Curated by
ACT
This activity explores the dominating set problem, and sets it up as the basis for a the public key encryption activity.
3 Views
0 Downloads
This activity explores the dominating set problem, and sets it up as the basis for a the public key encryption activity.