skip to main content
article
Free Access

Planar graph decomposition and all pairs shortest paths

Published:03 January 1991Publication History
Skip Abstract Section

Abstract

An algorithm is presented for generating a succinct encoding of all pairs shortest path information in a directed planar graph G with real-valued edge costs but no negative cycles. The algorithm runs in O(pn) time, where n is the number of vertices in G, and p is the minimum cardinality of a subset of the faces that cover all vertices, taken over all planar embeddings of G. The algorithm is based on a decomposition of the graph into O(pn) outerplanar subgraphs satisfying certain separator properties. Linear-time algorithms are presented for various subproblems including that of finding an appropriate embedding of G and a corresponding face-on-vertex covering of cardinality O(p), and of generating all pairs shortest path information in a directed outerplannar graph.

References

  1. 1 AHO. A. V., HOPCROFT, J. E., AND ULLMAN, J. D. The Design and Analysis of Computer Algorithms, Addison-Wesley, Reading, Mass., 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 BAKER, B. S. Approximation algorithms for NP-complete problems on planar graphs (prehmirmry version). In Proceedings of the 24th IEEE Symposium on Foundations of Computer Science (Tucson). IEEE, New York. 1983, pp. 265-273.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 BIENSTOCK.D., AND MONMA, C. L. On the complexity of covering vertices by faces in a planar graph. SIAM J Comput. 17(1988), 53-76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 BOOTH, K. S., AND LUEKER, G. S. Testing for the consecutive ones property, interval graphs, and graph plananty using PQ-tree algorithms. J. Comput. Syst. Sci 13(1976), 335-379.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 DEO, N., AND PANG, C. Shortest-path algorithms: Taxonomy and annotation. Networks 14 (1984). 275-323.Google ScholarGoogle Scholar
  6. 6 DIJKSTRA, E. W. A note on two problems in connexion with graphs. Numerische Math, 1 (1959). 269-271.Google ScholarGoogle Scholar
  7. 7 EVEN, S., AND TARJAN. R. E. Computing an st-numbenng. Theor. Comput, Sci. 2 (1976), 339-344.Google ScholarGoogle Scholar
  8. 8 FELLOWS, M. R., AND LANGSTON. M. A. Nonconstructive advances in polynomial-time complexity. Inf. Proc Lett. 26 (1987-88), 157-162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 FLOYD. R. W. Algorithm 97: Shortest path. Commun. ACM 5 (1962), 345. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 FREDERICKSON. G. N. Implicit data structures for the dictionary problem. J. ACM 30, 1, (Jan. 1983), 80-94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 FREDERICKSON, G. N. Fast algorithms for shortest paths in planar graphs, with applications. SIAM J. Comput. 16 (1987), 1004-1022. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12 FREDERICKSON, G. N., AND JANARDAN, R. Designing networks with compact routing tables. Algorithmica 3 (1988), 171-190.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13 FREDERICKSON, G. N., AND JANARDAN, R. Efficient message routing in planar networks. SIAM J. Comput, 18 (1989), 843-857. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14 FREDMAN, M. L. New bounds on the complexity of the shortest path problem. SIAM J. Comput 5 (1976), 83-89.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15 FREDMAN, M. L., AND TARJAN, R. E. Fibonacci heaps and their uses in improved network optimization algorithms. J. ACM 34, 3 (July 1987), 596-615. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16 GAJEWSKA, H., AND TARJAN, R.E. Deques with heap order. Inf. Proc Lett. 22(1986), 197-200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17 HARARY, F. Graph Theory. Addison-Wesley, Reading Mass., 1969.Google ScholarGoogle Scholar
  18. 18 HOPCROFT, J. E., AND TARJAN, R. E. Dividing a graph into triconnected components. SIAM J. Comput 2(1973), 135-158.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19 HOPCROFT, J. E., AND TARJAN, R. E. Efiiclent plananty testing. J. ACM 21, 4 (Oct. 1974), 549-568. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20 MUNRO, J. I., AND SUWANDA, H. Implicit data structures for fast search and update. J. Comput. Syst. Sci. 21 (1980), 236-250.Google ScholarGoogle ScholarCross RefCross Ref
  21. 21 SANTORO, N., AND KHATIB, R. Labelling and implicit routing inf networks Comput J. 28 (1985), 5-8.Google ScholarGoogle Scholar
  22. 22 VAN LEEUWEN, J., AND TAN, R. B. Computer networks with compact routing tables. In G. Rosenberg and A. Salomaa, Eds. The Book of L. Springer-Verlag, New York, 1986. pp. 259-273.Google ScholarGoogle Scholar
  23. 23 MARSHALL, S. A theorem on Boolean matrices. J. ACM, 1 (Jan. 1962), 11-12. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Planar graph decomposition and all pairs shortest paths

      Recommendations

      Reviews

      William Fennell Smyth

      Let G denote a directed planar graph of order n with real edge weights and no negative cycles, and let G denote an embedding of G in the plane. A face-on-vertex covering (FOVC) of G is a set of faces of G that cover all vertices of G. Let p denote the minimum cardinality of any FOVC over all embeddings of G. This paper describes a method of computing all pairs shortest path data for G in time O ( pn ). The shortest path data are encoded into routing tables, which are based on a naming of the vertices of G with distinct integers in [1, n ]. For each vertex v , these tables give the label of each arc vw , that is, a list of ranges of names of vertices, each of which has a shortest path from v that begins with arc vw . The method breaks down into two main phases. The first phase takes O ( n ) time to find an embedding G of G and an FOVC of G that is of cardinality q 4 p . This phase uses a generic algorithm for NP-hard problems that, given an embedding G , yields an FOVC of cardinality less than twice that of a minimum-cardinality FOVC of G . The second phase generates routing tables for G based on a given embedding G and corresponding FOVC of cardinality q. This phase consists of five main steps: Name the vertices of G in clockwise order around each face of the FOVC. This step requires O ( n ) time. Decompose G into q hammocks (subgraphs of G consisting of exactly two disjoint simple paths together with additional edges joining vertices in one path to vertices in the other). Each hammock has exactly four attachment vertices (the ends of the two paths) that connect it to the rest of G . This step requires O ( n ) time. Compute the shortest paths between every pair of attachment vertices, using a technique for hammock compression and the monotonicity of a certain distance function over the faces of a planar graph. This step requires O ( q 2 ) time. Using the shortest path data for attachment vertices, compute routing tables for all shortest paths from vertices in one hammock to vertices in another. This step requires O ( qn ) time. Employing an algorithm to compute shortest paths in outer planar graphs (those for which q = 1), and making use of deques with heap order, compute routing tables for all shortest paths between vertices in a single hammock. This step requires O ( n ) time. For anyone interested in planar graphs or shortest path problems, this paper is important. It combines many new insights with a variety of results that have appeared over the last decade to produce a lengthy and intricate algorithm of major theoretical interest. The paper is not easy to read, but the exposition is well organized and, with one or two minor lapses, clear. Examples and figures are used to good effect.

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Journal of the ACM
        Journal of the ACM  Volume 38, Issue 1
        Jan. 1991
        254 pages
        ISSN:0004-5411
        EISSN:1557-735X
        DOI:10.1145/102782
        Issue’s Table of Contents

        Copyright © 1991 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 January 1991
        Published in jacm Volume 38, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader