Perturbation results for distance-edge-monitoring numbers
Pith reviewed 2026-05-24 09:49 UTC · model grok-4.3
The pith
Deleting an edge from any graph increases its distance-edge-monitoring number by at most 2.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The central claim is that dem(G-e) − dem(G) ≤ 2 holds for every graph G and every edge e, with the bound sharp. The proof proceeds by examining how the removal of e affects the shortest-path containment relations that define which vertices monitor which edges.
What carries the argument
A distance-edge-monitoring set: a vertex subset M such that every edge lies on all shortest paths between some monitor in M and some other vertex.
If this is right
- A network can be kept monitored after any single link failure by adding at most two extra monitors.
- Vertex failures may demand arbitrarily many new monitors, so vertex and edge robustness differ sharply.
- The monitoring number of a subgraph need not be close to that of the host graph.
- An algorithm exists that decides, after any edge deletion, whether a candidate set still satisfies the monitoring property.
Where Pith is reading between the lines
- Designers of failure-tolerant networks may focus monitoring resources on edge stability rather than vertex stability.
- It would be useful to characterize the graphs that attain the +2 increase.
- The algorithmic check could be extended to dynamic settings where edges are added or removed repeatedly.
Load-bearing premise
The monitoring condition is defined using the standard shortest-path distances that remain after a single edge is deleted.
What would settle it
Any graph in which deleting one edge forces the addition of three or more new monitors to restore coverage of every remaining edge.
Figures
read the original abstract
Foucaud et al. recently introduced and initiated the study of a new graph-theoretic concept in the area of network monitoring. Given a graph $G=(V(G), E(G))$, a set $M \subseteq V(G)$ is a distance-edge-monitoring set if for every edge $e \in E(G)$, there is a vertex $x \in M$ and a vertex $y \in V(G)$ such that the edge $e$ belongs to all shortest paths between $x$ and $y$. The smallest size of such a set in $G$ is denoted by $\operatorname{dem}(G)$. Denoted by $G-e$ (resp. $G \backslash u$) the subgraph of $G$ obtained by removing the edge $e$ from $G$ (resp. a vertex $u$ together with all its incident edges from $G$). In this paper, we first show that $\operatorname{dem}(G-e)- \operatorname{dem}(G)\leq 2$ for any graph $G$ and edge $e \in E(G)$. Moreover, the bound is sharp. Next, we construct two graphs $G$ and $H$ to show that $\operatorname{dem}(G)-\operatorname{dem}(G\setminus u)$ and $\operatorname{dem}(H\setminus v)-\operatorname{dem}(H)$ can be arbitrarily large, where $u \in V(G)$ and $v \in V(H)$. We also study the relation between $\operatorname{dem}(H)$ and $\operatorname{dem}(G)$, where $H$ is a subgraph of $G$. In the end, we give an algorithm to judge whether the distance-edge monitoring set still remain in the resulting graph when any edge of the graph $G$ is deleted.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper studies perturbation effects on the distance-edge-monitoring number dem(G) of a graph G. It proves that dem(G-e) - dem(G) ≤ 2 for any graph G and edge e, with the bound sharp. It constructs families of graphs showing that dem can change by arbitrarily large amounts under vertex deletion (in both directions). It examines how dem behaves under taking subgraphs and concludes with an algorithm to decide whether a given distance-edge-monitoring set remains valid after an arbitrary edge deletion.
Significance. The edge-removal bound of +2 (with matching lower-bound examples) is a clean, useful result for a monitoring parameter whose definition rests only on shortest-path containment. The contrast with arbitrary changes under vertex deletion is informative. The subgraph monotonicity discussion and the decision algorithm are natural extensions. If the proofs are correct, the work strengthens the foundations of distance-edge-monitoring and supplies concrete tools for analyzing network robustness under small modifications.
minor comments (3)
- [Abstract] The abstract states that the bound is sharp but gives no hint of the extremal graphs; a one-sentence description of the construction (or a forward reference) would improve readability.
- [Algorithm section] In the algorithm section, the decision procedure is described in prose; adding pseudocode or a clear enumeration of the steps would make the procedure easier to implement and verify.
- [Throughout] Notation for the monitoring set M and the pair (x,y) is introduced early but occasionally reused without re-stating the containment condition; a short reminder sentence at the start of each technical section would help.
Simulated Author's Rebuttal
We thank the referee for the positive summary and recommendation of minor revision. No specific major comments appear in the report.
Circularity Check
No significant circularity in derivation chain
full rationale
The paper derives the bound dem(G-e) - dem(G) ≤ 2 directly from the definition of distance-edge-monitoring sets via shortest-path containment, with no fitted parameters, no self-referential definitions, and no load-bearing self-citations. All claims (including sharpness via explicit constructions and the decision algorithm) follow from standard graph operations and the initial concept introduced by Foucaud et al. (external citation). The derivation is self-contained against the given definitions and does not reduce any prediction to its inputs by construction.
Axiom & Free-Parameter Ledger
axioms (1)
- standard math Every pair of vertices in a connected graph has at least one shortest path.
Reference graph
Works this paper leans on
-
[1]
Network verification via routing table queries, J
Bampas E, Bil `o D, Drovandi G, Gual `a L, Klasing R, Proietti G. Network verification via routing table queries, J. Comput. System Sci., 2015. 81(1):234–248. doi:10.1016/j.jcss.2014.06.003
-
[2]
On the parameterized complexity of the edge monitoring problem, Inform
Baste J, Beggas F, Kheddouci H, Sau I. On the parameterized complexity of the edge monitoring problem, Inform. Process. Lett., 2017. 121:39–44. doi:10.1016/j.ipl.2017.01.008
-
[3]
Network discovery and verification, IEEE J
Beerliova Z, Eberhard F, Erlebach T, Hall A, Hoffmann M, Mihal´ak M, Ram LS. Network discovery and verification, IEEE J. Sel. Areas Commun. , 2006. 24(12):2168–2181. doi:10.1109/JSAC.2006.884015
-
[4]
Discovery of network properties with all-shortest-paths queries, Theoret
Bil `o D, Erlebach T, Mihal ´ak M, Widmayer P. Discovery of network properties with all-shortest-paths queries, Theoret. Comput. Sci., 2010. 411(14-15):1626–1637. doi:10.1016/j.tcs.2010.01.010
-
[5]
Graphs & digraphs, London: Chapman & Hall, 2015
Chartrand G, Lesniak L, Zhang P. Graphs & digraphs, London: Chapman & Hall, 2015. doi:10.1201/ b19731
work page 2015
-
[6]
The theory and applications of resolvability in graphs–A Survey, Congr
Chartrand G, Zhang P. The theory and applications of resolvability in graphs–A Survey, Congr . Numer .,
- [7]
-
[8]
Exploring networks with traceroute-like probes: Theory and simulations, Theoret
Dall’Asta L, Alvarez-Hamelin J, Barrat A, V ´azquez A, Vespignani A. Exploring networks with traceroute-like probes: Theory and simulations, Theoret. Comput. Sci., 2006. 355(1):6–24. doi:10.1016/ j.tcs.2005.12.009
work page 2006
-
[9]
The effect of vertex and edge deletion on the in- dependence number of graphs, F .E.J
Delen S, Zihni FE, Erdogan FO, Ayna HO, Cangul IN. The effect of vertex and edge deletion on the in- dependence number of graphs, F .E.J. of Appl. Math., 2022. 11(2):11–19. doi:10.17654/0972096022002
-
[10]
The effect of vertex or edge deletion on the metric dimension of graphs, J
Eroh L, Feit P, Kang C, Yi E. The effect of vertex or edge deletion on the metric dimension of graphs, J. Combin. Optim., 2015. 6(4):433–444. doi:10.4310/JOC.2015.v6.n4.a2. Ch. Yang et al. / Perturbation Results for Distance-edge-monitoring Numbers 163
-
[11]
Monitoring the edges of a graph using distances,Discrete Appl
Foucaud F, Kao S, Klasing R, Miller M, Ryan J. Monitoring the edges of a graph using distances,Discrete Appl. Math., 2022. 319:424–438. doi:10.1016/j.dam.2021.07.002
-
[12]
Heuristics for Internet map discovery, Proceedings IEEE INFOCOM
Govindan R, Tangmunarunkit H. Heuristics for Internet map discovery, Proceedings IEEE INFOCOM
-
[13]
Nineteenth Annual Joint Conference of the IEEE Com- puter and Communications Societies (Cat
Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Com- puter and Communications Societies (Cat. No.00CH37064), 2000 pp. 1371–1380
work page 2000
-
[14]
Erd˝os-Gallai-type problems for distance-edge-monitoring num- bers, Discrete Appl
Ji Z, Klasing R, Li W, Mao Y , Zhang X. Erd˝os-Gallai-type problems for distance-edge-monitoring num- bers, Discrete Appl. Math., 2024. 342:275–285
work page 2024
-
[15]
Monitoring the edges of product networks using distances, 2022
Li W, Klasing R, Mao Y , Ning B. Monitoring the edges of product networks using distances, 2022. arXiv:2211.10743
-
[16]
The effects of vertex deletion and edge deletion on the clique partition number, Ars Comb
Monson SD. The effects of vertex deletion and edge deletion on the clique partition number, Ars Comb. 42, 1996
work page 1996
-
[17]
The effect of vertex and edge deletion on the edge metric dimension of graphs
Wei M, Yue J, Chen L. The effect of vertex and edge deletion on the edge metric dimension of graphs. J. Comb. Optim., 2022. 44:331–342. doi:10.1007/s10878-021-00838-7
-
[18]
On the distance-edge-monitoring numbers of graphs,Discrete Appl
Yang C, Klasing R, Mao Y , Deng X. On the distance-edge-monitoring numbers of graphs,Discrete Appl. Math., 2024. 342:153–167. doi:10.1016/j.dam.2023.09.012
-
[19]
Distance-edge-monitoring numbers of networks, accepted by Acta Infor- matica
Yang G, Zhou J, He C, Mao Y . Distance-edge-monitoring numbers of networks, accepted by Acta Infor- matica
-
[20]
Diameter vulnerability of graphs by edge deletion,Discrete Math., 2009
Ye H, Yang C, Xu J. Diameter vulnerability of graphs by edge deletion,Discrete Math., 2009. 309:1001–
work page 2009
-
[21]
doi:10.1016/j.disc.2008.01.006
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.