On identifying codes that are robust against edge changes
نویسندگان
چکیده
Assume that G = (V ,E) is an undirected graph, and C ⊆ V . For every v ∈ V , denote Ir(G; v) = {u ∈ C : d(u, v) ≤ r}, where d(u, v) denotes the number of edges on any shortest path from u to v in G. If all the sets Ir(G; v) for v ∈ V are pairwise different, and none of them is the empty set, the codeC is called r-identifying. Themotivation for identifying codes comes, for instance, from finding faulty processors in multiprocessor systems or from location detection in emergency sensor networks. The underlying architecture is modelled by a graph. We study various types of identifying codes that are robust against six natural changes in the graph; known or unknown edge deletions, additions or both. Our focus is on the radius r=1. We show that in the infinite square grid the optimal density of a 1-identifying code that is robust against one unknown edge deletion is 1/2 and the optimal density of a 1-identifying code that is robust against one unknown edge addition equals 3/4 in the infinite hexagonal mesh. Moreover, although it is shown that all six problems are in general different, we prove that in the binary hypercube there are cases where five of the six problems coincide. © 2007 Elsevier Inc. All rights reserved.
منابع مشابه
On Identifying Codes in the King Grid that are Robust Against Edge Deletions
Assume that G = (V,E) is an undirected graph, and C ⊆ V . For every v ∈ V , we denote Ir(G; v) = {u ∈ C : d(u, v) ≤ r}, where d(u, v) denotes the number of edges on any shortest path from u to v. If all the sets Ir(G; v) for v ∈ V are pairwise different, and none of them is the empty set, the code C is called r-identifying. If C is r-identifying in all graphs G that can be obtained from G by de...
متن کاملTolerant identification with Euclidean balls
The concept of identifying codes was introduced by Karpovsky, Chakrabarty and Levitin in 1998. The identifying codes can be applied, for example, to sensor networks. In this paper, we consider as sensors the set Z 2 where one sensor can check its neighbours within Euclidean distance r. We construct tolerant identifying codes in this network that are robust against some changes in the neighbourh...
متن کاملDesign and Test of New Robust QCA Sequential Circuits
One of the several promising new technologies for computing at nano-scale is quantum-dot cellular automata (QCA). In this paper, new designs for different QCA sequential circuits are presented. Using an efficient QCA D flip-flop (DFF) architecture, a 5-bit counter, a novel single edge generator (SEG) and a divide-by-2 counter are implemented. Also, some types of oscillators, a new edge-t...
متن کاملCompressed Image Hashing using Minimum Magnitude CSLBP
Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Comput.
دوره 205 شماره
صفحات -
تاریخ انتشار 2007