4,340 research outputs found

    In the complement of a dominating set

    Get PDF
    A set D of vertices of a graph G=(V,E) is a dominating set, if every vertex of D\V has at least one neighbor that belongs to D. The disjoint domination number of a graph G is the minimum cardinality of two disjoint dominating sets of G. We prove upper bounds for the disjoint domination number for graphs of minimum degree at least 2, for graphs of large minimum degree and for cubic graphs.A set T of vertices of a graph G=(V,E) is a total dominating set, if every vertex of G has at least one neighbor that belongs to T. We characterize graphs of minimum degree 2 without induced 5-cycles and graphs of minimum degree at least 3 that have a dominating set, a total dominating set, and a non-empty vertex set that are disjoint.A set I of vertices of a graph G=(V,E) is an independent set, if all vertices in I are not adjacent in G. We give a constructive characterization of trees that have a maximum independent set and a minimum dominating set that are disjoint and we show that the corresponding decision problem is NP-hard for general graphs. Additionally, we prove several structural and hardness results concerning pairs of disjoint sets in graphs which are dominating, independent, or both. Furthermore, we prove lower bounds for the maximum cardinality of an independent set of graphs with specifed odd girth and small average degree.A connected graph G has spanning tree congestion at most s, if G has a spanning tree T such that for every edge e of T the edge cut defined in G by the vertex sets of the two components of T-e contains at most s edges. We prove that every connected graph of order n has spanning tree congestion at most n^(3/2) and we show that the corresponding decision problem is NP-hard

    Disjoint Dominating Sets with a Perfect Matching

    Full text link
    In this paper, we consider dominating sets DD and DD' such that DD and DD' are disjoint and there exists a perfect matching between them. Let DDm(G)DD_{\textrm{m}}(G) denote the cardinality of smallest such sets D,DD, D' in GG (provided they exist, otherwise DDm(G)=DD_{\textrm{m}}(G) = \infty). This concept was introduced in [Klostermeyer et al., Theory and Application of Graphs, 2017] in the context of studying a certain graph protection problem. We characterize the trees TT for which DDm(T)DD_{\textrm{m}}(T) equals a certain graph protection parameter and for which DDm(T)=α(T)DD_{\textrm{m}}(T) = \alpha(T), where α(G)\alpha(G) is the independence number of GG. We also further study this parameter in graph products, e.g., by giving bounds for grid graphs, and in graphs of small independence number

    Distributed Connectivity Decomposition

    Full text link
    We present time-efficient distributed algorithms for decomposing graphs with large edge or vertex connectivity into multiple spanning or dominating trees, respectively. As their primary applications, these decompositions allow us to achieve information flow with size close to the connectivity by parallelizing it along the trees. More specifically, our distributed decomposition algorithms are as follows: (I) A decomposition of each undirected graph with vertex-connectivity kk into (fractionally) vertex-disjoint weighted dominating trees with total weight Ω(klogn)\Omega(\frac{k}{\log n}), in O~(D+n)\widetilde{O}(D+\sqrt{n}) rounds. (II) A decomposition of each undirected graph with edge-connectivity λ\lambda into (fractionally) edge-disjoint weighted spanning trees with total weight λ12(1ε)\lceil\frac{\lambda-1}{2}\rceil(1-\varepsilon), in O~(D+nλ)\widetilde{O}(D+\sqrt{n\lambda}) rounds. We also show round complexity lower bounds of Ω~(D+nk)\tilde{\Omega}(D+\sqrt{\frac{n}{k}}) and Ω~(D+nλ)\tilde{\Omega}(D+\sqrt{\frac{n}{\lambda}}) for the above two decompositions, using techniques of [Das Sarma et al., STOC'11]. Moreover, our vertex-connectivity decomposition extends to centralized algorithms and improves the time complexity of [Censor-Hillel et al., SODA'14] from O(n3)O(n^3) to near-optimal O~(m)\tilde{O}(m). As corollaries, we also get distributed oblivious routing broadcast with O(1)O(1)-competitive edge-congestion and O(logn)O(\log n)-competitive vertex-congestion. Furthermore, the vertex connectivity decomposition leads to near-time-optimal O(logn)O(\log n)-approximation of vertex connectivity: centralized O~(m)\widetilde{O}(m) and distributed O~(D+n)\tilde{O}(D+\sqrt{n}). The former moves toward the 1974 conjecture of Aho, Hopcroft, and Ullman postulating an O(m)O(m) centralized exact algorithm while the latter is the first distributed vertex connectivity approximation

    Locating-dominating sets in twin-free graphs

    Full text link
    A locating-dominating set of a graph GG is a dominating set DD of GG with the additional property that every two distinct vertices outside DD have distinct neighbors in DD; that is, for distinct vertices uu and vv outside DD, N(u)DN(v)DN(u) \cap D \ne N(v) \cap D where N(u)N(u) denotes the open neighborhood of uu. A graph is twin-free if every two distinct vertices have distinct open and closed neighborhoods. The location-domination number of GG, denoted γL(G)\gamma_L(G), is the minimum cardinality of a locating-dominating set in GG. It is conjectured [D. Garijo, A. Gonz\'alez and A. M\'arquez. The difference between the metric dimension and the determining number of a graph. Applied Mathematics and Computation 249 (2014), 487--501] that if GG is a twin-free graph of order nn without isolated vertices, then γL(G)n2\gamma_L(G)\le \frac{n}{2}. We prove the general bound γL(G)2n3\gamma_L(G)\le \frac{2n}{3}, slightly improving over the 2n3+1\lfloor\frac{2n}{3}\rfloor+1 bound of Garijo et al. We then provide constructions of graphs reaching the n2\frac{n}{2} bound, showing that if the conjecture is true, the family of extremal graphs is a very rich one. Moreover, we characterize the trees GG that are extremal for this bound. We finally prove the conjecture for split graphs and co-bipartite graphs.Comment: 11 pages; 4 figure

    Coded Cooperative Data Exchange for a Secret Key

    Full text link
    We consider a coded cooperative data exchange problem with the goal of generating a secret key. Specifically, we investigate the number of public transmissions required for a set of clients to agree on a secret key with probability one, subject to the constraint that it remains private from an eavesdropper. Although the problems are closely related, we prove that secret key generation with fewest number of linear transmissions is NP-hard, while it is known that the analogous problem in traditional cooperative data exchange can be solved in polynomial time. In doing this, we completely characterize the best possible performance of linear coding schemes, and also prove that linear codes can be strictly suboptimal. Finally, we extend the single-key results to characterize the minimum number of public transmissions required to generate a desired integer number of statistically independent secret keys.Comment: Full version of a paper that appeared at ISIT 2014. 19 pages, 2 figure
    corecore