Sciweavers

2304 search results - page 73 / 461
» On the Vulnerability of Large Graphs
Sort
View
BIRTHDAY
2011
Springer
13 years 12 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
VLDB
1994
ACM
115views Database» more  VLDB 1994»
15 years 3 months ago
Database Graph Views: A Practical Model to Manage Persistent Graphs
Advanced technical applications like routing systems or electrical network managementsystems introduce the need for complex manipulations of large size graphs. Efficiently support...
Alejandro Gutiérrez, Philippe Pucheral, Her...
COMGEO
2007
ACM
14 years 12 months ago
Graph drawings with few slopes
The slope-number of a graph G is the minimum number of distinct edge slopes in a straight-line drawing of G in the plane. We prove that for Δ 5 and all large n, there is a Δ-reg...
Vida Dujmovic, Matthew Suderman, David R. Wood
DM
2002
104views more  DM 2002»
14 years 11 months ago
Graphs induced by Gray codes
We disprove a conjecture of Bultena and Ruskey [1], that all trees which are cyclic graphs of cyclic Gray codes have diameter 2 or 4, by producing codes whose cyclic graphs are tre...
Elizabeth L. Wilmer, Michael D. Ernst
DM
2011
184views Education» more  DM 2011»
14 years 6 months ago
Graphs of arbitrary excessive class
We show that there exists a family of r-regular graphs of arbitrarily large excessive index for each integer r greater than 3. Furthermore, we answer a question in [1] showing tha...
Giuseppe Mazzuoccolo, M. Young