Secure domination in a network A protection strategy

The concept of secure total domination in graphs was invested further. The study particularly considered a result obtained by Benecke et al. in a recent article. A counter example showed that such a result is faulty. A rectification of this result was provided and some quick consequences of the same...

وصف كامل

التفاصيل البيبلوغرافية
الحاوية / القاعدة:Transactions of the National Academy of Science and Technology Vol. 33, no. 1 (Jul. 2011), 164
المؤلف الرئيسي: Canoy, Segio R. Jr
مؤلفون آخرون: Go, Carmelito E.
التنسيق: مقال
اللغة:English
منشور في: 2011
الموضوعات: