Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








52 Hits in 7.1 sec

Prufer Coding: A Vectorization Method for Undirected Labeled Graph

Lin Yang, Yongjie Wang
2020 IEEE Access  
Prufer coding and decoding flowcharts for undirected labeled graph The prufer coding and decoding flow for the undirected labeled graph is shown in Figure 10 .  ...  In order to realize it, our contributions could be summarized as follows: a) Propose a method for undirected labeled graph vectorization based on the prufer algorithm, including graph encoding and decoding  ...  Author Name: Preparation of Papers for IEEE Access (February 2017) VOLUME XX, 2017 Author Name: Preparation of Papers for IEEE Access (February 2017) VOLUME XX, 2017  ... 
doi:10.1109/access.2020.3024974 fatcat:7s3q2wyhxzcbdiqgyykujozrtq

A Prufer-Sequence Based Representation of Large Graphs for Structural Encoding of Logic Networks [article]

Manjari Pradhan, Bhargab B. Bhattacharya
2022 arXiv   pre-print
Our representation is based on Prufer encoding for trees.  ...  Moreover, our method is based on a novel technique, called 𝒢𝒯-enhancement whereby we first transform the graph such that it can be represented by a singular tree.  ...  Clearly, for decoding the graph, this methods can not solely rely on the Prufer code.  ... 
arXiv:2209.01596v1 fatcat:fl5yzgu6pjcmnnuyvpwexfdinm

Edge sets: an effective evolutionary coding of spanning trees

G.R. Raidl, B.A. Julstrom
2003 IEEE Transactions on Evolutionary Computation  
We propose representing spanning trees in evolutionary algorithms for network design problems directly as sets of their edges, and we describe initialization, recombination, and mutation operators for  ...  Comparisons of this algorithm to others that encode candidate spanning trees via the Blob Code, with network random keys, and as strings of weights indicate the superiority of the edge-set encoding, particularly  ...  Acknowledgments The authors would like to thank the anonymous reviewers and David Fogel for their their valueable comments on a previous version of this article.  ... 
doi:10.1109/tevc.2002.807275 fatcat:iaecjournrdanmcuukhqbajx2i

Unified parallel encoding and decoding algorithms for Dandelion-like codes

Saverio Caminiti, Rossella Petreschi
2010 Journal of Parallel and Distributed Computing  
Namely, a unique encoding algorithm and a unique decoding algorithm, which when properly parameterized, can be used for all Dandelion-like codes, are designed.  ...  The Dandelion-like codes are eight bijections between labeled trees and strings of node labels.  ...  A free tree is converted into a directed graph by replacing each undirected edge {u, v} by two directed edges (u, v) and (v, u) .  ... 
doi:10.1016/j.jpdc.2010.07.003 fatcat:tznv3kjkmfdpndfn6eoxtkmphq

Code representation learning with Prüfer sequences

Tenzin Jinpa
2021
An effective and efficient code representation is critical to the success of sequence-to-sequence deep neural network models for a variety of tasks in code understanding, such as code summarization and  ...  To test the efficacy of Prüfer-sequence-based representation, we designed a code summarization using a sequence-to-sequence learning model on real-world benchmark datasets.  ...  Another approach in code representation learning is the tree-based or graph-based learning methods of the source code.  ... 
doi:10.14288/1.0402946 fatcat:hglo4wn6hrannnqqyprs2dm5wu

Recent Colorings And Labelings In Topological Coding [article]

Bing Yao
2021 arXiv   pre-print
The colorings and labelings of graph theory are main techniques in topological coding applied in asymmetric encryption system.  ...  labelings and graph colorings.  ...  We hope algebraic methods may solve some open problems of graph theory, for example, Graceful Tree Conjecture, and try to use algebraic methods for discovering possible regularity among labelings all in  ... 
arXiv:2106.15254v1 fatcat:xafgjp2bszbytkt6joeytqupu4

A preliminary comparison of tree encoding schemes for evolutionary algorithms

Eduardo G. Carrano, Carlos M. Fonseca, Ricardo H. C. Takahashi, Luciano C. A. Pimenta, Oriane M. Neto
2007 2007 IEEE International Conference on Systems, Man and Cybernetics  
of solutions after those operations, and the corresponding heritability and locality; 2) The encoding methods have been employed in a genetic algorithm to solve three different instances (with 10, 25  ...  The results of this study provide insight into the properties of current encoding schemes for network design problems.  ...  The decoding operators were labeled as follows: Label Decoding A Characteristic vector B Prüfer numbers C Network random keys D Edge sets E Node biased F Link and node biased The average decoding time  ... 
doi:10.1109/icsmc.2007.4414042 dblp:conf/smc/CarranoFTPN07 fatcat:lpjdrfpbvvdqlor2trcb3kt6si

Graph entropy rate minimization and the compressibility of undirected binary graphs

Marcos E. Bolanos, Selin Aviyente, Hayder Radha
2012 2012 IEEE Statistical Signal Processing Workshop (SSP)  
With the increasing popularity of complex network analysis through the use of graphs, a method for computing graph entropy has become important for a better understanding of a network's structure and for  ...  In this paper we propose a new approach for computing graph entropy with the intention of quantifying the compressibility of a graph.  ...  Finally, other coding algorithms such as Huffman coding, Prüfer coding, or an original coding method will be implemented so as to achieve the compression indicated by our proposed entropy rate measure  ... 
doi:10.1109/ssp.2012.6319634 dblp:conf/ssp/BolanosAR12 fatcat:uhnriolkcrftzn3tq3cohfbhyq

Reliable Adaptive Data Aggregation Route Strategy for a Trade-off between Energy and Lifetime in WSNs

Wenzhong Guo, Wei Hong, Bin Zhang, Yuzhong Chen, Naixue Xiong
2014 Sensors  
The data transmission path will be compromised for some disabled nodes.  ...  In this paper, we address the reliable data aggregation route problem for WSNs.  ...  The authors would like to thank Guolong Chen from Fuzhou University and Jie Li from University of Tsukuba for their invaluable expert advice that helped us successfully complete the paper.  ... 
doi:10.3390/s140916972 pmid:25215944 pmcid:PMC4208209 fatcat:go5dxncnbrgy5lvf4mifpzkk3m

A genetic algorithm for energy-efficient based multicast routing on MANETs

Yun-Sheng Yen, Yi-Kung Chan, Han-Chieh Chao, Jong Hyuk Park
2008 Computer Communications  
These proposed methods have always considered several techniques such as a route load for relaying, battery lifetime in route selection, decreasing the frequency of sending control messages, optimizing  ...  The simulation results show that our proposal method is an efficient and robust algorithm for multicast route selection.  ...  Consider a wireless network modeled as an undirected graph G = (V, L), where V is a set of nodes and L is a set of links.  ... 
doi:10.1016/j.comcom.2007.10.033 fatcat:oa47cmim3jg57dxr6p23icxhqi

Statistics of delta peaks in the spectral density of large random trees [article]

O. Golinelli
2003 arXiv   pre-print
The rest of the spectral density is a function which vanishes at all positions of peaks, which are a dense subset of real numbers: so this function is almost everywhere discontinuous.  ...  Moreover all associated eigenvectors are strictly localized on a finite number of nodes.  ...  Mallick for stimulating discussions and a careful reading of the manuscript.  ... 
arXiv:cond-mat/0301437v1 fatcat:ssmvw3fbcrcy3lch2ex3q2dwgu

How to encode a tree [article]

Sally Picciotto
2017 arXiv   pre-print
We construct bijections giving three "codes" for trees. These codes follow naturally from the Matrix Tree Theorem of Tutte and have many advantages over the one produced by Prufer in 1918.  ...  In each case, we have at least two algorithms, one of which involves hands-on manipulations of the tree while the other involves a combinatorial and linear algebraic manipulation of a matrix.  ...  The Prüfer Code In 1918, Prüfer [9] gave the following bijective proof of this formula. Given a labelled tree, we suppose that the least leaf is labelled i 1 , and that succ(i 1 ) = j 1 .  ... 
arXiv:1710.08463v1 fatcat:pkte265fcvebtlcs4ddnzvij7e

Diameter Constrained Fuzzy Minimum Spanning Tree Problem

Sk. Md. Abu Nayeem, Madhumangal Pal
2013 International Journal of Computational Intelligence Systems  
Furthermore, a fuzzy simulation based hybrid genetic algorithm is designed to solve the proposed models using Prüfer like code representation of labeled trees.  ...  Using the m λ measure, a generalization of credibility measure, the problem is formulated as chance-constrained programming problem and dependent-chance programming problem according to different decision  ...  Acknowledgement The authors are grateful to an anonymous reviewer for pointing out some mistakes and for providing fruitful suggestions.  ... 
doi:10.1080/18756891.2013.816027 fatcat:e5uuqhmutrbj7aqbqo2nj2ldke

Universal Topological Regularities of Syntactic Structures: Decoupling Efficiency from Optimization [article]

Fermín Moscoso del Prado Martín
2023 arXiv   pre-print
This pattern can arise from a process optimizing for communicative efficiency or, alternatively, by construction, as a by-effect of a sublinear preferential attachment process reflecting language production  ...  Human syntactic structures are usually represented as graphs.  ...  Acknowledgments Code and data are available online [51] . The author is indebted to Prof. Marco Baroni for helpful suggestions on this manuscript. The author declares no competing interests.  ... 
arXiv:2302.00129v1 fatcat:7zqgi3yc2rbytfii6taetk3a6q

POSSIBILITY-BASED PROBABILITY MAXIMIZATION MODELS FOR FUZZY RANDOM MINIMUM SPANNING TREE PROBLEMS

H. Katagiri, E.B. Mermri, M. Sakawa
2011 Scientiae mathematicae Japonicae  
or equal to a satisficing level.  ...  This paper deals with a minimum spanning tree programming problem involving fuzzy random weights.  ...  One of the classical theorems in enumeration is Cayley's theorem [3] , which says that in a complete undirected graph with n vertices there are n n−2 distinct labeled trees.  ... 
doi:10.32219/isms.73.2_3_157 fatcat:eprtrvvrsfasfh7brcuj32zqwq
« Previous Showing results 1 — 15 out of 52 results