Watching Systems in graphs: an extension of Identifying Codes

نویسندگان

  • David Auger
  • Irène Charon
  • Olivier Hudry
  • Antoine Lobstein
چکیده

We introduce the notion of watching systems in graphs, which is a generalization of that of identifying codes. We give some basic properties of watching systems, an upper bound on the minimum size of a watching system, and results on the graphs which achieve this bound; we also study the cases of the paths and cycles, and give complexity results.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An approach to fault detection and correction in design of systems using of Turbo ‎codes‎

We present an approach to design of fault tolerant computing systems. In this paper, a technique is employed that enable the combination of several codes, in order to obtain flexibility in the design of error correcting codes. Code combining techniques are very effective, which one of these codes are turbo codes. The Algorithm-based fault tolerance techniques that to detect errors rely on the c...

متن کامل

Identifying the Effective Ethical Codes on Urban Management with Meta Synthesis Method

Purpose: The compliance ethical characteristics plays an important role in urban management, and accordingly, the purpose of this study was identifying the effective ethical codes on urban management with a meta synthesis method. Methodology: This study in terms of purpose was applied and in terms of implementation method was qualitative. The field of research was all articles of effective eth...

متن کامل

An Approach to Increasing Reliability Using Syndrome Extension

Computational errors in numerical data processing may be detected efficiently by using parity values associated with real number codes, even when inherent round off errors are allowed in addition to failure disruptions. This paper examines correcting turbo codes by straightforward application of an algorithm derived for finite-field codes, modified to operate over any field. There are syndromes...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

Identifying codes in ( random ) geometric networks ∗ ( Technical report version )

It is important for networks built from wireless sensors technology to have a functional location detection system. Identifying codes, first introduced to model fault diagnosis of multi-processor systems, have recently proved to be useful to address this question. We are interested in the situation where the area of communication of each sensor is modelled by a disk: thus we consider identifyin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Discrete Applied Mathematics

دوره 161  شماره 

صفحات  -

تاریخ انتشار 2013