نتایج جستجو برای: k tuple dominating set
تعداد نتایج: 1004279 فیلتر نتایج به سال:
A k-dominating set is a set D k V such that every vertex i 2 V nD k has at least k i neighbours in D k. The k-domination number k (G) of G is the cardinality of a smallest k-dominating set of G. For k 1 = ::: = kn = 1, k-domination corresponds to the usual concept of domination. Our approach yields an improvement of an upper bound for the domination number found then the notion of k-dominating ...
We propose a memory efficient self-stabilizing protocol building distance-k independent dominating sets. A distance-k independent dominating set is a distance-k independent set and a distance-k dominating set. Our algorithm, named SID, is silent; it converges under the unfair distributed scheduler (the weakest scheduling assumption). The protocol SID is memory efficient : it requires only log(2...
A k-dominating set is a set D k V such that every vertex i 2 V nD k has at least k i neighbours in D k. The k-domination number k (G) of G is the cardinality of a smallest k-dominating set of G. For k 1 = ::: = kn = 1, k-domination corresponds to the usual concept of domination. Our approach yields an improvement of an upper bound for the domination number found then the notion of k-dominating ...
Efficient routing among mobile hosts is an important function in ad hoc networks. Routing based on a connected dominating set is a promising approach, where the search space for a route is reduced to the hosts in the set. A set is dominating if all the hosts are either in the set or neighbors of hosts in the set. The efficiency of dominating-set-based routing mainly depends on the overhead intr...
A k-tuple coloring of a graph G assigns a set of k colors to each vertex of G so that if two vertices are adjacent, the corresponding sets of colors are disjoint. The k-tuple chromatic number of G is the smallest t so that there is such a k-tuple coloring of G using t colors in all. The Kneser graph K(m,n) has as vertices all n-element subsets of the set {1,2, . . . ,m} and an edge between two ...
In order to update k-anonymous and confidential database, the suppression based and generalization based updating protocol technique has been proposed. These protocols check whether the database inserted with the new tuple is still k anonymous without knowing the content of the table and database respectively. But these methods will not work if initial database is empty. Also, if the incoming t...
Let G = (V,E) be a simple and undirected graph. For some integer k > 1, a set D ⊆ V is said to be a k-dominating set in G if every vertex v of G outside D has at least k neighbors in D. Furthermore, for some real number α with 0 < α 6 1, a set D ⊆ V is called an α-dominating set in G if every vertex v of G outside D has at least α×dv neighbors in D, where dv is the degree of v in G. The cardina...
A graph G is 3-domination-critical (3-critical, for short), if its domination number γ is 3 and the addition of any edge decreases γ by 1. In this paper, we show that every 3-critical graph with independence number 4 and minimum degree 3 is Hamilton-connected. Combining the result with those in [2], [4] and [5], we solve the following conjecture: a connected 3critical graph G is Hamilton-connec...
We propose a fast silent self-stabilizing building a k-independent dominating set, named FID. The convergence of protocol FID, is established for any computation under the unfair distributed scheduler. FID reaches a terminal (also legitimate) configuration in at most 4n+k rounds, where n is the network size. FID requires (k + 1)log(n+ 1) bits per node. keywords distributed computing, fault tole...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید