graph access
Recently Published Documents


TOTAL DOCUMENTS

19
(FIVE YEARS 7)

H-INDEX

4
(FIVE YEARS 1)

2020 ◽  
Vol 65 ◽  
pp. 100596
Author(s):  
David Chaves-Fraga ◽  
Freddy Priyatna ◽  
Andrea Cimmino ◽  
Jhon Toledo ◽  
Edna Ruckhaus ◽  
...  

Cryptography ◽  
2020 ◽  
pp. 537-544
Author(s):  
Teng Guo ◽  
Jian Jiao ◽  
Feng Liu ◽  
Wen Wang

In this paper, we first follow Ateniese et al.'s work that provides upper bounds of the pixel expansion of visual cryptography schemes(VCSs) for more kinds of graph access structures, in which we require that a subset of parties can determine the secret if they contain an edge of the graph G. The constructive upper bounds are derived by the graph decomposition technique. Then we generalize Ateniese et al.'s method of comparing the optimal pixel expansion of VCSs with two different access structures.


2019 ◽  
Vol 8 (2S8) ◽  
pp. 1848-1852

This article portrayed a novel bipartite weighted graph strategy for Feature optimization for machine learning models. Unlike many of the existing optimization techniques of diverse categories such as evolutionary computation techniques, diversity assessment strategies, the proposal is deterministic approach with minimal computational overhead, which has referred further as Bipartite Weighted Graph Approach for Optimal label prediction (BWG-OLP). The proposed model is about to derive a given feature is optimal or not by the respective feature’s correlation with the records and the correlation with the fellow features. The experimental study has carried on benchmark datasets to estimate the significance of the proposed method.


F1000Research ◽  
2019 ◽  
Vol 8 ◽  
pp. 1490
Author(s):  
Luis Yanes ◽  
Gonzalo Garcia Accinelli ◽  
Jonathan Wright ◽  
Ben J. Ward ◽  
Bernardo J. Clavijo

The Sequence Distance Graph (SDG) framework works with genome assembly graphs and raw data from paired, linked and long reads. It includes a simple deBruijn graph module, and can import graphs using the graphical fragment assembly (GFA) format. It also maps raw reads onto graphs, and provides a Python application programming interface (API) to navigate the graph, access the mapped and raw data and perform interactive or scripted analyses. Its complete workspace can be dumped to and loaded from disk, decoupling mapping from analysis and supporting multi-stage pipelines. We present the design and implementation of the framework, and example analyses scaffolding a short read graph with long reads, and navigating paths in a heterozygous graph for a simulated parent-offspring trio dataset. SDG  is  freely  available  under  the  MIT  license  at https://github.com/bioinfologics/sdg


2017 ◽  
Vol 9 (2) ◽  
pp. 38-44 ◽  
Author(s):  
Teng Guo ◽  
Jian Jiao ◽  
Feng Liu ◽  
Wen Wang

In this paper, we first follow Ateniese et al.'s work that provides upper bounds of the pixel expansion of visual cryptography schemes(VCSs) for more kinds of graph access structures, in which we require that a subset of parties can determine the secret if they contain an edge of the graph G. The constructive upper bounds are derived by the graph decomposition technique. Then we generalize Ateniese et al.'s method of comparing the optimal pixel expansion of VCSs with two different access structures.


2017 ◽  
Vol 11 (1) ◽  
pp. 25-35
Author(s):  
Massoud Hadian Dehkordi ◽  
Ali Safi

AbstractIn this paper, we study an important problem in secret sharing that determines the exact value or bound for the complexity. First, we use the induced subgraph complexity of the graph G with access structure Γ to obtain a lower bound on the complexity of the graph G. Then, applying decomposition techniques, we obtain an upper bound on the complexity of the graph G. We determine the exact values of the complexity for each of the ten graph access structures on seven participants. Also, we improve the value bound of the complexity for the six graph access structures with seven participants.


Sign in / Sign up

Export Citation Format

Share Document