Irreversible conversion of graphs

From MaRDI portal
Publication:551200

DOI10.1016/j.tcs.2011.03.029zbMath1220.05109OpenAlexW2030703286MaRDI QIDQ551200

Dieter Rautenbach, Carmen C. Centeno, Mitre C. Dourado, Lucia Draque Penso, Jayme Luiz Szwarcfiter

Publication date: 14 July 2011

Published in: Theoretical Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.tcs.2011.03.029




Related Items

Complexity aspects of the triangle path convexity\(P_3\)-hull number of graphs with diameter twoOn the \(P_3\)-hull number of some products of graphsDiscovering small target sets in social networks: a fast and effective algorithmVaccinate your trees!Optimizing Spread of Influence in Social Networks via Partial IncentivesOn the harmless set problem parameterized by treewidthA general framework for path convexitiesA Fast and Effective Heuristic for Discovering Small Target Sets in Social NetworksComputing the hull number in toll convexityOn the \(\Delta \)-interval and the \(\Delta \)-convexity numbers of graphs and graph productsFormulas in connection with parameters related to convexity of paths on three vertices: caterpillars and unit interval graphsAlgorithmic and structural aspects of the \(P_3\)-Radon numberGeneralized threshold processes on graphsON DYNAMIC MONOPOLIES OF GRAPHS WITH PROBABILISTIC THRESHOLDS\(P_3\)-convexity on graphs with diameter two: computing hull and interval numbersGeneralizations, formulations and subgradient based heuristic with dynamic programming procedure for target set selection problemsThe Maximum Time of 2-Neighbour Bootstrap Percolation: Complexity ResultsOn the Carathéodory number of interval and graph convexitiesIrreversible \(k\)-threshold conversion number of circulant graphsThe maximum time of 2-neighbor bootstrap percolation: complexity resultsNon-monotone target sets for threshold values restricted to $0$, $1$, and the vertex degreeOn the monophonic rank of a graphNew computational approaches for the power dominating set problem: Set covering and the neighborhoods of zero forcing fortsOn the hull number on cycle convexity of graphsTarget set selection with maximum activation timeComplexity analysis of \(P_3\)-convexity problems on bounded-degree and planar graphsSolving target set selection with bounded thresholds faster than \(2^n\)Characterization and recognition of Radon-independent sets in split graphsComplete characterizations of the 2-domination and \(\mathcal{P}_3\)-hull number polytopesIrreversible k-threshold conversion number of some graphsThe convexity of induced paths of order three and applications: complexity aspectsAn upper bound on the \(P_3\)-Radon numberIrreversible conversion processes with deadlinesLatency-bounded target set selection in social networksDynamic monopolies in directed graphs: the spread of unilateral influence in social networksThe Carathéodory number of the \(P_3\) convexity of chordal graphsComputing the \(\mathcal{P}_3\)-hull number of a graph, a polyhedral approachActive influence spreading in social networksGraphs with few \(P_4\)'s under the convexity of paths of order threeInapproximability results for graph convexity parametersDynamic monopolies for interval graphs with bounded thresholdsSolving Target Set Selection with Bounded Thresholds Faster than 2^nOn the complexity of the \(P_{3}\)-hull number of the Cartesian product of graphsComplexity properties of complementary prismsDynamic monopolies for degree proportional thresholds in connected graphs of girth at least five and treesA computational study of \(f\)-reversible processes on graphsReversible iterative graph processesConstant thresholds can make target set selection tractableOn some tractable and hard instances for partial incentives and target set selectionVector domination in split-indifference graphsOn the Carathéodory and exchange numbers of geodetic convexity in graphsWhom to befriend to influence peopleFast and frugal targeting with incentivesPartial immunization of treesEvangelism in Social NetworksThe hull number in the convexity of induced paths of order \(3\)The complexity of finding harmless individuals in social networksRemarks on k-Clique, k-Independent Set and 2-Contamination in Complementary PrismsInfluence diffusion in social networks under time window constraintsThe maximum time of 2-neighbour bootstrap percolation: algorithmic aspectsSpread of influence in weighted networks under time and budget constraintsInfluence Diffusion in Social Networks under Time Window ConstraintsOn irreversible spread of influence in edge-weighted graphsOn reconfigurability of target sets



Cites Work