2013
DOI: 10.1016/j.amc.2013.05.060
|View full text |Cite
|
Sign up to set email alerts
|

Locating–dominating codes: Bounds and extremal cardinalities

Abstract: In this work, two types of codes such that they both dominate and locate the vertices of a graph are studied. Those codes might be sets of detectors in a network or processors controlling a system whose set of responses should determine a malfunctioning processor or an intruder. Here, we present our more significant contributions on λ-codes and η-codes concerning concerning bounds, extremal values and realization theorems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
38
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(39 citation statements)
references
References 15 publications
(12 reference statements)
0
38
0
1
Order By: Relevance
“…As a straight consequence of Proposition 4 (5), the following result is derived. [13] and [3] in S \ {1, 2} is {3}; and the neighborhood of vertices [1245] and [245] in S \ {1, 2} is {4, 5} (see Figure 3).…”
Section: The Graph Associated With a Distinguishing Setmentioning
confidence: 99%
See 1 more Smart Citation
“…As a straight consequence of Proposition 4 (5), the following result is derived. [13] and [3] in S \ {1, 2} is {3}; and the neighborhood of vertices [1245] and [245] in S \ {1, 2} is {4, 5} (see Figure 3).…”
Section: The Graph Associated With a Distinguishing Setmentioning
confidence: 99%
“…[15] [13] [34] [3] [1] Proposition 5. Let S be a distinguishing set of cardinality k of a connected graph G of order n. Let G S be its associated graph.…”
Section: The Graph Associated With a Distinguishing Setmentioning
confidence: 99%
“…For the situations when the sensor can distinguish whether the anomaly is in the open neighbourhood of the sensor or in the location of the sensor itself, we have locating-dominating codes which were introduced by Slater in [21,24,25] (for recent developments, see [2] and [20]). More precisely, a code C ⊆ V is locating-dominating in G if the identifying sets I(C; u) are nonempty and unique for all u ∈ V \ C. Inspired by self-identifying codes, we may analogously define so called self-locating-dominating codes, which have been introduced and motivated in [16].…”
Section: Introductionmentioning
confidence: 99%
“…Lemma 20. The code C L = {(2, 1, 3), (3, 1, 4), (4, 1, 2), (1, 2, 4), (3, 2, 1), (4, 2, 3), (1, 3, 2), (2, 3, 4), (4, 3, 1), (1,4,3), (2, 4, 1), (3,4,2)…”
Section: Introductionmentioning
confidence: 99%
“…Given a graph G, a set S ⊆ V (G) is a dominating set if every vertex not in S is adjacent to some vertex in S. A set S ⊆ V (G) is a locating-dominating set if S is a dominating set and N (u) ∩ S = N (v) ∩ S for every two different vertices u and v not in S. The location-domination number of G, denoted by λ(G), is the minimum cardinality of a locating-dominating set. In [8,27], bounds for this parameter are given. In this paper, merging the concepts studied in [11,39], we introduce the neighbor-locating colorings and the neighbor-locating chromatic number, and examine this parameter in some families of graphs.…”
mentioning
confidence: 99%