نتایج جستجو برای: graph protection

تعداد نتایج: 376537  

Journal: : 2023

The article proposes the creation of an effective system for detecting and responding to external influences in order minimize consequences breaching protection cloud virtual resources a timely manner. Mathematical models have been improved ensure software-configured networks, namely: mathematical model impact attack on resources, assessing state choosing countermeasure based complex indicator ...

Journal: :Journal of physics 2023

Abstract Clustering anonymity is a common social network data privacy protection scheme, which based on graph-clustering. Many existing graph clustering methods mainly focus the relationship between structure and attributes of nodes, difference them due to metric usually causes problem poor results. To address shortcomings in above graph-clustering methods, method implemented with fused distanc...

Journal: :Journal of Computer Security 2010
James R. Conrad Jim Alves-Foss Sauchi Stephen Lee

We introduce TG/MC, a Monte-Carlo approach for evaluating the impact of uncertainty about vulnerabilities upon forecasts of security for a real-world system modeled by a protection graph. A TG/MC model defines a vulnerability as a potential change to an otherwise safe initial protection graph that, if exploited, leads to an unauthorized state, a violation of the system’s security policy through...

Journal: :Discrete Applied Mathematics 2011
Jonelle Hook Garth Isaak

The graph Ramsey number R(G,H) is the smallest integer r such that every 2-coloring of the edges of Kr contains either a red copy of G or a blue copy of H . We find the largest star that can be removed from Kr such that the underlying graph is still forced to have a red G or a blue H . Thus, we introduce the star-critical Ramsey number r∗(G,H) as the smallest integer k such that every 2-colorin...

2007
Paul Elliott-Magwood

Proof. We would like to build up a linearly independent set of constraints for G. The set of edge inequalities is linearly independent since the edge inequalities each correspond to a distinct edge variable. When we add all the vertex equalities to the edge inequalities corresponding to the edges that are in G, we can then use the edge inequalities to eliminate all the variables corresponding t...

Journal: :International Journal of Advanced Computer Science and Applications 2023

For the rapidly developing location-based web recommendation services, traditional point-of-interest(POI) methods not only fail to utilize user information efficiently, but also face problem of privacy leakage. Therefore, this paper proposes a privacy-preserving interest point system that fuses location and interaction information. The geolocation-based uses convolutional neural networks (CNN) ...

2009
Kenneth L. Marcus John Roberts

Title VII of the Civil Rights Act of 1964 forbids job discrimination based on race, color, religion, sex, or national origin.1 Title VII was originally enacted as a regulation of interstate commerce and applied only to private employers. In 1972, however, the Act was extended to the public sector pursuant to Congress’s Fourteenth Amendment authority to ensure that ‘‘[n]o State shall . . . deny ...

Journal: :journal of algebra and related topics 2015
a. sharma a. gaur

let $r$ be a commutative ring with identity. let $g(r)$ denote the maximal graph associated to $r$, i.e., $g(r)$ is a graph with vertices as the elements of $r$, where two distinct vertices $a$ and $b$ are adjacent if and only if there is a maximal ideal of $r$ containing both. let $gamma(r)$ denote the restriction of $g(r)$ to non-unit elements of $r$. in this paper we study the various graphi...

Journal: :CoRR 2010
Gilson O. dos Santos Francisco Marcos de Assis Aércio Ferreira de Lima

We present a description of encoding/decoding for a concatenated quantum code that enables both protection against quantum computational errors and the occurrence of one quantum erasure. For this, it is presented how encoding and decoding for quantum graph codes are done, which will provide the protection against the occurrence of computational errors (external code). As internal code is used e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید