2017
DOI: 10.1016/j.endm.2017.11.001
|View full text |Cite
|
Sign up to set email alerts
|

Complexity Issues of Variants of Secure Domination in Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…It is clear that equations (7) and ( 12) satisfy requirement 1. It can also been seen that equations ( 8), (10) and ( 11) satisfy requirement 2, by the following argument. First, constraints (8) and (11) ensure that if x i = 0, then y ij = 0.…”
Section: Improved Formulationmentioning
confidence: 83%
See 3 more Smart Citations
“…It is clear that equations (7) and ( 12) satisfy requirement 1. It can also been seen that equations ( 8), (10) and ( 11) satisfy requirement 2, by the following argument. First, constraints (8) and (11) ensure that if x i = 0, then y ij = 0.…”
Section: Improved Formulationmentioning
confidence: 83%
“…Hence, there must be a guard at vertex i in order to choose it as a designated guard for another vertex. Then, for each vertex j, constraint (10) ensures that either x j = 1 or i∈N (i) y ij = 1; this corresponds precisely to requirement 2.…”
Section: Improved Formulationmentioning
confidence: 99%
See 2 more Smart Citations