19,193 research outputs found
3-Factor-criticality in double domination edge critical graphs
A vertex subset of a graph is a double dominating set of if
for each vertex of , where is the set of the
vertex and vertices adjacent to . The double domination number of ,
denoted by , is the cardinality of a smallest double
dominating set of . A graph is said to be double domination edge
critical if for any edge . A double domination edge critical graph with is called --critical. A graph is
-factor-critical if has a perfect matching for each set of
vertices in . In this paper we show that is 3-factor-critical if is
a 3-connected claw-free --critical graph of odd order
with minimum degree at least 4 except a family of graphs.Comment: 14 page
Zero forcing in iterated line digraphs
Zero forcing is a propagation process on a graph, or digraph, defined in
linear algebra to provide a bound for the minimum rank problem. Independently,
zero forcing was introduced in physics, computer science and network science,
areas where line digraphs are frequently used as models. Zero forcing is also
related to power domination, a propagation process that models the monitoring
of electrical power networks.
In this paper we study zero forcing in iterated line digraphs and provide a
relationship between zero forcing and power domination in line digraphs. In
particular, for regular iterated line digraphs we determine the minimum
rank/maximum nullity, zero forcing number and power domination number, and
provide constructions to attain them. We conclude that regular iterated line
digraphs present optimal minimum rank/maximum nullity, zero forcing number and
power domination number, and apply our results to determine those parameters on
some families of digraphs often used in applications
Protecting a Graph with Mobile Guards
Mobile guards on the vertices of a graph are used to defend it against
attacks on either its vertices or its edges. Various models for this problem
have been proposed. In this survey we describe a number of these models with
particular attention to the case when the attack sequence is infinitely long
and the guards must induce some particular configuration before each attack,
such as a dominating set or a vertex cover. Results from the literature
concerning the number of guards needed to successfully defend a graph in each
of these problems are surveyed.Comment: 29 pages, two figures, surve
- …