Domatically critical and domatically full graphs

نویسنده

  • Douglas F. Rall
چکیده

A subset, D, of the vertex set of a graph G is called a dominating set of G if each vertex of G is either in D or adjacent to some vertex in D. The maximum cardinality of a partition of the vertex set of G into dominating sets is the domatic number of G, denoted d(G). G is said to be domatically critical if the removal of any edge of G decreases the domatic number, and G is domatically full if d(G) assumes the known lower bound of 6(G) + 1. An example is given to settle a conjecture of B. Zelinka concerning the structure of a domatically critical graph. We also prove that a domatically critical graph G is domatically full if d(G) < 3 and provide’ examples to show this does not extend to the cases d(G) > 3.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Domatic Number of Graph Products

A partition of V (G), all of whose classes are dominating sets in G, is called a domatic partition of G. The maximum number of classes of a domatic partition of G is called the domatic number of G. The concept of a domatic number was introduced in [1]. More interesting results on domatically full graphs, domatically critical, domatically cocritical graphs and other domatic numbers can be found ...

متن کامل

Approximating the independent domatic partition problem in random geometric graphs - an experimental study

We investigate experimentally the Domatic Partition (DP) problem, the Independent Domatic Partition (IDP) problem and the Idomatic partition problem in Random Geometric Graphs (RGGs). In particular, we model these problems as Integer Linear Programs (ILPs), solve them optimally, and show on a large set of samples that RGGs are independent domatically full most likely (over 93% of the cases) and...

متن کامل

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

متن کامل

Labeling Subgraph Embeddings and Cordiality of Graphs

Let $G$ be a graph with vertex set $V(G)$ and edge set $E(G)$, a vertex labeling $f : V(G)rightarrow mathbb{Z}_2$ induces an edge labeling $ f^{+} : E(G)rightarrow mathbb{Z}_2$ defined by $f^{+}(xy) = f(x) + f(y)$, for each edge $ xyin E(G)$.  For each $i in mathbb{Z}_2$, let $ v_{f}(i)=|{u in V(G) : f(u) = i}|$ and $e_{f^+}(i)=|{xyin E(G) : f^{+}(xy) = i}|$. A vertex labeling $f$ of a graph $G...

متن کامل

An Ant Colony Optimization Algorithm for Network Vulnerability Analysis

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Discrete Mathematics

دوره 86  شماره 

صفحات  -

تاریخ انتشار 1990