English: A schematic outlook of outer sentineling functionality: concept c0 sentineled against c1, c2, c3, c4 through {x1, x2, x3}. x1 and x3 are used as its own sentry
points also by c1, and x2 prevents c1 to invade c0; x2 and x3 are sentry points also
of c2, and x1 prevents invasion of c0 by c2; and x1 and x2 are sentry points also of
c4 and x3 prevents invasion; c3 does not include c0 ∪ S(c0), hence it cannot invade
c0. x4 is a useless point. All marked points are negative examples of c0.
Date
6 August 2008 (upload date)
Source
Own work
Author
B. Apolloni, S. Bassis, D. Malchiodi
Licensing
I, the copyright holder of this work, hereby publish it under the following licenses:
to share – to copy, distribute and transmit the work
to remix – to adapt the work
Under the following conditions:
attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
share alike – If you remix, transform, or build upon the material, you must distribute your contributions under the same or compatible license as the original.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled GNU Free Documentation License.http://www.gnu.org/copyleft/fdl.htmlGFDLGNU Free Documentation Licensetruetrue
You may select the license of your choice.
Captions
Add a one-line explanation of what this file represents
{{Information |Description={{en|1=A schematic outlook of outer sentineling functionality: concept c0 sentineled against c1, c2, c3, c4 through {x1, x2, x3}. x1 and x3 are used as its own sentry points also by c1, and x2 prevents c1 to invade c0; x2 and x3