VERY SIMPLE METHODS FOR ALL PAIRS NETWORK FLOW-ANALYSIS

被引:101
作者
GUSFIELD, D
机构
[1] Univ of California at Davis, , CA
关键词
D O I
10.1137/0219009
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A very simple algorithm for the classical problem of computing the maximum network flow value between every pair of nodes in an undirected, capacited n node graph is presented; as in the well-known Gomory-Hu method, the method given here uses only n-1 maximum flow computations. Our algorithm is implemented by adding only five simple lines of code to any program that produces a minimum cut; a program to produce an equivalent flow tree, which is a compact representation of the flow values, is obtained of the Gomory-Hu cut tree method that finds one minimum cut for every pair of nodes is also derived, and it shown that the seemingly fundamental operation of that method, node contraction, is not needed, nor must crossing cuts be avoided. As a result, this version of the Gomory-Hu method is implemented by adding less than ten simple lines of code to any program that produces a minimum cut. The algorithms in this paper demonstrate that a cut tree of graph G can be computed with n-1 calls to an oracle that alone knows G, and that, when given two nodes s and t, returns any arbitrary minimum (s, t) cut and its value.
引用
收藏
页码:143 / 155
页数:13
相关论文
共 26 条
[1]   OPTIMAL LINEAR ORDERING [J].
ADOLPHSON, D ;
HU, TC .
SIAM JOURNAL ON APPLIED MATHEMATICS, 1973, 25 (03) :403-423
[2]   CONSTRAINED OPTIMUM COMMUNICATION TREES AND SENSITIVITY ANALYSIS [J].
AGARWAL, S ;
MITTAL, AK ;
SHARMA, P .
SIAM JOURNAL ON COMPUTING, 1984, 13 (02) :315-328
[3]  
CHENG CK, 1988, CS88141 U CAL TECH R
[4]  
ELMAGHRABY SE, 1964, J ORSA, V12, P680
[5]  
Ford L., 1962, FLOWS NETWORKS, V71, P1059, DOI 10.2307/2311955
[6]  
FRANK H, 1972, COMMUNICATION TRANSM
[7]   MULTI-TERMINAL NETWORK FLOWS [J].
GOMORY, RE ;
HU, TC .
JOURNAL OF THE SOCIETY FOR INDUSTRIAL AND APPLIED MATHEMATICS, 1961, 9 (04) :551-570
[8]   MULTITERMINAL MAXIMUM FLOWS IN NODE-CAPACITATED NETWORKS [J].
GRANOT, F ;
HASSIN, R .
DISCRETE APPLIED MATHEMATICS, 1986, 13 (2-3) :157-163
[9]   A GRAPH THEORETIC APPROACH TO STATISTICAL-DATA SECURITY [J].
GUSFIELD, D .
SIAM JOURNAL ON COMPUTING, 1988, 17 (03) :552-571
[10]  
GUSFIELD D, 1989, CSE895 U CAL DIV COM