𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Edge vulnerability parameters of bisplit graphs

✍ Scribed by Metrose Metsidik; Elkin Vumar


Publisher
Elsevier Science
Year
2008
Tongue
English
Weight
260 KB
Volume
56
Category
Article
ISSN
0898-1221

No coin nor oath required. For personal study only.

✦ Synopsis


A graph is called bisplit if its vertex set can be partitioned into three stable sets I, Y and Z such that Y βˆͺ Z induces a complete bipartite graph (a biclique). In this paper, we investigate the edge vulnerability parameters of bisplit graphs. Let G = (Y βˆͺ Z , I, E) be a noncomplete connected bisplit graph with minimum vertex degree Ξ΄(G). We prove that its edge-connectivity is Ξ΄(G),

Examples are given to show that the condition cannot be dropped out. Moreover, it is shown that if |Y βˆͺ Z | < 2Ξ΄(G), then the edge-integrity of G equals |V (G)|.


πŸ“œ SIMILAR VOLUMES


Diameter vulnerability of graphs
✍ C. Peyrat πŸ“‚ Article πŸ“… 1984 πŸ› Elsevier Science 🌐 English βš– 344 KB
Diameter vulnerability of GC graphs
✍ J. GΓ³mez; I. Pelayo; C. Balbuena πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 469 KB

Concern over fault tolerance in the design of interconnection networks has stimulated interest in ΓΏnding large graphs with maximum degree and diameter D such that the subgraphs obtained by deleting any set of s vertices have diameter at most D , this value being close to D or even equal to it. This

Vulnerability in graphs of diameter four
✍ Geoffrey Exoo; Frank Harary; Cheng-De Xu πŸ“‚ Article πŸ“… 1993 πŸ› Elsevier Science 🌐 English βš– 285 KB

The analogue of Menger's Theorem on connectivity has been investigated for graphs of low diameter in which the removal of a set of lines increases the diameter. When the diameter is at most three, such a theorem has been proven already. Also, examples have been constructed to show that the result do

Measuring the vulnerability for classes
✍ Dieter Kratsch; Ton Kloks; Haiko Muller πŸ“‚ Article πŸ“… 1997 πŸ› Elsevier Science 🌐 English βš– 780 KB

A general method for the computation of various parameters measuring the vulnerability of a graph is introduced. Four measures of vulnerability are considered, i.e., the toughness, scattering number, vertex integrity and the size of a minimum balanced separator. We show how to compute these paramete