2019
DOI: 10.37236/7828
|View full text |Cite
|
Sign up to set email alerts
|

On a Conjecture Regarding Identification in Hamming Graphs

Abstract: Identifying codes in graphs have been widely studied since their introduction by Karpovsky, Chakrabarty and Levitin in 1998. In particular, there are a lot of results regarding the binary hypercubes, that is, the Hamming graphs K n 2 . In 2008, Gravier et al. started investigating identification in K 2 q . Goddard and Wash, in 2013, studied identifying codes in the general Hamming graphs K n q . They stated, for instance, that γ ID (K n q ) ≤ q n−1 for any q and n ≥ 3. Moreover, they conjectured that γ ID (K 3… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…For more details and references, see the survey [TFL21]. We also note that Junnila, et al [JLL19] determine the minimum size of self-locating-dominating codes for the Hamming graphs H(3, q), which is a different problem but has a similar flavor to metric dimension.…”
Section: Introductionmentioning
confidence: 88%
“…For more details and references, see the survey [TFL21]. We also note that Junnila, et al [JLL19] determine the minimum size of self-locating-dominating codes for the Hamming graphs H(3, q), which is a different problem but has a similar flavor to metric dimension.…”
Section: Introductionmentioning
confidence: 88%
“…as seen in Inequality (9). Since additional codewords in I 3 (0) cannot increase the share of codewords in I(0), we assume that there are exactly n+ 1 codewords in I 3 (0).…”
Section: The First Boundmentioning
confidence: 99%
“…In particular, every identifying code is also a locating-dominating code. An interested reader may find more information about identifying codes, for example, in [1,2,7,9]. The best known bounds for the locating-dominating codes in F n have been presented in Table 1.…”
Section: Introductionmentioning
confidence: 99%