2000
DOI: 10.1007/3-540-46521-9_2
|View full text |Cite
|
Sign up to set email alerts
|

Computing a Diameter-Constrained Minimum Spanning Tree in Parallel

Abstract: Abstract.A minimum spanning tree (MST) with a small diameter is required in numerous practical situations. It is needed, for example, in distributed mutual exclusion algorithms in order to minimize the number of messages communicated among processors per critical section.The DiameterConstrained MST (DCMST) problem can be stated as follows: given an undirected, edge-weighted graph G with n nodes and a positive integer k, find a spanning tree with the smallest weight among all spanning trees of G which contain n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0

Year Published

2004
2004
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(24 citation statements)
references
References 7 publications
0
24
0
Order By: Relevance
“…Deo and Abdalla [8] proposed One Time Tree Construction (OTTC), based on Prim's algorithm. It builds a spanning tree, starting from each node and connecting the nearest neighbor that does not violate the diameter constraint.…”
Section: One Time Tree Constructionmentioning
confidence: 99%
See 2 more Smart Citations
“…Deo and Abdalla [8] proposed One Time Tree Construction (OTTC), based on Prim's algorithm. It builds a spanning tree, starting from each node and connecting the nearest neighbor that does not violate the diameter constraint.…”
Section: One Time Tree Constructionmentioning
confidence: 99%
“…BDMST has many applications in real-world [2,4,22]; it is an NP-hard problem within diameter bound (D) ranges 4 ≤ D < |V| -1 [9], where diameter bound (D) is a constraint, the maximum feasible longest path between two vertices of a connected, undirected, weighted graph G to generate feasible MSTs and V is the set of vertices of G. Well-known heuristics which are evolved to provide solutions to BDMST problem, are: e.g., one time tree construction (OTTC) [8], iterative refinement (IR) [8], randomized greedy heuristics (RGH) [21], random tree construction (RTC) [10], center based tree construction (CBTC) [10] and center-based recursive clustering (CBRC) [20]. Initially, algorithmic complexity directed the development of various heuristics.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This problem has also been applied to data compression by Bookstien and Klien, 9 and distributed mutual exclusion in parallel computing by Raymond, 10 and Deo and Abdalla. 11 Different formulation of the DCMST has been found in the literature. 8,11,12 These formulations implicitly use a property of feasible diameter constrained spanning tree, pointed out by Handler.…”
Section: Introductionmentioning
confidence: 99%
“…11 Different formulation of the DCMST has been found in the literature. 8,11,12 These formulations implicitly use a property of feasible diameter constrained spanning tree, pointed out by Handler. 13 He pointed out that, when D is even, a central vertex i ∈ V must exist in a feasible tree T , such that no other vertex of T is more than D/2 edges away from i and when D is odd, a central edge e = (i, j) ∈ E must exist in T , such that no vertex of T is more than (D − 1)/2 edges away from the closest extremity of (i, j).…”
Section: Introductionmentioning
confidence: 99%