نتایج جستجو برای: construction graph

تعداد نتایج: 397667  

Journal: :IEEE Transactions on Knowledge and Data Engineering 2022

Recent years have witnessed the resurgence of knowledge engineering which is featured by fast growth graphs. However, most existing graphs are represented with pure symbols, hurts machine's capability to understand real world. The multi-modalization an inevitable key step towards realization human-level machine intelligence. results this endeavor Multi-modal Knowledge Graphs (MMKGs). In survey ...

Journal: :Discrete Mathematics 1995
Paolo Aluffi

In this note we construct a non-singular algebraic variety VG encoding the incidence information of a simple graph G, by a sequence of blow-ups of a projective space along suitable linear subspaces. The aim is to translate into the geometry of VG the combinatorial information about G; we nd that this can be done with surprising ease and e ciency. For example, we prove that the chromatic polynom...

2009
Christoph Böhm Philip Groth Ulf Leser

Ontologies are tools for describing and structuring knowledge, with many applications in searching and analyzing complex knowledge bases. Since building them manually is a costly process, there are various approaches for bootstrapping ontologies automatically through the analysis of appropriate documents. Such an analysis needs to find the concepts and the relationships that should form the ont...

2018
Roye Rozov Gil Goldshlager Eran Halperin Ron Shamir

Motivation We present Faucet, a two-pass streaming algorithm for assembly graph construction. Faucet builds an assembly graph incrementally as each read is processed. Thus, reads need not be stored locally, as they can be processed while downloading data and then discarded. We demonstrate this functionality by performing streaming graph assembly of publicly available data, and observe that the ...

Journal: :Computers & Security 2014
Ammar Ahmed E. Elhadi Mohd Aizaini Maarof Bazara I. A. Barry Hentabli Hamza

Malware stands for malicious software. It is software that is designed with a harmful intent. A malware detector is a system that attempts to identify malware using Application Programming Interface (API) call graph technique and/or other techniques. API call graph techniques follow two main steps, namely, transformation of malware samples into an API call graph using API call graph constructio...

Journal: :Discrete Applied Mathematics 1994
Roger Labahn

We describe the construction of a minimum broadcast graph with 63 vertices. The graph has 162 edges.

1998
Paolo Baldan Andrea Corradini Ugo Montanari

In a recent paper, mimicking Winskel’s construction for Petri nets, a concurrent semantics for (double-pushout) DPO graph grammars has been provided by showing that each graph grammar can be unfolded into an acyclic branching structure, that is itself a (nondeterministic occurrence) graph grammar describing all the possible computations of the original grammar. This paper faces the problem of p...

2000
Paolo Baldan Andrea Corradini

In a recent paper, mimicking Winskel's construction for Petri nets, a concurrent semantics for (double-pushout) DPO graph grammars has been provided by showing that each graph grammar can be unfolded into an acyclic branching structure, that is itself a (nondeterministic occurrence) graph grammar describing all the possible computations of the original grammar. This paper faces the problem of p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید