{"id":"https://openalex.org/W1969859239","doi":"https://doi.org/10.1080/00207169908804867","title":"The neighbour-integrity of boolean graphs and its compounds","display_name":"The neighbour-integrity of boolean graphs and its compounds","publication_year":1999,"publication_date":"1999-01-01","ids":{"openalex":"https://openalex.org/W1969859239","doi":"https://doi.org/10.1080/00207169908804867","mag":"1969859239"},"language":"en","primary_location":{"id":"doi:10.1080/00207169908804867","is_oa":false,"landing_page_url":"https://doi.org/10.1080/00207169908804867","pdf_url":null,"source":{"id":"https://openalex.org/S124867444","display_name":"International Journal of Computer Mathematics","issn_l":"0020-7160","issn":["0020-7160","1026-7425","1029-0265"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computer Mathematics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013595822","display_name":"P\u0131nar Erbay D\u00fcndar","orcid":"https://orcid.org/0000-0002-9923-9657"},"institutions":[{"id":"https://openalex.org/I41641357","display_name":"Ege University","ror":"https://ror.org/02eaafc18","country_code":"TR","type":"education","lineage":["https://openalex.org/I41641357"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Pinar D\u00fcndar","raw_affiliation_strings":["Department of Mathematics & Comp. Science , Ege \u00dcniversity , Bornova, \u0406zmir, 35100, T\u00fcrkeyScience Faculty"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics & Comp. Science , Ege \u00dcniversity , Bornova, \u0406zmir, 35100, T\u00fcrkeyScience Faculty","institution_ids":["https://openalex.org/I41641357"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5013595822"],"corresponding_institution_ids":["https://openalex.org/I41641357"],"apc_list":null,"apc_paid":null,"fwci":0.3949,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.61599867,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"4","first_page":"441","last_page":"447"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12292","display_name":"Graph Theory and Algorithms","score":0.9573000073432922,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12292","display_name":"Graph Theory and Algorithms","score":0.9573000073432922,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10374","display_name":"Advanced Graph Theory Research","score":0.9434000253677368,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.927299976348877,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.756716251373291},{"id":"https://openalex.org/keywords/and-inverter-graph","display_name":"And-inverter graph","score":0.6555292010307312},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6417026519775391},{"id":"https://openalex.org/keywords/telecommunications-network","display_name":"Telecommunications network","score":0.5327221155166626},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4843215048313141},{"id":"https://openalex.org/keywords/graph-product","display_name":"Graph product","score":0.4702179431915283},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4682159423828125},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4238499402999878},{"id":"https://openalex.org/keywords/boolean-function","display_name":"Boolean function","score":0.39128464460372925},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35219550132751465},{"id":"https://openalex.org/keywords/boolean-expression","display_name":"Boolean expression","score":0.3292442560195923},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2564142942428589},{"id":"https://openalex.org/keywords/pathwidth","display_name":"Pathwidth","score":0.20443016290664673},{"id":"https://openalex.org/keywords/line-graph","display_name":"Line graph","score":0.1883859634399414},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10206678509712219}],"concepts":[{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.756716251373291},{"id":"https://openalex.org/C196836630","wikidata":"https://www.wikidata.org/wiki/Q4753279","display_name":"And-inverter graph","level":4,"score":0.6555292010307312},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6417026519775391},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.5327221155166626},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4843215048313141},{"id":"https://openalex.org/C68103157","wikidata":"https://www.wikidata.org/wiki/Q569347","display_name":"Graph product","level":5,"score":0.4702179431915283},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4682159423828125},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4238499402999878},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.39128464460372925},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35219550132751465},{"id":"https://openalex.org/C158465420","wikidata":"https://www.wikidata.org/wiki/Q1979515","display_name":"Boolean expression","level":3,"score":0.3292442560195923},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2564142942428589},{"id":"https://openalex.org/C43517604","wikidata":"https://www.wikidata.org/wiki/Q7144893","display_name":"Pathwidth","level":4,"score":0.20443016290664673},{"id":"https://openalex.org/C203776342","wikidata":"https://www.wikidata.org/wiki/Q1378376","display_name":"Line graph","level":3,"score":0.1883859634399414},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10206678509712219},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/00207169908804867","is_oa":false,"landing_page_url":"https://doi.org/10.1080/00207169908804867","pdf_url":null,"source":{"id":"https://openalex.org/S124867444","display_name":"International Journal of Computer Mathematics","issn_l":"0020-7160","issn":["0020-7160","1026-7425","1029-0265"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computer Mathematics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1591736593","https://openalex.org/W1993955016","https://openalex.org/W1999446839","https://openalex.org/W2063870033","https://openalex.org/W2751533025","https://openalex.org/W4252460087"],"related_works":["https://openalex.org/W4249396218","https://openalex.org/W2686992952","https://openalex.org/W3029381898","https://openalex.org/W4226191681","https://openalex.org/W3212751295","https://openalex.org/W2109998394","https://openalex.org/W2133491672","https://openalex.org/W4241453319","https://openalex.org/W2024769762","https://openalex.org/W4248224315"],"abstract_inverted_index":{"Communication":[0],"services":[1],"have":[2],"traditionally":[3],"been":[4],"characterized":[5],"by":[6,97],"high":[7],"levels":[8],"of":[9,35,39,52,64,80,91],"service":[10,31],"dependability.":[11],"Today":[12],"cable":[13],"cuts,":[14],"node":[15],"interruptions,":[16],"software":[17],"errors":[18],"or":[19,54],"hardware":[20],"failures":[21],"and":[22,45],"transmission":[23],"failure":[24],"at":[25],"various":[26],"points":[27],"can":[28],"cause":[29],"interrupted":[30],"for":[32,88],"long":[33],"periods":[34],"time.":[36],"Large":[37],"amounts":[38],"data":[40],"transmitted":[41],"through":[42],"fiber":[43],"optic":[44],"satellite":[46],"communication":[47],"networks,":[48],"requires":[49],"greater":[50],"degrees":[51],"stability":[53],"less":[55],"vulnerability.":[56],"The":[57],"neighbour":[58,78],"integrity":[59,79],"is":[60,68],"a":[61,65,71,81],"vulnerability":[62],"measure":[63],"graph":[66,100],"which":[67,94],"considered":[69],"as":[70],"communications":[72],"network":[73],"model.":[74],"This":[75],"paper":[76],"presents":[77],"Boolean":[82,92],"graph.":[83],"Also,":[84],"theorems":[85],"are":[86,95],"given":[87],"some":[89],"compounds":[90],"graphs":[93],"obtained":[96],"using":[98],"the":[99],"operations.":[101]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
