2,100 research outputs found

    Upper bounds for domination related parameters in graphs on surfaces

    Get PDF
    AbstractIn this paper we give tight upper bounds on the total domination number, the weakly connected domination number and the connected domination number of a graph in terms of order and Euler characteristic. We also present upper bounds for the restrained bondage number, the total restrained bondage number and the restricted edge connectivity of graphs in terms of the orientable/nonorientable genus and maximum degree

    Characterizations in Domination Theory

    Get PDF
    Let G = (V,E) be a graph. A set R is a restrained dominating set (total restrained dominating set, resp.) if every vertex in V − R (V) is adjacent to a vertex in R and (every vertex in V −R) to a vertex in V −R. The restrained domination number of G (total restrained domination number of G), denoted by gamma_r(G) (gamma_tr(G)), is the smallest cardinality of a restrained dominating set (total restrained dominating set) of G. If T is a tree of order n, then gamma_r(T) is greater than or equal to (n+2)/3. We show that gamma_tr(T) is greater than or equal to (n+2)/2. Moreover, we show that if n is congruent to 0 mod 4, then gamma_tr(T) is greater than or equal to (n+2)/2 + 1. We then constructively characterize the extremal trees achieving these lower bounds. Finally, if G is a graph of order n greater than or equal to 2, such that both G and G\u27 are not isomorphic to P_3, then gamma_r(G) + gamma_r(G\u27) is greater than or equal to 4 and less than or equal to n +2. We provide a similar result for total restrained domination and characterize the extremal graphs G of order n achieving these bounds

    Protecting a Graph with Mobile Guards

    Full text link
    Mobile guards on the vertices of a graph are used to defend it against attacks on either its vertices or its edges. Various models for this problem have been proposed. In this survey we describe a number of these models with particular attention to the case when the attack sequence is infinitely long and the guards must induce some particular configuration before each attack, such as a dominating set or a vertex cover. Results from the literature concerning the number of guards needed to successfully defend a graph in each of these problems are surveyed.Comment: 29 pages, two figures, surve

    (1,j)(1,j)-set problem in graphs

    Full text link
    A subset D⊆VD \subseteq V of a graph G=(V,E)G = (V, E) is a (1,j)(1, j)-set if every vertex v∈V∖Dv \in V \setminus D is adjacent to at least 11 but not more than jj vertices in D. The cardinality of a minimum (1,j)(1, j)-set of GG, denoted as γ(1,j)(G)\gamma_{(1,j)} (G), is called the (1,j)(1, j)-domination number of GG. Given a graph G=(V,E)G = (V, E) and an integer kk, the decision version of the (1,j)(1, j)-set problem is to decide whether GG has a (1,j)(1, j)-set of cardinality at most kk. In this paper, we first obtain an upper bound on γ(1,j)(G)\gamma_{(1,j)} (G) using probabilistic methods, for bounded minimum and maximum degree graphs. Our bound is constructive, by the randomized algorithm of Moser and Tardos [MT10], We also show that the (1,j)(1, j)- set problem is NP-complete for chordal graphs. Finally, we design two algorithms for finding γ(1,j)(G)\gamma_{(1,j)} (G) of a tree and a split graph, for any fixed jj, which answers an open question posed in [CHHM13]
    • …
    corecore