Correcting the algorithm for a minimum secure dominating set of proper interval graphs by Zou, Liu, Hsu and Wang

Zou et al. (2019) proposed an algorithm for calculating a minimum secure dominating set of a proper interval graph. However, we find a counterexample for which the algorithm outputs an incorrect subset of vertices. In this paper, we provide a modified algorithm and the proofs for the correctness.

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Discrete Applied Mathematics Jg. 334; S. 139 - 144
Hauptverfasser: Araki, Toru, Saito, Ryuya
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Elsevier B.V 31.07.2023
Schlagworte:
ISSN:0166-218X, 1872-6771
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Zou et al. (2019) proposed an algorithm for calculating a minimum secure dominating set of a proper interval graph. However, we find a counterexample for which the algorithm outputs an incorrect subset of vertices. In this paper, we provide a modified algorithm and the proofs for the correctness.
AbstractList Zou et al. (2019) proposed an algorithm for calculating a minimum secure dominating set of a proper interval graph. However, we find a counterexample for which the algorithm outputs an incorrect subset of vertices. In this paper, we provide a modified algorithm and the proofs for the correctness.
Author Saito, Ryuya
Araki, Toru
Author_xml – sequence: 1
  givenname: Toru
  orcidid: 0000-0003-2399-8769
  surname: Araki
  fullname: Araki, Toru
  email: arakit@gunma-u.ac.jp
  organization: Graduate School of Science and Technology, Gunma University, Kiryu, Gunma 376-8515, Japan
– sequence: 2
  givenname: Ryuya
  surname: Saito
  fullname: Saito, Ryuya
  organization: Division of Electronics and Informatics, Gunma University, Kiryu, Gunma, Japan
BookMark eNp9kMFOwzAMQCMEEtvgA7jlA2hxmpJl4oQmYEiTuIBAXKI0dbdMa1Il7aT9PRnjxGEXW7b8LPuNybnzDgm5YZAzYOJuk9e6zQsoeA5lDlCckRGT0yIT0yk7J6M0I7KCya9LMo5xAwAsVSPSzX0IaHrrVrRfI9XblQ-2X7e08YFq2lpn26GlEc0QkNY-NfTvdMSe-oZ2wXcYqHU9hp3e0lXQ3TrSak-__XBLlzaFRRyodjX91G51RS4avY14_Zcn5OP56X2-yJZvL6_zx2VmuOB9hgalFhoqjrWoOZSVQMEqI2eyhJLfC2QSioqXHKpC1lU5Q6M5l1g0pZQc-IRMj3tN8DEGbJSxfbrcuz5ou1UM1EGc2qgkTh3EKShVEpdI9o_sgm112J9kHo4Mppd2FoOKxqIzWNuDXVV7e4L-AfrQiPc
CitedBy_id crossref_primary_10_1016_j_tcs_2024_114706
Cites_doi 10.1016/j.dam.2019.02.043
10.7151/dmgt.1405
10.1016/j.dam.2022.01.013
10.1016/0898-1221(93)90308-I
10.1016/j.dam.2019.01.012
10.1016/j.ipl.2019.01.005
10.1016/j.ipl.2015.05.006
10.1016/j.dam.2017.10.020
10.1016/j.dam.2018.03.040
10.2989/16073606.2015.1068238
10.2989/16073606.2016.1259188
10.1016/S0022-0000(76)80045-1
10.1016/j.dam.2014.02.001
10.1016/j.ipl.2021.106155
ContentType Journal Article
Copyright 2023 Elsevier B.V.
Copyright_xml – notice: 2023 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.dam.2023.04.002
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
EISSN 1872-6771
EndPage 144
ExternalDocumentID 10_1016_j_dam_2023_04_002
S0166218X2300121X
GroupedDBID -~X
ADEZE
AFTJW
ALMA_UNASSIGNED_HOLDINGS
FDB
OAUVE
AAYXX
AI.
CITATION
FA8
VH1
WUQ
ID FETCH-LOGICAL-c363t-ece8a6a0b3ed6d304b6e61bc898404356e1802b3430b28db49eca338e2f488303
ISICitedReferencesCount 2
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000982620100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0166-218X
IngestDate Tue Nov 18 22:39:54 EST 2025
Sat Nov 29 07:26:32 EST 2025
Sat May 20 23:43:24 EDT 2023
IsPeerReviewed true
IsScholarly true
Keywords Domination
Linear time algorithm
Proper interval graphs
Secure domination
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c363t-ece8a6a0b3ed6d304b6e61bc898404356e1802b3430b28db49eca338e2f488303
ORCID 0000-0003-2399-8769
PageCount 6
ParticipantIDs crossref_citationtrail_10_1016_j_dam_2023_04_002
crossref_primary_10_1016_j_dam_2023_04_002
elsevier_sciencedirect_doi_10_1016_j_dam_2023_04_002
PublicationCentury 2000
PublicationDate 2023-07-31
PublicationDateYYYYMMDD 2023-07-31
PublicationDate_xml – month: 07
  year: 2023
  text: 2023-07-31
  day: 31
PublicationDecade 2020
PublicationTitle Discrete Applied Mathematics
PublicationYear 2023
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Klostermeyer, Mynhardt (b15) 2008; 28
Zou, Liu, Chang, Hsu (b19) 2022; 311
Jha, Pradhan, Banerjee (b13) 2019; 145
Zou, Liu, Hsu, Wang (b20) 2019; 260
Castillano, Ugbinada (b9) 2014; 8
Chartrand, Lesniak, Zhang (b10) 2011
Cockayne, Grobler, Gründlingh, Munganga, van Vuuren (b11) 2005; 67
Looges, Olariu (b17) 1993; 25
Arumugam, Ebadi, Manrique (b4) 2014
Golumbic (b12) 2004
Booth, Lueker (b5) 1976; 13
Burger, de Villiers, van Vuuren (b7) 2014; 171
Merouane, Chellali (b18) 2015; 115
Araki, Yumoto (b3) 2018; 236
Li, Shao, Xu (b16) 2017; 40
Araki, Miyazaki (b1) 2018; 247
Araki, Yamanaka (b2) 2019; 262
Burger, de Villiers, van Vuuren (b8) 2016; 39
Kišek, Klavžar (b14) 2021; 172
Burger, de Villiers, Vuuren (b6) 2013
Li (10.1016/j.dam.2023.04.002_b16) 2017; 40
Kišek (10.1016/j.dam.2023.04.002_b14) 2021; 172
Araki (10.1016/j.dam.2023.04.002_b1) 2018; 247
Merouane (10.1016/j.dam.2023.04.002_b18) 2015; 115
Araki (10.1016/j.dam.2023.04.002_b3) 2018; 236
Zou (10.1016/j.dam.2023.04.002_b20) 2019; 260
Golumbic (10.1016/j.dam.2023.04.002_b12) 2004
Chartrand (10.1016/j.dam.2023.04.002_b10) 2011
Burger (10.1016/j.dam.2023.04.002_b7) 2014; 171
Araki (10.1016/j.dam.2023.04.002_b2) 2019; 262
Klostermeyer (10.1016/j.dam.2023.04.002_b15) 2008; 28
Looges (10.1016/j.dam.2023.04.002_b17) 1993; 25
Burger (10.1016/j.dam.2023.04.002_b6) 2013
Arumugam (10.1016/j.dam.2023.04.002_b4) 2014
Booth (10.1016/j.dam.2023.04.002_b5) 1976; 13
Cockayne (10.1016/j.dam.2023.04.002_b11) 2005; 67
Burger (10.1016/j.dam.2023.04.002_b8) 2016; 39
Zou (10.1016/j.dam.2023.04.002_b19) 2022; 311
Castillano (10.1016/j.dam.2023.04.002_b9) 2014; 8
Jha (10.1016/j.dam.2023.04.002_b13) 2019; 145
References_xml – volume: 262
  start-page: 179
  year: 2019
  end-page: 184
  ident: b2
  article-title: Secure domination in cographs
  publication-title: Discrete Appl. Math.
– volume: 8
  start-page: 5203
  year: 2014
  end-page: 5211
  ident: b9
  article-title: Secure domination in the joins of graphs
  publication-title: Appl. Math. Sci.
– volume: 311
  start-page: 68
  year: 2022
  end-page: 71
  ident: b19
  article-title: The co-secure domination in proper interval graphs
  publication-title: Discrete Appl. Math.
– volume: 67
  start-page: 19
  year: 2005
  end-page: 32
  ident: b11
  article-title: Protection of a graph
  publication-title: Util. Math.
– volume: 40
  start-page: 1
  year: 2017
  end-page: 12
  ident: b16
  article-title: On secure domination in trees
  publication-title: Quaest. Math.
– volume: 260
  start-page: 289
  year: 2019
  end-page: 293
  ident: b20
  article-title: A simple algorithm for secure domination in proper interval graphs
  publication-title: Discrete Appl. Math.
– year: 2011
  ident: b10
  article-title: Graphs & Digraphs
– volume: 236
  start-page: 23
  year: 2018
  end-page: 29
  ident: b3
  article-title: On the secure domination numbers of maximal outerplanar graphs
  publication-title: Discrete Appl. Math.
– year: 2004
  ident: b12
  article-title: Algorithmic Graph Theory and Perfect Graphs
– volume: 13
  start-page: 335
  year: 1976
  end-page: 379
  ident: b5
  article-title: Testing for the consecutive ones property, interval graphs, and graph planarity using PQ-tree algorithms
  publication-title: J. Comput. System Sci.
– volume: 25
  start-page: 15
  year: 1993
  end-page: 25
  ident: b17
  article-title: Optimal greedy algorithms for indifference graphs
  publication-title: Comput. Math. Appl.
– volume: 115
  start-page: 786
  year: 2015
  end-page: 790
  ident: b18
  article-title: On secure domination in graphs
  publication-title: Inform. Process. Lett.
– start-page: 167
  year: 2014
  end-page: 182
  ident: b4
  article-title: Co-secure and secure domination in graphs
  publication-title: Util. Math.
– volume: 145
  start-page: 30
  year: 2019
  end-page: 38
  ident: b13
  article-title: The secure domination problem in cographs
  publication-title: Inform. Process. Lett.
– volume: 39
  start-page: 189
  year: 2016
  end-page: 202
  ident: b8
  article-title: On minimum secure dominating sets of graphs
  publication-title: Quaest. Math.
– volume: 247
  start-page: 70
  year: 2018
  end-page: 76
  ident: b1
  article-title: Secure domination in proper interval graphs
  publication-title: Discrete Appl. Math.
– volume: 172
  year: 2021
  ident: b14
  article-title: Correcting the algorithm for the secure domination number of cographs by Jha, Pradhan, and Banerjee
  publication-title: Inform. Process. Lett.
– year: 2013
  ident: b6
  article-title: A binary programming approach towards achieving effective graph protection
  publication-title: Proceedings of the 2013 ORSSA Annual Conference
– volume: 28
  start-page: 267
  year: 2008
  end-page: 284
  ident: b15
  article-title: Secure domination and secure total domination in graphs
  publication-title: Discuss. Math. Graph Theory
– volume: 171
  start-page: 15
  year: 2014
  end-page: 47
  ident: b7
  article-title: A linear algorithm for secure domination in trees
  publication-title: Discrete Appl. Math.
– volume: 262
  start-page: 179
  year: 2019
  ident: 10.1016/j.dam.2023.04.002_b2
  article-title: Secure domination in cographs
  publication-title: Discrete Appl. Math.
  doi: 10.1016/j.dam.2019.02.043
– volume: 8
  start-page: 5203
  issue: 105
  year: 2014
  ident: 10.1016/j.dam.2023.04.002_b9
  article-title: Secure domination in the joins of graphs
  publication-title: Appl. Math. Sci.
– volume: 67
  start-page: 19
  year: 2005
  ident: 10.1016/j.dam.2023.04.002_b11
  article-title: Protection of a graph
  publication-title: Util. Math.
– start-page: 167
  year: 2014
  ident: 10.1016/j.dam.2023.04.002_b4
  article-title: Co-secure and secure domination in graphs
  publication-title: Util. Math.
– volume: 28
  start-page: 267
  year: 2008
  ident: 10.1016/j.dam.2023.04.002_b15
  article-title: Secure domination and secure total domination in graphs
  publication-title: Discuss. Math. Graph Theory
  doi: 10.7151/dmgt.1405
– volume: 311
  start-page: 68
  year: 2022
  ident: 10.1016/j.dam.2023.04.002_b19
  article-title: The co-secure domination in proper interval graphs
  publication-title: Discrete Appl. Math.
  doi: 10.1016/j.dam.2022.01.013
– year: 2011
  ident: 10.1016/j.dam.2023.04.002_b10
– volume: 25
  start-page: 15
  issue: 7
  year: 1993
  ident: 10.1016/j.dam.2023.04.002_b17
  article-title: Optimal greedy algorithms for indifference graphs
  publication-title: Comput. Math. Appl.
  doi: 10.1016/0898-1221(93)90308-I
– volume: 260
  start-page: 289
  year: 2019
  ident: 10.1016/j.dam.2023.04.002_b20
  article-title: A simple algorithm for secure domination in proper interval graphs
  publication-title: Discrete Appl. Math.
  doi: 10.1016/j.dam.2019.01.012
– volume: 145
  start-page: 30
  year: 2019
  ident: 10.1016/j.dam.2023.04.002_b13
  article-title: The secure domination problem in cographs
  publication-title: Inform. Process. Lett.
  doi: 10.1016/j.ipl.2019.01.005
– volume: 115
  start-page: 786
  year: 2015
  ident: 10.1016/j.dam.2023.04.002_b18
  article-title: On secure domination in graphs
  publication-title: Inform. Process. Lett.
  doi: 10.1016/j.ipl.2015.05.006
– volume: 236
  start-page: 23
  year: 2018
  ident: 10.1016/j.dam.2023.04.002_b3
  article-title: On the secure domination numbers of maximal outerplanar graphs
  publication-title: Discrete Appl. Math.
  doi: 10.1016/j.dam.2017.10.020
– year: 2004
  ident: 10.1016/j.dam.2023.04.002_b12
– volume: 247
  start-page: 70
  year: 2018
  ident: 10.1016/j.dam.2023.04.002_b1
  article-title: Secure domination in proper interval graphs
  publication-title: Discrete Appl. Math.
  doi: 10.1016/j.dam.2018.03.040
– volume: 39
  start-page: 189
  issue: 2
  year: 2016
  ident: 10.1016/j.dam.2023.04.002_b8
  article-title: On minimum secure dominating sets of graphs
  publication-title: Quaest. Math.
  doi: 10.2989/16073606.2015.1068238
– volume: 40
  start-page: 1
  issue: 1
  year: 2017
  ident: 10.1016/j.dam.2023.04.002_b16
  article-title: On secure domination in trees
  publication-title: Quaest. Math.
  doi: 10.2989/16073606.2016.1259188
– year: 2013
  ident: 10.1016/j.dam.2023.04.002_b6
  article-title: A binary programming approach towards achieving effective graph protection
– volume: 13
  start-page: 335
  year: 1976
  ident: 10.1016/j.dam.2023.04.002_b5
  article-title: Testing for the consecutive ones property, interval graphs, and graph planarity using PQ-tree algorithms
  publication-title: J. Comput. System Sci.
  doi: 10.1016/S0022-0000(76)80045-1
– volume: 171
  start-page: 15
  issue: 10
  year: 2014
  ident: 10.1016/j.dam.2023.04.002_b7
  article-title: A linear algorithm for secure domination in trees
  publication-title: Discrete Appl. Math.
  doi: 10.1016/j.dam.2014.02.001
– volume: 172
  year: 2021
  ident: 10.1016/j.dam.2023.04.002_b14
  article-title: Correcting the algorithm for the secure domination number of cographs by Jha, Pradhan, and Banerjee
  publication-title: Inform. Process. Lett.
  doi: 10.1016/j.ipl.2021.106155
SSID ssj0001218
ssj0000186
ssj0006644
Score 2.3775628
Snippet Zou et al. (2019) proposed an algorithm for calculating a minimum secure dominating set of a proper interval graph. However, we find a counterexample for which...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 139
SubjectTerms Domination
Linear time algorithm
Proper interval graphs
Secure domination
Title Correcting the algorithm for a minimum secure dominating set of proper interval graphs by Zou, Liu, Hsu and Wang
URI https://dx.doi.org/10.1016/j.dam.2023.04.002
Volume 334
WOSCitedRecordID wos000982620100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-6771
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001218
  issn: 0166-218X
  databaseCode: AIEXJ
  dateStart: 20211207
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-6771
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001218
  issn: 0166-218X
  databaseCode: AIEXJ
  dateStart: 20220331
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWlkM5VDxFeckHTqSRkthxnGNVigoSFYJFRFwiJ3Fgq91klceq--87ju1kRQEBEpfsyoojx_NlZjwef4PQy6iMS-6H0qVl5Lm0iEEPMp-5MSuI9MtIZFE5FJuILi54ksQfZrONPQuzWUZVxa-u4vV_FTW0gbDV0dm_EPf4UGiA_yB0uILY4fpHgj9V9Tbyzh6DEstvdbPovq90vqSjuERW_cppVaBdOkWtcmGGu1s5ZAWsVXi-GXgkGhiXM1Bat8pN_Vr3ehk__Jy3_bDz8EUY42dc3NcL0ETgio8O7vuRGbad4CV0uex53fRjkEcshppOzsdtvxW74YiA2DinjZHdOCejw5aMueBMJNrqaFXLo8BlkS7AYnUxMZFNrU19zXNkDLOviSJv6HwdfriEISlmgYAM1LVeMBm4Me3wkxqHGgasuxSXXXIL7QdRGIM23D95e5a82yEeU6x6BzZUN-1MgYdGDV-8fiO7Uz7kDP4whJ_7Ojv-y_wuOjQLD3yiAXMPzWR1H93Zkc0DtJ6gg6EZj9DBAB0ssIEO1tDBE3SgpcN1iTV0sIUO1tDB2RYDdI4xAOcYA2wwwAYr2DxEn9-czU_PXVORw80JI50rc8kFE15GZAEfs0czJpmf5TzmiqUpZFIRCmaEEi8LeJHRWOaCEC6DEgwFeEuP0F5VV_IxwpEvQi4oZZ4saCzA2HF4YiCp8riLUBwhz85dmhu6elU1ZZnavMTLFKY7VdOdejSF6T5Cr8Yua83V8rubqRVIapxN7USmgKtfd3vyb92eooPpY3mG9rqml8_R7XzTLdrmhUHfNSj4nws
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Correcting+the+algorithm+for+a+minimum+secure+dominating+set+of+proper+interval+graphs+by+Zou%2C+Liu%2C+Hsu+and+Wang&rft.jtitle=Discrete+Applied+Mathematics&rft.au=Araki%2C+Toru&rft.au=Saito%2C+Ryuya&rft.date=2023-07-31&rft.pub=Elsevier+B.V&rft.issn=0166-218X&rft.eissn=1872-6771&rft.volume=334&rft.spage=139&rft.epage=144&rft_id=info:doi/10.1016%2Fj.dam.2023.04.002&rft.externalDocID=S0166218X2300121X
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0166-218X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0166-218X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0166-218X&client=summon