The watching system as a generalization of identifying code

被引:2
|
作者
Ghorbani, Modjtaba [1 ]
Dehmer, Matthias [2 ,3 ,4 ]
Maimani, Hamidreza [1 ]
Maddah, Sheyda [1 ]
Roozbayani, Maryam [1 ]
Emmert-Streib, Frank [5 ,6 ]
机构
[1] Shahid Rajaee Teacher Training Univ, Fac Sci, Dept Math, Tehran 16785136, Iran
[2] Swiss Distance Univ Appl Sci, Dept Comp Sci, Brig, Switzerland
[3] UMIT, Dept Biomed Comp Sci & Mechatron, Hall In Tirol, Austria
[4] Nankai Univ, Coll Artificial Intelligence, Tianjin 300071, Peoples R China
[5] Tampere Univ, Predict Soc & Data Analyt Lab, Korkeakoulunkatu 10, Tampere 33720, Finland
[6] Tampere Univ, Inst Biosci & Med Technol, Korkeakoulunkatu 10, Tampere 33720, Finland
基金
奥地利科学基金会;
关键词
Watching system; Domination number; Graph products; Identifying code;
D O I
10.1016/j.amc.2020.125302
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The watching system, as a generalization of identifying code, has been defined by Auger in 2010. The identifying code has been used to wireless networks and it has been also applied to locate objects in the sensor networks. On the other hand, the graph product is employed in most of the mathematic branches such as network design to study the structure of network elements. In this paper, we give some upper bounds for the watching number of well-know product graphs. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Identifying use cases in source code
    Zhang, Lu
    Qin, Tao
    Zhou, Zhiying
    Hao, Dan
    Sun, Jiasu
    JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (11) : 1588 - 1598
  • [22] RepliComment: Identifying clones in code comments
    Blasi, Arianna
    Stulova, Nataliia
    Gorla, Alessandra
    Nierstrasz, Oscar
    JOURNAL OF SYSTEMS AND SOFTWARE, 2021, 182
  • [23] Terrorist Network Monitoring with Identifying Code
    Sen, Arunabha
    Goliber, Victoria Horan
    Zhou, Chenyang
    Basu, Kaustav
    SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 329 - 339
  • [24] Identifying Source Code File Experts
    Cury, Otavio
    Avelino, Guilherme
    Neto, Pedro Santos
    Britto, Ricardo
    Valente, Marco Tulio
    PROCEEDINGS OF THE16TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, ESEM 2022, 2022, : 125 - 136
  • [25] Recommendations for Developers Identifying Code Smells
    de Mello, Rafael
    Oliveira, Roberto
    Uchoa, Anderson
    Oizumi, Willian
    Garcia, Alessandro
    Fonseca, Baldoino
    de Mello, Fernanda
    IEEE SOFTWARE, 2023, 40 (02) : 90 - 98
  • [26] RepliComment: Identifying Clones in Code Comments
    Blasi, Arianna
    Gorla, Alessandra
    2018 IEEE/ACM 26TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2018), 2018, : 320 - 323
  • [27] Research on Embedded Software Testing Based on Code Coverage and Variable Watching
    Du, SongYang
    Yang, Hua
    Zhang, Ying
    Chen, ZhongWei
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 1694 - 1699
  • [28] Theoretical and experimental study on hydraulic servo position control system with generalization pulse code modulation control
    Liu, R
    Wang, XY
    Tao, GL
    Ding, F
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON FLUID POWER TRANSMISSION AND CONTROL (ICFP'2001), 2001, : 176 - 179
  • [29] Automated Generalization and Refinement of Code Templates with EKEKO/X
    Molderez, Tim
    De Roover, Coen
    2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1, 2016, : 669 - 672
  • [30] A generalization of cyclic code equivalence algorithm to constacyclic codes
    Dev Akre
    Nuh Aydin
    Matthew Harrington
    Saurav Pandey
    Designs, Codes and Cryptography, 2023, 91 : 763 - 777