Journal ArticleDOI
Graph theory with applications to engineering and computer science
N.R. Malik
- Vol. 63, Iss: 10, pp 1533-1534
TLDR
Graph Theory and Its Applications to Problems of Society and its Applications to Algorithms and Computer Science.Abstract:
Introductory Graph Theory with ApplicationsGraph Theory with ApplicationsResearch Topics in Graph Theory and Its ApplicationsChemical Graph TheoryMathematical Foundations and Applications of Graph EntropyGraph Theory with Applications to Engineering and Computer ScienceGraphs Theory and ApplicationsQuantitative Graph TheoryApplied Graph TheoryChemical Graph TheoryA First Course in Graph TheoryGraph TheoryGraph Theory with ApplicationsGraph Theory with ApplicationsSpectra of GraphsFuzzy Graph Theory with Applications to Human TraffickingApplications of Graph TheoryChemical Applications of Graph TheoryRecent Advancements in Graph TheoryA Textbook of Graph TheoryGraph Theory and Its Engineering ApplicationsGraph Theory, Combinatorics, and ApplicationsAdvanced Graph Theory and CombinatoricsTopics in Intersection Graph TheoryGraph Theory with Applications to Engineering and Computer ScienceGraph Theory and Its Applications, Second EditionHandbook of Research on Advanced Applications of Graph Theory in Modern SocietyGraph Theory with Applications to Algorithms and Computer ScienceGraph TheoryGraph Theory with Algorithms and its ApplicationsGraph TheoryGraph Theory with ApplicationsGraph Theory ApplicationsHandbook of Graph TheoryGraph Theory and Its Applications to Problems of SocietyBasic Graph Theory with ApplicationsTenread more
Citations
More filters
Principal Ideal Graphs of Rees Matrix Semigroups
R. S. Indu,L. John +1 more
TL;DR: In this article, the necessary and sufficient condition for which two elements in a Rees matrix semigroup are adjacent in SG and GS was studied and the number of edges in SG was analyzed.
Proceedings ArticleDOI
Using a novel approach to cluster analysis to gain new valuable insights into software-project risk management
TL;DR: The method, which is based upon a novel approach to cluster analysis, generates a set of business rules indicating how risk factors may influence project performance, making it easier for managers to identify what needs to been done and when it needs to be done, before the worst happens.
Proceedings ArticleDOI
Using causal reasoning to validate stochastic models
A. Chandra,C.-L. Wu,J.A. Abraham +2 more
TL;DR: This paper develops a model validation methodology using causal reasoning that uses the structural and behavioral knowledge derived from the system specification and a causal reasoning mechanism for validation purposes for conceptual validation of Markov models.
Proceedings Article
Search Graph Formation for Minimizing the Complexity of Planning
TL;DR: This paper assumes that the complexity associated with the computation of cost of traversing an edge is significantly larger than the overhead of searching through the graph, which creates non-trivial complexity results that allows to optimize the creation of the graph based on the computational power available.
On enhancement of Elliptic Curve Encryption of Amazigh Text using Graph Theory
Fatima Amounas,Selma Mokhtar Zadeh shahraki,Mashallah Abbasi Dezfouli,Morteza Ebrahimi,Shahram Jamali +4 more
TL;DR: An enhanced version of elliptic curve encryption method using graph theory is developed, which attempts to enhance the efficiency by providing add-on security to the ECC cryptosystem using graphs and its properties.