Article ID Journal Published Year Pages File Type
6421844 Applied Mathematics and Computation 2013 8 Pages PDF
Abstract

In this work, two types of codes such that they both dominate and locate the vertices of a graph are studied. Those codes might be sets of detectors in a network or processors controlling a system whose set of responses should determine a malfunctioning processor or an intruder. Here, we present our contributions on λ-codes and η-codes concerning bounds, extremal values and realization theorems.

Related Topics
Physical Sciences and Engineering Mathematics Applied Mathematics
Authors
, , , , ,