scholarly journals On the Minimum Size of an Identifying Code Over All Orientations of a Graph

10.37236/7117 ◽  
2018 ◽  
Vol 25 (1) ◽  
Author(s):  
Nathann Cohen ◽  
Frédéric Havet

If $G$ be a graph or a digraph, let $\mathrm{id}(G)$ be the minimum size of an identifying code of $G$ if one exists, and $\mathrm{id}(G)=+\infty$ otherwise. For a graph $G$, let $\mathrm{idor}(G)$ be the minimum of $\mathrm{id}(D)$ overall orientations $D$ of $G$. We give some lower and upper bounds on $\mathrm{idor}(G)$. In particular, we show that $\mathrm{idor}(G)\leqslant \frac{3}{2} \mathrm{id}(G)$ for every graph $G$. We also show that computing $\mathrm{idor}(G)$ is NP-hard, while deciding whether $\mathrm{idor}(G)\leqslant |V(G)|-k$ is polynomial-time solvable for every fixed integer $k$.

10.37236/1583 ◽  
2001 ◽  
Vol 8 (1) ◽  
Author(s):  
Irène Charon ◽  
Iiro Honkala ◽  
Olivier Hudry ◽  
Antoine Lobstein

Consider a connected undirected graph $G=(V,E)$ and a subset of vertices $C$. If for all vertices $v \in V$, the sets $B_r(v) \cap C$ are all nonempty and pairwise distinct, where $B_r(v)$ denotes the set of all points within distance $r$ from $v$, then we call $C$ an $r$-identifying code. We give general lower and upper bounds on the best possible density of $r$-identifying codes in three infinite regular graphs.


10.37236/9903 ◽  
2021 ◽  
Vol 28 (3) ◽  
Author(s):  
Luciano N. Grippo ◽  
Adrián Pastine ◽  
Pablo Torres ◽  
Mario Valencia-Pabon ◽  
Juan C. Vera

This paper considers an infection spreading in a graph; a vertex gets infected if at least two of its neighbors are infected. The $P_3$-hull number is the minimum size of a vertex set that eventually infects the whole graph. In the specific case of the Kneser graph $K(n,k)$, with $n\ge 2k+1$, an infection spreading on the family of $k$-sets of an $n$-set is considered. A set is infected whenever two sets disjoint from it are infected. We compute the exact value of the $P_3$-hull number of $K(n,k)$ for $n>2k+1$. For $n = 2k+1$, using graph homomorphisms from the Knesser graph to the Hypercube, we give lower and upper bounds.


2018 ◽  
Vol 52 (4-5) ◽  
pp. 1123-1145
Author(s):  
Alain Quilliot ◽  
Djamal Rebaine ◽  
Hélène Toussaint

We deal here with theLinear Arrangement Problem(LAP) onintervalgraphs, any interval graph being given here together with its representation as theintersectiongraph of some collection of intervals, and so with relatedprecedenceandinclusionrelations. We first propose a lower boundLB, which happens to be tight in the case ofunit intervalgraphs. Next, we introduce the restriction PCLAP of LAP which is obtained by requiring any feasible solution of LAP to be consistent with theprecedencerelation, and prove that PCLAP can be solved in polynomial time. Finally, we show both theoretically and experimentally that PCLAP solutions are a good approximation for LAP onintervalgraphs.


Mathematics ◽  
2019 ◽  
Vol 7 (11) ◽  
pp. 1111
Author(s):  
Antonio González ◽  
María Luz Puertas

Determining vertex subsets are known tools to provide information about automorphism groups of graphs and, consequently about symmetries of graphs. In this paper, we provide both lower and upper bounds of the minimum size of such vertex subsets, called the determining number of the graph. These bounds, which are performed for arbitrary graphs, allow us to compute the determining number in two different graph families such are cographs and unit interval graphs.


Algorithmica ◽  
2021 ◽  
Author(s):  
Britta Dorn ◽  
Ronald de Haan ◽  
Ildikó Schlotter

AbstractWe consider the following control problem on fair allocation of indivisible goods. Given a set I of items and a set of agents, each having strict linear preferences over the items, we ask for a minimum subset of the items whose deletion guarantees the existence of a proportional allocation in the remaining instance; we call this problem Proportionality by Item Deletion (PID). Our main result is a polynomial-time algorithm that solves PID for three agents. By contrast, we prove that PID is computationally intractable when the number of agents is unbounded, even if the number k of item deletions allowed is small—we show that the problem is $${\mathsf {W}}[3]$$ W [ 3 ] -hard with respect to the parameter k. Additionally, we provide some tight lower and upper bounds on the complexity of PID when regarded as a function of |I| and k. Considering the possibilities for approximation, we prove a strong inapproximability result for PID. Finally, we also study a variant of the problem where we are given an allocation $$\pi $$ π in advance as part of the input, and our aim is to delete a minimum number of items such that $$\pi $$ π is proportional in the remainder; this variant turns out to be $${{\mathsf {N}}}{{\mathsf {P}}}$$ N P -hard for six agents, but polynomial-time solvable for two agents, and we show that it is $$\mathsf {W[2]}$$ W [ 2 ] -hard when parameterized by the number k of


2012 ◽  
Vol 28 (1) ◽  
pp. 59-66
Author(s):  
ADRIAN DEACONU ◽  
◽  
ELEONOR CIUREA ◽  

The problem consists in modifying the lower and upper bounds of a given feasible flow f in a network G so that the given flow becomes a maximum flow in G and the distance between the initial vector of bounds and the modified one measured using Lk norm (k ∈ N∗) is minimum. A fast apriori fesibility test is presented. An algorithm for solving this problem is deduced. Strongly and weakly polynomial time implementations of this algorithm are presented. Some particular cases of the problem are discussed.


1990 ◽  
Vol 19 (335) ◽  
Author(s):  
Peter Bro Miltersen

We analyze the concept of <em> malignness</em>, which is the property of probability ensembles of making the average case running time equal to the worst case running time for a class of algorithms. We derive lower and upper bounds on the complexity of malign ensembles, which are tight for exponential time algorithms, and which show that no polynomial time computable malign ensemble exists for the class of superlinear algorithms. Furthermore, we show that for no class of superlinear algorithms a polynomial time computable malign ensemble exists, unless every language in P has an expected polynomial time constructor.


10.37236/4562 ◽  
2015 ◽  
Vol 22 (2) ◽  
Author(s):  
Camino Balbuena ◽  
Florent Foucaud ◽  
Adriana Hansberg

Locating-dominating sets and identifying codes are two closely related notions in the area of separating systems. Roughly speaking, they consist in a dominating set of a graph such that every vertex is uniquely identified by its neighbourhood within the dominating set. In this paper, we study the size of a smallest locating-dominating set or identifying code for graphs of girth at least 5 and of given minimum degree. We use the technique of vertex-disjoint paths to provide upper bounds on the minimum size of such sets, and construct graphs who come close to meeting these bounds.


2015 ◽  
Vol Vol. 17 no.2 (Discrete Algorithms) ◽  
Author(s):  
Gwenaël Joret ◽  
Adrian Vetta

International audience We consider the <i>rank reduction problem</i> for matroids: Given a matroid $M$ and an integer $k$, find a minimum size subset of elements of $M$ whose removal reduces the rank of $M$ by at least $k$. When $M$ is a graphical matroid this problem is the minimum $k$-cut problem, which admits a 2-approximation algorithm. In this paper we show that the rank reduction problem for transversal matroids is essentially at least as hard to approximate as the densest $k$-subgraph problem. We also prove that, while the problem is easily solvable in polynomial time for partition matroids, it is NP-hard when considering the intersection of two partition matroids. Our proof shows, in particular, that the maximum vertex cover problem is NP-hard on bipartite graphs, which answers an open problem of B.&nbsp;Simeone.


Sign in / Sign up

Export Citation Format

Share Document