Art
J-GLOBAL ID:201502277025428642   Reference number:15A0452213

Secure Sets and Defensive Alliances in Graphs: A Faster Algorithm and Improved Bounds

グラフのセキュア集合と防衛同盟:高速アルゴリズムと改良された限界
Author (4):
Material:
Volume: E98.D  Issue:Page: 486-489 (J-STAGE)  Publication year: 2015 
JST Material Number: U0469A  ISSN: 1745-1361  Document type: Article
Article type: 原著論文  Country of issue: Japan (JPN)  Language: ENGLISH (EN)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

JST classification (2):
JST classification
Category name(code) classified by JST.
Data protection  ,  Theory of computation 
Reference (17):
  • [1] R.C. Brigham, R.D. Dutton, and S.T. Hedetniemi, “Security in graphs,” Discrete Appl. Math., vol.155, pp.1708-1714, 2007.
  • [2] F.R.K. Chung, Z. Füredi, R.L. Graham, and P.D. Seymour, “On induced subgraphs of the cube,” J. Comb. Theory, Ser. A, vol.49, pp.180-187, 1988.
  • [3] R.D. Dutton, “The evolution of a hard graph theory problem - secure sets,” A course material of COT 6410: Computational Complexity, University of Central Florida, 2010. Available at http://www.cs.ucf.edu/courses/cot6410/spr2010/doc/SecureSets.doc
  • [4] R.D. Dutton, “On a graph's security number,” Discrete Math., vol.309, pp.4443-4447, 2009.
  • [5] R.D. Dutton, R. Lee, and R.C. Brigham, “Bounds on a graph's security number,” Discrete Appl. Math., vol.156, pp.695-704, 2008.
more...
Terms in the title (5):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page