Results 121 to 130 of about 11,781 (210)
Universality for Graphs of Bounded Degeneracy
ABSTRACT Given a family ℋ$$ \mathscr{H} $$ of graphs, a graph G$$ G $$ is called ℋ$$ \mathscr{H} $$‐universal if G$$ G $$ contains every graph of ℋ$$ \mathscr{H} $$ as a subgraph. Following the extensive research on universal graphs of small size for bounded‐degree graphs, Alon asked what is the minimum number of edges that a graph must have to be ...
Peter Allen +2 more
wiley +1 more source
ABSTRACT Let G$$ G $$ be a Dirac graph, and let S$$ S $$ be a vertex subset of G$$ G $$, chosen uniformly at random. How likely is the induced subgraph G[S]$$ G\left[S\right] $$ to be Hamiltonian? This question, proposed by Erdős and Faudree in 1996, was recently resolved by Draganić, Keevash, and Müyesser, in the setting of graphs.
Zach Hunter +3 more
wiley +1 more source
Exploring Regional Biogeography of Abundant and Rare Bacteria in Soils With Long‐Read CycloneSEQ
ABSTRACT Background Rare microbial communities represent an important component of biodiversity in soil ecosystems, co‐existing with abundant species to drive ecosystem multifunctionality and maintain its stable operation. However, knowledge remains limited regarding the geographical distribution patterns and potential driving factors of microorganisms,
Yarong Li +12 more
wiley +1 more source
ABSTRACT System of Systems (SoS) environments are inherently complex, involving numerous operationally and managerially independent component systems with hidden interdependencies and frequent interactions based on unstructured data. In this paper, we propose using graphical Retrieval‐Augmented Generation (GraphRAG), a tool that combines large language
Yinchien Huang +2 more
wiley +1 more source
Mission Aware Cyber‐Physical Security
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis +3 more
wiley +1 more source
In this review, we present eMap 2.0, a web‐based platform for analyzing electron transfer pathways in proteins. We highlight representative applications of eMap, including its use in characterizing electron transfer within individual proteins and in revealing shared electron transfer pathways across protein families.
James R. Gayvert +3 more
wiley +1 more source
Note on extremal problems about connected subgraph sums. [PDF]
Cambie S, Groenland C.
europepmc +1 more source
ABSTRACT Wind energy's intermittency poses significant challenges for power grid stability. Existing forecasting methods exhibit notable limitations: traditional machine learning models struggle with long‐term temporal dependencies, while deep learning approaches often overlook spatial relationships among turbines.
YuChen Zhang
wiley +1 more source
Critical Review for One‐Class Classification: Recent Advances and Reality Behind Them
This review presents a new taxonomy to summarize one‐class classification (OCC) algorithms and their applications. The main argument is that OCC should not learn multiple classes. The paper highlights common violations of OCC involving multiple classes.
Toshitaka Hayashi +3 more
wiley +1 more source
Link Prediction in Heterogeneous Information Networks: Improved Hypergraph Convolution with Adaptive Soft Voting. [PDF]
Zhang S +6 more
europepmc +1 more source

