2012
DOI: 10.1016/j.cie.2011.11.013
|View full text |Cite
|
Sign up to set email alerts
|

Searching Steiner trees for web graph query

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…The basic algorithm for circuit searching is backtracking approach based on depth-first search [5,13,17]. In depth-first search, edges are explored out of the most recently discovered vertex v that still has unexplored edges leaving it.…”
Section: Circuit Searching Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…The basic algorithm for circuit searching is backtracking approach based on depth-first search [5,13,17]. In depth-first search, edges are explored out of the most recently discovered vertex v that still has unexplored edges leaving it.…”
Section: Circuit Searching Algorithmsmentioning
confidence: 99%
“…1, a Social networkis suited to represent the Web, where a web page is set as a vertex and hyperlink as an edge that is widely accepted as the basic approach to analyze the Web structure [1,5,6,8]. The Web structure can be easily constructed the search and storing data structure by using graphs.…”
Section: Introductionmentioning
confidence: 99%
“…Most current desktop applications of Internet behavior management are designed to limit the online behavior of employees in order to protect corporation's information security. The function of this kind software includes the prohibition or monitoring something such as BT, stocks, chat, MSN, QQ, monitoring e-mail and bandwidth, in order to reduce viruses infecting and achieve the purpose of the correct guidance of employees Internet usage [1][2][3][4][5] . However, mobile devices have small memory and limited resources, what's more, for security reason, most of mobile operating systems have strict restrictions on the functionality of applications and permission management, so it is difficult to obtain permission to manage any application such as stocks, QQ.…”
Section: Introductionmentioning
confidence: 99%
“…Secondly, there is no guarantee whether the movement is correctly made in each iterations. To get over this problem, a two-stage method is suggested both of these problems [19,27,36]. It is possible to guarantee that the correct move is made by using statistical selection methods.…”
Section: Optimized Combinatorial Cluster Algorithmsmentioning
confidence: 99%
“…As a new data processing ear like Big Data, Cloud Computing, and Internet of Things (IoT) approaches, the amount of data being collected in databases far exceeds the ability to reduce and analyze these data without the use of automated analysis techniques, data mining [25][26][27]34,36]. As the importance of data mining has grown, one of the critical issues to emerge is how to scale data mining techniques to larger and larger databases [2,24,35].…”
Section: Introductionmentioning
confidence: 99%