Watching Systems in graphs: an extension of Identifying Codes
نویسندگان
چکیده
We introduce the notion of watching systems in graphs, which is a generalization of that of identifying codes. We give some basic properties of watching systems, an upper bound on the minimum size of a watching system, and results on the graphs which achieve this bound; we also study the cases of the paths and cycles, and give complexity results.
منابع مشابه
An approach to fault detection and correction in design of systems using of Turbo codes
We present an approach to design of fault tolerant computing systems. In this paper, a technique is employed that enable the combination of several codes, in order to obtain flexibility in the design of error correcting codes. Code combining techniques are very effective, which one of these codes are turbo codes. The Algorithm-based fault tolerance techniques that to detect errors rely on the c...
متن کاملIdentifying the Effective Ethical Codes on Urban Management with Meta Synthesis Method
Purpose: The compliance ethical characteristics plays an important role in urban management, and accordingly, the purpose of this study was identifying the effective ethical codes on urban management with a meta synthesis method. Methodology: This study in terms of purpose was applied and in terms of implementation method was qualitative. The field of research was all articles of effective eth...
متن کاملAn Approach to Increasing Reliability Using Syndrome Extension
Computational errors in numerical data processing may be detected efficiently by using parity values associated with real number codes, even when inherent round off errors are allowed in addition to failure disruptions. This paper examines correcting turbo codes by straightforward application of an algorithm derived for finite-field codes, modified to operate over any field. There are syndromes...
متن کاملIdentifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کاملIdentifying codes in ( random ) geometric networks ∗ ( Technical report version )
It is important for networks built from wireless sensors technology to have a functional location detection system. Identifying codes, first introduced to model fault diagnosis of multi-processor systems, have recently proved to be useful to address this question. We are interested in the situation where the area of communication of each sensor is modelled by a disk: thus we consider identifyin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Discrete Applied Mathematics
دوره 161 شماره
صفحات -
تاریخ انتشار 2013