9,874 research outputs found

    Protecting a Graph with Mobile Guards

    Full text link
    Mobile guards on the vertices of a graph are used to defend it against attacks on either its vertices or its edges. Various models for this problem have been proposed. In this survey we describe a number of these models with particular attention to the case when the attack sequence is infinitely long and the guards must induce some particular configuration before each attack, such as a dominating set or a vertex cover. Results from the literature concerning the number of guards needed to successfully defend a graph in each of these problems are surveyed.Comment: 29 pages, two figures, surve

    Semitotal domination in trees

    Full text link
    In this paper, we study a parameter that is squeezed between arguably the two important domination parameters, namely the domination number, γ(G)\gamma(G), and the total domination number, γt(G)\gamma_t(G). A set SS of vertices in GG is a semitotal dominating set of GG if it is a dominating set of GG and every vertex in S is within distance 22 of another vertex of SS. The semitotal domination number, γt2(G)\gamma_{t2}(G), is the minimum cardinality of a semitotal dominating set of GG. We observe that γ(G)γt2(G)γt(G)\gamma(G)\leq \gamma_{t2}(G)\leq \gamma_t(G). In this paper, we give a lower bound for the semitotal domination number of trees and we characterize the extremal trees. In addition, we characterize trees with equal domination and semitotal domination numbers.Comment: revise

    Distances and Domination in Graphs

    Get PDF
    This book presents a compendium of the 10 articles published in the recent Special Issue “Distance and Domination in Graphs”. The works appearing herein deal with several topics on graph theory that relate to the metric and dominating properties of graphs. The topics of the gathered publications deal with some new open lines of investigations that cover not only graphs, but also digraphs. Different variations in dominating sets or resolving sets are appearing, and a review on some networks’ curvatures is also present

    Secure domination number of kk-subdivision of graphs

    Full text link
    Let G=(V,E)G=(V,E) be a simple graph. A dominating set of GG is a subset DVD\subseteq V such that every vertex not in DD is adjacent to at least one vertex in DD. The cardinality of a smallest dominating set of GG, denoted by γ(G)\gamma(G), is the domination number of GG. A dominating set DD is called a secure dominating set of GG, if for every uVDu\in V-D, there exists a vertex vDv\in D such that uvEuv \in E and D{v}{u}D-\{v\}\cup\{u\} is a dominating set of GG. The cardinality of a smallest secure dominating set of GG, denoted by γs(G)\gamma_s(G), is the secure domination number of GG. For any kNk \in \mathbb{N}, the kk-subdivision of GG is a simple graph G1kG^{\frac{1}{k}} which is constructed by replacing each edge of GG with a path of length kk. In this paper, we study the secure domination number of kk-subdivision of GG.Comment: 10 Pages, 8 Figure

    Total protection in graphs

    Get PDF
    Suposem que una o diverses entitats estan situades en alguns dels vèrtexs d'un graf simple, i que una entitat situada en un vèrtex es pot ocupar d'un problema en qualsevol vèrtex del seu entorn tancat. En general, una entitat pot consistir en un robot, un observador, una legió, un guàrdia, etc. Informalment, diem que un graf està protegit sota una determinada ubicació d'entitats si hi ha almenys una entitat disponible per tractar un problema en qualsevol vèrtex. S'han considerat diverses estratègies (o regles d'ubicació d'entitats), sota cadascuna de les quals el graf es considera protegit. Aquestes estratègies de protecció de grafs s'emmarquen en la teoria de la dominació en grafs, o en la teoria de la dominació segura en grafs. En aquesta tesi, introduïm l'estudi de la w-dominació (segura) en grafs, el qual és un enfocament unificat a la idea de protecció de grafs, i que engloba variants conegudes de dominació (segura) en grafs i introdueix de noves. La tesi està estructurada com un compendi de deu articles, els quals han estat publicats en revistes indexades en el JCR. El primer està dedicat a l'estudi de la w-dominació, el cinquè a l'estudi de la w-dominació segura, mentre que els altres treballs estan dedicats a casos particulars d'estratègies de protecció total. Com és d'esperar, el nombre mínim d'entitats necessàries per a la protecció sota cada estratègia és d'interès. En general, s'obtenen fórmules tancades o fites ajustades sobre els paràmetres estudiats.Supongamos que una o varias entidades están situadas en algunos de los vértices de un grafo simple y que una entidad situada en un vértice puede ocuparse de un problema en cualquier vértice de su vecindad cerrada. En general, una entidad puede consistir en un robot, un observador, una legión, un guardia, etc. Informalmente, decimos que un grafo está protegido bajo una determinada ubicación de entidades si existe al menos una entidad disponible para tratar un problema en cualquier vértice. Se han considerado varias estrategias (o reglas de ubicación de entidades), bajo cada una de las cuales el grafo se considera protegido. Estas estrategias de protección de grafos se enmarcan en la teoría de la dominación en grafos, o en la teoría de la dominación segura en grafos. En esta tesis, introducimos el estudio de la w-dominación (segura) en grafos, el cual es un enfoque unificado a la idea de protección de grafos, y que engloba variantes conocidas de dominación (segura) en grafos e introduce otras nuevas. La tesis está estructurada como un compendio de diez artículos, los cuales han sido publicados en revistas indexadas en el JCR. El primero está dedicado al estudio de la w-dominación, el quinto al estudio de la w-dominación segura, mientras que los demás trabajos están dedicados a casos particulares de estrategias de protección total. Como es de esperar, el número mínimo de entidades necesarias para la protección bajo cada estrategia es de interés. En general, se obtienen fórmulas cerradas o cotas ajustadas sobre los parámetros estudiadosSuppose that one or more entities are stationed at some of the vertices of a simple graph and that an entity at a vertex can deal with a problem at any vertex in its closed neighbourhood. In general, an entity could consist of a robot, an observer, a legion, a guard, and so on. Informally, we say that a graph is protected under a given placement of entities if there exists at least one entity available to handle a problem at any vertex. Various strategies (or rules for entities placements) have been considered, under each of which the graph is deemed protected. These strategies for the protection of graphs are framed within the theory of domination in graphs, or in the theory of secure domination in graphs. In this thesis, we introduce the study of (secure) w-domination in graphs, which is a unified approach to the idea of protection of graphs, that encompasses known variants of (secure) domination in graphs and introduces new ones. The thesis is structured as a compendium of ten papers which have been published in JCR-indexed journals. The first one is devoted to the study of w-domination, the fifth one is devoted to the study of secure w-domination, while the other papers are devoted to particular cases of total protection strategies. As we can expect, the minimum number of entities required for protection under each strategy is of interest. In general, we obtain closed formulas or tight bounds on the studied parameters

    Trees with Unique Italian Dominating Functions of Minimum Weight

    Get PDF
    An Italian dominating function, abbreviated IDF, of GG is a function f ⁣:V(G){0,1,2}f \colon V(G) \rightarrow \{0, 1, 2\} satisfying the condition that for every vertex vV(G)v \in V(G) with f(v)=0f(v)=0, we have uN(v)f(u)2\sum_{u \in N(v)} f(u) \ge 2. That is, either vv is adjacent to at least one vertex uu with f(u)=2f(u) = 2, or to at least two vertices xx and yy with f(x)=f(y)=1f(x) = f(y) = 1. The Italian domination number, denoted γI\gamma_I(G), is the minimum weight of an IDF in GG. In this thesis, we use operations that join two trees with a single edge in order to build trees with unique γI\gamma_I-functions
    corecore