Liar's domination in graphs: Complexity and algorithm
Discrete Applied Mathematics
A linear time algorithm for liar's domination problem in proper interval graphs
Information Processing Letters
Note: On upper bounds for multiple domination numbers of graphs
Discrete Applied Mathematics
Hardness results and approximation algorithm for total liar's domination in graphs
Journal of Combinatorial Optimization
Hi-index | 0.04 |
Assume that each vertex of a graph G is the possible location for an “intruder” such as a thief, or a saboteur, a fire in a facility or some possible processor fault in a computer network. A device at a vertex v is assumed to be able to detect the intruder at any vertex in its closed neighborhood N[v] and to identify at which vertex in N[v] the intruder is located. One must then have a dominating set S ⊆ V(G), a set with ∪v∈SN[v] = V(G), to be able to identify any intruder's location. If any one device can fail to detect the intruder, then one needs a double-dominating set. This article introduces the study of liar's dominating sets, sets that can identify an intruder's location even when any one device in the neighborhood of the intruder vertex can lie, that is, any one device in the neighborhood of the intruder vertex can misidentify any vertex in its closed neighborhood as the intruder location. Liar's dominating sets lie between double-dominating sets and triple-dominating sets because every triple-dominating set is a liar's dominating set, and every liar's dominating set must double dominate. © 2009 Wiley Periodicals, Inc. NETWORKS, 2009