Constructions of sensitive graphs which are not strongly sensitive

نویسندگان

  • K. M. Koh
  • K. S. Poh
چکیده

Let G be a simple graph with vertex set V(G) and edge set E(G). For each a in V(G), let N(a) = {x E V(G) : ax E E(G)} be the set of neighbours of a. A subset S of V(G) is called a closed set of G if, for each pair of distinct elements u, b in S, N(a) ON(b) s S. Let Z’(G) be the family of closed sets of G, inclusive of the empty set 0. Evidently, Z(G) is closed under arbitrary intersection and it thus forms a lattice under set-inclusion (see Fig. 1). The lattice 2?(G), which was first introduced by Sauer (see [6] and also [3, 4, 5]), is called the closed-set lattice of the graph G. We shall now introduce, in terms of their closed-set lattices, various classes of graphs. A graph G is said to be minimally critical if 2(G) + _Y(G e) for each e in E(G), and maximally critical if Z(G) $ Z’(G + e) for any e in E(G), where G is the complement of G. We say that G is critical if G is both maximally and minimally critical. A graph G is said to be sensitive if for any graph G’ that 2?(G) = .Z(G’) implies G = G’. Suppose that G and G’ are graphs such that 2?(G) = Z(G’) un d er a lattice isomorphism @. It is easily seen that @ induces naturally a bijection 4 : V(G)+ V(G’) such that for each x in V(G), G(x) =x’ in V(G’) if and only if @({x}) = {x’} in .2(G)). W e call 4 the bijection induced by @. A graph G is said to be strongly sensitive if for any graph G’ and for any lattice isomorphism @: Z’(G) = Z(G’), the bijection Cp induced by Qi is a graph isomorphism of G onto G’. For a graph G, the following implications follow immediately from definitions:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

متن کامل

Data sanitization in association rule mining based on impact factor

Data sanitization is a process that is used to promote the sharing of transactional databases among organizations and businesses, it alleviates concerns for individuals and organizations regarding the disclosure of sensitive patterns. It transforms the source database into a released database so that counterparts cannot discover the sensitive patterns and so data confidentiality is preserved ag...

متن کامل

Constructions of antimagic labelings for some families of regular graphs

In this paper we construct antimagic labelings of the regular complete multipartite graphs and we also extend the construction to some families of regular graphs.

متن کامل

Constructions of strongly regular Cayley graphs and skew Hadamard difference sets from cyclotomic classes

In this paper, we give a construction of strongly regular Cayley graphs and a construction of skew Hadamard difference sets. Both constructions are based on choosing cyclotomic classes in finite fields, and they generalize the constructions given by Feng and Xiang [10, 12]. Three infinite families of strongly regular graphs with new parameters are obtained. The main tools that we employed are i...

متن کامل

Expression analysis of K+ transporter genes associated with salinity tolerance in grape

Molecular information of K+ accumulation in grapes is strongly required. Under salinity condition potassium transporters are inhibited by Na+. The aim of this study was to investigate the effects of salinity on the expression of K+ transporter genes in grape. Based on the previous screening study on 18 grape genotypes, ‘H6’ and ‘Gharashani’ (tolerant) and ‘Shirazi’ and ‘GhezelUzum’ (sensitive) ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Discrete Mathematics

دوره 72  شماره 

صفحات  -

تاریخ انتشار 1988