Complexity issues of perfect secure domination in graphs
From MaRDI portal
Publication:5037201
Recommendations
- The complexity of secure domination problem in graphs
- Complexity issues of variants of secure domination in graphs
- Perfect secure domination in graphs
- Algorithmic complexity of secure connected domination in graphs
- On secure domination in graphs
- Secure total domination in graphs: bounds and complexity
- Secure domination and secure total domination in graphs
- Secure total domination in graphs
- Algorithmic aspects of secure connected domination in graphs
- The secure domination problem in cographs
Cites work
- scientific article; zbMATH DE number 3639144 (Why is no real title available?)
- scientific article; zbMATH DE number 468643 (Why is no real title available?)
- scientific article; zbMATH DE number 2188604 (Why is no real title available?)
- scientific article; zbMATH DE number 2188623 (Why is no real title available?)
- Algorithm and Hardness Results for Outer-connected Dominating Set in Graphs
- Algorithmic aspects of semitotal domination in graphs
- Counting independent sets in tree convex bipartite graphs
- Dominating sets in n‐cubes
- On secure domination in graphs
- Perfect \(k\)-domination in graphs
- Perfect secure domination in graphs
- Secure domination and secure total domination in graphs
- The algorithmic use of hypertree structure and maximum neighbourhood orderings
- The monadic second-order logic of graphs. I: Recognizable sets of finite graphs
- Threshold graphs and related topics
Cited in
(5)
This page was built for publication: Complexity issues of perfect secure domination in graphs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5037201)