2004
DOI: 10.1016/s0012-365x(03)00306-6
|View full text |Cite
|
Sign up to set email alerts
|

The minimum density of an identifying code in the king lattice

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0

Year Published

2004
2004
2020
2020

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 43 publications
(41 citation statements)
references
References 10 publications
0
41
0
Order By: Relevance
“…, 2 k+1 }}. Then the code C = C 1 ∪ C 2 has density 3 8 . In the diagonal pattern S r,∆ ((0, 0), (−1, −1)) there are at least the four vertices (a, b), (b, a), (a, b − 1), (b − 1, a) and their symmetric images by a central rotation in (−0.5, −0.5).…”
Section: Claim (Ii)mentioning
confidence: 99%
See 1 more Smart Citation
“…, 2 k+1 }}. Then the code C = C 1 ∪ C 2 has density 3 8 . In the diagonal pattern S r,∆ ((0, 0), (−1, −1)) there are at least the four vertices (a, b), (b, a), (a, b − 1), (b − 1, a) and their symmetric images by a central rotation in (−0.5, −0.5).…”
Section: Claim (Ii)mentioning
confidence: 99%
“…For special values of r, this graph has been considered in many papers, for example, [1,3,6,8,9]. For related results, see [2,12].…”
Section: Introductionmentioning
confidence: 99%
“…7) While C is not empty, 8) Update dist(C, C j ) and path(C, C j ) for every C j ∈ C and set C * ← arg min Cj ∈ b C dist(C, C j ).…”
Section: Iterationmentioning
confidence: 99%
“…Although introduced only twelve years ago [1], identifying codes have been linked to a number of deeply researched theoretical foundations, including super-imposed codes [2], covering codes [1,3], locating-dominating sets [4], and tilings [5][6][7][8]. They have also been generalized and used for detecting faults or failures in multi-processor systems [1], RF-based localization in harsh environments [9][10][11], and routing in networks [12].…”
Section: Introductionmentioning
confidence: 99%
“…Significant efforts in the research of identifying codes and their variants have focused on finding efficient constructions in two dimensional lattices, grids and Hamming spaces (see [12,[23][24][25][26], and [6] for a summary of recent results). Until recently, little has been published towards a polynomial time approximation algorithm for arbitrary graphs.…”
Section: Introductionmentioning
confidence: 99%