<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>On the Domination Number of -Constrained de Bruijn Graphs (Short Paper)⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Tiziana Calamoneri</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Angelo Monti</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Blerina Sinaimeri</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Luiss University</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Sapienza University of Rome</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Motivated by the work on the domination number of de Bruijn graphs and some of its generalizations, we introduce a natural generalization of de Bruijn graphs (directed and undirected), namely -constrained de Bruijn graphs, where  is a positive integer, and then study the domination number of these graphs. Within the definition of -constrained de Bruijn graphs, de Bruijn and Kautz graphs correspond to 1-constrained and 2-constrained de Bruijn graphs, respectively. This generalization inherits many structural properties of de Bruijn graphs and may have similar applications in interconnection networks or bioinformatics. We establish upper and lower bounds for the domination number on -constrained de Bruijn graphs both in the directed and in the undirected case. These bounds are often very close and in some cases we are able to find the exact value.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;domination number</kwd>
        <kwd>de Bruijn graph</kwd>
        <kwd>Kautz graph</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        NP-hard [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and hence it is a challenge to determine classes of graphs for which  () can be
exactly computed. A closed formula for the domination number has been exactly determined
only for few specific classes of graphs such as de Bruijn graphs [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], Kautz graphs [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], generalized
Petersen graphs [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], Cartesian product of two directed paths [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and graphs defined by two
levels of the -cube [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Furthermore, close bounds are provided for some generalizations of
the previous classes [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ].
      </p>
      <p>
        Here we focus on the well-known de Bruijn graphs which have various applications in
diferent areas as for example bioinformatics [
        <xref ref-type="bibr" rid="ref14">14, 15</xref>
        ], interconnection networks [16] and
peerto-peer systems [17]. De Bruijn graphs are defined as follows:
Definition 1. Given an alphabet Σ and a positive integer , the de Bruijn graph of order  on Σ
is defined as follows:
- vertices are associated to all the sequences in Σ
- edges are the ordered pair of the form (︀ (1, . . . , ), (2, . . . , , +1)︀) , where 1, . . . and +1
are in Σ.
      </p>
      <p>In Fig. 2.a we show a de Bruijn graph of order 2 on Σ = {1, 2, 3}. Particular induced
subgraphs of de Bruijn graphs have also been studied due to their applications related to both
DNA assembly and high-performance or fault-tolerant computing [18]. These subgraphs can
be defined by choosing particular subsets of vertices. For instance, the subgraph induced by the
sequences of Σ that do not contain equal adjacent characters corresponds to the well-known
Kautz graph [19] which has many properties that are desirable in computer networks [18, 20].
In Fig. 2.b we show a Kautz graph of order 2 on Σ = {1, 2, 3}.</p>
      <p>The undirected version of de Bruijn and Kautz graphs can be easily obtained by simply
ignoring the direction of the edges and removing loops and multiple edges (see Fig. 2.c as the
undirected version of the Kautz graph in Fig. 2.b).</p>
      <p>Here we propose a new natural generalization of the Kautz graphs, obtained by extending
the constraint on the sequences labeling the vertices, from adjacent positions to an arbitrary
distance .</p>
      <p>Definition 2. Given a sequence x = (1, . . . , ) ∈ Σ we say that x is -constrained, for some
integer , if for all 1 ≤ ,  ≤ , whenever  =  it holds | − | ≥ .</p>
      <p>Note that every sequence in Σ is trivially 1-constrained while the sequences labeling
Kautz graphs are 2-constrained. For any -constrained x ∈ Σ with |Σ| =  it holds that
1 ≤  ≤ min{,  }. We denote by  (, ,  ) the set of all -constrained sequences from the set
Σ. We now introduce -constrained de Bruijn graphs.</p>
      <p>Definition 3. Given an alphabet Σ, with |Σ| =  , and two positive integers  and , with
1 ≤  ≤ min{,  }, we define the directed -constrained de Bruijn graph of order  on Σ as the
subgraph of the directed de Bruijn graph of order  on Σ induced by the set  (, ,  ).</p>
      <p>We denote a -constrained directed de Bruijn graph with (, ,  ) and its undirected
version with (, ,  ). Clearly, directed de Bruijn graphs and directed Kautz graphs
coincide with (, 1, ) and (, 2, ), respectively.
a. b. c.</p>
      <p>Figure 1: For Σ = {1, 2, 3} we show: (a) the directed de Bruijn graph ((, , , )1, 2); (b) the directed
Kautz graph (, 2, 2); (c) the undirected Kautz graph (, 2, 2).</p>
      <p>In addition to their theoretical interest, -constrained de Bruijn graphs may also find
applications in interconnection networks due to their sparsity and connectivity. Moreover, in some
cases, these graphs could be more suitable than de Bruijn graphs in modelling problems. For
example, in genome rearrangement, which is an important part of bioinformatics research,
permutations of integers (i.e. -constrained sequences) are used to represent genomes. Thus,
-constrained de Bruijn graphs could find applications in genome assembly [ 21, 22]. More
generally, -constrained sequences for  &lt;  may be used to model genomes where duplication
of genes is allowed only at a certain distance in the genome.</p>
      <p>In the full version of this extended abstract we provide a systematic study of the domination
number of -constrained de Bruijn graphs in both the directed and the undirected case.</p>
      <p>
        Although the domination numbers for de Bruijn and Kautz graphs have been exactly
determined (see [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and [
        <xref ref-type="bibr" rid="ref8">8, 23</xref>
        ]), the exact values in the undirected cases are still missing. We are able to
provide close upper and lower bounds on the value of  ((, 1, )) and  ((, 2, )).
Furthermore, in the particular case when the sequences labeling the vertices are permutations
(i.e.  = ), we determine the exact value of the domination number in both the directed and
undirected case.
      </p>
      <p>We also consider the case where the sequences are partial -permutations on the set of
symbols when |Σ| =  =  + , for some integer . In this case we are able to provide close
upper and lower bounds for  (( + , , )) and  (( + , , )).</p>
      <p>Finally, we are able to provide upper and lower bounds for the domination number of
(, ,  ). Concerning the value of (, ,  ) it remains an open problem to find an
upper bound that is asymptotically better than the one trivially derived by the directed case.
The results announced in this extended abstract are summarized in Table 1 and Table 2 for the
directed and the undirected cases, respectively.</p>
      <p>All the proofs can be found in the full version of the paper [24].</p>
      <p>We conclude this extended abstract with a comparison between the undirected and the
directed cases.</p>
      <p>A dominating set for a directed graph is a fortiori also a dominating set for its underlying
undirected graph. Thus,  ((, 1, )) ≤  ((, 1, )). However, we improved this
Graph 
(, 1, )
(, 2, )
(, 3, )
(, ,  )
(, , )
( + , , )
the full version of this extended abstract.</p>
      <p>Summary of the results for undirected -constrained de Bruijn graphs. Results without a reference are
proved in the full version of this extended abstract.
( −
For  ≥
3 the upper bound of ( −
⌈︁   ⌉︁</p>
      <p>+1
 − 1 and  ((, 1, 3)) =  ⌈︀ 2 ⌉︀ , respectively. For  ≥
bound. Namely, for  = 2 and  = 3, we deduce  ((, 1, 2)) ≤  −
 ((, 1, 3)) ≤  2−  +1, respectively, that are worse than our results  ((,
1
1 +  +1 and</p>
      <p>1, 2)) =
4 the upper bound provided for the
directed case is
and the one from the undirected case is (︀ 1
⌈︁
−  2
1 )︀   ⌉︁
 +1 .</p>
      <p>
        Regarding  = 2, the result proved in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], gives us  ((, 2, )) ≤  ((, 2, )) =
1)− 1. Our results show that, for  = 2,  ((, 2, )) =  ((, 2, )) =  − 1.
      </p>
      <p>1)− 1 derived from the directed case is improved to
( − 1)− 1 − ( − 2)( − 1)− 4.</p>
      <p>Since  ((, 3, )) ≤  ((, 3, )), for  even we have an upper bound of  ( −
2)− 2 and in the undirected case we improve this result to ( − 1)( − 2)− 2 =  ( − 2)− 2 −
( − 2)− 2. For  odd, we have ( − 1)2( − 2)− 3 in the directed case and the improvement
to ( − 1)( − 2)− 2 = ( − 1)2( − 2)− 3 − ( − 1)( − 2)− 3 in the undirected case.</p>
      <p>Finally, we have  (( + , , )) ≤ (+− (1+)(1)+!− 1)! = (+ +)(− +11) (+!)! which is
worse that the undirected result when  goes to infinity. Furthermore, for small values of 
the results show that, while for  = 2,  ((, 2, )) =  ((, 2, )) =  − 1, for
 ≥ 3 the upper bound of ( − 1)− 1 derived from the directed case can be already improved
to ( − 1)− 1 − ( − 2)( − 1)− 4.
k-mer hitting sets for improved analysis of high-throughput sequencing, PLOS
Computational Biology 13 (2017) 1–15.
[15] P. A. Pevzner, H. Tang, M. S. Waterman, An eulerian path approach to DNA fragment
assembly, Proceedings of the National Academy of Sciences 98 (2001) 9748–9753.
[16] A.-H. Esfahanian, S. L. Hakimi, Fault-tolerant routing in De Bruijn communication
networks, IEEE Trans. Comput. 34 (1985) 777–788.
[17] M. F. Kaashoek, D. R. Karger, Koorde: A simple degree-optimal distributed hash table, in:
M. F. Kaashoek, I. Stoica (Eds.), Peer-to-Peer Systems II, Springer Berlin Heidelberg, Berlin,
Heidelberg, 2003, pp. 98–107.
[18] D. Li, X. Lu, J. Su, Graph-Theoretic Analysis of Kautz Topology and DHT Schemes, in:
H. Jin, G. R. Gao, Z. Xu, H. Chen (Eds.), Network and Parallel Computing, Springer Berlin
Heidelberg, Berlin, Heidelberg, 2004, pp. 308–315.
[19] W. H. Kautz, Bounds on directed (, ) graphs, Theory of cellular logic networks and
machines 24 (1968) 20–28.
[20] J.-C. Bermond, N. Homobono, C. Peyrat, Connectivity of kautz networks, Discrete</p>
      <p>Mathematics 114 (1993) 51–62.
[21] M. A. Alekseyev, P. A. Pevzner, Colored de Bruijn graphs and the genome halving problem,</p>
      <p>IEEE/ACM Transactions on Computational Biology and Bioinformatics 4 (2007) 98–107.
[22] Y. Lin, S. Nurk, P. A. Pevzner, What is the diference between the breakpoint graph and
the de Bruijn graph?, BMC Genomics 15 (2014) S6.
[23] T. Araki, On the -tuple domination of de Bruijn and Kautz digraphs, Information</p>
      <p>Processing Letters 104 (2007) 86 – 90.
[24] T. Calamoneri, A. Monti, B. Sinaimeri, On the domination number of -constrained de
bruijn graphs, 2021. URL: https://arxiv.org/abs/2112.10426.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S. T.</given-names>
            <surname>Hedetniemi</surname>
          </string-name>
          , R. C.
          <article-title>Laskar, Bibliography on domination in graphs and some basic definitions of domination parameters</article-title>
          ,
          <source>Discrete Mathematics</source>
          <volume>86</volume>
          (
          <year>1990</year>
          )
          <fpage>257</fpage>
          -
          <lpage>277</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>T. W.</given-names>
            <surname>Haynes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. T.</given-names>
            <surname>Hedetniemi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. J.</given-names>
            <surname>Slater</surname>
          </string-name>
          , Domination in Graphs, vol.
          <volume>209</volume>
          of Monographs and Textbooks in Pure and Applied Mathematics, Marcel Dekker, New York, USA.,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>F.</given-names>
            <surname>Dai</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Wu,</surname>
          </string-name>
          <article-title>An extended localized algorithm for connected dominating set formation in ad hoc wireless networks</article-title>
          ,
          <source>IEEE Transactions on Parallel and Distributed Systems</source>
          <volume>15</volume>
          (
          <year>2004</year>
          )
          <fpage>908</fpage>
          -
          <lpage>920</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>T.</given-names>
            <surname>Milenković</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Memišević</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bonato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Pržulj</surname>
          </string-name>
          ,
          <article-title>Dominating biological networks</article-title>
          ,
          <source>PLOS ONE 6</source>
          (
          <year>2011</year>
          )
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bonato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lozier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Mitsche</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Pérez-Giménez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Prałat</surname>
          </string-name>
          ,
          <article-title>The domination number of on-line social networks and random geometric graphs</article-title>
          , in: R.
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Stephan</surname>
          </string-name>
          (Eds.),
          <source>Theory and Applications of Models of Computation</source>
          , Springer International Publishing,
          <year>2015</year>
          , pp.
          <fpage>150</fpage>
          -
          <lpage>163</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Garey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Johnson</surname>
          </string-name>
          ,
          <article-title>Computers and Intractability: A Guide to the Theory of NP-</article-title>
          <string-name>
            <surname>Completeness</surname>
            ,
            <given-names>W. H.</given-names>
          </string-name>
          <string-name>
            <surname>Freeman</surname>
          </string-name>
          &amp; Co
          <string-name>
            <surname>Ltd</surname>
          </string-name>
          ,
          <year>1979</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Blazsik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Kása</surname>
          </string-name>
          , Dominating sets in de Bruijn graphs,
          <source>Pure mathematics and applications 13</source>
          (
          <year>2002</year>
          )
          <fpage>79</fpage>
          -
          <lpage>85</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kikuchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shibata</surname>
          </string-name>
          ,
          <article-title>On the domination numbers of generalized de Bruijn digraphs and generalized Kautz digraphs</article-title>
          ,
          <source>Information Processing Letters</source>
          <volume>86</volume>
          (
          <year>2003</year>
          )
          <fpage>400</fpage>
          -
          <lpage>408</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>H.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kang</surname>
          </string-name>
          , G. Xu,
          <article-title>The exact domination number of the generalized Petersen graphs</article-title>
          ,
          <source>Discrete Mathematics</source>
          <volume>309</volume>
          (
          <year>2009</year>
          )
          <fpage>2596</fpage>
          -
          <lpage>2607</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mollard</surname>
          </string-name>
          ,
          <article-title>The domination number of cartesian product of two directed paths</article-title>
          ,
          <source>Journal of Combinatorial Optimization</source>
          <volume>27</volume>
          (
          <year>2014</year>
          )
          <fpage>144</fpage>
          -
          <lpage>151</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>L.</given-names>
            <surname>Badakhshian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. O.</given-names>
            <surname>Katona</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Tuza</surname>
          </string-name>
          ,
          <article-title>The domination number of the graph defined by two levels of the n-cube</article-title>
          ,
          <source>Discrete Applied Mathematics</source>
          <volume>266</volume>
          (
          <year>2019</year>
          )
          <fpage>30</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Balogh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. O.</given-names>
            <surname>Katona</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Linz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Tuza</surname>
          </string-name>
          ,
          <article-title>The domination number of the graph defined by two levels of the n-cube,</article-title>
          <string-name>
            <surname>II</surname>
          </string-name>
          ,
          <source>European Journal of Combinatorics</source>
          <volume>91</volume>
          (
          <year>2021</year>
          )
          <fpage>103201</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Shan</surname>
          </string-name>
          , L. Kang,
          <article-title>Constructing the minimum dominating sets of generalized de Bruijn digraphs</article-title>
          , Discrete Math.
          <volume>338</volume>
          (
          <year>2015</year>
          )
          <fpage>1501</fpage>
          -
          <lpage>1508</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Orenstein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pellow</surname>
          </string-name>
          , G. Marçais,
          <string-name>
            <given-names>R.</given-names>
            <surname>Shamir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Kingsford</surname>
          </string-name>
          , Designing small universal
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>