منابع مشابه
Data Security Equals Graph Connectivity
To protect sensitive information in a cross tabulated table, it is a common practice to suppress some of the cells in the table. This paper investigates four levels of data security of a two-dimensional table concerning the effectiveness of this practice. These four levels of data security protect the information contained in, respectively, individual cells, individual rows and columns, several...
متن کاملIdentification of mild cognitive impairment disease using brain functional connectivity and graph analysis in fMRI data
Background: Early diagnosis of patients in the early stages of Alzheimer's, known as mild cognitive impairment, is of great importance in the treatment of this disease. If a patient can be diagnosed at this stage, it is possible to treat or delay Alzheimer's disease. Resting-state functional magnetic resonance imaging (fMRI) is very common in the process of diagnosing Alzheimer's disease. In th...
متن کاملGraph Connectivity
This work is mainly concerned with the strength of connections between vertices with respect to the number of vertexor edge-disjoint paths. As we shall see, this is equivalent to the question of how many nodes or edges must be removed from a graph to destroy all paths between two (arbitrary or specified) vertices. We review algorithms which • check k-vertex (k-edge) connectivity, • compute the ...
متن کاملGraph Contraction and Connectivity Parallel and Sequential Data
Definition 1.3 (Subgraph). Let G = (V, E) and H = (V ′, E′) be two graphs. H is a subgraph of G if V ′ ⊆ V and E′ ⊆ E. H is a proper subgraph is V ′ ( V or E′ ( E. Definition 1.4 (Vertex Induced Subgraph). Let G = (V, E) and V ′ ⊆ V . The subgraph of G induced by V is a graph H = (V ′, E′) where E′ = {{u, v} ∈ E|u ∈ V ′, v ∈ V ′}. Definition 1.5 (Edge Induced Subgraph). Let G = (V, E) and E′ ⊆ ...
متن کاملAn Improved Randomized Data Structure for Dynamic Graph Connectivity
We present a randomized algorithm for dynamic graph connectivity. With failure probability less than 1/n (for any constant c we choose), our solution has worst case running time O(log n) per edge insertion, O(log n) per edge deletion, and O(log n/ log log n) per query, where n is the number of vertices. The previous best algorithm has worst case running time O(log n) per edge insertion and O(lo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SIAM Journal on Discrete Mathematics
سال: 1996
ISSN: 0895-4801,1095-7146
DOI: 10.1137/s0895480193243274