30 research outputs found
Distance paired-domination problems on subclasses of chordal graphs
AbstractLet G=(V,E) be a graph without isolated vertices. For a positive integer k, a set S⊆V is a k-distance paired-dominating set if each vertex in V−S is within distance k of a vertex in S and the subgraph induced by S contains a perfect matching. In this paper, we present two linear time algorithms to find a minimum cardinality k-distance paired-dominating set in interval graphs and block graphs, which are two subclasses of chordal graphs. In addition, we present a characterization of trees with unique minimum k-distance paired-dominating set
Linear-Time Algorithms for Maximum-Weight Induced Matchings and Minimum Chain Covers in Convex Bipartite Graphs
A bipartite graph is convex if the vertices in can be
linearly ordered such that for each vertex , the neighbors of are
consecutive in the ordering of . An induced matching of is a
matching such that no edge of connects endpoints of two different edges of
. We show that in a convex bipartite graph with vertices and
weighted edges, an induced matching of maximum total weight can be computed in
time. An unweighted convex bipartite graph has a representation of
size that records for each vertex the first and last neighbor
in the ordering of . Given such a compact representation, we compute an
induced matching of maximum cardinality in time.
In convex bipartite graphs, maximum-cardinality induced matchings are dual to
minimum chain covers. A chain cover is a covering of the edge set by chain
subgraphs, that is, subgraphs that do not contain induced matchings of more
than one edge. Given a compact representation, we compute a representation of a
minimum chain cover in time. If no compact representation is given, the
cover can be computed in time.
All of our algorithms achieve optimal running time for the respective problem
and model. Previous algorithms considered only the unweighted case, and the
best algorithm for computing a maximum-cardinality induced matching or a
minimum chain cover in a convex bipartite graph had a running time of
An introduction to integrated domination using K1’s and K2’s
1 online resource (xiii, 70 p.) : ill. (some col.)Includes abstract.Includes bibliographical references (p. 67-70).In Mathematics, graph theory is the study of graphs, which consist of a set of points, called vertices, and the connections between them, called edges. Domination is a subfield of this study, which looks at subsets of vertices in a graph that are adjacent to every other vertex in the graph. These subsets are called dominating sets. A vertex u is said to dominate a vertex v, if u is adjacent to v.
The principal problem of domination is to find the smallest dominating set for a graph. Variations of domination exist, with the two standard types using K1’s (single vertices), or K2’s (paired vertices) as guards.
To the best of our knowledge, we introduce the idea of integrating two different types of guards in one dominating set. Here, we look at the idea of dominating a graph using a combination of guards in the forms of K1’s and K2’s, and the problem of finding a minimum dominating set for this style of domination, which we call integrated domination.
We look at a number of well-known variations of domination, and then characterize graphs and subgraphs where a minimum integrated dominating set can efficiently be found. As well, we present a bound for this style of domination, and then discuss further directions for this problem
Graph Algorithms and Applications
The mixture of data in real-life exhibits structure or connection property in nature. Typical data include biological data, communication network data, image data, etc. Graphs provide a natural way to represent and analyze these types of data and their relationships. Unfortunately, the related algorithms usually suffer from high computational complexity, since some of these problems are NP-hard. Therefore, in recent years, many graph models and optimization algorithms have been proposed to achieve a better balance between efficacy and efficiency. This book contains some papers reporting recent achievements regarding graph models, algorithms, and applications to problems in the real world, with some focus on optimization and computational complexity
Total protection in graphs
Suposem que una o diverses entitats estan situades en alguns dels vèrtexs d'un graf simple, i que una entitat situada
en un vèrtex es pot ocupar d'un problema en qualsevol vèrtex del seu entorn tancat. En general, una entitat pot
consistir en un robot, un observador, una legió, un guà rdia, etc. Informalment, diem que un graf està protegit sota una
determinada ubicació d'entitats si hi ha almenys una entitat disponible per tractar un problema en qualsevol vèrtex.
S'han considerat diverses estratègies (o regles d'ubicació d'entitats), sota cadascuna de les quals el graf es considera
protegit. Aquestes estratègies de protecció de grafs s'emmarquen en la teoria de la dominació en grafs, o en la teoria
de la dominació segura en grafs.
En aquesta tesi, introduïm l'estudi de la w-dominació (segura) en grafs, el qual és un enfocament unificat a la idea de
protecció de grafs, i que engloba variants conegudes de dominació (segura) en grafs i introdueix de noves.
La tesi està estructurada com un compendi de deu articles, els quals han estat publicats en revistes indexades en el
JCR. El primer està dedicat a l'estudi de la w-dominació, el cinquè a l'estudi de la w-dominació segura, mentre que els
altres treballs estan dedicats a casos particulars d'estratègies de protecció total. Com és d'esperar, el nombre mÃnim
d'entitats necessà ries per a la protecció sota cada estratègia és d'interès. En general, s'obtenen fórmules tancades o
fites ajustades sobre els parà metres estudiats.Supongamos que una o varias entidades están situadas en algunos de los vértices de un grafo simple y que una
entidad situada en un vértice puede ocuparse de un problema en cualquier vértice de su vecindad cerrada. En general,
una entidad puede consistir en un robot, un observador, una legión, un guardia, etc. Informalmente, decimos que un
grafo está protegido bajo una determinada ubicación de entidades si existe al menos una entidad disponible para tratar
un problema en cualquier vértice. Se han considerado varias estrategias (o reglas de ubicación de entidades), bajo
cada una de las cuales el grafo se considera protegido. Estas estrategias de protección de grafos se enmarcan en la
teorÃa de la dominación en grafos, o en la teorÃa de la dominación segura en grafos.
En esta tesis, introducimos el estudio de la w-dominación (segura) en grafos, el cual es un enfoque unificado a la idea
de protección de grafos, y que engloba variantes conocidas de dominación (segura) en grafos e introduce otras
nuevas. La tesis está estructurada como un compendio de diez artÃculos, los cuales han sido publicados en revistas
indexadas en el JCR. El primero está dedicado al estudio de la w-dominación, el quinto al estudio de la w-dominación
segura, mientras que los demás trabajos están dedicados a casos particulares de estrategias de protección total.
Como es de esperar, el número mÃnimo de entidades necesarias para la protección bajo cada estrategia es de interés.
En general, se obtienen fórmulas cerradas o cotas ajustadas sobre los parámetros estudiadosSuppose that one or more entities are stationed at some of the vertices of a simple graph and that an entity at a vertex
can deal with a problem at any vertex in its closed neighbourhood. In general, an entity could consist of a robot, an
observer, a legion, a guard, and so on. Informally, we say that a graph is protected under a given placement of
entities if there exists at least one entity available to handle a problem at any vertex. Various strategies (or rules for
entities placements) have been considered, under each of which the graph is deemed protected. These strategies for
the protection of graphs are framed within the theory of domination in graphs, or in the theory of secure domination in
graphs.
In this thesis, we introduce the study of (secure) w-domination in graphs, which is a unified approach to the idea of
protection of graphs, that encompasses known variants of (secure) domination in graphs and introduces new ones.
The thesis is structured as a compendium of ten papers which have been published in JCR-indexed journals. The first
one is devoted to the study of w-domination, the fifth one is devoted to the study of secure w-domination, while the
other papers are devoted to particular cases of total protection strategies. As we can expect, the minimum number of
entities required for protection under each strategy is of interest. In general, we obtain closed formulas or tight bounds
on the studied parameters