Matrix Formulation of EISs of Graphs and Its Application to WSN Covering Problems
In this paper, the problem of formulating and finding externally independent sets of graphs is considered by using a newly developed STP method, called semitensor product of matrices. By introducing a characteristic value of a vertex subset of a graph and using the algebraic representation of pseudological functions, several necessary and sufficient conditions of matrix form are proposed to express the externally independent sets (EISs), minimum externally independent sets (MEISs), and kernels of graphs. Based on this, the concepts of EIS matrix, MEIS matrix, and kernel matrix are introduced. By these matrices’ complete characterization of these three structures of graphs, three algorithms are further designed which can find all these kinds of subsets of graphs mathematically. The results are finally applied to a WSN covering problem to demonstrate the correctness and effectiveness of the proposed results.
A graph is a figure composed of vertices and edges and is usually used to describe a specific relationship between things; vertices are used to represent things, and an edge connecting two vertices is used to represent the relationship between the two things. The intuitive diagrammatic representation of relationships has created widespread use of graphs in modeling systems in physical science and engineering problems; actually any system involving a binary relation can be represented by a graph . Graph theory has experienced explosive growth and has come to play a central role in engineering and computer science curricula .
Independent set problem of graphs is a key issue in graph theory and control theory and has been applied to many practical problems in the industrial field such as resource selection, facility location, mobile base station location, and logistics center location. [3, 4]. The problem has become a hot topic in the field of system and control. Yue and Yan  gave a matrix formulation of k-internally independent sets and k-maximum internally independent sets of graphs by proposing several new sufficient and necessary conditions of k-internally independent sets and k-maximum internally independent sets. Based on these conditions, they further designed algebraic algorithms that can find all the k-internally independent sets and k-maximum internally independent sets of a given graph. The approach is different from other methods and may offer a new perspective to understand structures of a graph. With regard to the number of independent sets of a graph, Hua  proposed an upper bound of the value for the graphs having k cut-edges. Also, he described corresponding extremal graphs. There are also a series of conjectures on independent sets of graphs. Deng, Guo, and Zang  proved Chvatal’s conjecture on maximal independent sets of a graph. Later, the conjecture was generalized by Ding , which was then proved by Sun and Hu .
In recent years, a new matrix analysis tool, called semitensor product of matrices (STP of matrices), has been developed . The STP of matrices generalizes the traditional product of matrices by allowing any two matrices; the number of columns of the former is not equal to that of rows of the latter to participate in operation; and almost all the major properties of the traditional product hold true for the STP of matrices. Theoretically, the STP of matrices can be applied in most of engineering and science fields, especially for the problems that can be presented as a discrete mathematical model. The STP of matrices is now well established and has been found to be very useful in many areas [11–19].
Based on the STP of matrices, a matrix approach to investigate graph problems has been established recently. Wang, Zhang, and Liu  introduced the STP of matrices to the domain of graph theory and proposed a matrix approach to investigate serval problems such as the internally stable set problem, absolutely maximum internally stable set problem, maximum weight stable set problem, and vertex coloring problem. Several new results and algorithms were proposed. Afterwards, the matrix approach was applied to many problems in the field of graph theory. In , Xu considered the coloring problem of robust graphs and presented several new results by formulating the coloring problem as an optimization problem. With these new conclusions, a new timetabling scheme is developed. Later, Xu and Wang [22, 23] advanced the study to the problems of conflict-free coloring and fuzzy graph coloring. Zhong et al.  used the matrix approach to discuss the way of searching minimum stable sets and cores of graphs. Meng, Feng, and Li  pushed the method towards the hypergraphs area and investigated transversal and covering problems. In , Yue et al. proposed a necessary and sufficient condition of multi-internally stable set of graphs. The presented results are further used to solve the multitrack assignment problem; two solvability conditions are presented.
The advantages of this matrix approach to graph problems are the mathematical formulation and exact decision results for the problems, which are very useful to study other graph problems. The idea of this approach is entirely different from that of existing ones and may be a new perspective to comprehend the structures of graphs in a mode of mathematics.
The motivations of this paper, inspired by the superiorities of the matrix approach to graphs, are to formulate the externally independent sets of graphs in a matrix fashion and to find all the externally independent sets of a graph mathematically. Further, the results are expected to expand to the cases of minimum externally independent sets and kernels of graphs; and the results are used to solve a kind of WSN covering problem and service stations optimal location problem, which serves as a means of examination of the correctness and effectiveness of the proposed results.
The contributions of this paper consist of two aspects. In theory, we established several necessary and sufficient conditions of externally independent sets, minimum externally independent sets, and kernels of graphs. In algorithm, three algorithms were designed which can produce all the externally independent sets, all the minimum externally independent sets, and all the kernels of a graph. These may advance the graph matrix approach in the area of system science.
The paper is organized as follows. In Section 2, we give necessary preliminaries on graphs and the research tool of this paper, as well as the STP of matrices. Section 3 presents the main results of this paper, including theory results and algorithm ones. Section 4 is devoted to discussing differences between the proposed approach and existing methods, as well as the complexity of the proposed algorithms. An application of the results to WSN covering problem, serving as an examination of the correctness and effectiveness of the presented results, is given in Section 5; this is followed by concluding remarks in Section 6.
In this section, we give some necessary preliminaries on STP of matrices (semitensor product of matrices) and externally independent sets (EISs) of graphs.
Definition 1. (STP of matrices) (see ). For any two matrices and , their STP, denoted by , is defined aswhere is the least common multiple of and and is the Kronecker product.
The following example illustrates the STP of matrices:(1)For two vectors and , their STP is(2)For two matrices of dimensions and , and , their STP is
Remark 1. The STP of matrices is a generalization of the traditional matrix multiplication; when , the STP of matrices reduces to the latter. In this paper, the matrix multiplication is the STP of matrices by default, and the symbol is also omitted except for special emphasis needed.
Definition 2. (swap matrix) (see ). A swap matrix is an matrix, whose rows and columns are tagged by index . The rows are organized by the order of multi-index and the columns by . The element at position is defined as
Proposition 1. (A property of swap matrix) : For any two column vectors and , the following pseudocommutative law holds:
Definition 3. (dummy operator) (see ). The dummy operators and are defined asFor convenience, define and .
Proposition 2. (a property of dummy operator) (see ). For any two logical vectors and ( and are described below), the following pseudoelimination laws hold:
Proposition 3. (negation operator) (see ). The matrix is called the negation operator of 2-valued logical variables (where is given in the following notations). For any 2-valued logical variable , .
Definition 4. (graph) (see ). A graph is a tuple , where is a set of objects called vertices and is a set of 2-element subsets of called edges.
In a graph , , is called a neighbor of if ; is default to be a neighbor of itself. Denote by the neighbor set of .
Definition 5. (externally independent set of a graph) (see ). A set of vertices of is called an externally independent set (EIS) of if for any a vertex there is a vertex such that . An EIS is called a minimum externally independent set (MEIS) if any proper subset of is not an EIS. An MEIS with the least number of vertices is called an absolutely minimum externally independent set (AMEIS). The number of vertices of an AMEIS is called the externally independent number of , denoted by .
Definition 6. (unitary adjacency matrix of a graph) (see ). For a graph of vertices , the matrix is called the adjacency matrix of :The matrix is called the unitary adjacency matrix (UAM) of :It is easy to get thatwhere denotes the logic product operation, and is the Kronecker symbol defined as follows:
3. Main Results
In this section, we present the main results of this paper, including theoretic part and algorithm part. Theoretic results consist of matrix formulations of externally independent set and minimum externally independent set of graphs. Algorithm results contain two algorithms which can find all the externally independent sets and minimum externally independent sets of a graph, respectively. Further, we extend these results to the kernels of graphs by appropriate modification.
3.1. Matrix Formulation and Algebraic Algorithm of EIS
Definition 7. (characteristic logical vector of vertex subset) (see ). Given a vertex subset of , the characteristic logical vector of , denoted as , isIn the framework of the STP of matrices and based on Definition 7, we define the characteristic value of a vertex subset of a graph. A characteristic value corresponds to a unique vertex subset of a graph.
Definition 8. (characteristic value of vertex subset). For a vertex subset of , is its characteristic logical vector. Let , ; the characteristic value of is defined as
Remark 2. Since each is uniquely determined by , where is defined in (30), and each set of uniquely determines , the characteristic value of is uniquely determined by the characteristic logical vector , and vice versa. Therefore, once one of and is known, the other one can then be determined; consequently, the vertex subset is known.
Theorem 1. Given a graph with being its UAM, . contains an externally independent set if and only if there is satisfyingwhere
Proof. Necessity: assume that is an externally independent set of . Let be the characteristic logical vector of . It follows from Definition 5 that, for a vertex not in , corresponding to , there is such thatEquation (16) is equivalent toFrom (8) and (17), we have the following:Since both and only take the values of 0 and 1, (18) can be further expressed asOn the other hand, set , . From (7), we have thatwhere
Clearly,We thus get from (19) thatwhere .
Thus, the following equations are equivalent to each other for :(1)(2)(3)There is a column of which is (4)There exists such that Note that (19) amounts toIt is easy to know that equation (23) has a solution if and only if there is such thatwhereThe equivalence between (19) and (23) shows the necessity.
(Sufficiency). The sufficiency follows the reversibility from equations (16) to (23).
Remark 3. Theorem 1 describes the condition that a graph contains an externally independent set, based on which we can develop a criterion of judging whether a given vertex subset of a graph is an externally independent set or not.
Theorem 2. Let be the UAM of graph . Given a vertex subset with being its characteristic logical vector and being its characteristic value, where , is an externally independent set of if and only ifwhere
Proof. Comparing (26) with (14), we know that it is sufficient to show that the -th column of is equal to ; that is, the -th column of , is equal to 1.
The proof of Theorem 1 shows that if and only if “there is satisfying ” Thus, there is only a need to prove that meets the requirement. Actually, the sizes of and are and , respectively. In this situation, the semitensor product of matrices amounts to the traditional matrix multiplication. Thus, is exactly the -th column of . It is natural that is equivalent to . Theorem 2 is then proved.
Definition 9. (externally independent set matrix). Matrix of (14) or (26) in Theorem 1 or 2 is called the externally independent set matrix of graph .
According to the proof of Theorem 1, we can easily get the following conclusion which describes a condition under which a graph has an externally independent set. The difference with Theorem 1 is the usage of a different characteristic logical vector, as Corollary 1 shows.
Corollary 1. Consider graph whose UAM is . Give a two-valued variable and let . There are externally independent sets in equivalent to the fact that the following equation has at least one solution:In fact, the number of externally independent sets of equals that of the solutions. More specifically, an externally independent set is determined by each solution of (28). Further, according to Theorem 2, the number of externally independent sets is equal to that of -columns of .
Algorithm 1. For a given graph , let be the UAM of , and assign each a two-valued variable . Set . The following five-step procedure yields all the externally independent sets and minimum externally independent sets of . Step 1: compute the externally independent set matrix of graph . Step 2: check whether has a column being . If not, has no externally independent set and the algorithm ends here. Otherwise, define Step 3: solve the equation with respect to for each in by computing , , where Step 4: select and construct . is an externally independent set of . All the externally independent sets of are Step 5: the externally independent number of is where is the cardinality of . All the minimum externally independent sets of are
Remark 5. Using Algorithm 1, we can obtain all the externally independent sets of a graph, including the externally independent sets with special properties; for example, each vertex outside an externally independent set is linked with the externally independent set only once, exactly k times, and so forth. In brief, Algorithm 1 offers a way to see the whole picture of the structure of a graph in terms of externally independent sets by producing all of them.
3.2. Matrix Formulation and Algebraic Algorithm of MEIS
Algorithm 1’s ability of finding all the externally independent sets of a graph enables us to obtain the minimum externally independent sets of a given graph. In this subsection, we address the algebraic formulation and algorithm of minimum externally independent sets of graphs.
Theorem 3. Consider a graph with the UAM . For a given vertex subset with characteristic logical vector and characteristic value , where , is a minimum externally independent set of if and only ifwhere(1)(2); is given in Proposition 3; .
Proof: . (Necessity) Let be the characteristic logical vector of the minimum externally independent set .(i)For , we know according to (19) that(ii)For , we next prove thatIf this not true, that is, , it follows then from Theorem 1 that the vertex subset with characteristic logical vector is also an externally independent set; that is, is an externally independent set of . This contradicts the fact that is a minimum externally independent set of . Thus, (36) holds.
Equations (35) and (36) imply thatwhere .
On the other hand,By (20), we getSubstitution of and equations (38) and (39) into (37) gives the necessity.
Sufficiency: suppose that (34) holds; it follows from the reversibility of equation (37) to (39) that the characteristic logical vector of , , satisfies (35) and (36).
If , then ; therefore, is an externally independent set of . If there is , thenAccording to Theorem 2, is an externally independent set of .
Now let us remove a vertex from and denote the resulting vertex subset as . The characteristic logical vector of is . Since , . It follows from (36) thatWe then know that and this indicates that does not meet (14). Therefore, is not an externally independent set of . Thus, is a minimum externally independent set of . The sufficiency is proved.
We can also transfer the problem of finding minimum externally independent sets of graphs to the problem of solving the minimum value of pseudo-Boolean functions. To this end, we first make some preparations.
Lemma 1. (see ). Let be a pseudo-Boolean function with constraint conditions:where each is a nonnegative integer-valued pseudo-Boolean function. Denote by and the sums of positive coefficients and negative coefficients of , respectively. Construct a pseudo-Boolean function:Then,(i)If is a local minimum point of under the constraint conditions (42), then is also a local minimum point of ;(ii)If is a local minimum point of and , then is also a local minimum point of under the constraint conditions (42).
Theorem 4. For a given graph with the UAM , a vertex subset whose characteristic logical vector and characteristic value are and , respectively, where . Then, is a minimum externally independent set of if and only if the -th component of is minimum among all the nonnegative components, wherein which ;
Proof. According to the proof of Theorem 1, the characteristic logical vector of a minimum externally independent set of graph is the local minimum point of pseudo-Boolean function under the constraint condition (18). Using Lemma 1, where and , such a minimization problem with constraint conditions is converted to the following minimization problem without constraint conditions:Since both and are two-valued variables taking 0 and 1, (45) is equivalent to the following pseudo-Boolean function:By (20)–(22), (46) can be rewritten aswhereIt is now clear from the characteristic value of , , that the -th component of is the minimum value of functions (45) and (46). The proof is completed.
Remark 6. The necessity and sufficiency of Theorem 4 ensure that the matrix of (44) is qualified to describe the minimum externally independent sets of graphs. We define as the minimum externally independent set matrix of a graph.
Definition 10. (minimum externally independent set matrix). Matrix of (44) in Theorem 4 is called the minimum externally independent set matrix of graph .
The necessity and sufficiency of Theorem 4 also offer us a matrix approach to find all the minimum externally independent sets of a graph. Similar to Algorithm 1, we have the following algorithm producing all the minimum externally independent sets of a given graph.
Algorithm 2. Let be the UAM of graph . Assign each vertex a characteristic variable and define . Taking the following steps, one can get all the minimum externally independent sets of . Step 1. Compute the minimum externally independent set matrix of , that is, in (44). Step 2. Check whether there are nonnegative components in the first row of ; if not, contains no minimum externally independent set and the algorithm terminates. Otherwise, set Step 3. For each in , solve the equation with respect to , , by computing , , where Step 4. Choose and set is a minimum externally independent set of ; and all the minimum externally independent sets of are , is produced by Steps 3 and 4.}
3.3. Extending Results to the Kernels of Graphs
The kernel of graphs is an important topic in the area of graph theory and has a great applied value in the scientific field such as similarity measurement of graph structures . A subset of vertices is called a kernel of a graph if is both an externally independent set and an internally stable set of the graph. The matrix formulation and algebraic algorithm of internally stable set of graphs are presented in . Combining these results, in this subsection, we extend the results of the externally independent sets and minimum externally independent sets to the case of the kernels of graphs, including matrix formulation and algebraic algorithm of finding all the kernels of a graph.
Lemma 2. (see ). Let be the UAM of graph with . Then, has an internally stable set if and only if there is , , such that , where
Lemma 3. (see ). Let be the UAM of graph with . For a given subset with characteristic logical vector and letting , , is an internally stable set of if and only if , where is given in Lemma 2.
According to the definition of kernel of a graph, combining Lemmas 2 and 3 and Theorems 1 and 2, we can easily get the following results.
Corollary 3. Let be the UAM of graph . Given a vertex subset with being its characteristic logical vector and being its characteristic value, where , is a kernel if and only ifwhere and are given in Corollary 2.
From Corollaries 2 and 3, it is clear that matrices and present the information of all the kernels of a graph. We introduce the definition of kernel matrix of a graph.
Definition 11. (kernel matrix of graphs). The following matrix is called the kernel matrix of graph described in Corollary 3, wherein which and are given in Corollary 3.
Corollary 3 offers us a way to develop an algorithm to find all the kernels of a graph.
Algorithm 3. Consider the graph given in Corollary 3. Assign each a two-valued variable , and define . The following procedure produces all the kernels of : Step 1: compute the kernel matrix of graph , denoted as . Step 2: divide into the form of as described in Corollary 3. Step 3: check whether has a column being . If not, has no kernel set and the algorithm ends here. Otherwise, go to next step. Step 4: check whether has a column being . If not, has no kernel set and the algorithm ends here. Otherwise, set Step 5: solve the equation with respect to for each in by computing , , where Step 6: select and construct . is a kernel of . All the kernels of are .
4. Comparisons with Existing Approaches and Complexity Analysis
The externally independent set problem of graphs has been studied widely and many results have been proposed. Most of the existing results can be roughly classified, from viewpoint of research approach, into three categories: graph theory-based, integer programming model-based, and algorithm-based .
The STP of matrices provides an elegant way to analyze the structures of graphs , which is very promising due to the rapid increase of computational technologies. The results of this paper established using the STP of matrices have the following differences and advantages in the aspects of model formulation, perspective and expansibility of conclusions, and so forth.
Most of existing results use graph theory, optimization theory, and computer-based algorithms to formulate and find externally independent sets of a graph. Such approach has a disadvantage that not all the externally independent sets of given graphs can be obtained. In this paper, the problem of externally independent set is considered from the perspective of k-valued logic. Using the algebraic expression of k-valued pseudo-Boolean functions developed by STP, the externally independent set matrix (EISM), minimum externally independent set matrix (MEISM), and kernel matrix are proposed. These three matrices have precise mathematical meanings; they provide complete information of externally independent sets (EISs), minimum externally independent sets (MEISs), and kernel sets of a graph. More importantly, the completeness of describing externally independent sets (EISs) and minimum externally independent sets (MEISs) and kernels of graphs enable us to design algorithms to find all the EISs, MEISs, and kernel sets of a graph.
Besides, the proposed results, including theoretical results and algorithms, can be easily extended to the cases of k-externally independent set, k-minimum externally independent set, and k-kernel sets by replacing the unitary adjacency matrix (UAM) by k-adjacency matrix (KAM) of graphs. Correspondingly, the concepts of k-externally independent set matrix (k-EISM), minimum externally independent set matrix (k-MEISM), and k-kernel matrix can also be established.
We next analyze the computational complexity of the presented searching algorithms (Algorithms 1–3), taking Algorithm 2 as an example; Algorithms 1 and 3 are very similar to Algorithm 2. Consider a graph of vertices . In Algorithm 2, only Step 3 involves circulation iteration. For a graph with vertices, the time of circulation iteration is at most in the worst situation. Therefore, Algorithm 2 iterates times at most and the time complexity is . In addition, all the computations involved in Algorithm 2 are matrix multiplication, namely, the semitensor product of matrices, which can be easily conducted by using the STP toolbox.
5. An Application to WSN Covering Problems
WSN covering problem studies how to reach a minimum number of sensors or the construction costs under the condition of covering all points of interest. WSN covering problem can be studied by viewing it as set covering problem. The set covering problem was first proposed by Roth  to solve the location problem of emergency service facilities such as fire control center and ambulance. An integer programming model for the set covering problem with different costs was established. Plane, Hendrick, Daskin, and Stern proposed a double objective set covering problem with the minimum number of service stations and the maximum number of customers. Since 2000, many heuristic algorithms have been used to solve set covering problems. Fisher and Northup proposed a dual heuristic algorithm to solve the set covering problem . Beasley and Jornsten combined the subgradient optimization method and Lagrange relaxation algorithm to solve such problems . Beasley and Chu gave a genetic algorithm to solve the set covering problem with different cost of service stations. Among them, random greedy algorithm, simple greedy algorithm, and transform greedy algorithm are the best algorithms for almost all problems, of which random greedy algorithm is the best. Halperin and Karp proved that the set covering problem is NP-complete .
In this section, we use the presented results to solve a WSN covering problem, whose graph model is shown in Figure 1, to verify the correctness and effectiveness of the results. It is sufficient from the logical relation among Algorithm 2, Theorems 2 and 1, and Algorithm 1 that there is only a need to check Algorithm 2.
The UAM of is Steps 1 and 2: according to (44), all of the minimum nonnegative components of the minimum externally independent set matrix of are as follows: Thus, the set is . Step 3: for each in , computing , , taking as an example, we get Step 4: choose and construct . is a minimum externally independent set of . Repeating Steps 3 and 4, we get all the minimum externally independent sets of , which are listed in Table 1.
It is clear from Table 1 that has three absolutely minimum externally independent sets:
Therefore, the covering problem has three optimal solutions:(1)Putting two sensors at locations and (2)Putting two sensors at locations and (3)Putting two sensors at locations and
Remark 7. It was shown in  that there are two optimization schemes of putting two sensors, and . According to our result, there are exactly three such optimization schemes, , , and .
6. Concluding Remarks
Externally independent set is an important structure of a graph. Many problems in science and engineering can be formulated by externally independent set of graphs. Description and search of externally independent sets of a graph represent a key issue in graph theory. In this paper, a newly proposed matrix analysis tool, semitensor product of matrices, is used to consider the problem of formulating and finding externally independent sets, minimum externally independent sets, and kernel sets of graphs. Several new necessary and sufficient conditions of these three structures are obtained; and three kinds of matrices containing the complete information of these vertex subsets are proposed. Further three algebraic algorithms that can find all these special subsets of a graph are developed. As a test of the effectiveness of the obtained results, a WSN covering problem, namely, location of service stations, is considered by these results. The research approach of this paper may offer a different way to investigate the structures of graphs and related problems such as Hamiltonian paths, Hamiltonian circles, and complete graphs.
|/:||The vector with each element being 1/0|
|:||The -th column of matrix|
|:||The -th column of the identity matrix|
|:||The compactness form of matrix|
|:||The cardinality of set .|
No underlying data support the results of the current study.
The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.
Conflicts of Interest
The authors declare that there are no conflicts of interest.
The authors would like to express their thanks to Professor Yiguang Hong for his encouragement and helpful suggestions. This research was funded by the National Natural Science Foundation of China (grant nos. U1804150 and 62073124).
J. Richard, Introduction to Graph Theory, PMA Publishing, London, UK, 2017.
X. L. Li, C. Magnant, and Z. M. Qin, “Properly colored connectivity of graphs introduction,” 2018.View at: Google Scholar
J. M. Yue and Y. Y. Yan, “Matrix method to search k-maximum internally stable sets of graphs,” Proceedings of the 34th Chinese Control Conference, vol. 23, pp. 36–41, 2015.View at: Google Scholar
G. L. Ding, “Stable sets versus independent sets,” Discrete Mathematics, vol. 117, no. 1–3, pp. 73–87, 2005.View at: Google Scholar
D. Z. Cheng, H. S. Qi, and Y. Zhao, An Introduction to Semi-tensor Product of Matrices and its Applications, World Scientific Publishing Co. Pte. Ltd., Singapore, 2012.
Y. R. Zhou, Z. Q. Chen, Z. X. Liu et al., Strongly Fault Prognosability of Partially-Observed Discrete Event Systems, CIENCE CHINA-Information Sciences, London, UK, 2021.
M. R. Xu and Y. Z. Wang, “T-coloring of graphs with application to frequency assignment in cellular mobile networks,” Proceedings of the 33rd Chinese Control Conference, vol. 23, pp. 2536–2541, 2014.View at: Google Scholar
M. R. Xu, Y. Z. Wang, and P. Jiang, “Fuzzy graph coloring via semi-tensor product method,” Proceedings of the 34th Chinese Control Conference, vol. 23, pp. 973–978, 2015.View at: Google Scholar
M. Meng, J. E. Feng, and X. X. Li, “A matrix method to hypergraph transversal and covering problems with application in simplifying Boolean functions,” Proceedings of the 35th Chinese Control Conference, vol. 2016, pp. 2772–2777, 2016.View at: Google Scholar
J. M. Yue, Z. Q. Chen, Y. Y. Yan et al., “Solvability of k-track assignment problem: a graph approach,” Control Theory & Applications, vol. 34, no. 4, pp. 457–466, 2017.View at: Google Scholar
Y. C. Liu and W. Zhang, Boolean Methodology, Literature Press, London, UK, 1993.
J. P. Roth, “Algorithm for computing an almost minimum cover,” IBM Technical Disclosure Bulletin, vol. 15, no. 12, pp. 3720–3722, 1973.View at: Google Scholar
E. Halperin and R. M. Karp, “The minimum-entropy set cover problem,” 2004.View at: Google Scholar