Because of their good properties, iterated line digraphs (specially Kautz and de Bruijn digraphs) have been considered to design interconnection networks. The diameter-vulnerability of a digraph is the maximum diameter of the subdigraphs obtained by deleting a fixed number of vertices or arcs. For a
Embedding iterated line digraphs in books
โ Scribed by Toru Hasunuma
- Publisher
- John Wiley and Sons
- Year
- 2002
- Tongue
- English
- Weight
- 306 KB
- Volume
- 40
- Category
- Article
- ISSN
- 0028-3045
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
We propose broadcasting algorithms for line digraphs in the telegraph model. The new protocols use a broadcasting protocol for a graph G to obtain a broadcasting protocol for the graph L k G, the graph obtained by applying k times, the line digraph operation to G. As a consequence improved bounds fo
## Abstract Let __G__ be an undirected connected graph that is not a path. We define __h__(__G__) (respectively, __s__(__G__)) to be the least integer __m__ such that the iterated line graph __L__^__m__^(__G__) has a Hamiltonian cycle (respectively, a spanning closed trail). To obtain upper bounds