Sciweavers

7913 search results - page 279 / 1583
» Information Collection on a Graph
Sort
View
81
Voted
GG
2004
Springer
15 years 6 months ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu
99
Voted
ITCC
2003
IEEE
15 years 6 months ago
Distance-Hereditary Embeddings of Circulant Graphs
In this paper we present a distance-hereditary decomposition of optimal chordal rings of 2k2 nodes into a set of rings of 2k nodes, where k is the diameter. All the rings belongin...
Carmen Martínez, Ramón Beivide, Jaim...
INFOCOM
1997
IEEE
15 years 5 months ago
Addressing Network Survivability Issues by Finding the K-Best Paths through a Trellis Graph
Due to the increasing reliance of our society on the timely and reliable transfer of large quantities of information (suchas voice, data, and video)across high speed communication...
Stavros D. Nikolopoulos, Andreas Pitsillides, Davi...
VISSYM
2007
15 years 3 months ago
Online Dynamic Graph Drawing
This paper presents an algorithm for drawing a sequence of graphs online. The algorithm strives to maintain the global structure of the graph and thus the user's mental map, ...
Yaniv Frishman, Ayellet Tal
78
Voted
IPL
2007
96views more  IPL 2007»
15 years 21 days ago
Fault diameter of product graphs
The (k − 1)-fault diameter Dk(G) of a k-connected graph G is the maximum diameter of an induced subgraph by deleting at most k − 1 vertices from G. This paper considers the fa...
Jun-Ming Xu, Chao Yang