-
7
-
-
0015330635
-
Theoretical improvements in algorithmic efficiency for network flow problems
-
J. Edmonds and R. M. Karp. Theoretical improvements in algorithmic efficiency for network flow problems. Journal of the ACM, 19(2):248-264, 1972.
-
(1972)
Journal of the ACM
, vol.19
, Issue.2
, pp. 248-264
-
-
Edmonds, J.1
Karp, R.M.2
-
9
-
-
79959286384
-
-
M. Fossi, D. Turner, E. Johnson, T. Mack, T. Adams, J. Blackbird, S. Entwise, B. Graveland, D. McKinney, J. Mulcahy, and C. Wueest. Symantec Global Internet Security Threat Report: Trends for 2009, Volume XV, 2010.
-
(2010)
Symantec Global Internet Security Threat Report: Trends for 2009
, vol.15
-
-
Fossi, M.1
Turner, D.2
Johnson, E.3
Mack, T.4
Adams, T.5
Blackbird, J.6
Entwise, S.7
Graveland, B.8
McKinney, D.9
Mulcahy, J.10
Wueest, C.11
-
10
-
-
73749086870
-
A survey of graph edit distance
-
X. Gao, B. Xiao, D. Tao, and X. Li. A survey of graph edit distance. Pattern Analysis & Applications, 13(1):113-129, 2010.
-
(2010)
Pattern Analysis & Applications
, vol.13
, Issue.1
, pp. 113-129
-
-
Gao, X.1
Xiao, B.2
Tao, D.3
Li, X.4
-
14
-
-
33748193035
-
A binary linear programming formulation of the graph edit distance
-
DOI 10.1109/TPAMI.2006.152
-
D. Justice and A. Hero. A binary linear programming formulation of the graph edit distance. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28:1200-1214, 2006. (Pubitemid 46405019)
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.8
, pp. 1200-1214
-
-
Justice, D.1
Hero, A.2
-
15
-
-
26444479778
-
Optimization by simulated annealing
-
S. Kirkpatrick, C. Gelatt Jr, and M. Vecchi. Optimization by simulated annealing. Science, 220(4598):671, 1983.
-
(1983)
Science
, vol.220
, Issue.4598
, pp. 671
-
-
Kirkpatrick, S.1
Gelatt Jr., C.2
Vecchi, M.3
-
18
-
-
33749585254
-
Fast suboptimal algorithms for the computation of graph edit distance
-
Structural, Syntactic, and Statistical Pattern Recognition. Springer, 2006
-
M. Neuhaus, K. Riesen, and H. Bunke. Fast suboptimal algorithms for the computation of graph edit distance. In Structural, Syntactic, and Statistical Pattern Recognition. LNCS, volume 4109/2006, pages 163-172. Springer, 2006.
-
(2006)
LNCS
, vol.4109
, pp. 163-172
-
-
Neuhaus, M.1
Riesen, K.2
Bunke, H.3
-
19
-
-
64849091214
-
Approximate graph edit distance computation by means of bipartite graph matching
-
K. Riesen and H. Bunke. Approximate graph edit distance computation by means of bipartite graph matching. Image and Vision Computing, 27(7):950-959, 2009.
-
(2009)
Image and Vision Computing
, vol.27
, Issue.7
, pp. 950-959
-
-
Riesen, K.1
Bunke, H.2
-
22
-
-
84875656430
-
Exploiting similarity between variants to defeat malware
-
A. Walenstein, M. Venable, M. Hayes, C. Thompson, and A. Lakhotia. Exploiting similarity between variants to defeat malware. In Proceedings of BlackHat DC 2007, 2007.
-
Proceedings of BlackHat DC 2007, 2007
-
-
Walenstein, A.1
Venable, M.2
Hayes, M.3
Thompson, C.4
Lakhotia, A.5
-
23
-
-
77954692432
-
Comparing stars: On approximating graph edit distance
-
Z. Zeng, A. K. H. Tung, J. Wang, J. Feng, and L. Zhou. Comparing stars: On approximating graph edit distance. Proceedings of the VLDB Endowment, 2(1):25-36, 2009.
-
(2009)
Proceedings of the VLDB Endowment
, vol.2
, Issue.1
, pp. 25-36
-
-
Zeng, Z.1
Tung, A.K.H.2
Wang, J.3
Feng, J.4
Zhou, L.5
-
24
-
-
0030230721
-
Using anytime algorithms in intelligent systems
-
S. Zilberstein. Using anytime algorithms in intelligent systems. AI magazine, 17(3):73, 1996.
-
(1996)
AI Magazine
, vol.17
, Issue.3
, pp. 73
-
-
Zilberstein, S.1
|