer Science10.1016/j.tcs.2021.09.003893(159-175)Online publication date: Nov-2021
  • (2021)Artificial bee colony algorithm using permutation encoding for the bounded diameter minimum spanning tree problemSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-021-05913-z25:16(11289-11305)Online publication date: 1-Aug-2021
  • (2020)Serial and parallel memetic algorithms for the bounded diameter minimum spanning tree problemExpert Systems10.1111/exsy.1261038:2Online publication date: Aug-2020
  • (2020)Novel Heuristics for the Euclidean Leaf-Constrained Minimum Spanning Tree ProblemSN Computer Science10.1007/s42979-020-0120-y1:2Online publication date: 30-Mar-2020
  • (2019)Runtime analysis of evolutionary algorithms for the depth restricted (1,2)-minimum spanning tree problemProceedings of the 15th ACM/SIGEVO Conference on Foundations of Genetic Algorithms10.1145/3299904.3340314(133-146)Online publication date: 27-Aug-2019
  • (2018)A Heuristic for the Bounded Diameter Minimum Spanning Tree ProblemProceedings of the 2nd International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence10.1145/3206185.3206202(84-88)Online publication date: 24-Mar-2018
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media