Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 572
1.
  • DeGAN - Decomposition-based... DeGAN - Decomposition-based unified anomaly detection in static networks
    Tüzen, Ahmet; Yaslan, Yusuf Information sciences, August 2024, 2024-08-00, Volume: 677
    Journal Article
    Peer reviewed

    Graph anomaly detection aims to identify anomalous occurrences in networks. However, this is more challenging than the traditional anomaly detection problem because anomalies in graphs can manifest ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
2.
  • Evaluation of Reachability ... Evaluation of Reachability Queries Based on Recursive DAG Decomposition
    Chen, Yangjun; Chen, Yibin; Zhang, Yifeng IEEE transactions on knowledge and data engineering, 08/2023, Volume: 35, Issue: 8
    Journal Article
    Peer reviewed

    Let G ( V , E ) be a digraph (directed graph) with n nodes and e arcs. Digraph G* = ( V , E* ) is the reflexive, transitive closure if v → u ∈ E* iff there is a path from v to u in G . Efficient ...
Full text
Available for: IJS, NUK, UL
3.
  • A critical probability for ... A critical probability for biclique partition of Gn,p
    Bohman, Tom; Hofstad, Jakob Journal of combinatorial theory. Series B, 20/May , Volume: 166
    Journal Article
    Peer reviewed
    Open access

    The biclique partition number of a graph G=(V,E), denoted bp(G), is the minimum number of pairwise edge disjoint complete bipartite subgraphs of G so that each edge of G belongs to exactly one of ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
4.
  • Optimal UAV Caching and Tra... Optimal UAV Caching and Trajectory in Aerial-Assisted Vehicular Networks: A Learning-Based Approach
    Wu, Huaqing; Lyu, Feng; Zhou, Conghao ... IEEE journal on selected areas in communications, 12/2020, Volume: 38, Issue: 12
    Journal Article
    Peer reviewed

    In this article, we investigate the UAV-aided edge caching to assist terrestrial vehicular networks in delivering high-bandwidth content files. Aiming at maximizing the overall network throughput, we ...
Full text
Available for: IJS, NUK, UL
5.
  • A dual CNN–RNN for multiple... A dual CNN–RNN for multiple people tracking
    Babaee, Maryam; Li, Zimu; Rigoll, Gerhard Neurocomputing (Amsterdam), 11/2019, Volume: 368
    Journal Article
    Peer reviewed

    In this paper, we present a deep learning-based approach, namely a dual CNN–RNN for multiple people tracking. We follow tracking-by-detection paradigm by first training a CNN to measure the ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
6.
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
7.
  • Decomposition of complete g... Decomposition of complete graphs into connected unicyclic graphs with eight edges and pentagon
    Froncek, Dalibor; Kingston, O'Neill Indonesian journal of combinatorics, 06/2019, Volume: 3, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    A G -decomposition of the complete graph Kn is a family of pairwise edge disjoint subgraphs of Kn , all isomorphic to G , such that every edge of Kn belongs to exactly one copy of G . Using standard ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
8.
  • A note on decomposing graph... A note on decomposing graphs to locally almost irregular subgraphs
    Przybyło, Jakub Applied mathematics and computation, 06/2024, Volume: 470
    Journal Article
    Peer reviewed

    We consider a concept related with decompositions of graphs to locally irregular subgraphs and the notion of almost irregular subgraphs, introduced recently by Alon and Wei. We say that a graph is ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
9.
  • Decompositions into two lin... Decompositions into two linear forests of bounded lengths
    Campbell, Rutger; Hörsch, Florian; Moore, Benjamin Discrete mathematics, June 2024, 2024-06-00, Volume: 347, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    For some k∈Z≥0∪{∞}, we call a linear forest k-bounded if each of its components has at most k edges. We will say a (k,ℓ)-bounded linear forest decomposition of a graph G is a partition of E(G) into ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
10.
  • A fast approximate method f... A fast approximate method for k-edge connected component detection in graphs with high accuracy
    Yu, Ting; Liu, Mengchi; Ren, Zujie ... Information sciences, July 2023, 2023-07-00, Volume: 633
    Journal Article
    Peer reviewed

    Finding k-edge connected components (k-ECCs) is widely used to investigate the major cohesive structures within a graph. Traditional methods utilizing global minimum cut to split the graph ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
1 2 3 4 5
hits: 572

Load filters