127 research outputs found

    Total domination stable graphs upon edge addition

    Get PDF
    AbstractA set S of vertices in a graph G is a total dominating set if every vertex of G is adjacent to some vertex in S. The minimum cardinality of a total dominating set of G is the total domination number of G. A graph is total domination edge addition stable if the addition of an arbitrary edge has no effect on the total domination number. In this paper, we characterize total domination edge addition stable graphs. We determine a sharp upper bound on the total domination number of total domination edge addition stable graphs, and we determine which combinations of order and total domination number are attainable. We finish this work with an investigation of claw-free total domination edge addition stable graphs

    Algorithmic Complexity of Isolate Secure Domination in Graphs

    Get PDF
    A dominating set SS is an Isolate Dominating Set (IDS) if the induced subgraph G[S]G[S] has at least one isolated vertex. In this paper, we initiate the study of new domination parameter called, isolate secure domination. An isolate dominating set S⊆VS\subseteq V is an isolate secure dominating set (ISDS), if for each vertex u∈V∖Su \in V \setminus S, there exists a neighboring vertex vv of uu in SS such that (S∖{v})∪{u}(S \setminus \{v\}) \cup \{u\} is an IDS of GG. The minimum cardinality of an ISDS of GG is called as an isolate secure domination number, and is denoted by γ0s(G)\gamma_{0s}(G). Given a graph G=(V,E) G=(V,E) and a positive integer k, k, the ISDM problem is to check whether G G has an isolate secure dominating set of size at most k. k. We prove that ISDM is NP-complete even when restricted to bipartite graphs and split graphs. We also show that ISDM can be solved in linear time for graphs of bounded tree-width.Comment: arXiv admin note: substantial text overlap with arXiv:2002.00002; text overlap with arXiv:2001.1125

    Algorithmic complexity of isolate secure domination in graphs

    Get PDF
    A dominating set S is an Isolate Dominating Set (IDS) if the induced subgraph G[S] has at least one isolated vertex. In this paper, we initiate the study of new domination parameter called, isolate secure domination. An isolate dominating set S subset of V is an isolate secure dominating set (ISDS), if for each vertex u is an element of V \ S, there exists a neighboring vertex v of u in S such that (S \ {v}) boolean OR {u} is an IDS of G. The minimum cardinality of an ISDS of G is called as an isolate secure domination number, and is denoted by gamma(0s) (G). We give isolate secure domination number of path and cycle graphs. Given a graph G = (V, E) and a positive integer k, the ISDM problem is to check whether G has an isolate secure dominating set of size at most k. We prove that ISDM is NP-complete even when restricted to bipartite graphs and split graphs. We also show that ISDM can be solved in linear time for graphs of bounded tree-width.Publisher's Versio

    The cost of edge removal in graph domination

    Get PDF
    CITATION:A. P. de Villiers (2020): The cost of edge removal in graph domination, AKCE International Journal of Graphs and CombinatoricsABSTRACT A vertex set D of a graph G is a dominating set of G if each vertex of G is a member of D or is adjacent to a member of D. The domination number of G, denoted by cðGÞ, is the cardinality of a smallest dominating set of G. In this paper two cost functions, dqðGÞ and DqðGÞ, are considered which measure respectively the smallest possible and the largest possible increase in the cardinal-ity of a dominating set, over and above cðGÞ,ifq edges were to be removed from G. Bounds are established on dqðGÞ and DqðGÞ for a general graph G, after which these bounds are sharpened or these parameters are determined exactly for a number of special graph classes, including paths, cycles, complete bipartite graphs and complete graphs

    Tracking advanced persistent threats in critical infrastructures through opinion dynamics

    Get PDF
    Advanced persistent threats pose a serious issue for modern industrial environments, due to their targeted and complex attack vectors that are difficult to detect. This is especially severe in critical infrastructures that are accelerating the integration of IT technologies. It is then essential to further develop effective monitoring and response systems that ensure the continuity of business to face the arising set of cyber-security threats. In this paper, we study the practical applicability of a novel technique based on opinion dynamics, that permits to trace the attack throughout all its stages along the network by correlating different anomalies measured over time, thereby taking the persistence of threats and the criticality of resources into consideration. The resulting information is of essential importance to monitor the overall health of the control system and cor- respondingly deploy accurate response procedures. Advanced Persistent Threat Detection Traceability Opinion Dynamics.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    Total Domination Dot Critical and Dot Stable Graphs.

    Get PDF
    Two vertices are said to be identifed if they are combined to form one vertex whose neighborhood is the union of their neighborhoods. A graph is total domination dot-critical if identifying any pair of adjacent vertices decreases the total domination number. On the other hand, a graph is total domination dot-stable if identifying any pair of adjacent vertices leaves the total domination number unchanged. Identifying any pair of vertices cannot increase the total domination number. Further we show it can decrease the total domination number by at most two. Among other results, we characterize total domination dot-critical trees with total domination number three and all total domination dot-stable graphs

    Chromatic Excellence in Graphs

    Get PDF
    Excellence in graphs introduced by G.H. Fricke is extended to partitions of the vertex set with respect to a parameter. A graph G is said to be Chromatic excellent if {v} appears in a chromatic partition of G for every vϵV(G). This paper is devoted to the study of chromatic excellence in graphs

    Response Time Bounds for DAG Tasks with Arbitrary Intra-Task Priority Assignment

    Get PDF
    Most parallel real-time applications can be modeled as directed acyclic graph (DAG) tasks. Intra-task priority assignment can reduce the nondeterminism of runtime behavior of DAG tasks, possibly resulting in a smaller worst-case response time. However, intra-task priority assignment incurs dependencies between different parts of the graph, making it a challenging problem to compute the response time bound. Existing work on intra-task task priority assignment for DAG tasks is subject to the constraint that priority assignment must comply with the topological order of the graph, so that the response time bound can be computed in polynomial time. In this paper, we relax this constraint and propose a new method to compute response time bound of DAG tasks with arbitrary priority assignment. With the benefit of our new method, we present a simple but effective priority assignment policy, leading to smaller response time bounds. Comprehensive evaluation with both single-DAG systems and multi-DAG systems demonstrates that our method outperforms the state-of-the-art method with a considerable margin
    • …
    corecore