graph searching
Recently Published Documents


TOTAL DOCUMENTS

113
(FIVE YEARS 8)

H-INDEX

19
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Matjaž Krnc ◽  
Nevena Pivač

Graph searching is one of the simplest and most widely used tools in graph algorithms. Every graph search method is defined using some partic-ular selection rule, and the analysis of the corre-sponding vertex orderings can aid greatly in de-vising algorithms, writing proofs of correctness, or recognition of various graph families. We study graphs where the sets of vertex order-ings produced by two di˙erent search methods coincide. We characterise such graph families for ten pairs from the best-known set of graph searches: Breadth First Search (BFS), Depth First Search (DFS), Lexicographic Breadth First Search (LexBFS) and Lexicographic Depth First Search (LexDFS), and Maximal Neighborhood Search (MNS).


Author(s):  
Al Refai Mohammed N. ◽  
Jamhawi Zeyad

<p><span id="docs-internal-guid-06e4528a-7fff-0e38-150e-f136d6f22d84"><span>Memory consumption, of opened and closed lists in graph searching algorithms, affect in finding the solution. Using frontier boundary will reduce the memory usage for a closed list, and improve graph size expansion. The blind algorithms, depth-first frontier Searches, and breadth-first frontier Searches were used to compare the memory usage in slide tile puzzles as an example of the cyclic graph. This paper aims to prove that breadth-first frontier search is better than depth-first frontier search in memory usage. Both opened and closed lists in the cyclic graph are used. The level number and nodes count at each level for slide tile puzzles are changed when starting from different empty tile location. Eventually, the unorganized spiral path in depth-first search appears clearly through moving inside the graph to find goals.</span></span></p>


2021 ◽  
Vol 858 ◽  
pp. 145-146
Author(s):  
Spyros Angelopoulos ◽  
Nancy E. Clarke ◽  
Fedor V. Fomin ◽  
Archontia C. Giannopoulou ◽  
Roman Rabinovich

Author(s):  
Étienne André ◽  
Jaime Arias ◽  
Laure Petrucci ◽  
Jaco van de Pol

AbstractWe study semi-algorithms to synthesise the constraints under which a Parametric Timed Automaton satisfies some liveness requirement. The algorithms traverse a possibly infinite parametric zone graph, searching for accepting cycles. We provide new search and pruning algorithms, leading to successful termination for many examples. We demonstrate the success and efficiency of these algorithms on a benchmark. We also illustrate parameter synthesis for the classical Bounded Retransmission Protocol. Finally, we introduce a new notion of completeness in the limit, to investigate if an algorithm enumerates all solutions.


2019 ◽  
Vol 794 ◽  
pp. 1-2
Author(s):  
Spyros Angelopoulos ◽  
Nicolas Nisse ◽  
Dimitrios M. Thilikos

2019 ◽  
Vol 29 (4) ◽  
pp. 043121
Author(s):  
Tomoyuki Miyaji ◽  
Nina Sviridova ◽  
Kazuyuki Aihara ◽  
Tiejun Zhao ◽  
Akimasa Nakano

2018 ◽  
Vol 14 (3) ◽  
pp. 56-82 ◽  
Author(s):  
Jeya Mala Dharmalingam ◽  
M Eswaran

This article describes how software vulnerability analysis and testing for web applications should detect not only the common attacks but also dynamic vulnerability attacks. These are the attacks such as structured query language injection attacks (SQLIAs) which will extract the most crucial user information from the targeted database. In this proposed approach, an intelligent agent namely intelligent vulnerability analyzer agent (IVA) is proposed in which the external attacks due to dynamic user inputs are identified using a heuristic-guided intelligent graph searching and then a pre and post condition based analysis is performed to identify the dynamic vulnerabilities. Further, the proposed approach is compared with some of the existing works based on the number of false positives and false negatives of attacks detection and confirmed that the proposed work is a novel and effective one in finding out SQLIAs.


Sign in / Sign up

Export Citation Format

Share Document