scispace - formally typeset
Journal ArticleDOI

Graph theory with applications to engineering and computer science

N.R. Malik
- Vol. 63, Iss: 10, pp 1533-1534
TLDR
Graph Theory and Its Applications to Problems of Society and its Applications to Algorithms and Computer Science.
Abstract
Introductory Graph Theory with ApplicationsGraph Theory with ApplicationsResearch Topics in Graph Theory and Its ApplicationsChemical Graph TheoryMathematical Foundations and Applications of Graph EntropyGraph Theory with Applications to Engineering and Computer ScienceGraphs Theory and ApplicationsQuantitative Graph TheoryApplied Graph TheoryChemical Graph TheoryA First Course in Graph TheoryGraph TheoryGraph Theory with ApplicationsGraph Theory with ApplicationsSpectra of GraphsFuzzy Graph Theory with Applications to Human TraffickingApplications of Graph TheoryChemical Applications of Graph TheoryRecent Advancements in Graph TheoryA Textbook of Graph TheoryGraph Theory and Its Engineering ApplicationsGraph Theory, Combinatorics, and ApplicationsAdvanced Graph Theory and CombinatoricsTopics in Intersection Graph TheoryGraph Theory with Applications to Engineering and Computer ScienceGraph Theory and Its Applications, Second EditionHandbook of Research on Advanced Applications of Graph Theory in Modern SocietyGraph Theory with Applications to Algorithms and Computer ScienceGraph TheoryGraph Theory with Algorithms and its ApplicationsGraph TheoryGraph Theory with ApplicationsGraph Theory ApplicationsHandbook of Graph TheoryGraph Theory and Its Applications to Problems of SocietyBasic Graph Theory with ApplicationsTen

read more

Citations
More filters

Principal Ideal Graphs of Rees Matrix Semigroups

R. S. Indu, +1 more
TL;DR: In this article, the necessary and sufficient condition for which two elements in a Rees matrix semigroup are adjacent in SG and GS was studied and the number of edges in SG was analyzed.
Proceedings ArticleDOI

Using a novel approach to cluster analysis to gain new valuable insights into software-project risk management

TL;DR: The method, which is based upon a novel approach to cluster analysis, generates a set of business rules indicating how risk factors may influence project performance, making it easier for managers to identify what needs to been done and when it needs to be done, before the worst happens.
Proceedings ArticleDOI

Using causal reasoning to validate stochastic models

TL;DR: This paper develops a model validation methodology using causal reasoning that uses the structural and behavioral knowledge derived from the system specification and a causal reasoning mechanism for validation purposes for conceptual validation of Markov models.
Proceedings Article

Search Graph Formation for Minimizing the Complexity of Planning

TL;DR: This paper assumes that the complexity associated with the computation of cost of traversing an edge is significantly larger than the overhead of searching through the graph, which creates non-trivial complexity results that allows to optimize the creation of the graph based on the computational power available.

On enhancement of Elliptic Curve Encryption of Amazigh Text using Graph Theory

TL;DR: An enhanced version of elliptic curve encryption method using graph theory is developed, which attempts to enhance the efficiency by providing add-on security to the ECC cryptosystem using graphs and its properties.