On a new class of codes for identifying vertices in graphs
read more
Citations
Grid coverage for surveillance and target location in distributed sensor networks
Computer Science – Theory and Applications
Minimizing the size of an identifying or locating-dominating code in a graph is NP-hard
Robust location detection in emergency sensor networks
Robust location detection with sensor networks
References
The Theory of Error-Correcting Codes
On the Connection Assignment Problem of Diagnosable Systems
Fat-trees: universal networks for hardware-efficient supercomputing
Related Papers (5)
Minimizing the size of an identifying or locating-dominating code in a graph is NP-hard
Frequently Asked Questions (11)
Q2. What is the condition for generating a graph with vertices?
The authors are interested in generating a graph with vertices in which the number of codewords is as close to as possible for the identification of single vertices and to for identification of sets of up to vertices.
Q3. how many codewords are in a ball?
The center of the ball is covered by all codewords, a vertex at distance one from the center is covered only by itself, and each vertex at distance two by a different pair of codewords.
Q4. What is the advantage of a test program?
Since the test program has to reside on the local memory of every monitor processor, this also minimizes the amount of memory required to store the test program.
Q5. how many codewords are covered by a cube?
Every codeword is covered only by itself because the Hamming distance between any two parity vectors of codewords is at least three.
Q6. What is the lower bound of the -dimensional binary cube?
The lower bound (16) is achieved if there exists a perfect covering of the -dimensional cube by balls of radius two, i.e., a perfect code1 with distance five.
Q7. What is the simplest example of a binary cube computer?
An example of a commercial binary-cube computer is the NCUBE/ten, which is a ten-dimensional system developed by NCUBE Corporation [8], [14].
Q8. Why is the vertices in a triangular mesh not distinguishable?
This is because the vertices inare at distance two from each other and any vertex is at the same distance from all the vertices in Hence the vertices in are not distinguishable ifFinally, the authors address the problem of code construction for hexagonal and triangular meshes, the former topology having received attention recently [23].
Q9. what is the simplest way to maximize the number of columns under the constraint?
obviously,it follows that(8)To maximize the number of columns under the constraint (8), the authors have to choose the weights of the columns as small as possible, starting with columns of weight , , etc., up to the point where the right-hand side of (8) is exceeded.
Q10. How many bits in a graph are the for identifying a faulty processor?
The number of bits in the syndrome equals the number of test links in the test graph; this can be extremely large in systems with thousands of processors, and can easily lead to traffic congestion system when the syndrome is communicated to the host.
Q11. what is the density of codewords for a three-dimensional cube?
Theorem 6 and Corollary 4 show that the density of codewords is only for three-dimensional cubes, and tends to zero as increases.