19,215 research outputs found

    On two variations of identifying codes

    Full text link
    Identifying codes have been introduced in 1998 to model fault-detection in multiprocessor systems. In this paper, we introduce two variations of identifying codes: weak codes and light codes. They correspond to fault-detection by successive rounds. We give exact bounds for those two definitions for the family of cycles

    Identifying codes of corona product graphs

    Full text link
    For a vertex xx of a graph GG, let NG[x]N_G[x] be the set of xx with all of its neighbors in GG. A set CC of vertices is an {\em identifying code} of GG if the sets NG[x]∩CN_G[x]\cap C are nonempty and distinct for all vertices xx. If GG admits an identifying code, we say that GG is identifiable and denote by γID(G)\gamma^{ID}(G) the minimum cardinality of an identifying code of GG. In this paper, we study the identifying code of the corona product H⊙GH\odot G of graphs HH and GG. We first give a necessary and sufficient condition for the identifiable corona product H⊙GH\odot G, and then express γID(H⊙G)\gamma^{ID}(H\odot G) in terms of γID(G)\gamma^{ID}(G) and the (total) domination number of HH. Finally, we compute γID(H⊙G)\gamma^{ID}(H\odot G) for some special graphs GG

    Linear Codes are Optimal for Index-Coding Instances with Five or Fewer Receivers

    Full text link
    We study zero-error unicast index-coding instances, where each receiver must perfectly decode its requested message set, and the message sets requested by any two receivers do not overlap. We show that for all these instances with up to five receivers, linear index codes are optimal. Although this class contains 9847 non-isomorphic instances, by using our recent results and by properly categorizing the instances based on their graphical representations, we need to consider only 13 non-trivial instances to solve the entire class. This work complements the result by Arbabjolfaei et al. (ISIT 2013), who derived the capacity region of all unicast index-coding problems with up to five receivers in the diminishing-error setup. They employed random-coding arguments, which require infinitely-long messages. We consider the zero-error setup; our approach uses graph theory and combinatorics, and does not require long messages.Comment: submitted to the 2014 IEEE International Symposium on Information Theory (ISIT

    Vanishing ideals over graphs and even cycles

    Full text link
    Let X be an algebraic toric set in a projective space over a finite field. We study the vanishing ideal, I(X), of X and show some useful degree bounds for a minimal set of generators of I(X). We give an explicit description of a set of generators of I(X), when X is the algebraic toric set associated to an even cycle or to a connected bipartite graph with pairwise disjoint even cycles. In this case, a fomula for the regularity of I(X) is given. We show an upper bound for this invariant, when X is associated to a (not necessarily connected) bipartite graph. The upper bound is sharp if the graph is connected. We are able to show a formula for the length of the parameterized linear code associated with any graph, in terms of the number of bipartite and non-bipartite components

    Locating-dominating sets and identifying codes in graphs of girth at least 5

    Full text link
    Locating-dominating sets and identifying codes are two closely related notions in the area of separating systems. Roughly speaking, they consist in a dominating set of a graph such that every vertex is uniquely identified by its neighbourhood within the dominating set. In this paper, we study the size of a smallest locating-dominating set or identifying code for graphs of girth at least 5 and of given minimum degree. We use the technique of vertex-disjoint paths to provide upper bounds on the minimum size of such sets, and construct graphs who come close to meet these bounds.Comment: 20 pages, 9 figure
    • …
    corecore