咨询与建议

限定检索结果

文献类型

  • 2,067 篇 期刊文献
  • 817 篇 会议
  • 41 篇 学位论文
  • 7 册 图书
  • 1 篇 资讯

馆藏范围

  • 2,932 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,317 篇 工学
    • 2,074 篇 计算机科学与技术...
    • 518 篇 软件工程
    • 348 篇 电气工程
    • 132 篇 测绘科学与技术
    • 131 篇 建筑学
    • 131 篇 土木工程
    • 129 篇 信息与通信工程
    • 77 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 22 篇 网络空间安全
    • 20 篇 生物工程
    • 18 篇 材料科学与工程(可...
    • 13 篇 仪器科学与技术
    • 12 篇 交通运输工程
    • 11 篇 化学工程与技术
    • 11 篇 安全科学与工程
    • 10 篇 石油与天然气工程
  • 1,051 篇 理学
    • 943 篇 数学
    • 80 篇 统计学(可授理学、...
    • 62 篇 生物学
    • 51 篇 物理学
    • 27 篇 化学
    • 20 篇 系统科学
  • 189 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 62 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 36 篇 经济学
    • 35 篇 应用经济学
  • 33 篇 医学
    • 16 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 19 篇 法学
    • 14 篇 社会学
  • 9 篇 教育学
  • 8 篇 文学
  • 6 篇 农学
  • 1 篇 艺术学

主题

  • 2,933 篇 graph algorithms
  • 140 篇 approximation al...
  • 106 篇 algorithms
  • 94 篇 parallel algorit...
  • 65 篇 computational co...
  • 64 篇 graph theory
  • 56 篇 parameterized co...
  • 52 篇 combinatorial pr...
  • 49 篇 analysis of algo...
  • 45 篇 shortest paths
  • 45 篇 planar graphs
  • 44 篇 treewidth
  • 38 篇 social networks
  • 36 篇 data structures
  • 36 篇 distributed comp...
  • 33 篇 distributed algo...
  • 29 篇 parameterized al...
  • 29 篇 complexity
  • 29 篇 np-completeness
  • 26 篇 interval graphs

机构

  • 24 篇 univ bergen dept...
  • 19 篇 univ elect sci &...
  • 16 篇 ben gurion univ ...
  • 14 篇 ben gurion univ ...
  • 12 篇 carnegie mellon ...
  • 12 篇 stanford univ de...
  • 10 篇 ist austria klos...
  • 10 篇 carleton univ sc...
  • 9 篇 univ vienna fac ...
  • 9 篇 technion israel ...
  • 9 篇 brno university ...
  • 9 篇 carnegie mellon ...
  • 9 篇 univ rostock ins...
  • 8 篇 indian inst tech...
  • 8 篇 simon fraser uni...
  • 8 篇 chinese univ hon...
  • 8 篇 swiss fed inst t...
  • 8 篇 carnegie mellon ...
  • 8 篇 natl inst inform...
  • 8 篇 tel aviv univ sc...

作者

  • 31 篇 xiao mingyu
  • 22 篇 tsur dekel
  • 18 篇 saurabh saket
  • 17 篇 panda b. s.
  • 16 篇 fomin fedor v.
  • 13 篇 bader david a.
  • 13 篇 bodlaender hans ...
  • 13 篇 pandey arti
  • 13 篇 lokshtanov danie...
  • 12 篇 kratsch dieter
  • 11 篇 karthick t.
  • 11 篇 de figueiredo ce...
  • 11 篇 henzinger monika
  • 11 篇 bodlaender hl
  • 11 篇 nanongkai danupo...
  • 10 篇 mcmillan scott
  • 10 篇 nagamochi hirosh...
  • 10 篇 low tze meng
  • 10 篇 dragan feodor f.
  • 9 篇 dondi riccardo

语言

  • 2,637 篇 英文
  • 285 篇 其他
  • 7 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 土耳其文
检索条件"主题词=Graph Algorithms"
2933 条 记 录,以下是251-260 订阅
排序:
Finding Minimum Matching Cuts in H-free graphs and graphs of Bounded Radius and Diameter
arXiv
收藏 引用
arXiv 2025年
作者: Lucke, Felicia Marchand, Joseph Olbrich, Jannik Department of Computer Science Durham University United Kingdom ENS Paris-Saclay France Ulm University Germany
A matching cut is a matching that is also an edge cut. In the problem Minimum Matching Cut, we ask for a matching cut with the minimum number of edges in the matching. We give polynomial-time algorithms for P7-free, S... 详细信息
来源: 评论
ELUSIVE PROPERTIES OF COUNTABLY INFINITE graphS
arXiv
收藏 引用
arXiv 2025年
作者: Elekes, Márton Kátay, Tamás Kocsis, Anett Alfréd Rényi Institute of Mathematics Budapest Hungary AND Eötvös Loránd University Budapest Hungary Alfréd Rényi Institute of Mathematics Budapest Hungary Eötvös Loránd University Budapest Hungary
A graph property is elusive (or evasive) if any algorithm testing it by asking questions of the form "Is there an edge between vertices x and y?" must, in the worst case, examine all pairs of vertices. Elusi... 详细信息
来源: 评论
More Efficient Sybil Detection Mechanisms Leveraging Resistance of Users to Attack Requests
arXiv
收藏 引用
arXiv 2025年
作者: Dehkordi, Ali Safarpoor Zehmakan, Ahad N. Australian National University Canberra Australia
We investigate the problem of sybil (fake account) detection in social networks from a graph algorithms perspective, where graph structural information is used to classify users as sybil and benign. We introduce the n... 详细信息
来源: 评论
Balancing Accuracy and Efficiency for Large-Scale SLAM: A Minimal Subset Approach for Scalable Loop Closures
arXiv
收藏 引用
arXiv 2025年
作者: Stathoulopoulos, Nikolaos Kanellakis, Christoforos Nikolakopoulos, George Robotics and AI Group Department of Computer Electrical and Space Engineering Luleå University of Technology Luleå971 87 Sweden
Typical LiDAR SLAM architectures feature a front-end for odometry estimation and a back-end for refining and optimizing the trajectory and map, commonly through loop closures. However, loop closure detection in large-... 详细信息
来源: 评论
On the Locality of Hall's Theorem
arXiv
收藏 引用
arXiv 2025年
作者: Brandt, Sebastian Maus, Yannic Narayanan, Ananth Schager, Florian Uitto, Jara
The last five years of research on distributed graph algorithms have seen huge leaps of progress, both regarding algorithmic improvements and impossibility results: new strong lower bounds have emerged for many centra... 详细信息
来源: 评论
graph Clustering by Means of Evolutionary algorithms
Graph Clustering by Means of Evolutionary Algorithms
收藏 引用
作者: Kohout, Jan Charles University of Prague
Partitioning nodes of a graph into clusters according to their simi- larities can be a very useful but complex task of data analysis. Many dierent approaches and algorithms for this problem exist, one of the possibili... 详细信息
来源: 评论
Unit Edge-Length Rectilinear Drawings with Crossings and Rectangular Faces
arXiv
收藏 引用
arXiv 2025年
作者: Angelini, Patrizio Binucci, Carla Di Battista, Giuseppe Di Giacomo, Emilio Didimo, Walter Grosso, Fabrizio Ortali, Giacomo Tollis, Ioannis G. John Cabot University Italy University of Perugia Italy University of Roma Tre Italy University of Crete Greece
Unit edge-length drawings, rectilinear drawings (where each edge is either a horizontal or a vertical segment), and rectangular face drawings are among the most studied subjects in graph Drawing. However, most of the ... 详细信息
来源: 评论
Shortest Paths, Pigeonholes and Finite Sets : A Constructive Proof in Agda  24
Shortest Paths, Pigeonholes and Finite Sets : A Constructive...
收藏 引用
Proceedings of the 36th Symposium on Implementation and Application of Functional Languages
作者: Michael Youssef University of Kaiserslautern-Landau (RPTU) Kaiserslautern Germany
来源: 评论
Critical (P5, W4)-Free graphs
arXiv
收藏 引用
arXiv 2025年
作者: Xia, Wen Jooken, Jorik Goedgebeur, Jan Beaton, Iain Cameron, Ben Huang, Shenwei College of Computer Science Nankai University Tianjin300071 China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China Department of Computer Science KU Leuven Campus Kulak-Kortrijk Kortrijk8500 Belgium Department of Applied Mathematics Computer Science and Statistics Ghent University Ghent9000 Belgium Department of Mathematics and Statistics Acadia University WolfvilleNS Canada School of Mathematical and Computational Sciences University of Prince Edward Island CharlottetownPE Canada
A graph G is k-vertex-critical if χ(G) = k but χ(G − v) 1, H2)-free if it contains no induced subgraph isomorphic to H1 nor H2. A W4 is the graph consisting of a C4 plus an additional vertex adjacent to all the vert... 详细信息
来源: 评论
Hosoya Polynomials of Mycielskian graphs
arXiv
收藏 引用
arXiv 2025年
作者: Vaidya, Sanju Li, Aihua Mercy College Dobbs FerryNY555 United States Montclair State University 1 Normal Avenue MontclairNJ07044 United States
Vulnerability measures and topological indices are crucial in solving various problems such as the stability of the communication networks and development of mathematical models for chemical compounds. In 1947, Harry ... 详细信息
来源: 评论