Results 71 to 80 of about 4,791 (239)

Short note of supertree-width and n-Superhypertree-width [PDF]

open access: yesNeutrosophic Sets and Systems
This paper investigates the properties of tree-width and related graph width parameters for n SuperHyperGraphs, a broader generalization of hypergraphs.
Takaaki Fujita
doaj   +1 more source

Tractable Inference for Hybrid Bayesian Networks with NAT-Modeled Dynamic Discretization

open access: yesProceedings of the International Florida Artificial Intelligence Research Society Conference, 2022
Hybrid BNs (HBNs) extend Bayesian networks (BNs) to both discrete and continuous variables. Among inference methods for HBNs, we focus on dynamic discretization (DD) that converts HBN to discrete BN for inference.
Yang Xiang, Hanwen Zheng
doaj   +1 more source

Induced subgraphs of bounded treewidth and the container method [PDF]

open access: yesACM-SIAM Symposium on Discrete Algorithms, 2020
A hole in a graph is an induced cycle of length at least 4. A hole is long if its length is at least 5. By $P_t$ we denote a path on $t$ vertices. In this paper we give polynomial-time algorithms for the following problems: the Maximum Weight Independent
Tara Abrishami   +4 more
semanticscholar   +1 more source

On the k-rainbow domination in graphs with bounded tree-width

open access: yesElectronic Journal of Graph Theory and Applications, 2021
Given a positive integer k and a graph G = (V, E), a function f from V to the power set of Ik is called a k-rainbow function if for each vertex v ∈ V, f(v)=∅ implies ∪u ∈ N(v)f(u)=Ik where N(v) is the set of all neighbors of vertex v and Ik = {1, …, k ...
M. Alambardar Meybodi   +3 more
doaj   +1 more source

Decomposition-Guided Reductions for Argumentation and Treewidth

open access: yesInternational Joint Conference on Artificial Intelligence, 2021
Argumentation is a widely applied framework for modeling and evaluating arguments and its reasoning with various applications. Popular frameworks are abstract argumentation (Dung’s framework) or logic-based argumentation (Besnard-Hunter’s framework ...
J. Fichte   +3 more
semanticscholar   +1 more source

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

Treewidth of Grid Subsets

open access: yesCombinatorica, 2017
15 pages, no ...
Berger, Eli   +2 more
openaire   +2 more sources

Solving Integer Linear Programs by Exploiting Variable-Constraint Interactions: A Survey

open access: yesAlgorithms, 2019
Integer Linear Programming (ILP) is among the most successful and general paradigms for solving computationally intractable optimization problems in computer science.
Robert Ganian, Sebastian Ordyniak
doaj   +1 more source

Intersection Dimension and Graph Invariants

open access: yesDiscussiones Mathematicae Graph Theory, 2021
We show that the intersection dimension of graphs with respect to several hereditary properties can be bounded as a function of the maximum degree. As an interesting special case, we show that the circular dimension of a graph with maximum degree Δ is at
Aravind N.R., Subramanian C.R.
doaj   +1 more source

First-order queries on classes of structures with bounded expansion [PDF]

open access: yesLogical Methods in Computer Science, 2020
We consider the evaluation of first-order queries over classes of databases with bounded expansion. The notion of bounded expansion is fairly broad and generalizes bounded degree, bounded treewidth and exclusion of at least one minor.
Wojtek Kazana, Luc Segoufin
doaj   +1 more source

Home - About - Disclaimer - Privacy