SlideShare a Scribd company logo
Proximity Preserving Labeling Schemes
and Their Applications
By – David Peleg
Presented By – Meenakshi Tripathi
Here comes your footer  Page 2
Features
 Aims to label vertices of a graph s.t. distance b/w any two vertices
inferred from inspecting the labels – Proximity Preserving labeling
 For n vertex weighted trees with M bit edge weights, label size
O(Mlogn+log2
n) bit .
 Based on use of Tree Separators ( Vertex whose removal breaks Tree T
into disconnected subtrees of atmost n/2 vertices each) .
 Labeling Scheme uses O(Mlogn + log2
n) bit labes, where M is maximum
bits to represent edge weight in the graph.
General details
Here comes your footer  Page 3
The Labeling System
The procedure recursively partitions the tree by finding a separator. For eg. in the tree T depicted in Fig.
(a,0,0)a
b dc
(a,1,1)
(a,1,3)
(a,1,2)
(b,0,0) (d,0,0)
(c,0,0)
Labeling Algorithm : Proc1
Label Description
 If subtree T’ has a single vertex v0 then it
is labeled as (I(v0), 0, 0).
 Tree separator v0 labeled as (I(v0), 0, 0).
 J(v)=(I(v0), dist(v,v0,T), i).
 If vertex v is internal to subtrees at level
p-1 and becomes separator at level p
then
Label(v)= J1(v) . J2(v)…….Jp(v)
Label consists of p triples
Subtree T2
Subtree T1
Distance Finding Algorithm  Proc2
Computing the Distances–
 If Label(u) = J1(u) . J2(u)…….Jp(u) and Label(v)= J1(v) . J2(v)…….Jp(v)
Finding dT(u,v) given Label(u) and Label(v) – Proc2
1. p = 1: /* v is the separator */ Return the 2nd
field in J1(u).
2. q = 1: /* u is the separator */ Return the 2nd
field in J1(v).
3. p; q > 1: Let J1(u) = (I(w) ; dist(u;w; T ) ; i) & J1(v) = (I(w) ; dist(v;w; T) ; j) for some i; j.
There are two subcases to consider.
(a) i # j: /* u and v belong to different subtrees */ Return the sum of the 2nd field in J1(u) and J1(v).
(b) i = j: /* u and v belong to the same subtree */ Then do the following:
i. Peel of the 1st triple J1(u) from Label(u), and the triple J1(v)
from Label(v), remaining with
Labeli(u) = J2(u) : : : Jq(u)
Labeli(v) = J2(v) : : : Jp(v) ;
ii. Invoke procedure Proc2 recursively on Labeli(u) and Labeli(v) to
compute dist(u; v; Ti);
iii. Return this value.
Root Case
Find distance on different
subtrees only else
discard the triplet
Distance approx. labelings
Distance- Approximating Labelings
 Tree cover is of graph G is defined as a special collection of trees in the graph,
containing all vertices in G.
 l neighborhood of a vertex v V is collection of vertices at distance l or less from it in∈
G , Tl(v)={w | dist(w,v,G)<=l}
 Given a weighted graph G=(V,E,w) an l tree cover is a collection TC of trees in G, s.t.
for every v V∈ ∃ a tree T TC that spans the entire l –neighborhood T∈ l(v) is subset of
V(T).
 Depth(TC) =max T TC∈ {Depth(T)},
 Overlap of TC is maximum, over all vertices of v, of the number of different trees
containing v , Overlap(TC) = max v V∈ |{T TC |∈ v V(T)}|∈
Uses Tree Covers
Here comes your footer  Page 7
Labeling System
Using all tree cover
Here comes your footer  Page 8
Distance Estimation Algorithm
THANKS
THANKS

More Related Content

What's hot

Combine and distribute stations
Combine and distribute stationsCombine and distribute stations
Combine and distribute stations
Erik Tjersland
 
Weakly guiding fibres simulation with gnu octave
Weakly guiding fibres simulation with gnu octaveWeakly guiding fibres simulation with gnu octave
Weakly guiding fibres simulation with gnu octave
Kurbatov Roman
 
CS 354 Bezier Curves
CS 354 Bezier Curves CS 354 Bezier Curves
CS 354 Bezier Curves
Mark Kilgard
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
Heman Pathak
 
Dijsktra’s Sortest path algorithm
Dijsktra’s Sortest path algorithmDijsktra’s Sortest path algorithm
Dijsktra’s Sortest path algorithm
Delowar Hossain
 
1573 measuring arclength
1573 measuring arclength1573 measuring arclength
1573 measuring arclength
Dr Fereidoun Dejahang
 
BITS C464.doc
BITS C464.docBITS C464.doc
BITS C464.doc
butest
 
Ece6 cmc-dec08
Ece6 cmc-dec08Ece6 cmc-dec08
Ece6 cmc-dec08
kumartarsem
 
Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)
VARUN KUMAR
 
11 clusadvanced
11 clusadvanced11 clusadvanced
11 clusadvanced
JoonyoungJayGwak
 
Javascript Array map method
Javascript Array map methodJavascript Array map method
Javascript Array map method
tanerochris
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
csandit
 
Trident International Graphics Workshop2014 3/5
Trident International Graphics Workshop2014 3/5Trident International Graphics Workshop2014 3/5
Trident International Graphics Workshop2014 3/5
Takao Wada
 
Smu bscit sem 1 summer 2015 assignemnts
Smu bscit sem 1 summer 2015 assignemntsSmu bscit sem 1 summer 2015 assignemnts
Smu bscit sem 1 summer 2015 assignemnts
solved_assignments
 
Lab lecture 2 bresenham
Lab lecture 2 bresenhamLab lecture 2 bresenham
Lab lecture 2 bresenham
simpleok
 
Geometry Batching Using Texture-Arrays
Geometry Batching Using Texture-ArraysGeometry Batching Using Texture-Arrays
Geometry Batching Using Texture-Arrays
Matthias Trapp
 
Double & triple integral unit 5 paper 1 , B.Sc. 2 Mathematics
Double & triple integral unit 5 paper 1 , B.Sc. 2 MathematicsDouble & triple integral unit 5 paper 1 , B.Sc. 2 Mathematics
Double & triple integral unit 5 paper 1 , B.Sc. 2 Mathematics
Shri Shankaracharya College, Bhilai,Junwani
 
Interactive Rendering and Stylization of Transportation Networks Using Distan...
Interactive Rendering and Stylization of Transportation Networks Using Distan...Interactive Rendering and Stylization of Transportation Networks Using Distan...
Interactive Rendering and Stylization of Transportation Networks Using Distan...
Matthias Trapp
 
Circular Convolution
Circular ConvolutionCircular Convolution
Circular Convolution
Sarang Joshi
 

What's hot (20)

Combine and distribute stations
Combine and distribute stationsCombine and distribute stations
Combine and distribute stations
 
Weakly guiding fibres simulation with gnu octave
Weakly guiding fibres simulation with gnu octaveWeakly guiding fibres simulation with gnu octave
Weakly guiding fibres simulation with gnu octave
 
CS 354 Bezier Curves
CS 354 Bezier Curves CS 354 Bezier Curves
CS 354 Bezier Curves
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Dijsktra’s Sortest path algorithm
Dijsktra’s Sortest path algorithmDijsktra’s Sortest path algorithm
Dijsktra’s Sortest path algorithm
 
1573 measuring arclength
1573 measuring arclength1573 measuring arclength
1573 measuring arclength
 
BITS C464.doc
BITS C464.docBITS C464.doc
BITS C464.doc
 
Ece6 cmc-dec08
Ece6 cmc-dec08Ece6 cmc-dec08
Ece6 cmc-dec08
 
Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)
 
11 clusadvanced
11 clusadvanced11 clusadvanced
11 clusadvanced
 
Javascript Array map method
Javascript Array map methodJavascript Array map method
Javascript Array map method
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
 
Trident International Graphics Workshop2014 3/5
Trident International Graphics Workshop2014 3/5Trident International Graphics Workshop2014 3/5
Trident International Graphics Workshop2014 3/5
 
Smu bscit sem 1 summer 2015 assignemnts
Smu bscit sem 1 summer 2015 assignemntsSmu bscit sem 1 summer 2015 assignemnts
Smu bscit sem 1 summer 2015 assignemnts
 
Lab lecture 2 bresenham
Lab lecture 2 bresenhamLab lecture 2 bresenham
Lab lecture 2 bresenham
 
Hcp
HcpHcp
Hcp
 
Geometry Batching Using Texture-Arrays
Geometry Batching Using Texture-ArraysGeometry Batching Using Texture-Arrays
Geometry Batching Using Texture-Arrays
 
Double & triple integral unit 5 paper 1 , B.Sc. 2 Mathematics
Double & triple integral unit 5 paper 1 , B.Sc. 2 MathematicsDouble & triple integral unit 5 paper 1 , B.Sc. 2 Mathematics
Double & triple integral unit 5 paper 1 , B.Sc. 2 Mathematics
 
Interactive Rendering and Stylization of Transportation Networks Using Distan...
Interactive Rendering and Stylization of Transportation Networks Using Distan...Interactive Rendering and Stylization of Transportation Networks Using Distan...
Interactive Rendering and Stylization of Transportation Networks Using Distan...
 
Circular Convolution
Circular ConvolutionCircular Convolution
Circular Convolution
 

Similar to Compact routing peleg paper

DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
graphhoc
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
cscpconf
 
1568973267 effect of multi-tone
1568973267 effect of multi-tone1568973267 effect of multi-tone
1568973267 effect of multi-tone
University of Technology
 
Mm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithmsMm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithms
Eellekwameowusu
 
Edge linking hough transform
Edge linking hough transformEdge linking hough transform
Edge linking hough transform
aruna811496
 
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULLADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
Fransiskeran
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD Editor
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
K-means Clustering Algorithm with Matlab Source code
K-means Clustering Algorithm with Matlab Source codeK-means Clustering Algorithm with Matlab Source code
K-means Clustering Algorithm with Matlab Source code
gokulprasath06
 
Transport and routing on coupled spatial networks
Transport and routing on coupled spatial networksTransport and routing on coupled spatial networks
Transport and routing on coupled spatial networks
richardgmorris
 
Optimisation random graph presentation
Optimisation random graph presentationOptimisation random graph presentation
Optimisation random graph presentation
Venkat Sai Sharath Mudhigonda
 
Principal Component Analysis for Tensor Analysis and EEG classification
Principal Component Analysis for Tensor Analysis and EEG classificationPrincipal Component Analysis for Tensor Analysis and EEG classification
Principal Component Analysis for Tensor Analysis and EEG classification
Tatsuya Yokota
 
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij (Stepan Douplii)
 
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
CSCJournals
 
Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s method
IAEME Publication
 
ON OPTIMIZATION OF MANUFACTURING OF FIELD-EFFECT HETERO TRANSISTORS A THREE S...
ON OPTIMIZATION OF MANUFACTURING OF FIELD-EFFECT HETERO TRANSISTORS A THREE S...ON OPTIMIZATION OF MANUFACTURING OF FIELD-EFFECT HETERO TRANSISTORS A THREE S...
ON OPTIMIZATION OF MANUFACTURING OF FIELD-EFFECT HETERO TRANSISTORS A THREE S...
jedt_journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Hierarchical clustering
Hierarchical clusteringHierarchical clustering
Hierarchical clustering
ishmecse13
 
graph theory
graph theorygraph theory
graph theory
Shashank Singh
 

Similar to Compact routing peleg paper (20)

DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
 
1568973267 effect of multi-tone
1568973267 effect of multi-tone1568973267 effect of multi-tone
1568973267 effect of multi-tone
 
Mm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithmsMm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithms
 
Edge linking hough transform
Edge linking hough transformEdge linking hough transform
Edge linking hough transform
 
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULLADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
K-means Clustering Algorithm with Matlab Source code
K-means Clustering Algorithm with Matlab Source codeK-means Clustering Algorithm with Matlab Source code
K-means Clustering Algorithm with Matlab Source code
 
Transport and routing on coupled spatial networks
Transport and routing on coupled spatial networksTransport and routing on coupled spatial networks
Transport and routing on coupled spatial networks
 
Optimisation random graph presentation
Optimisation random graph presentationOptimisation random graph presentation
Optimisation random graph presentation
 
Principal Component Analysis for Tensor Analysis and EEG classification
Principal Component Analysis for Tensor Analysis and EEG classificationPrincipal Component Analysis for Tensor Analysis and EEG classification
Principal Component Analysis for Tensor Analysis and EEG classification
 
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
 
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
 
Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s method
 
ON OPTIMIZATION OF MANUFACTURING OF FIELD-EFFECT HETERO TRANSISTORS A THREE S...
ON OPTIMIZATION OF MANUFACTURING OF FIELD-EFFECT HETERO TRANSISTORS A THREE S...ON OPTIMIZATION OF MANUFACTURING OF FIELD-EFFECT HETERO TRANSISTORS A THREE S...
ON OPTIMIZATION OF MANUFACTURING OF FIELD-EFFECT HETERO TRANSISTORS A THREE S...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Hierarchical clustering
Hierarchical clusteringHierarchical clustering
Hierarchical clustering
 
graph theory
graph theorygraph theory
graph theory
 

More from Meenakshi Tripathi

Cryptoppt
CryptopptCryptoppt
Compactrouting
CompactroutingCompactrouting
Compactrouting
Meenakshi Tripathi
 
Warmhole routing ppt
Warmhole routing pptWarmhole routing ppt
Warmhole routing ppt
Meenakshi Tripathi
 
Thorup zwick compactrouting scheme
Thorup zwick compactrouting schemeThorup zwick compactrouting scheme
Thorup zwick compactrouting scheme
Meenakshi Tripathi
 
Cowen2006 vrsn1
Cowen2006 vrsn1Cowen2006 vrsn1
Cowen2006 vrsn1
Meenakshi Tripathi
 
Linear programming ppt
Linear programming pptLinear programming ppt
Linear programming ppt
Meenakshi Tripathi
 
Internet hyperbolic mapping paper by Krioukov
Internet hyperbolic mapping paper by KrioukovInternet hyperbolic mapping paper by Krioukov
Internet hyperbolic mapping paper by Krioukov
Meenakshi Tripathi
 

More from Meenakshi Tripathi (7)

Cryptoppt
CryptopptCryptoppt
Cryptoppt
 
Compactrouting
CompactroutingCompactrouting
Compactrouting
 
Warmhole routing ppt
Warmhole routing pptWarmhole routing ppt
Warmhole routing ppt
 
Thorup zwick compactrouting scheme
Thorup zwick compactrouting schemeThorup zwick compactrouting scheme
Thorup zwick compactrouting scheme
 
Cowen2006 vrsn1
Cowen2006 vrsn1Cowen2006 vrsn1
Cowen2006 vrsn1
 
Linear programming ppt
Linear programming pptLinear programming ppt
Linear programming ppt
 
Internet hyperbolic mapping paper by Krioukov
Internet hyperbolic mapping paper by KrioukovInternet hyperbolic mapping paper by Krioukov
Internet hyperbolic mapping paper by Krioukov
 

Recently uploaded

Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

Compact routing peleg paper

  • 1. Proximity Preserving Labeling Schemes and Their Applications By – David Peleg Presented By – Meenakshi Tripathi
  • 2. Here comes your footer  Page 2 Features  Aims to label vertices of a graph s.t. distance b/w any two vertices inferred from inspecting the labels – Proximity Preserving labeling  For n vertex weighted trees with M bit edge weights, label size O(Mlogn+log2 n) bit .  Based on use of Tree Separators ( Vertex whose removal breaks Tree T into disconnected subtrees of atmost n/2 vertices each) .  Labeling Scheme uses O(Mlogn + log2 n) bit labes, where M is maximum bits to represent edge weight in the graph. General details
  • 3. Here comes your footer  Page 3 The Labeling System The procedure recursively partitions the tree by finding a separator. For eg. in the tree T depicted in Fig. (a,0,0)a b dc (a,1,1) (a,1,3) (a,1,2) (b,0,0) (d,0,0) (c,0,0)
  • 4. Labeling Algorithm : Proc1 Label Description  If subtree T’ has a single vertex v0 then it is labeled as (I(v0), 0, 0).  Tree separator v0 labeled as (I(v0), 0, 0).  J(v)=(I(v0), dist(v,v0,T), i).  If vertex v is internal to subtrees at level p-1 and becomes separator at level p then Label(v)= J1(v) . J2(v)…….Jp(v) Label consists of p triples Subtree T2 Subtree T1
  • 5. Distance Finding Algorithm  Proc2 Computing the Distances–  If Label(u) = J1(u) . J2(u)…….Jp(u) and Label(v)= J1(v) . J2(v)…….Jp(v) Finding dT(u,v) given Label(u) and Label(v) – Proc2 1. p = 1: /* v is the separator */ Return the 2nd field in J1(u). 2. q = 1: /* u is the separator */ Return the 2nd field in J1(v). 3. p; q > 1: Let J1(u) = (I(w) ; dist(u;w; T ) ; i) & J1(v) = (I(w) ; dist(v;w; T) ; j) for some i; j. There are two subcases to consider. (a) i # j: /* u and v belong to different subtrees */ Return the sum of the 2nd field in J1(u) and J1(v). (b) i = j: /* u and v belong to the same subtree */ Then do the following: i. Peel of the 1st triple J1(u) from Label(u), and the triple J1(v) from Label(v), remaining with Labeli(u) = J2(u) : : : Jq(u) Labeli(v) = J2(v) : : : Jp(v) ; ii. Invoke procedure Proc2 recursively on Labeli(u) and Labeli(v) to compute dist(u; v; Ti); iii. Return this value. Root Case Find distance on different subtrees only else discard the triplet
  • 6. Distance approx. labelings Distance- Approximating Labelings  Tree cover is of graph G is defined as a special collection of trees in the graph, containing all vertices in G.  l neighborhood of a vertex v V is collection of vertices at distance l or less from it in∈ G , Tl(v)={w | dist(w,v,G)<=l}  Given a weighted graph G=(V,E,w) an l tree cover is a collection TC of trees in G, s.t. for every v V∈ ∃ a tree T TC that spans the entire l –neighborhood T∈ l(v) is subset of V(T).  Depth(TC) =max T TC∈ {Depth(T)},  Overlap of TC is maximum, over all vertices of v, of the number of different trees containing v , Overlap(TC) = max v V∈ |{T TC |∈ v V(T)}|∈ Uses Tree Covers
  • 7. Here comes your footer  Page 7 Labeling System Using all tree cover
  • 8. Here comes your footer  Page 8 Distance Estimation Algorithm

Editor's Notes

  1. Achieves stretch (1, d) using O(elog2n) bit local Routing tables &amp; message headers. TZ achieves (3,0) stretch with O(n^1/2 log 2 n) table size Hybrid Scheme achieves stretch min { (1,d), (3,0)}
  2. Tree cover – Data struc to speedup nearest neighbor search, tree = hierarchy of levels; level c associated with i decreases by 1 as tree is descended. Properties of level C : 1) Nesting C i IS SUBSET OF C i-1 2) for all q ∈ C i-1 there exist p ∈ C i s.t. dis p.q&lt;=2^i and only one such p, called parent of q; 3) Separation : for all p,q ∈ C i , dis p.q &gt; 2^i