# graph theory

biblio

- affiliation graphs
- computer network management
- device discovery and management
- encryption-invariant device management strategy
- future traffic demand
- graph theory
- internet
- IP networks
- Local area networks
- management complexity
- network administrators
- Network reconnaissance
- network-connected devices
- passive network reconnaissance
- pubcrawl
- resilience
- Resiliency
- Scalability
- security analysts
- security risk
- university campus network

biblio

- nearest neighbour methods
- pubcrawl
- graph theory
- neural nets
- Measurement
- image segmentation
- Predictive Metrics
- graph embedding
- gait analysis
- diseases
- nearest neighbor search
- Dynamic Time Warping
- gait cycle
- gait information
- gait phase estimates
- gait phase segmentation method
- inertial measurement units
- k-nearest neighbors
- k-nearest neighbors algorithm
- k-nearest neighbors graph embedding
- neural network-based graph embedding scheme
- self-collected IMU gait signals
- weighted dynamic time warping algorithm

biblio

- machine learning algorithms
- learning (artificial intelligence)
- machine learning
- pubcrawl
- graph theory
- Big Data
- query processing
- trees (mathematics)
- Data mining
- Measurement
- application program interfaces
- Predictive Metrics
- Partitioning algorithms
- approximation theory
- Approximation algorithms
- message passing
- search problems
- nearest neighbor search
- Load management
- high-dimensional data
- graph-based sequential approximate k-NN search algorithm
- hierarchical navigable small world
- HNSW
- k-d tree-based solution
- k-nearest neighbor search
- K-NN search
- load balancing
- MPI one-sided communication
- MPI-OpenMP solution
- Nearest neighbor methods
- parallel algorithms
- similarity search
- Vantage Point Tree
- vantage point trees

biblio

- Software
- Task Analysis
- Support vector machines
- machine learning
- pubcrawl
- graph theory
- internet
- tools
- Libraries
- supply chain management
- neural network
- Measurement
- Databases
- reverse engineering
- Predictive Metrics
- Microprogramming
- Classification algorithms
- supervised learning
- nearest neighbor search
- Bayes method
- clustering methods
- k-nearest neighbor search
- Matrices
- vector

biblio

- pubcrawl
- resilience
- Resiliency
- graph theory
- distribution network
- distribution networks
- disasters
- Topology
- communication graph
- Agent
- communication capability
- Damage Assessment
- disaster event
- distributed average consensus algorithm
- distributed consensus algorithm
- IEEE 123-node test case
- numerical simulations
- outage
- PDS
- power distribution system
- sensing units
- switch status

biblio

- privacy
- security of data
- risk management
- pubcrawl
- Human behavior
- resilience
- Resiliency
- data privacy
- Data models
- Compositionality
- probability
- differential privacy
- random processes
- graph theory
- Social network services
- social networking (online)
- Bayesian
- social networks
- Bayes methods
- Data Sanitization
- college student friendship network
- conditional probability
- differentially private social network generation
- DP-EGRM
- exponential random graph model
- exponential random graph model (ERGM)
- goodness of fit
- latent space models
- network information preservation
- network statistics
- node differential privacy (DP)
- posterior distribution
- privacy risk level
- private dyadwise randomized response
- private network
- sensitive relational information
- synthetic social networks

biblio

- pubcrawl
- graph theory
- social networking (online)
- Metrics
- social network
- network theory (graphs)
- cyber physical systems
- Unsupervised Learning
- Semantics
- Compositionality
- Periodic structures
- singular value decomposition
- SVD
- tensors
- Tucker decomposition
- decomposition
- analytical methodologies
- Blogs
- clustered graph spectrum
- Community discovery
- community structure discovery
- compact community size distribution
- digital marketing
- Facebook groups
- fact checking
- followfollower relationships
- functional coherency
- functional Twitter elements
- hashtag semantics
- heavy degree distribution tail
- high clustering coefficient values
- higher order analytics
- higher order counterpart
- Julia
- Kruskal decomposition
- low diameter
- news aggregators
- Political Campaigns
- politics
- rank one tensors
- recursive community structure
- semantic weight
- semantically aware communities
- Structural coherency
- structural Twitter elements
- substantial empirical evidence
- synthetic graph generation models
- tensor algebra
- tensor kruskal decomposition
- tensor representation
- Tucker tensor decomposition
- Twitter subgraph
- unofficial form
- unsupervised discovery

biblio

- Scalability
- Resiliency
- pubcrawl
- graph theory
- Metrics
- Analytical models
- cyber-physical systems
- sensors
- automata
- data visualisation
- Human Factors
- Compositionality
- actuators
- discrete event systems
- cyber-physical system
- Discrete-Event Systems
- Cyber Dependencies
- dependency graphs
- even unsolvable synthesis procedures
- lengthy synthesis procedures
- model reduction steps
- reduced order systems
- required computational time
- supervisor synthesis
- supervisory controller
- synthesis problem
- system components
- tunnels

biblio

- security of data
- Scalability
- Data models
- cyber-physical systems
- Resiliency
- pubcrawl
- graph theory
- Computational modeling
- Metrics
- Analytical models
- cyber-attacks
- Anomaly Detection
- sensors
- Human Factors
- Compositionality
- programmable controllers
- navigation
- Cyber Dependencies
- Marine vehicles
- Anomalies
- CPS anomalies
- cyber-physical system
- data and information quality
- data streams
- data-driven decision system
- digital subsystems
- information quality measures vectors
- naval CPS
- naval cyber-physical anomaly propagation analysis
- naval engineering computing
- naval propulsion management system
- optimized supervisory control
- programmable logical controller
- propagation analysis
- quality assessed graph
- system graph

biblio

- adversarial behavior
- adversarial intent
- Adversary Models
- adversary type
- fine-grained information
- game theory
- Games
- graph theory
- graphical coordination games
- Human behavior
- Metrics
- multi-agent systems
- network topology
- optimal system design
- Planning
- pubcrawl
- resilience
- Resiliency
- Scalability
- security
- security of data
- security strategy
- system operator
- System performance
- Topology
- unknown adversary