Dualizing cubic graph theory
T. McKee (1988)
Fundamenta Mathematicae
Similarity:
T. McKee (1988)
Fundamenta Mathematicae
Similarity:
E. Bampis, A. Giannakos, A. Karzanov, Y. Manoussakis, I. Milis (2000)
RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
Similarity:
Stodolsky, B.Y. (2008)
The Electronic Journal of Combinatorics [electronic only]
Similarity:
P. J. McCarthy (1978)
Czechoslovak Mathematical Journal
Similarity:
Zbigniew Lonc, Zdeněk Ryjáček (1991)
Czechoslovak Mathematical Journal
Similarity:
Araya, Makoto, Wiener, Gábor (2011)
The Electronic Journal of Combinatorics [electronic only]
Similarity:
Juraj Bosák (1984)
Mathematica Slovaca
Similarity:
Katarzyna Jesse-Józefczyk, Elżbieta Sidorowicz (2014)
Open Mathematics
Similarity:
Consider a graph whose vertices play the role of members of the opposing groups. The edge between two vertices means that these vertices may defend or attack each other. At one time, any attacker may attack only one vertex. Similarly, any defender fights for itself or helps exactly one of its neighbours. If we have a set of defenders that can repel any attack, then we say that the set is secure. Moreover, it is strong if it is also prepared for a raid of one additional foe who can strike...