Franklin Kenter
Rice University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Franklin Kenter.
Journal of Combinatorial Optimization | 2017
Daniela Ferrero; Leslie Hogben; Franklin Kenter; Michael Young
We present a counterexample to a lower bound for the power domination number given in Liao (J Comb Optim 31:725–742, 2016). We also define the power propagation time, using the power domination propagation ideas in Liao and the (zero forcing) propagation time in Hogben et al. (Discrete Appl Math 160:1994–2005, 2012).
Mathematics Magazine | 2015
Christopher Cox; Jessica De Silva; Philip Deorsey; Franklin Kenter; Troy Retter; Josh Tobin
Summary The game of Hanabi is a multiplayer cooperative card game that has many similarities to a mathematical “hat guessing game.” In Hanabi, a player does not see the cards in her own hand and must rely on the actions of the other players to determine information about her cards. This article presents two strategies for Hanabi. These strategies use different encoding schemes, based on ideas from network coding, to efficiently relay information. The first strategy allows players to effectively recommend moves for other players, and the second strategy allows players to determine the contents of their hands. Results from computer simulations demonstrate that both strategies perform well. In particular, the second strategy achieves a perfect score more than 75 percent of the time.
Discrete Mathematics | 2017
Daniela Ferrero; Leslie Hogben; Franklin Kenter; Michael Young
Abstract Zero forcing and power domination are iterative processes on graphs where an initial set of vertices are observed, and additional vertices become observed based on some rules. In both cases, the goal is to eventually observe the entire graph using the fewest number of initial vertices. The concept of k -power domination was introduced by Chang et al. (2012) as a generalization of power domination and standard graph domination. Independently, k -forcing was defined by Amos et al. (2015) to generalize zero forcing. In this paper, we combine the study of k -forcing and k -power domination, providing a new approach to analyze both processes. We give a relationship between the k -forcing and the k -power domination numbers of a graph that bounds one in terms of the other. We also obtain results using the contraction of subgraphs that allow the parallel computation of k -forcing and k -power dominating sets.
Operations Research Letters | 2016
Franklin Kenter
The minimum rank problem asks to find the minimum rank over all matrices with a given pattern associated with a graph. This problem is NP-hard, and there is no known approximation method. Further, this problem has no straightforward convex relaxation. In this article, a numerical algorithm is given to heuristically approximate the minimum rank using alternating projections. The effectiveness of this algorithm is demonstrated by comparing its results to a related parameter: the zero-forcing number. Using these methods, numerical evidence for the minimum rank graph complement conjecture is provided.
congress on evolutionary computation | 2016
Franklin Kenter; Emily Meigs
We investigate Extortionate Zero Determinant (EZD) strategies for the iterated prisoners dilemma (IPD) against random memory-based strategies without mutation. These strategies are randomly-generated deterministic instructions with a predetermined average level of cooperation. While EZD strategies generally outperform any single evolutionary opponent, we show that under certain conditions EZD strategies can be taken over by a small number of randomly-generated deterministic strategies and force the EZD to extinction. We demonstrate that a major determining factor contributing to this phenomena is the maximum score among all non-EZD strategies when playing against itself. In contrast, we theoretically analyze the IPD consisting of an EZD strategy and a purely random one that cooperates each round with a predetermined probability. In this latter case, the EZD almost always prevails though the purely random player survives. In this sense, we conclude that even without mutation, it is still evolutionarily advantageous for the IPD to have a diverse initial random population.
Journal of Complex Networks | 2016
David Burstein; Franklin Kenter; Jeremy Kun; Feng Shi
Despite the large effort devoted to cybersecurity research over the last decades, cyber intrusions and attacks are still increasing. With respect to routing networks, route hijacking has highlighted the need to reexamine the existing protocols that govern traffic routing. In particular, our pri- mary question is how the topology of a network affects the susceptibility of a routing protocol to endogenous route misdirection. In this paper we define and analyze an abstract model of traffic interception (i.e. eavesdropping) in distance-vector routing networks. Specifically, we study al- gorithms that measure the potential of groups of dishonest agents to divert traffic through their infrastructure under the constraint that messages must reach their intended destinations. We relate two variants of our model based on the allowed kinds of lies, define strategies for colluding agents, and prove optimality in special cases. In our main theorem we derive a provably optimal monitoring strategy for subsets of agents in which no two are adjacent, and we extend this strategy to the general case. Finally, we use our results to analyze the susceptibility of real and synthetic networks to endogenous traffic interception. In the Autonomous Systems (AS) graph of the United States, we show that compromising only 18 random nodes in the AS graph surprisingly captures 10% of all traffic paths in the network in expectation when a distance-vector routing protocol is in use.
Electronic Journal of Linear Algebra | 2016
Keivan Hassani Monfared; Paul Horn; Franklin Kenter; Kathleen Nowak; John Sinkovic; Josh Tobin
The principal permanent rank characteristic sequence is a binary sequence
arXiv: Combinatorics | 2015
Randy Davila; Franklin Kenter
r_0 r_1 \ldots r_n
Linear Algebra and its Applications | 2016
Ghodratollah Aalipour; Aida Abiad; Zhanar Berikkyzy; Jay Cummings; Jessica De Silva; Wei Gao; Kristin Heysse; Leslie Hogben; Franklin Kenter; Jephian C. H. Lin; Michael J. Tait
where
Discrete Applied Mathematics | 2014
Fan R. K. Chung; Franklin Kenter
r_k = 1