Results 111 to 120 of about 21,959 (221)

On the Variable Ordering in Subgraph Isomorphism Algorithms

open access: yesIEEE/ACM Transactions on Computational Biology and Bioinformatics, 2017
Graphs are mathematical structures to model several biological data. Applications to analyze them require to apply solutions for the subgraph isomorphism problem, which is NP-complete. Here, we investigate the existing strategies to reduce the subgraph isomorphism algorithm running time with emphasis on the importance of the order with which the graph ...
Bonnici Vincenzo, Giugno Rosalba
openaire   +4 more sources

Homology analysis of malware based on graph

open access: yesTongxin xuebao, 2017
Malware detection and homology analysis has been the hotspot of malware analysis.API call graph of malware can represent the behavior of it.Because of the subgraph isomorphism algorithm has high complexity,the analysis of malware based on the graph ...
Bing-lin ZHAO   +4 more
doaj   +2 more sources

Node Embedding and Cosine Similarity for Efficient Maximum Common Subgraph Discovery

open access: yesApplied Sciences
Finding the maximum common induced subgraph is a fundamental problem in computer science. Proven to be NP-hard in the 1970s, it has, nowadays, countless applications that still motivate the search for efficient algorithms and practical heuristics.
Stefano Quer   +4 more
doaj   +1 more source

Subgraph Isomorphism: Prolog vs. Conventional

open access: yes
Subgraph Isomorphism uses a small graph as a pattern to identify within a larger graph a set of vertices that have matching edges. This paper addresses a logic program written in Prolog for a specific relatively complex graph pattern for which multiple conventional implementations (including parallel) exist.
Yin, Claire Y., Kogge, Peter M.
openaire   +2 more sources

Random Generation Topology Coding Technique in Asymmetric Topology Encryption

open access: yesMathematics
The security of traditional public key cryptography algorithms depends on the difficulty of the underlying mathematical problems. Asymmetric topological encryption is a graph-dependent encryption algorithm produced to resist attacks by quantum computers ...
Jing Su, Bing Yao
doaj   +1 more source

Improving Graph Neural Network Expressivity via Subgraph Isomorphism Counting [PDF]

open access: green, 2022
Giorgos Bouritsas   +3 more
openalex   +1 more source

Maximum Common Subgraph Isomorphism Algorithms [PDF]

open access: yes, 2017
Maximum common subgraph (MCS) isomorphism algorithms play an important role in chemoinformatics by providing an effective mechanism for the alignment of pairs of chemical structures. This article discusses the various types of MCS that can be identified when two graphs are compared and reviews some of the algorithms that are available for this purpose,
Duesbury, E.   +2 more
openaire  

Home - About - Disclaimer - Privacy