1,902 research outputs found

    Algorithmic complexity of isolate secure domination in graphs

    Get PDF
    A dominating set S is an Isolate Dominating Set (IDS) if the induced subgraph G[S] has at least one isolated vertex. In this paper, we initiate the study of new domination parameter called, isolate secure domination. An isolate dominating set S subset of V is an isolate secure dominating set (ISDS), if for each vertex u is an element of V \ S, there exists a neighboring vertex v of u in S such that (S \ {v}) boolean OR {u} is an IDS of G. The minimum cardinality of an ISDS of G is called as an isolate secure domination number, and is denoted by gamma(0s) (G). We give isolate secure domination number of path and cycle graphs. Given a graph G = (V, E) and a positive integer k, the ISDM problem is to check whether G has an isolate secure dominating set of size at most k. We prove that ISDM is NP-complete even when restricted to bipartite graphs and split graphs. We also show that ISDM can be solved in linear time for graphs of bounded tree-width.Publisher's Versio

    Algorithmic aspects of disjunctive domination in graphs

    Full text link
    For a graph G=(V,E)G=(V,E), a set DVD\subseteq V is called a \emph{disjunctive dominating set} of GG if for every vertex vVDv\in V\setminus D, vv is either adjacent to a vertex of DD or has at least two vertices in DD at distance 22 from it. The cardinality of a minimum disjunctive dominating set of GG is called the \emph{disjunctive domination number} of graph GG, and is denoted by γ2d(G)\gamma_{2}^{d}(G). The \textsc{Minimum Disjunctive Domination Problem} (MDDP) is to find a disjunctive dominating set of cardinality γ2d(G)\gamma_{2}^{d}(G). Given a positive integer kk and a graph GG, the \textsc{Disjunctive Domination Decision Problem} (DDDP) is to decide whether GG has a disjunctive dominating set of cardinality at most kk. In this article, we first propose a linear time algorithm for MDDP in proper interval graphs. Next we tighten the NP-completeness of DDDP by showing that it remains NP-complete even in chordal graphs. We also propose a (ln(Δ2+Δ+2)+1)(\ln(\Delta^{2}+\Delta+2)+1)-approximation algorithm for MDDP in general graphs and prove that MDDP can not be approximated within (1ϵ)ln(V)(1-\epsilon) \ln(|V|) for any ϵ>0\epsilon>0 unless NP \subseteq DTIME(VO(loglogV))(|V|^{O(\log \log |V|)}). Finally, we show that MDDP is APX-complete for bipartite graphs with maximum degree 33

    Algorithmic Aspects of Secure Connected Domination in Graphs

    Full text link
    Let G=(V,E)G = (V,E) be a simple, undirected and connected graph. A connected dominating set SVS \subseteq V is a secure connected dominating set of GG, if for each uVS u \in V\setminus S, there exists vSv\in S such that (u,v)E(u,v) \in E and the set (S{v}){u}(S \setminus \{ v \}) \cup \{ u \} is a connected dominating set of GG. The minimum size of a secure connected dominating set of GG denoted by γsc(G) \gamma_{sc} (G), is called the secure connected domination number of GG. Given a graph G G and a positive integer k, k, the Secure Connected Domination (SCDM) problem is to check whether G G has a secure connected dominating set of size at most k. k. In this paper, we prove that the SCDM problem is NP-complete for doubly chordal graphs, a subclass of chordal graphs. We investigate the complexity of this problem for some subclasses of bipartite graphs namely, star convex bipartite, comb convex bipartite, chordal bipartite and chain graphs. The Minimum Secure Connected Dominating Set (MSCDS) problem is to find a secure connected dominating set of minimum size in the input graph. We propose a (Δ(G)+1) (\Delta(G)+1) - approximation algorithm for MSCDS, where Δ(G) \Delta(G) is the maximum degree of the input graph G G and prove that MSCDS cannot be approximated within (1ϵ)ln(V) (1 -\epsilon) ln(| V |) for any ϵ>0 \epsilon > 0 unless NPDTIME(VO(loglogV)) NP \subseteq DTIME(| V |^{O(log log | V |)}) even for bipartite graphs. Finally, we show that the MSCDS is APX-complete for graphs with Δ(G)=4\Delta(G)=4

    Guarding Networks Through Heterogeneous Mobile Guards

    Full text link
    In this article, the issue of guarding multi-agent systems against a sequence of intruder attacks through mobile heterogeneous guards (guards with different ranges) is discussed. The article makes use of graph theoretic abstractions of such systems in which agents are the nodes of a graph and edges represent interconnections between agents. Guards represent specialized mobile agents on specific nodes with capabilities to successfully detect and respond to an attack within their guarding range. Using this abstraction, the article addresses the problem in the context of eternal security problem in graphs. Eternal security refers to securing all the nodes in a graph against an infinite sequence of intruder attacks by a certain minimum number of guards. This paper makes use of heterogeneous guards and addresses all the components of the eternal security problem including the number of guards, their deployment and movement strategies. In the proposed solution, a graph is decomposed into clusters and a guard with appropriate range is then assigned to each cluster. These guards ensure that all nodes within their corresponding cluster are being protected at all times, thereby achieving the eternal security in the graph.Comment: American Control Conference, Chicago, IL, 201
    corecore