2002
DOI: 10.1016/s0012-365x(01)00357-0
|View full text |Cite
|
Sign up to set email alerts
|

On strongly identifying codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2002
2002
2017
2017

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 53 publications
(27 citation statements)
references
References 0 publications
0
27
0
Order By: Relevance
“…An identifying code is similar to an OLD, but considers the closed neighborhood of a node v V. Thus, it assumes no malfunction of a detector, a node in D. The requirements for an identifying code are similar to those given in the first section, but are for N [v] = N(v) v. A strongly identifying code, as discussed in [4], on a graph, G, must be able to identify a node with an event whether or not a detection system installed at that node fails to function. Thus, it must simultaneously satisfy the requirements of an identifying code and an OLD.…”
Section: Ilp For Cold Generationmentioning
confidence: 99%
“…An identifying code is similar to an OLD, but considers the closed neighborhood of a node v V. Thus, it assumes no malfunction of a detector, a node in D. The requirements for an identifying code are similar to those given in the first section, but are for N [v] = N(v) v. A strongly identifying code, as discussed in [4], on a graph, G, must be able to identify a node with an event whether or not a detection system installed at that node fails to function. Thus, it must simultaneously satisfy the requirements of an identifying code and an OLD.…”
Section: Ilp For Cold Generationmentioning
confidence: 99%
“…We provide an infinite sequence of optimal strongly (1, ≤ l)-identifying codes for every l ≥ 3. The case l = 1 is examined in [9] and no infinite family of optimal codes is known in that case. If l = 2 there exist two infinite families of strongly (1, ≤ 2)-identifying codes [13].…”
Section: A Code C Is Strongly (T ≤ L)-identifying If and Only Ifmentioning
confidence: 99%
“…If this is not the case, that is, malfunctioning processors may send '1' or '0' regardless of their state (which is '1'), then we must require more from the code in order to locate the faulty processors in this case. This situation can be handled with the following concept of strong identification introduced in [9,10,13].…”
Section: Introductionmentioning
confidence: 99%
“…When a detection device at vertex v can determine if an intruder is in N (v) but will not/can not report if the intruder is at v itself, then we are interested in open-locating-dominating sets as introduced for the k-cubes Q k by Honkala, Laihonen and Ranto [21] and for all graphs by Seo and Slater [26,27]. An open dominating set S ⊆ V (G) is an open-locating-dominating set if for all u and v in V (G) one has u).…”
Section: Introductionmentioning
confidence: 99%
“…A graph G has an open-locating-dominating set when no two vertices have the same open neighborhood, and OLD(G) is the minimum cardinality of such a set. See, for example, [5,16,21,28,29,30,31,32,33]. Lobstein [24] maintains a bibliography, currently with more than 300 entries, for work on these topics.…”
Section: Introductionmentioning
confidence: 99%