Searched for: subject%3A%22Hypergraphs%22
(1 - 11 of 11)
document
Zhang, Z. (author), Yan, Gaowei (author), Qiao, Tiezhu (author), Fang, Yaling (author), Pang, Y. (author)
Aiming at the problem of mismatch between real-time data distribution and modeling data distribution caused by the change of working conditions in industrial process, which leads to the performance deterioration of the soft sensor model, a multi-source unsupervised soft sensor method based on joint distribution alignment and mapping structure...
journal article 2022
document
Bishnoi, A. (author), Das, Shagnik (author), Morris, Patrick (author), Szabó, Tibor (author)
A well-known conjecture, often attributed to Ryser, states that the cover number of an r-partite r-uniform hypergraph is at most r−1 times larger than its matching number. Despite considerable effort, particularly in the intersecting case, this conjecture remains wide open, motivating the pursuit of variants of the original conjecture....
journal article 2021
document
Hu, Feng (author), Ma, Lin (author), Zhan, X. (author), Zhou, Yinzuo (author), Liu, Chuang (author), Zhao, Haixing (author), Zhang, Zi Ke (author)
The study of citation networks is of interest to the scientific community. However, the underlying mechanism driving individual citation behavior remains imperfectly understood, despite the recent proliferation of quantitative research methods. Traditional network models normally use graph theory to consider articles as nodes and citations as...
journal article 2021
document
Dekker, Florine W. (author), Erkin, Z. (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
conference paper 2021
document
Dekker, Florine (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
master thesis 2020
document
Titulaer, Björn (author)
In this report we will take a look at various proofs of Ramsey's theorem, some of the bounds that result from those proofs and applications of Ramsey's theorem. We will consider the proof of Ramsey himself, the proof of Skolem, the proof given by Erd\H{o}s and Szekeres and the proof of again Erd\H{o}s and Rado. The best upper bound for higher...
bachelor thesis 2020
document
Yang, Dingqi (author), Qu, Bingqing (author), Yang, J. (author), Cudré-Mauroux, Philippe (author)
Location-Based Social Networks (LBSNs) have been widely used as a primary data source for studying the impact of mobility and social relationships on each other. Traditional approaches manually define features to characterize users' mobility homophily and social proximity, and show that mobility and social features can help friendship and...
journal article 2020
document
Huang, Yilin (author), Verbraeck, A. (author), Seck, M (author)
The graph transformation based method presented in this paper can automatically generate simulation models assuming that the models are intended for a certain domain. The method differs from other methods in that: the data used for model generation does not contain specifications of the model structures to be generated; the generated simulation...
journal article 2016
document
Liu, D. (author)
The infrastructure networks, including the Internet, telecommunication networks, electrical power grids, transportation networks (road, railway, waterway, and airway networks), gas networks and water networks, are becoming more and more complex. The complex infrastructure networks are crucial to our human society, and it has been a hot research ...
doctoral thesis 2013
document
Liu, D. (author), Blenn, N. (author), Van Mieghem, P.F.A. (author)
ur society contains all types of organizations, such as companies, research groups and hobby clubs. Affliation networks, as a large and important portion of social networks, consist of individuals and their affiation relations: Two individuals are connected by a link if they belong to the same organization(s). Affliation networks naturally...
journal article 2012
document
Liu, D. (author), Blenn, N. (author), Van Mieghem, P.F.A. (author)
Social networks, as well as many other real-world networks, exhibit overlapping community structure. In this paper, we present formulas which facilitate the computation for characterizing the overlapping community structure of networks. A hypergraph representation of networks with overlapping community structure is introduced. Using the...
journal article 2012
Searched for: subject%3A%22Hypergraphs%22
(1 - 11 of 11)