We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Near-optimal Steiner tree computation powered by node embeddings

    Steiner minimum tree problem on a graph, i.e., finding a tree with the minimum weight that covers the set of terminal nodes, is a classical NP-hard...

    Boyu Yang, Weiguo Zheng in Knowledge and Information Systems
    Article 16 May 2023
  2. Candidate-Aware Attention Enhanced Graph Neural Network for News Recommendation

    Facing the daily explosive growth of the news quantity, personalized news recommendation for users becomes an increasingly challenging problem....
    **aohong Li, Ruihong Li, ... Huifang Ma in Knowledge Science, Engineering and Management
    Conference paper 2023
  3. Critical Node Privacy Protection Based on Random Pruning of Critical Trees

    With the popularity of social networks, the conflict between the heterogeneous social network data publishing and user privacy leakage is becoming...
    Lianwei Qu, Yong Wang, **g Yang in Knowledge Science, Engineering and Management
    Conference paper 2023
  4. Quantifying Node-Based Core Resilience

    Core decomposition is an efficient building block for various graph analysis tasks such as dense subgraph discovery and identifying influential...
    Jakir Hossain, Sucheta Soundarajan, Ahmet Erdem Sarıyüce in Machine Learning and Knowledge Discovery in Databases: Research Track
    Conference paper 2023
  5. Central node identification via weighted kernel density estimation

    The detection of central nodes in a network is a fundamental task in network science and graph data analysis. During the past decades, numerous...

    Yan Liu, Xue Feng, ... Zengyou He in Data Mining and Knowledge Discovery
    Article 31 January 2024
  6. BatchedGreedy: A batch processing approach for influence maximization with candidate constraint

    Influence maximization (IM) aims to find k seed nodes from social network G to maximize the spread of influence under a given diffusion model....

    **aowei Han, **aopeng Yao, Hejiao Huang in Applied Intelligence
    Article 12 July 2022
  7. Example Applications Beyond Node Classification

    While our running example in this book was node classification, and also the benchmark datasets discussed above use mostly node classification as a...
    Heiko Paulheim, Petar Ristoski, Jan Portisch in Embedding Knowledge Graphs with RDF2vec
    Chapter 2023
  8. Property graph representation learning for node classification

    Graph representation learning (graph embedding) has led to breakthrough results in various machine learning graph-based applications such as node...

    Shu Li, Nayyar A. Zaidi, ... Gang Li in Knowledge and Information Systems
    Article Open access 24 August 2023
  9. Seagull optimization algorithm for node localization in wireless sensor networks

    Numerous applications of wireless sensor networks (WSNs) highly depend on the node location, such as maritime rescue, agriculture, and hazardous...

    Yogendra Mohan, Rajesh Kumar Yadav, Manisha Manjul in Multimedia Tools and Applications
    Article 05 February 2024
  10. Meta Heuristic Technique with Reinforcement Learning for Node Deployment in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are vital in applications like environmental monitoring, smart homes, and battlefield surveillance. Comprising small...

    S. M. Kusuma, K. N. Veena, ... Lobo Athena Marianne in SN Computer Science
    Article Open access 17 May 2024
  11. Optimizing relay node placement and routing in WBANs using free search krill herd and harmony search algorithm

    Wireless Body Area Network (WBAN) plays an important role in healthcare applications like in medical, non-medical and psychological sector for remote...

    Sushree Chinmayee Patra, Tusharkanta Samal, ... Ram Chandra Barik in Multimedia Tools and Applications
    Article 24 April 2024
  12. Efficient fog node placement using nature-inspired metaheuristic for IoT applications

    Managing the explosion of data from the edge to the cloud requires intelligent supervision, such as fog node deployments, which is an essential task...

    Abdenacer Naouri, Nabil Abdelkader Nouri, ... Sahraoui Dhelim in Cluster Computing
    Article Open access 08 April 2024
  13. MPR Node Selection Improvement in OLSR Based on Binary Cuckoo Search

    Unmanned aerial vehicle (UAV) relay is an appropriate choice for emergency communications because of its good mobility and flexibility of placement....
    Tong Wang, Kai Yu, ... Liwei Chen in Wireless Sensor Networks
    Conference paper 2024
  14. An optimized sensor node localization approach for wireless sensor networks using RSSI

    This article offers an efficient isosceles layout model for node deployment, and a parameter-less Jaya algorithm is also proposed as a solution to...

    Shilpi, Prateek Raj Gautam, ... Arvind Kumar in The Journal of Supercomputing
    Article 05 December 2022
  15. Complex Network Community Discovery Algorithms Based on Node Similarity and Network Embeddings

    This paper briefly analyzes the summary of network embedding and node similarity, emphasizes the discovery, and takes numerical simulation as the...
    Zhixun Zhang, Juan Wang, Yanqiang Xu in Frontier Computing on Industrial Applications Volume 3
    Conference paper 2024
  16. Hybridized Black Widow-Honey Badger Optimization: Swarm Intelligence Strategy for Node Localization Scheme in WSN

    The evolutionary growth of Wireless Sensor Networks (WSN) exploits a wide range of applications. To deploy the WSN in a larger area, for sensing the...

    K Johny Elma, Praveena Rachel Kamala S, Saraswathi T in Journal of Grid Computing
    Article 26 January 2024
  17. C2N-ABDP: Cluster-to-Node Attention-Based Differentiable Pooling

    Graph neural networks have achieved state-of-the-art performance in various graph based tasks, including classification and regression at both node...
    Rongji Ye, Lixin Cui, ... Edwin R. Hancock in Graph-Based Representations in Pattern Recognition
    Conference paper 2023
  18. A Practical Multi-candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles

    Quantum secure voting aims to provide various approaches to performing electronic voting via quantum technologies, like entangled particles or...
    **n Sun, Anran Cui, ... **ngchi Su in Information Security and Cryptology
    Conference paper 2024
  19. Social network node influence maximization method combined with degree discount and local node optimization

    For the problem of maximizing the influence of nodes in traditional social networks, it is impossible to select nodes and spread the scope of...

    **aoyang Liu, Songyang Wu, ... Yihao Zhang in Social Network Analysis and Mining
    Article 12 March 2021
  20. \(\textbf{k}\) NN-Embed: Locally Smoothed Embedding Mixtures for Multi-interest Candidate Retrieval

    Candidate retrieval is the first stage in recommendation systems, where a light-weight system is used to retrieve potentially relevant items for an...
    Ahmed El-Kishky, Thomas Markovich, ... Ying **ao in Advances in Knowledge Discovery and Data Mining
    Conference paper 2023
Did you find what you were looking for? Share feedback.