Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Graphs, Dioids and Semirings: New Models and Algorithms (Operations Research/Computer Science Interfaces Series)May 2008
Publisher:
  • Springer Publishing Company, Incorporated
ISBN:978-0-387-75449-9
Published:19 May 2008
Pages:
388
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

The origins of Graph Theory date back to Euler (1736) with the solution of the celebrated 'Koenigsberg Bridges Problem'; and to Hamilton with the famous 'Trip around the World' game (1859), stating for the first time a problem which, in its most recent version the 'Traveling Salesman Problem' -, is still the subject of active research. Yet, it has been during the last fifty years or sowith the rise of the electronic computersthat Graph theory has become an indispensable discipline in terms of the number and importance of its applications across the Applied Sciences. Graph theory has been especially central to Theoretical and Algorithmic Computer Science, and Automatic Control, Systems Optimization, Economy and Operations Research, Data Analysis in the Engineering Sciences. Close connections between graphs and algebraic structures have been widely used in the analysis and implementation of efficient algorithms for many problems, for example: transportation network optimization, telecommunication network optimization and planning, optimization in scheduling and production systems, etc. The primary objectives of GRAPHS, DIODS AND SEMIRINGS: New Models and Algorithms are to emphasize the deep relations existing between the semiring and diod structures with graphs and their combinatorial properties, while demonstrating the modeling and problem-solving capability and flexibility of these structures. In addition the book provides an extensive overview of the mathematical properties employed by "nonclassical" algebraic structures, which either extend usual algebra (i.e., semirings), or correspond to a new branch of algebra (i.e., diods), apart from the classical structures of groups, rings, and fields.

Cited By

  1. ACM
    Abo Khamis M, Ngo H, Pichler R, Suciu D and Wang Y (2024). Convergence of datalog over (Pre-) Semirings, Journal of the ACM, 71:2, (1-55), Online publication date: 30-Apr-2024.
  2. ACM
    Abo Khamis M, Ngo H, Pichler R, Suciu D and Remy Wang Y (2023). Convergence of Datalog over (Pre-) Semirings, ACM SIGMOD Record, 52:1, (75-82), Online publication date: 7-Jun-2023.
  3. Sobrinho J and Ferreira M (2022). From Non-Optimal Routing Protocols to Routing on Multiple Optimality Criteria, IEEE/ACM Transactions on Networking, 31:1, (294-307), Online publication date: 1-Feb-2023.
  4. ACM
    Khamis M, Ngo H, Pichler R, Suciu D and Remy Wang Y (2022). Datalog in Wonderland, ACM SIGMOD Record, 51:2, (6-17), Online publication date: 29-Jul-2022.
  5. ACM
    Abo Khamis M, Ngo H, Pichler R, Suciu D and Wang Y Convergence of Datalog over (Pre-) Semirings Proceedings of the 41st ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (105-117)
  6. Kincaid Z, Reps T and Cyphert J Algebraic Program Analysis Computer Aided Verification, (46-83)
  7. Kannan R, Sao P, Lu H, Herrmannova D, Thakkar V, Patton R, Vuduc R and Potok T Scalable knowledge graph analytics at 136 petaflop/s Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, (1-13)
  8. Cechlárová K, Gourvès L and Lesca J On the problem of assigning PhD grants Proceedings of the 28th International Joint Conference on Artificial Intelligence, (130-136)
  9. ACM
    Daggitt M, Gurney A and Griffin T Asynchronous convergence of policy-rich distributed bellman-ford routing protocols Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, (103-116)
  10. Valverde-Albacete F and Peláez-Moreno C On the Relation between Semifield-Valued FCA and the Idempotent Singular Value Decomposition 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-8)
  11. Němcová Z and Gavalec M Applications of Extremal Algebras and Fuzzy Logic 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-6)
  12. Chu S, Murphy B, Roesch J, Cheung A and Suciu D (2018). Axiomatic foundations and algorithms for deciding semantic equivalences of SQL queries, Proceedings of the VLDB Endowment, 11:11, (1482-1495), Online publication date: 1-Jul-2018.
  13. Plavka J (2018). Subeigenvectors and supereigenvectors of fuzzy matrices, Fuzzy Sets and Systems, 339:C, (62-72), Online publication date: 15-May-2018.
  14. Khayou H and Sarakbi B (2017). A validation model for non-lexical routing protocols, Journal of Network and Computer Applications, 98:C, (58-64), Online publication date: 15-Nov-2017.
  15. Hidaka S, Jouault F and Tisi M On additivity in transformation languages Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems, (23-33)
  16. ACM
    Kincaid Z, Breck J, Boroujeni A and Reps T (2017). Compositional recurrence analysis revisited, ACM SIGPLAN Notices, 52:6, (248-262), Online publication date: 14-Sep-2017.
  17. ACM
    Kincaid Z, Breck J, Boroujeni A and Reps T Compositional recurrence analysis revisited Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, (248-262)
  18. Hong H, Kim Y, Scholten G and Sendra J (2017). Resultants over commutative idempotent semirings I, Journal of Symbolic Computation, 79:P2, (285-308), Online publication date: 1-Mar-2017.
  19. Bouznif M, Moncel J and Preissmann M (2016). A constant time algorithm for some optimization problems in rotagraphs and fasciagraphs, Discrete Applied Mathematics, 208:C, (27-40), Online publication date: 31-Jul-2016.
  20. Valverde-Albacete F and Peláez-Moreno C (2015). The spectra of irreducible matrices over completed idempotent semifields, Fuzzy Sets and Systems, 271:C, (46-69), Online publication date: 15-Jul-2015.
  21. Werner T (2015). Marginal Consistency: Upper-Bounding Partition Functions over Commutative Semirings, IEEE Transactions on Pattern Analysis and Machine Intelligence, 37:7, (1455-1468), Online publication date: 1-Jul-2015.
  22. ACM
    Thion R, Lesueur F and Talbi M Tuple-based access control Proceedings of the 30th Annual ACM Symposium on Applied Computing, (2165-2170)
  23. Tiskin A (2015). Fast Distance Multiplication of Unit-Monge Matrices, Algorithmica, 71:4, (859-888), Online publication date: 1-Apr-2015.
  24. Ignjatović J, Ćirić M, Šešelja B and Tepavčević A (2015). Fuzzy relational inequalities and equations, fuzzy quasi-orders, closures and openings of fuzzy sets, Fuzzy Sets and Systems, 260:C, (1-24), Online publication date: 1-Feb-2015.
  25. ACM
    Schelter S Scaling data mining in massively parallel dataflow systems Proceedings of the 2014 SIGMOD PhD symposium, (11-15)
  26. ACM
    Dolan S (2013). Fun with semirings, ACM SIGPLAN Notices, 48:9, (101-110), Online publication date: 12-Nov-2013.
  27. ACM
    Schelter S, Ewen S, Tzoumas K and Markl V "All roads lead to Rome" Proceedings of the 22nd ACM international conference on Information & Knowledge Management, (1919-1928)
  28. Rétvári G, Gulyás A, Heszberger Z, Csernai M and Bíró J (2013). Compact policy routing, Distributed Computing, 26:5-6, (309-320), Online publication date: 1-Oct-2013.
  29. ACM
    Dolan S Fun with semirings Proceedings of the 18th ACM SIGPLAN international conference on Functional programming, (101-110)
  30. Höfner P and Möller B (2012). Dijkstra, Floyd and Warshall meet Kleene, Formal Aspects of Computing, 24:4-6, (459-476), Online publication date: 1-Jul-2012.
  31. Plavka J (2012). On the O ( n 3 ) algorithm for checking the strong robustness of interval fuzzy matrices, Discrete Applied Mathematics, 160:4, (640-647), Online publication date: 1-Mar-2012.
  32. Plavka J (2012). On the O(n3) algorithm for checking the strong robustness of interval fuzzy matrices, Discrete Applied Mathematics, 160:4-5, (640-647), Online publication date: 1-Mar-2012.
  33. ACM
    Alim M and Griffin T On the interaction of multiple routing algorithms Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies, (1-12)
  34. Stawiaski J Optimal path Proceedings of the 10th international conference on Mathematical morphology and its applications to image and signal processing, (417-428)
  35. ACM
    Rétvári G, Gulyás A, Heszberger Z, Csernai M and Bíró J Compact policy routing Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing, (149-158)
  36. ACM
    Alim M and Griffin T Hybrid link-state, path-vector routing Proceedings of the 6th Asian Internet Engineering Conference, (32-39)
  37. ACM
    Le F, Xie G and Zhang H Theory and new primitives for safely connecting routing protocol instances Proceedings of the ACM SIGCOMM 2010 conference, (219-230)
  38. ACM
    Le F, Xie G and Zhang H (2010). Theory and new primitives for safely connecting routing protocol instances, ACM SIGCOMM Computer Communication Review, 40:4, (219-230), Online publication date: 16-Aug-2010.
  39. Zhang C, Zhu X, Song Y and Fang Y A formal study of trust-based routing in wireless ad hoc networks Proceedings of the 29th conference on Information communications, (2838-2846)
  40. Griffin T The stratified shortest-paths problem Proceedings of the 2nd international conference on COMmunication systems and NETworks, (268-277)
  41. ACM
    Lambert A, Buob M and Uhlig S Improving internet-wide routing protocols convergence with MRPC timers Proceedings of the 5th international conference on Emerging networking experiments and technologies, (325-336)
  42. Billings J and Griffin T A Model of Internet Routing Using Semi-modules Proceedings of the 11th International Conference on Relational Methods in Computer Science and 6th International Conference on Applications of Kleene Algebra: Relations and Kleene Algebra in Computer Science, (29-43)
  43. ACM
    Taylor P and Griffin T A model of configuration languages for routing protocols Proceedings of the 2nd ACM SIGCOMM workshop on Programmable routers for extensible services of tomorrow, (55-60)
Contributors
  • Paris Dauphine University
  • Sorbonne University

Recommendations