Search results for " Graphs"

showing 10 items of 62 documents

A bio-inspired approach to attack graphs analysis

2018

Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graphs analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building…

Bio-inspired techniqueTheoretical computer scienceComputer scienceNetwork securitybusiness.industrymedia_common.quotation_subjectComputer Science (all)Bio-inspired techniquesNetwork securityAttack graphPathway analysisFlux balance analysisTheoretical Computer ScienceInterdependenceAttack graphMetabolic network modelAttack graphs; Bio-inspired techniques; Network securityGraph (abstract data type)businessAttack graphsmedia_common
researchProduct

Topology of synaptic connectivity constrains neuronal stimulus representation, predicting two complementary coding strategies

2022

In motor-related brain regions, movement intention has been successfully decoded from in-vivo spike train by isolating a lower-dimension manifold that the high-dimensional spiking activity is constrained to. The mechanism enforcing this constraint remains unclear, although it has been hypothesized to be implemented by the connectivity of the sampled neurons. We test this idea and explore the interactions between local synaptic connectivity and its ability to encode information in a lower dimensional manifold through simulations of a detailed microcircuit model with realistic sources of noise. We confirm that even in isolation such a model can encode the identity of different stimuli in a lo…

Computer and Information SciencesPhysiologyScienceModels NeurologicalInformation TheoryAction PotentialsNeurophysiologySynaptic TransmissionMembrane PotentialTopologyAnimal CellsClustering CoefficientsAnimalsManifoldsNeuronsMultidisciplinaryNeuronal MorphologyQuantitative Biology::Neurons and CognitionDirected GraphsvariabilityQRBiology and Life SciencesEigenvaluesSomatosensory CortexCell BiologyRatsMicrocircuitsElectrophysiologyAlgebraLinear AlgebraCellular NeuroscienceGraph TheoryPhysical SciencesEngineering and TechnologyMedicineCellular TypesdiverseMathematicsElectrical EngineeringResearch ArticleNeuroscienceElectrical Circuits
researchProduct

Argumentation graphs with constraint-based reasoning for collaborative expertise

2018

International audience; Collaborative processes are very important in telemedicine domain since they allow for making right decisions in complex situations with multidisciplinary staff. When modelling these collaborative processes, some inconsistencies can appear. In semantic modelling (conceptual graphs), these inconsistencies are verified using constraints. In this work, collaborative processes are represented using an argumentation system modelled in a conceptual graph formalism where inconsistencies could be particular bad attack relation between arguments. To overcome these inconsistencies, two solutions are proposed. The first one is to weight the arguments evolving in the argumentati…

Constraint based reasoningmedical deontologyComputer Networks and CommunicationsComputer sciencedomain0206 medical engineeringMédecine humaine et pathologieArgumentation theory02 engineering and technologyInconsistenciesWeightingdecision makingArgumentation theoryAutreMultidisciplinary approachframeworksCredibilityconceptual graphs0202 electrical engineering electronic engineering information engineeringinconsistenciesCompetence (human resources)Health professionalsManagement scienceMedical deontology[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]decision-makingargumentation theory16. Peace & justice020601 biomedical engineeringWeightingassignmentConceptual graphsHardware and ArchitectureConceptual graph020201 artificial intelligence & image processingweightingteleexpertiseDecision makingpreference-based argumentationmanagement[SDV.MHEP]Life Sciences [q-bio]/Human health and pathologySoftwareFuture Generation Computer Systems
researchProduct

Some properties of vertex-oblique graphs

2016

The type t G ( v ) of a vertex v ? V ( G ) is the ordered degree-sequence ( d 1 , ? , d d G ( v ) ) of the vertices adjacent with v , where d 1 ? ? ? d d G ( v ) . A graph G is called vertex-oblique if it contains no two vertices of the same type. In this paper we show that for reals a , b the class of vertex-oblique graphs G for which | E ( G ) | ? a | V ( G ) | + b holds is finite when a ? 1 and infinite when a ? 2 . Apart from one missing interval, it solves the following problem posed by Schreyer et?al. (2007): How many graphs of bounded average degree are vertex-oblique? Furthermore we obtain the tight upper bound on the independence and clique numbers of vertex-oblique graphs as a fun…

Discrete mathematicsClique-sumNeighbourhood (graph theory)020206 networking & telecommunications0102 computer and information sciences02 engineering and technology01 natural sciencesTheoretical Computer ScienceMetric dimensionCombinatoricsIndifference graphNew digraph reconstruction conjecture010201 computation theory & mathematicsChordal graphIndependent set0202 electrical engineering electronic engineering information engineeringDiscrete Mathematics and CombinatoricsBound graphirregular graphsindependence numbervertex-oblique graphslexicographic productMathematicsDiscrete Mathematics
researchProduct

On lazy representations and Sturmian graphs

2011

In this paper we establish a strong relationship between the set of lazy representations and the set of paths in a Sturmian graph associated with a real number α. We prove that for any non-negative integer i the unique path weighted i in the Sturmian graph associated with α represents the lazy representation of i in the Ostrowski numeration system associated with α. Moreover, we provide several properties of the representations of the natural integers in this numeration system.

Discrete mathematicsCombinatoricsOstrowski numerationIntegernumeration systems Sturmian graphs continued fractionsSettore INF/01 - InformaticaGraphMathematicsReal number
researchProduct

Sturmian graphs and integer representations over numeration systems

2012

AbstractIn this paper we consider a numeration system, originally due to Ostrowski, based on the continued fraction expansion of a real number α. We prove that this system has deep connections with the Sturmian graph associated with α. We provide several properties of the representations of the natural integers in this system. In particular, we prove that the set of lazy representations of the natural integers in this numeration system is regular if and only if the continued fraction expansion of α is eventually periodic. The main result of the paper is that for any number i the unique path weighted i in the Sturmian graph associated with α represents the lazy representation of i in the Ost…

Discrete mathematicsContinued fractionsApplied MathematicsNumeration systemsSturmian graphsGraphCombinatoricsOstrowski numerationIntegerIf and only ifnumeration systems Sturmian graphs continued fractions.Numeration systems; SUBWORD GRAPHS; WORDSDiscrete Mathematics and CombinatoricsSUBWORD GRAPHSContinued fractionWORDSMathematicsReal number
researchProduct

On the hardness of optimization in power-law graphs

2008

Our motivation for this work is the remarkable discovery that many large-scale real-world graphs ranging from Internet and World Wide Web to social and biological networks appear to exhibit a power-law distribution: the number of nodes y"i of a given degree i is proportional to i^-^@b where @b>0 is a constant that depends on the application domain. There is practical evidence that combinatorial optimization in power-law graphs is easier than in general graphs, prompting the basic theoretical question: Is combinatorial optimization in power-law graphs easy? Does the answer depend on the power-law exponent @b? Our main result is the proof that many classical NP-hard graph-theoretic optimizati…

Discrete mathematicsGeneral Computer ScienceVertex coverPower-law graphsGraph construction algorithmsClique (graph theory)Theoretical Computer ScienceCombinatoricsIndifference graphDominating setChordal graphIndependent setNP-hardnessCombinatorial optimizationGraph optimization problemsMaximal independent setMathematicsComputer Science(all)Theoretical Computer Science
researchProduct

Minimal Morse flows on compact manifolds

2006

Abstract In this paper we prove, using the Poincare–Hopf inequalities, that a minimal number of non-degenerate singularities can be computed in terms only of abstract homological boundary information. Furthermore, this minimal number can be realized on some manifold with non-empty boundary satisfying the abstract homological boundary information. In fact, we present all possible indices and types (connecting or disconnecting) of singularities realizing this minimal number. The Euler characteristics of all manifolds realizing this minimal number are obtained and the associated Lyapunov graphs of Morse type are described and shown to have the lowest topological complexity.

Discrete mathematicsLyapunov functionTopological complexityBoundary (topology)Type (model theory)Morse codeManifoldLyapunov graphslaw.inventionsymbols.namesakePoincaré–Hopf inequalitieslawEuler's formulasymbolsGravitational singularityGeometry and TopologyMathematics::Symplectic GeometryConley indexMathematicsTopology and its Applications
researchProduct

Online Scheduling of Task Graphs on Heterogeneous Platforms

2020

Modern computing platforms commonly include accelerators. We target the problem of scheduling applications modeled as task graphs on hybrid platforms made of two types of resources, such as CPUs and GPUs. We consider that task graphs are uncovered dynamically, and that the scheduler has information only on the available tasks, i.e., tasks whose predecessors have all been completed. Each task can be processed by either a CPU or a GPU, and the corresponding processing times are known. Our study extends a previous $4\sqrt{m/k}$ 4 m / k -competitive online algorithm by Amaris et al. [1] , where $m$ m is the number of CPUs and $k$ k the number of GPUs ( $m\geq k$ m ≥ k ). We prove that no online…

Discrete mathematics[INFO.INFO-CC]Computer Science [cs]/Computational Complexity [cs.CC]020203 distributed computingScheduleCompetitive analysisComputer scienceHeuristicSchedulingOnline algorithmsProcessor schedulingSymmetric multiprocessor system02 engineering and technologyUpper and lower boundsGraphScheduling (computing)Computational Theory and MathematicsHardware and ArchitectureSignal Processing0202 electrical engineering electronic engineering information engineeringTask analysisTask graphsHeterogeneous computingOnline algorithm[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]
researchProduct

About Supergraphs. Part III

2019

Summary The previous articles [5] and [6] introduced formalizations of the step-by-step operations we use to construct finite graphs by hand. That implicitly showed that any finite graph can be constructed from the trivial edgeless graph K 1 by applying a finite sequence of these basic operations. In this article that claim is proven explicitly with Mizar[4].

EpigraphTheoretical computer scienceApplied Mathematics68t99Part iiiComputational Mathematics03b35construction of finite graphsQA1-93905c76Graph operationssupergraphgraph operationsMathematicsMathematicsFormalized Mathematics
researchProduct