|
|
|
Agostinho Agra and Jose Maria Samuco
Given a social network modelled by a graph, the goal of the influence maximization problem is to find k vertices that maximize the number of active vertices through a process of diffusion. For this diffusion, the linear threshold model is considered. A n...
ver más
|
|
|
|
|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|
|
|
|
|
Anna Mpanti, Stavros D. Nikolopoulos and Leonidas Palios
Consider a graph G which belongs to a graph class ??
C
. We are interested in connecting a node ?????(??)
w
?
V
(
G
)
to G by a single edge ????
u
w
where ?????(??)
u
?
V
(
G
)
; we call such an edge a tail. As the graph resulting from G after the addi...
ver más
|
|
|
|
|
|
|
Yuanyou Ou and Baoning Niu
The dual-channel graph collaborative filtering recommendation algorithm (DCCF) suppresses the over-smoothing problem and overcomes the problem of expansion in local structures only in graph collaborative filtering. However, DCCF has the following problem...
ver más
|
|
|
|
|
|
|
Bimal Kumar Roy and Anandarup Roy
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share th...
ver más
|
|
|
|
|
|
|
Yuanfeng Lian, Yueyao Geng and Tian Tian
Due to the complexity of the oil and gas station system, the operational data, with various temporal dependencies and inter-metric dependencies, has the characteristics of diverse patterns, variable working conditions and imbalance, which brings great ch...
ver más
|
|
|
|
|
|
|
Eric Dolores-Cuenca, José Antonio Arciniega-Nevárez, Anh Nguyen, Amanda Yitong Zou, Luke Van Popering, Nathan Crock, Gordon Erlebacher and Jose L. Mendoza-Cortes
In this paper, we study the flow of signals through linear paths with the nonlinear condition that a node emits a signal when it receives external stimuli or when two incoming signals from other nodes arrive coincidentally with a combined amplitude above...
ver más
|
|
|
|
|
|
|
Masataka Yamada and Akihiro Inokuchi
Subgraph and supergraph search methods are promising techniques for the development of new drugs. For example, the chemical structure of favipiravir?an antiviral treatment for influenza?resembles the structure of some components of RNA. Represented as gr...
ver más
|
|
|
|
|
|
|
Lianwei Li, Yangfeng Xu, Cunjin Xue, Yuxuan Fu and Yuanyu Zhang
It is important to consider where, when, and how the evolution of sea surface temperature anomalies (SSTA) plays significant roles in regional or global climate changes. In the comparison of where and when, there is a great challenge in clearly describin...
ver más
|
|
|
|
|
|
|
Petro Lizunov,Andrii Biloshchytskyi,Alexander Kuchansky,Yurii Andrashko,Svitlana Biloshchytska
Pág. 21 - 28
The study considers the possibilities of using latent semantic analysis for the tasks of identifying scientific subject spaces and evaluating the completeness of covering the results of dissertation research by science degree seekers.A probabilistic them...
ver más
|
|
|
|