63 research outputs found

    Characterizing extremal digraphs for identifying codes and extremal cases of Bondy's theorem on induced subsets

    Full text link
    An identifying code of a (di)graph GG is a dominating subset CC of the vertices of GG such that all distinct vertices of GG have distinct (in)neighbourhoods within CC. In this paper, we classify all finite digraphs which only admit their whole vertex set in any identifying code. We also classify all such infinite oriented graphs. Furthermore, by relating this concept to a well known theorem of A. Bondy on set systems we classify the extremal cases for this theorem

    New results on metric-locating-dominating sets of graphs

    Get PDF
    A dominating set S of a graph is a metric-locating-dominating set if each vertex of the graph is uniquely distinguished by its distanc es from the elements of S , and the minimum cardinality of such a set is called the metri c-location- domination number. In this paper, we undertake a study that, in general graphs and specific families, relates metric-locating-dominatin g sets to other special sets: resolving sets, dominating sets, locating-dominating set s and doubly resolving sets. We first characterize classes of trees according to cer tain relationships between their metric-location-domination number and thei r metric dimension and domination number. Then, we show different methods to tran sform metric- locating-dominating sets into locating-dominating sets a nd doubly resolving sets. Our methods produce new bounds on the minimum cardinalities of all those sets, some of them involving parameters that have not been related so farPostprint (published version

    New results on metric-locating-dominating sets of graphs

    Get PDF
    A dominating set SS of a graph is a metric-locating-dominating set if each vertex of the graph is uniquely distinguished by its distances from the elements of SS, and the minimum cardinality of such a set is called the metric-location-domination number. In this paper, we undertake a study that, in general graphs and specific families, relates metric-locating-dominating sets to other special sets: resolving sets, dominating sets, locating-dominating sets and doubly resolving sets. We first characterize classes of trees according to certain relationships between their metric-location-domination number and their metric dimension and domination number. Then, we show different methods to transform metric-locating-dominating sets into locating-dominating sets and doubly resolving sets. Our methods produce new bounds on the minimum cardinalities of all those sets, some of them involving parameters that have not been related so far.Comment: 13 pages, 3 figure

    Bounds and extremal graphs for total dominating identifying codes

    Full text link
    An identifying code CC of a graph GG is a dominating set of GG such that any two distinct vertices of GG have distinct closed neighbourhoods within CC. The smallest size of an identifying code of GG is denoted γID(G)\gamma^{\text{ID}}(G). When every vertex of GG also has a neighbour in CC, it is said to be a total dominating identifying code of GG, and the smallest size of a total dominating identifying code of GG is denoted by γtID(G)\gamma_t^{\text{ID}}(G). Extending similar characterizations for identifying codes from the literature, we characterize those graphs GG of order nn with γtID(G)=n\gamma_t^{\text{ID}}(G)=n (the only such connected graph is P3P_3) and γtID(G)=n1\gamma_t^{\text{ID}}(G)=n-1 (such graphs either satisfy γID(G)=n1\gamma^{\text{ID}}(G)=n-1 or are built from certain such graphs by adding a set of universal vertices, to each of which a private leaf is attached). Then, using bounds from the literature, we remark that any (open and closed) twin-free tree of order nn has a total dominating identifying code of size at most 3n4\frac{3n}{4}. This bound is tight, and we characterize the trees reaching it. Moreover, by a new proof, we show that this bound actually holds for the larger class of all twin-free graphs of girth at least 5. The cycle C8C_8 also attains this bound. We also provide a generalized bound for all graphs of girth at least 5 (possibly with twins). Finally, we relate γtID(G)\gamma_t^{\text{ID}}(G) to the related parameter γID(G)\gamma^{\text{ID}}(G) as well as the location-domination number of GG and its variants, providing bounds that are either tight or almost tight

    Random subgraphs make identification affordable

    Full text link
    An identifying code of a graph is a dominating set which uniquely determines all the vertices by their neighborhood within the code. Whereas graphs with large minimum degree have small domination number, this is not the case for the identifying code number (the size of a smallest identifying code), which indeed is not even a monotone parameter with respect to graph inclusion. We show that every graph GG with nn vertices, maximum degree Δ=ω(1)\Delta=\omega(1) and minimum degree δclogΔ\delta\geq c\log{\Delta}, for some constant c>0c>0, contains a large spanning subgraph which admits an identifying code with size O(nlogΔδ)O\left(\frac{n\log{\Delta}}{\delta}\right). In particular, if δ=Θ(n)\delta=\Theta(n), then GG has a dense spanning subgraph with identifying code O(logn)O\left(\log n\right), namely, of asymptotically optimal size. The subgraph we build is created using a probabilistic approach, and we use an interplay of various random methods to analyze it. Moreover we show that the result is essentially best possible, both in terms of the number of deleted edges and the size of the identifying code

    On global location-domination in graphs

    Full text link
    A dominating set SS of a graph GG is called locating-dominating, LD-set for short, if every vertex vv not in SS is uniquely determined by the set of neighbors of vv belonging to SS. Locating-dominating sets of minimum cardinality are called LDLD-codes and the cardinality of an LD-code is the location-domination number λ(G)\lambda(G). An LD-set SS of a graph GG is global if it is an LD-set of both GG and its complement G\overline{G}. The global location-domination number λg(G)\lambda_g(G) is the minimum cardinality of a global LD-set of GG. In this work, we give some relations between locating-dominating sets and the location-domination number in a graph and its complement.Comment: 15 pages: 2 tables; 8 figures; 20 reference

    Metric-locating-dominating sets of graphs for constructing related subsets of vertices

    Get PDF
    © 2018. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/A dominating set S of a graph is a metric-locating-dominating set if each vertex of the graph is uniquely distinguished by its distances from the elements of S , and the minimum cardinality of such a set is called the metric-location-domination number. In this paper, we undertake a study that, in general graphs and specific families, relates metric-locating-dominating sets to other special sets: resolving sets, dominating sets, locating-dominating sets and doubly resolving sets. We first characterize the extremal trees of the bounds that naturally involve metric-location-domination number, metric dimension and domination number. Then, we prove that there is no polynomial upper bound on the location-domination number in terms of the metric-location-domination number, thus extending a result of Henning and Oellermann. Finally, we show different methods to transform metric-locating-dominating sets into locating-dominating sets and doubly resolving sets. Our methods produce new bounds on the minimum cardinalities of all those sets, some of them concerning parameters that have not been related so farPeer ReviewedPostprint (author's final draft

    On the size of identifying codes in triangle-free graphs

    Get PDF
    In an undirected graph GG, a subset CV(G)C\subseteq V(G) such that CC is a dominating set of GG, and each vertex in V(G)V(G) is dominated by a distinct subset of vertices from CC, is called an identifying code of GG. The concept of identifying codes was introduced by Karpovsky, Chakrabarty and Levitin in 1998. For a given identifiable graph GG, let \M(G) be the minimum cardinality of an identifying code in GG. In this paper, we show that for any connected identifiable triangle-free graph GG on nn vertices having maximum degree Δ3\Delta\geq 3, \M(G)\le n-\tfrac{n}{\Delta+o(\Delta)}. This bound is asymptotically tight up to constants due to various classes of graphs including (Δ1)(\Delta-1)-ary trees, which are known to have their minimum identifying code of size nnΔ1+o(1)n-\tfrac{n}{\Delta-1+o(1)}. We also provide improved bounds for restricted subfamilies of triangle-free graphs, and conjecture that there exists some constant cc such that the bound \M(G)\le n-\tfrac{n}{\Delta}+c holds for any nontrivial connected identifiable graph GG

    On location, domination and information retrieval

    Get PDF
    The thesis is divided into two main branches: identifying and locatingdominating codes, and information retrieval. The former topics are motivated by the aim to locate objects in sensor networks (or other similar applications) and the latter one by the need to retrieve information in memories such as DNA data storage systems. Albeit the underlying applications, the study on these topics mainly belongs to discrete mathematics; more specically, to the elds of coding and graph theory. The sensor networks are usually represented by graphs where vertices represent the monitored locations and edges the connections between the locations. Moreover, the locations of the sensors are determined by a code. Furthermore, the desired properties of the sensor network are deeply linked with the properties of the underlying code. The number of errors in reading the data is abundant in the DNA data storage systems. In particular, there can occur more errors than a reasonable error-correcting code can handle. However, this problem is somewhat oset by the possibility to obtain multiple approximations of the same information from the data storage. Hence, the information retrieval process can be modelled by the Levenshtein's channel model, where a message is sent through multiple noisy channels and multiple outputs are received. In the rst two papers of the thesis, we introduce and study the new concepts of self- and solid-locating-dominating codes as a natural analogy to self-identifying codes with respect to locating-dominating codes. The rst paper introduces these new codes and considers them in some graphs such as the Hamming graphs. Then, in the second paper, we broaden our view on the topic by considering graph theoretical questions. We give optimal codes in multiple dierent graph classes and some more general results using concepts such as the Dilworth number and graph complements. The third paper focuses on the q-ary Hamming spaces. In particular, we disprove a conjecture proposed by Goddard and Wash related to identifying codes. In the fourth paper, we return to self- and solid-locating-dominating codes and give optimal codes in some graph classes and consider their densities in innite graphs. In the fth paper, we consider information retrieval in memories; in particular, the Levenshtein's channel model. In the channel model, we transmit some codeword belonging to the binary Hamming space through multiple identical channels. With the help of multiple dierent outputs, we give a list of codewords which may have been sent. In the paper, we study the number of channels required to have a rather small (constant) list size when the properties of the channels, the code and the dimension of the Hamming space are xed. In particular, we give an exact relation between the number of channels and the asymptotic value of the maximum list size.Väitöskirja käsittelee kahta aihetta: identioivia ja paikantavia peittokoodeja sekä tiedon noutamista muistista. Ensimmäisen aiheen motivaationa on objektien paikantaminen sensoriverkoista (sekä muut samankaltaiset sovellukset) ja jälkimmäisen tiedonnouto DNA-muisteista. Näiden aiheiden tutkimus kuuluu diskreettiin matematiikkaan, täsmällisemmin koodaus- ja graa-teoriaan. Sensoriverkkoja kuvataan yleensä graafeilla, joissa solmut esittävät tarkkailtuja kohteita ja viivat yhteyksiä näiden kohteiden välillä. Edelleen sensorien paikat määräytyvät annetun koodin perusteella. Tästä johtuen sensoriverkon halutut ominaisuudet pohjautuvat vahvasti alla olevaan koodiin. Luettaessa tietoa DNA-muisteista tapahtuvien virheiden määrä saattaa olla erittäin suuri; erityisesti suurempi kuin kiinnitetyn virheitä korjaavan koodin korjauskyky. Toisaalta tilanne ei ole aivan näin ongelmallinen, sillä DNA-muisteista voidaan saada useita eri arvioita muistiin tallennetusta tiedosta. Näistä syistä johtuen tietojen noutamista DNA-muisteista voidaan mallintaa käyttäen Levenshteinin kanavamallia. Kanavamallissa yksi viesti lähetetään useiden häiriöisten kanavien kautta ja näin vastaanotetaan useita viestejä (yksi jokaisesta kanavasta). Väitöskirjan kahdessa ensimmäisessä julkaisussa esitellään ja tutkitaan uusia paikantavien peittokoodien luokkia, jotka pohjautuvat aiemmin tutkittuihin itse-identioiviin koodeihin. Ensimmäisessä julkaisussa on esitelty nämä koodiluokat sekä tutkittu niitä joissain graafeissa kuten Hammingin graafeissa. Tämän jälkeen toisessa julkaisussa käsitellään yleisiä graa-teoreettisia kysymyksiä. Julkaisussa esitetään optimaaliset koodit useille graaperheille sekä joitain yleisempiä tuloksia käyttäen mm. Dilworthin lukua sekä graakomplementteja. Kolmas julkaisu keskittyy q-arisiin Hammingin avaruuksiin. Erityisesti julkaisussa todistetaan vääräksi Goddardin ja Washin aiemmin esittämä identioivia koodeja koskeva otaksuma. Neljäs artikkeli käsittelee jo kahdessa ensimmäisessä artikkelissa esiteltyjä paikantavien peittokoodien luokkia. Artikkeli esittää optimaalisia koodeja useille graaperheille sekä käsittelee äärettömiä graafeja. Viides artikkeli käsittelee tiedonnoutoa ja erityisesti Levenshteinin kanavamallia. Kanavamallissa binääriseen Hammingin avaruuteen kuuluva koodisana lähetetään useiden identtisten kanavien läpi. Näistä kanavista vastaanotetaan useita eri arvioita lähetetystä koodisanasta ja rakennetaan lista mahdollisesti lähetetyistä sanoista. Artikkelissa tutkitaan kuinka monta kanavaa tarvitaan, jotta tämän listan koko on pieni (vakio), kun kanavien ominaisuudet, koodi ja Hammingin avaruuden dimensio on kiinnitetty. Erityisesti löydetään täsmällinen suhde kanavien lukumäärän ja asymptoottisesti maksimaalisen listan koon välille
    corecore