On Codes Identifying Vertices in the Two-Dimensional Square Lattice with Diagonals
IEEE Transactions on Computers
Bounds for Codes Identifying Vertices in the Hexagonal Grid
SIAM Journal on Discrete Mathematics
Discrete Mathematics
Fault-tolerant locating-dominating sets
Discrete Mathematics
On the density of identifying codes in the square lattice
Journal of Combinatorial Theory Series B
Minimizing the size of an identifying or locating-dominating code in a graph is NP-hard
Theoretical Computer Science
Identifying and locating-dominating codes on chains and cycles
European Journal of Combinatorics
European Journal of Combinatorics
On a new class of codes for identifying vertices in graphs
IEEE Transactions on Information Theory
Discrete sensor placement problems in distribution networks
Mathematical and Computer Modelling: An International Journal
Identifying codes of cycles with odd orders
European Journal of Combinatorics
On r-locating-dominating sets in paths
European Journal of Combinatorics
Note: On the size of identifying codes in binary hypercubes
Journal of Combinatorial Theory Series A
An optimal result for codes identifying sets of words
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Identifying codes and locating-dominating sets on paths and cycles
Discrete Applied Mathematics
Minimum sizes of identifying codes in graphs differing by one vertex
Cryptography and Communications
Locating and identifying codes in circulant networks
Discrete Applied Mathematics
New results on variants of covering codes in Sierpiński graphs
Designs, Codes and Cryptography
Minimum sizes of identifying codes in graphs differing by one edge
Cryptography and Communications
Hi-index | 0.00 |
For a graph G and a set D@?V(G), define N"r[x]={x"i@?V(G):d(x,x"i)@?r} (where d(x,y) is graph theoretic distance) and D"r(x)=N"r[x]@?D. D is known as an r-identifying code if for every vertex x,D"r(x)0@?, and for every pair of vertices x and y, xy@?D"r(x)D"r(y). The various applications of these codes include attack sensor placement in networks and fault detection/localization in multiprocessor or distributed systems. Bertrand et al. [N. Bertrand, I. Charon, O. Hudry, A. Lobstein, Identifying and locating-dominating codes on chains and cycles, European Journal of Combinatorics 25 (2004) 969-987] and Gravier et al. [S. Gravier, J. Moncel, A. Semri, Identifying codes of cycles, European Journal of Combinatorics 27 (2006) 767-776] provide partial results about the minimum size of D for r-identifying codes for paths and cycles and present complete closed form solutions for the case r=1, based in part on Daniel [M. Daniel, Codes identifiants, Rapport pour le DEA ROCO, Grenoble, June 2003]. We provide complete solutions for the case r=2.