Graph theory

View this topic in
In mathematics and computer science, graph theory is the study of graphs, mathematical structures used to model pairwise relations between objects from a certain collection. (Wikipedia.org)






Conferences related to Graph theory

Back to Top

2013 IEEE International Conference on Data Engineering (ICDE 2013)

The annual IEEE International Conference on Data Engineering (ICDE) addresses research issues in designing, building, managing, and evaluating advanced data-intensive systems and applications. It is a leading forum for researchers, practitioners, developers, and users to explore cutting-edge ideas and to exchange techniques, tools, and experiences.


2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

People perceive the Web increasingly as a social medium that fosters interaction among people, sharing of experiences and knowledge, group activities, community formation and evolution. This has led to a rising prominence of Social Network Analysis and Mining (SNAM) in academia, politics, homeland security and business. The 2013 international conference on Advances in Social Network Analysis and Mining (ASONAM-13 will primarily provide an interdisciplinary venue brings together practitioners and researchers from a variety of SNAM fields to promote collaborations and exchange of ideas and practices. The conference will address important aspects with a specific focus on the emerging trends and industry needs associated with social networking analysis and mining. The conference solicits experimental and theoretical works on social network analysis and mining with their application to real life situations.

  • 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)

    In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social Web sites, email logs, phone logs and instant messaging systems, which are widely analyzed using graph theory and machine learning techniques. People perceive the Web increasingly as a social medium that fosters interaction among people, sharing of experiences and knowledge, group activities, community formation and evolution. This has led to a rising prominence of SNAM in academia, politics, homeland security and business.

  • 2011 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2011)

    The international conference on Advances in Social Network Analysis and Mining (ASONAM 2011) will primarily provide an interdisciplinary venue that will bring together practitioners and researchers from a variety of SNAM fields to promote collaborations and exchange of ideas and practices. ASONAM 2011 is intended to address important aspects with a specific focus on the emerging trends and industry needs associated with social networking analysis and mining. The conference solicits experimental and theoreti

  • 2010 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2010)

    The international conference on Advances in Social Network Analysis and Mining (ASONAM 2010) will primarily provide an interdisciplinary venue that will bring together practitioners and researchers from a variety of SNAM fields to promote collaborations and exchange of ideas and practices. ASONAM 2010 is intended to address important aspects with a specific focus on the emerging trends and industry needs associated with social networking analysis and mining. The conference solicits experimental and theoreti

  • 2009 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2009)

    In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social websites, email logs, phone logs and instant messageing systems, which are widely analyzed using graph theory and machine learning techniques. People perceive teh web increasingly as a social medium that fosters interaction among people, sharing of experiences and knowledge, group activities, community


2012 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)

BIBM 2012 solicits high-quality original research papers (including significant work-in-progress) in any aspect of bioinformatics, biomedicine and healthcare informatics. New computational techniques and methods in machine learning; data mining; text analysis; pattern recognition; knowledge representation; databases; data modeling; combinatorics; stochastic modeling; string and graph algorithms; linguistic methods; robotics; constraint satisfaction; data visualization; parallel computation; data integration; modeling and simulation and their application in life science domain are especially encouraged.


2011 2nd International Conference on Biomedical Engineering and Computer Science (ICBECS)

The 2nd International Conference on Biomedical Engineering and Computer Science (ICBECS 2011) will be held from April 23th to 24th, 2010 in Wuhan, China, which will bring together top researchers from Asian Pacific areas, North America, Europe and around the world to exchange research results and address open issues in all aspects of biomedical engineering, bioinformatics and computer science.


2011 3rd International Workshop on Education Technology and Computer Science (ETCS)

ETCS2011 will be held on 12-13 March, 2011 in Wuhan, China. ETCS2009 and ETCS2010 have been indexed by EI Compendex and ISTP. The ETCS2011 will bring together the top researchers from Asian Pacific nations, North America, Europe and around the world to exchange their research results and address open issues in Education Technology and Computer Science.

  • 2010 2nd International Workshop on Education Technology and Computer Science (ETCS)

    The 2nd International Workshop on Education Technology and Computer Science (ETCS2010) will be held on 6-7 March, 2010 in Wuhan, China. The workshop will bring together the top researchers from Asian Pacific nations, North America, Europe and around the world to exchange their research results and address open issues in Education Technology and Computer Science.


More Conferences

Periodicals related to Graph theory

Back to Top

Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.


Pattern Analysis and Machine Intelligence, IEEE Transactions on

Statistical and structural pattern recognition; image analysis; computational models of vision; computer vision systems; enhancement, restoration, segmentation, feature extraction, shape and texture analysis; applications of pattern analysis in medicine, industry, government, and the arts and sciences; artificial intelligence, knowledge representation, logical and probabilistic inference, learning, speech recognition, character and text recognition, syntactic and semantic processing, understanding natural language, expert systems, ...


Signal Processing, IEEE Transactions on

The technology of transmission, recording, reproduction, processing, and measurement of speech; other audio-frequency waves and other signals by digital, electronic, electrical, acoustic, mechanical, and optical means; the components and systems to accomplish these and related aims; and the environmental, psychological, and physiological factors of thesetechnologies.


Visualization and Computer Graphics, IEEE Transactions on

Specific topics include, but are not limited to: a) visualization techniques and methodologies; b) visualization systems and software; c) volume visulaization; d) flow visualization; e) information visualization; f) multivariate visualization; g) modeling and surfaces; h) rendering techniques and methodologies; i) graphics systems and software; j) animation and simulation; k) user interfaces; l) virtual reality; m) visual programming and program visualization; ...




Xplore Articles related to Graph theory

Back to Top

Pruning near-duplicate images for mobile landmark identification: A graph theoretical approach

Danisman, T.; Martinet, J.; Bilasco, I.M. Content-Based Multimedia Indexing (CBMI), 2015 13th International Workshop on, 2015

Automatic landmark identification is one of the hot research topics in computer vision domain. Efficient and robust identification of landmark points is a challenging task, especially in a mobile context. This paper addresses the pruning of near-duplicate images for creating representative training image sets to minimize overall query processing complexity and time. We prune different perspectives of real world landmarks ...


Enumeration of reachable, forbidden, live states of gen-left k-net system (with a non-sharing resource place) of Petri Nets

Chao, D.Y.; Tsung Hsien Yu Computational Intelligence in Control and Automation (CICA), 2014 IEEE Symposium on, 2014

Earlier, Chao pioneered the very first closed-form solution of the number of reachable and other states for marked graphs (MG) and kth order system which is the simplest class of S3PR (Systems of Simple Sequential Processes with Resources). This paper progresses one step further on enumerating reachable (forbidden, live, and deadlock) states for general k-net systems (one non- sharing resource ...


An integrated decision, control and fault detection scheme for cooperating unmanned vehicle formations

Lechevin, N.; Rabbath, C.A.; Shanmugavel, M.; Tsourdos, A.; White, B.A. American Control Conference, 2008, 2008

We propose a hierarchical and decentralized scheme for integrated decision, control and fault detection in cooperating unmanned aerial systems flying in formations and operating in adversarial environments. To handle, in a cooperative fashion, events that may adversely affect the outcome of a multi- vehicle mission, events such as actuator faults, body damage, network interruption/delays, and vehicle loss, we present a ...


A Hybrid Algorithm to Reconfigure Platforms of Radio Mobile Services

Letaifa, A.B.; Tabbane, S.; Choukai, Z. Local Computer Networks, 2005. 30th Anniversary. The IEEE Conference on, 2005

Radio mobile multimedia services are much more requested these years and operators must answer to the requirements while guaranteeing quality of service. Among the solutions, mobile network platforms must be able to answer efficiently and on time to the expectations of the users through dynamic adaptation of the architecture. Our model is based on a hybrid algorithm to reconfigure the ...


Hill climbing with reduced search space (logic optimization)

Brand, D. Computer-Aided Design, 1988. ICCAD-88. Digest of Technical Papers., IEEE International Conference on, 1988

A general optimization algorithm, which in some areas successfully competes with simulated annealing and the Kernighan-Lin algorithm, as well as special heuristics, is presented. It gains speed by taking advantage of the structure of the objective function in order to reduce the search space. Results obtained from the implementation of the algorithm on three problems are presented.<>


More Xplore Articles

Educational Resources on Graph theory

Back to Top

eLearning

Pruning near-duplicate images for mobile landmark identification: A graph theoretical approach

Danisman, T.; Martinet, J.; Bilasco, I.M. Content-Based Multimedia Indexing (CBMI), 2015 13th International Workshop on, 2015

Automatic landmark identification is one of the hot research topics in computer vision domain. Efficient and robust identification of landmark points is a challenging task, especially in a mobile context. This paper addresses the pruning of near-duplicate images for creating representative training image sets to minimize overall query processing complexity and time. We prune different perspectives of real world landmarks ...


Enumeration of reachable, forbidden, live states of gen-left k-net system (with a non-sharing resource place) of Petri Nets

Chao, D.Y.; Tsung Hsien Yu Computational Intelligence in Control and Automation (CICA), 2014 IEEE Symposium on, 2014

Earlier, Chao pioneered the very first closed-form solution of the number of reachable and other states for marked graphs (MG) and kth order system which is the simplest class of S3PR (Systems of Simple Sequential Processes with Resources). This paper progresses one step further on enumerating reachable (forbidden, live, and deadlock) states for general k-net systems (one non- sharing resource ...


An integrated decision, control and fault detection scheme for cooperating unmanned vehicle formations

Lechevin, N.; Rabbath, C.A.; Shanmugavel, M.; Tsourdos, A.; White, B.A. American Control Conference, 2008, 2008

We propose a hierarchical and decentralized scheme for integrated decision, control and fault detection in cooperating unmanned aerial systems flying in formations and operating in adversarial environments. To handle, in a cooperative fashion, events that may adversely affect the outcome of a multi- vehicle mission, events such as actuator faults, body damage, network interruption/delays, and vehicle loss, we present a ...


A Hybrid Algorithm to Reconfigure Platforms of Radio Mobile Services

Letaifa, A.B.; Tabbane, S.; Choukai, Z. Local Computer Networks, 2005. 30th Anniversary. The IEEE Conference on, 2005

Radio mobile multimedia services are much more requested these years and operators must answer to the requirements while guaranteeing quality of service. Among the solutions, mobile network platforms must be able to answer efficiently and on time to the expectations of the users through dynamic adaptation of the architecture. Our model is based on a hybrid algorithm to reconfigure the ...


Hill climbing with reduced search space (logic optimization)

Brand, D. Computer-Aided Design, 1988. ICCAD-88. Digest of Technical Papers., IEEE International Conference on, 1988

A general optimization algorithm, which in some areas successfully competes with simulated annealing and the Kernighan-Lin algorithm, as well as special heuristics, is presented. It gains speed by taking advantage of the structure of the objective function in order to reduce the search space. Results obtained from the implementation of the algorithm on three problems are presented.<>


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Graph theory"

IEEE-USA E-Books

No IEEE-USA E-Books are currently tagged "Graph theory"



Standards related to Graph theory

Back to Top

No standards are currently tagged "Graph theory"


Jobs related to Graph theory

Back to Top