2014
DOI: 10.1016/j.dam.2014.02.001
|View full text |Cite
|
Sign up to set email alerts
|

A linear algorithm for secure domination in trees

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
9
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…Algorithms exist to solve the secure domination problem, including linear-time algorithms for trees [5] and block graphs [17], as well as algorithms for general graphs [2,3,4]. However, there are very few infinite families of graphs for which the secure domination number is known.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Algorithms exist to solve the secure domination problem, including linear-time algorithms for trees [5] and block graphs [17], as well as algorithms for general graphs [2,3,4]. However, there are very few infinite families of graphs for which the secure domination number is known.…”
Section: Introductionmentioning
confidence: 99%
“…In the former case, v 2 2 is left unguarded. In the latter case, v 5 1 is left unguarded. This implies that S is not secure dominating, which is a contradiction, and hence S cannot contain the pattern 101101. .…”
mentioning
confidence: 99%
See 3 more Smart Citations