30 research outputs found

    Distance paired-domination problems on subclasses of chordal graphs

    Get PDF
    AbstractLet G=(V,E) be a graph without isolated vertices. For a positive integer k, a set S⊆V is a k-distance paired-dominating set if each vertex in V−S is within distance k of a vertex in S and the subgraph induced by S contains a perfect matching. In this paper, we present two linear time algorithms to find a minimum cardinality k-distance paired-dominating set in interval graphs and block graphs, which are two subclasses of chordal graphs. In addition, we present a characterization of trees with unique minimum k-distance paired-dominating set

    Linear-Time Algorithms for Maximum-Weight Induced Matchings and Minimum Chain Covers in Convex Bipartite Graphs

    Full text link
    A bipartite graph G=(U,V,E)G=(U,V,E) is convex if the vertices in VV can be linearly ordered such that for each vertex u∈Uu\in U, the neighbors of uu are consecutive in the ordering of VV. An induced matching HH of GG is a matching such that no edge of EE connects endpoints of two different edges of HH. We show that in a convex bipartite graph with nn vertices and mm weighted edges, an induced matching of maximum total weight can be computed in O(n+m)O(n+m) time. An unweighted convex bipartite graph has a representation of size O(n)O(n) that records for each vertex u∈Uu\in U the first and last neighbor in the ordering of VV. Given such a compact representation, we compute an induced matching of maximum cardinality in O(n)O(n) time. In convex bipartite graphs, maximum-cardinality induced matchings are dual to minimum chain covers. A chain cover is a covering of the edge set by chain subgraphs, that is, subgraphs that do not contain induced matchings of more than one edge. Given a compact representation, we compute a representation of a minimum chain cover in O(n)O(n) time. If no compact representation is given, the cover can be computed in O(n+m)O(n+m) time. All of our algorithms achieve optimal running time for the respective problem and model. Previous algorithms considered only the unweighted case, and the best algorithm for computing a maximum-cardinality induced matching or a minimum chain cover in a convex bipartite graph had a running time of O(n2)O(n^2)

    An introduction to integrated domination using K1’s and K2’s

    Get PDF
    1 online resource (xiii, 70 p.) : ill. (some col.)Includes abstract.Includes bibliographical references (p. 67-70).In Mathematics, graph theory is the study of graphs, which consist of a set of points, called vertices, and the connections between them, called edges. Domination is a subfield of this study, which looks at subsets of vertices in a graph that are adjacent to every other vertex in the graph. These subsets are called dominating sets. A vertex u is said to dominate a vertex v, if u is adjacent to v. The principal problem of domination is to find the smallest dominating set for a graph. Variations of domination exist, with the two standard types using K1’s (single vertices), or K2’s (paired vertices) as guards. To the best of our knowledge, we introduce the idea of integrating two different types of guards in one dominating set. Here, we look at the idea of dominating a graph using a combination of guards in the forms of K1’s and K2’s, and the problem of finding a minimum dominating set for this style of domination, which we call integrated domination. We look at a number of well-known variations of domination, and then characterize graphs and subgraphs where a minimum integrated dominating set can efficiently be found. As well, we present a bound for this style of domination, and then discuss further directions for this problem

    Graph Algorithms and Applications

    Get PDF
    The mixture of data in real-life exhibits structure or connection property in nature. Typical data include biological data, communication network data, image data, etc. Graphs provide a natural way to represent and analyze these types of data and their relationships. Unfortunately, the related algorithms usually suffer from high computational complexity, since some of these problems are NP-hard. Therefore, in recent years, many graph models and optimization algorithms have been proposed to achieve a better balance between efficacy and efficiency. This book contains some papers reporting recent achievements regarding graph models, algorithms, and applications to problems in the real world, with some focus on optimization and computational complexity

    Total protection in graphs

    Get PDF
    Suposem que una o diverses entitats estan situades en alguns dels vèrtexs d'un graf simple, i que una entitat situada en un vèrtex es pot ocupar d'un problema en qualsevol vèrtex del seu entorn tancat. En general, una entitat pot consistir en un robot, un observador, una legió, un guàrdia, etc. Informalment, diem que un graf està protegit sota una determinada ubicació d'entitats si hi ha almenys una entitat disponible per tractar un problema en qualsevol vèrtex. S'han considerat diverses estratègies (o regles d'ubicació d'entitats), sota cadascuna de les quals el graf es considera protegit. Aquestes estratègies de protecció de grafs s'emmarquen en la teoria de la dominació en grafs, o en la teoria de la dominació segura en grafs. En aquesta tesi, introduïm l'estudi de la w-dominació (segura) en grafs, el qual és un enfocament unificat a la idea de protecció de grafs, i que engloba variants conegudes de dominació (segura) en grafs i introdueix de noves. La tesi està estructurada com un compendi de deu articles, els quals han estat publicats en revistes indexades en el JCR. El primer està dedicat a l'estudi de la w-dominació, el cinquè a l'estudi de la w-dominació segura, mentre que els altres treballs estan dedicats a casos particulars d'estratègies de protecció total. Com és d'esperar, el nombre mínim d'entitats necessàries per a la protecció sota cada estratègia és d'interès. En general, s'obtenen fórmules tancades o fites ajustades sobre els paràmetres estudiats.Supongamos que una o varias entidades están situadas en algunos de los vértices de un grafo simple y que una entidad situada en un vértice puede ocuparse de un problema en cualquier vértice de su vecindad cerrada. En general, una entidad puede consistir en un robot, un observador, una legión, un guardia, etc. Informalmente, decimos que un grafo está protegido bajo una determinada ubicación de entidades si existe al menos una entidad disponible para tratar un problema en cualquier vértice. Se han considerado varias estrategias (o reglas de ubicación de entidades), bajo cada una de las cuales el grafo se considera protegido. Estas estrategias de protección de grafos se enmarcan en la teoría de la dominación en grafos, o en la teoría de la dominación segura en grafos. En esta tesis, introducimos el estudio de la w-dominación (segura) en grafos, el cual es un enfoque unificado a la idea de protección de grafos, y que engloba variantes conocidas de dominación (segura) en grafos e introduce otras nuevas. La tesis está estructurada como un compendio de diez artículos, los cuales han sido publicados en revistas indexadas en el JCR. El primero está dedicado al estudio de la w-dominación, el quinto al estudio de la w-dominación segura, mientras que los demás trabajos están dedicados a casos particulares de estrategias de protección total. Como es de esperar, el número mínimo de entidades necesarias para la protección bajo cada estrategia es de interés. En general, se obtienen fórmulas cerradas o cotas ajustadas sobre los parámetros estudiadosSuppose that one or more entities are stationed at some of the vertices of a simple graph and that an entity at a vertex can deal with a problem at any vertex in its closed neighbourhood. In general, an entity could consist of a robot, an observer, a legion, a guard, and so on. Informally, we say that a graph is protected under a given placement of entities if there exists at least one entity available to handle a problem at any vertex. Various strategies (or rules for entities placements) have been considered, under each of which the graph is deemed protected. These strategies for the protection of graphs are framed within the theory of domination in graphs, or in the theory of secure domination in graphs. In this thesis, we introduce the study of (secure) w-domination in graphs, which is a unified approach to the idea of protection of graphs, that encompasses known variants of (secure) domination in graphs and introduces new ones. The thesis is structured as a compendium of ten papers which have been published in JCR-indexed journals. The first one is devoted to the study of w-domination, the fifth one is devoted to the study of secure w-domination, while the other papers are devoted to particular cases of total protection strategies. As we can expect, the minimum number of entities required for protection under each strategy is of interest. In general, we obtain closed formulas or tight bounds on the studied parameters

    36th International Symposium on Theoretical Aspects of Computer Science: STACS 2019, March 13-16, 2019, Berlin, Germany

    Get PDF
    corecore