scispace - formally typeset
Journal ArticleDOI

Graph theory with applications to engineering and computer science

N.R. Malik
- Vol. 63, Iss: 10, pp 1533-1534
TLDR
Graph Theory and Its Applications to Problems of Society and its Applications to Algorithms and Computer Science.
Abstract
Introductory Graph Theory with ApplicationsGraph Theory with ApplicationsResearch Topics in Graph Theory and Its ApplicationsChemical Graph TheoryMathematical Foundations and Applications of Graph EntropyGraph Theory with Applications to Engineering and Computer ScienceGraphs Theory and ApplicationsQuantitative Graph TheoryApplied Graph TheoryChemical Graph TheoryA First Course in Graph TheoryGraph TheoryGraph Theory with ApplicationsGraph Theory with ApplicationsSpectra of GraphsFuzzy Graph Theory with Applications to Human TraffickingApplications of Graph TheoryChemical Applications of Graph TheoryRecent Advancements in Graph TheoryA Textbook of Graph TheoryGraph Theory and Its Engineering ApplicationsGraph Theory, Combinatorics, and ApplicationsAdvanced Graph Theory and CombinatoricsTopics in Intersection Graph TheoryGraph Theory with Applications to Engineering and Computer ScienceGraph Theory and Its Applications, Second EditionHandbook of Research on Advanced Applications of Graph Theory in Modern SocietyGraph Theory with Applications to Algorithms and Computer ScienceGraph TheoryGraph Theory with Algorithms and its ApplicationsGraph TheoryGraph Theory with ApplicationsGraph Theory ApplicationsHandbook of Graph TheoryGraph Theory and Its Applications to Problems of SocietyBasic Graph Theory with ApplicationsTen

read more

Citations
More filters

Scalable Model Checking Beyond Safety - A Communication Fabric Perspective

Sayak Ray
TL;DR: This research has developed symbolic algorithms and their open-source implemen-tations that effectively solve liveness verification problem for industrially relevant hardwaresystems and their practical and effectiveness have been demonstrated.
Book

Applying pointer analysis to the synthesis of hardware from C

TL;DR: This thesis presents a solution for efficiently mapping arbitrary C code with pointers and malloc/free into hardware, and an implementation using the SUIF compiler framework is presented.
Journal ArticleDOI

Efficient Prüfer-Like Coding and Counting Labelled Hypertrees

TL;DR: It is shown that r-uniform hypertrees can be encoded in linear time using as little as n−2 integers in the range [1,n] and the decoding algorithm also runs inlinear time.
Journal Article

Prime weighted graph in cryptographic system for secure communication

TL;DR: The prime weighted graph is defined and an efficient encryption scheme usingPrime weighted graph in cryptographic system for secure communication is proposed and java program is designed for the encryption/decryption algorithm.
Journal ArticleDOI

Applicability of sub graph centrality to improve data accessibility among peers in MANETs

TL;DR: This work has proposed a mechanism which not only enhances data accessibility, replicates data in a minimum number of nodes, relocates shared data on the prediction of mobility of replica holder and in addition, data can be accessed by any node in aminimum number of hops.