Constructions of sensitive graphs which are not strongly sensitive
نویسندگان
چکیده
Let G be a simple graph with vertex set V(G) and edge set E(G). For each a in V(G), let N(a) = {x E V(G) : ax E E(G)} be the set of neighbours of a. A subset S of V(G) is called a closed set of G if, for each pair of distinct elements u, b in S, N(a) ON(b) s S. Let Z’(G) be the family of closed sets of G, inclusive of the empty set 0. Evidently, Z(G) is closed under arbitrary intersection and it thus forms a lattice under set-inclusion (see Fig. 1). The lattice 2?(G), which was first introduced by Sauer (see [6] and also [3, 4, 5]), is called the closed-set lattice of the graph G. We shall now introduce, in terms of their closed-set lattices, various classes of graphs. A graph G is said to be minimally critical if 2(G) + _Y(G e) for each e in E(G), and maximally critical if Z(G) $ Z’(G + e) for any e in E(G), where G is the complement of G. We say that G is critical if G is both maximally and minimally critical. A graph G is said to be sensitive if for any graph G’ that 2?(G) = .Z(G’) implies G = G’. Suppose that G and G’ are graphs such that 2?(G) = Z(G’) un d er a lattice isomorphism @. It is easily seen that @ induces naturally a bijection 4 : V(G)+ V(G’) such that for each x in V(G), G(x) =x’ in V(G’) if and only if @({x}) = {x’} in .2(G)). W e call 4 the bijection induced by @. A graph G is said to be strongly sensitive if for any graph G’ and for any lattice isomorphism @: Z’(G) = Z(G’), the bijection Cp induced by Qi is a graph isomorphism of G onto G’. For a graph G, the following implications follow immediately from definitions:
منابع مشابه
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
متن کاملData sanitization in association rule mining based on impact factor
Data sanitization is a process that is used to promote the sharing of transactional databases among organizations and businesses, it alleviates concerns for individuals and organizations regarding the disclosure of sensitive patterns. It transforms the source database into a released database so that counterparts cannot discover the sensitive patterns and so data confidentiality is preserved ag...
متن کاملConstructions of antimagic labelings for some families of regular graphs
In this paper we construct antimagic labelings of the regular complete multipartite graphs and we also extend the construction to some families of regular graphs.
متن کاملConstructions of strongly regular Cayley graphs and skew Hadamard difference sets from cyclotomic classes
In this paper, we give a construction of strongly regular Cayley graphs and a construction of skew Hadamard difference sets. Both constructions are based on choosing cyclotomic classes in finite fields, and they generalize the constructions given by Feng and Xiang [10, 12]. Three infinite families of strongly regular graphs with new parameters are obtained. The main tools that we employed are i...
متن کاملExpression analysis of K+ transporter genes associated with salinity tolerance in grape
Molecular information of K+ accumulation in grapes is strongly required. Under salinity condition potassium transporters are inhibited by Na+. The aim of this study was to investigate the effects of salinity on the expression of K+ transporter genes in grape. Based on the previous screening study on 18 grape genotypes, ‘H6’ and ‘Gharashani’ (tolerant) and ‘Shirazi’ and ‘GhezelUzum’ (sensitive) ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Discrete Mathematics
دوره 72 شماره
صفحات -
تاریخ انتشار 1988