Secure domination in a network A protection strategy
The concept of secure total domination in graphs was invested further. The study particularly considered a result obtained by Benecke et al. in a recent article. A counter example showed that such a result is faulty. A rectification of this result was provided and some quick consequences of the same...
| Veröffentlicht in: | Transactions of the National Academy of Science and Technology Vol. 33, no. 1 (Jul. 2011), 164 |
|---|---|
| 1. Verfasser: | |
| Weitere Verfasser: | |
| Format: | Artikel |
| Sprache: | English |
| Veröffentlicht: |
2011
|
| Schlagworte: |