期刊文献+

网络图的计算机算法及显示方法研究 被引量:5

下载PDF
导出
摘要 为了推动网络图计算机科学的深入发展,本文首先分析点、边符号两种控制算法,以期获得全新的网络图系统,然后重点探究网络图的计算机算法及显示方法,具体从理论基础、实现流程、注意事项和最短路径等方面展开讨论。
作者 周琼
出处 《通讯世界》 2018年第4期110-111,共2页 Telecom World
  • 相关文献

参考文献7

二级参考文献47

  • 1CAPUTO K E, HAMMER DA. Adhesive dynamics simulation of G-protein-mediated chemokine-activated neutrophil adhesion [J]. Biophysical Journal, 2009, 96(8): 2989-3004.
  • 2Liu K, Terzi E. Towards identity anonymization on graphs. In: Proc. of the 2008 ACM SIGMOD Int'l Conf. on Management of Data. 2008.93-106. [doi: 10.1145/1376616.1376629].
  • 3Zhou B, Pei J. Preserving privacy in social networks against neighborhood attacks. In: Proc. of the 24th IEEE Int'l Conf. on Data Engineering. 2008. 506-515. [doi: 10.1109/ICDE.2008.4497459].
  • 4Hay M, Miklau G, Jensen D, Towsley D. Resisting structural identification in anonymized social networks. In: Proc. of the 34th Int'l Conf. on Very Large Databases. 2008. 102-114. [doi: 10.14778/1453856.1453873].
  • 5Zou L, Chen L, Ozsu MT. K-Automorphism: A general framework for privacy preserving network publication. In: Proc. of the 35th Int'l Conf. on Very Large Databases. 2009. 946-957. [doi: 10.14778/1687627.1687734].
  • 6Cormode G, Srivastava D, Yu T, Zhang Q. Anonymizing bipartite graph data using safe groupings. In: Proc. of the 34th Int'l Conf. on Very Large Databases. 2008. 833-844. [doi: 10.14778/1453856.1453947].
  • 7Bhagat S, Cormode G, Krishnamurthy B, Srivastava D. Class-Based graph anonymization for social network data. In: Proc. of the 35th Int'l Conf. on Very Large Databases. 2009. 766-777. [doi: 10.14778/1687627.1687714].
  • 8Fard AM, Wang K, Yu PS. Limiting link disclosure in social network analysis through subgraph-wise perturbation. In: Proc. of the 15th Int'l Conf. on Extending Database Technology. 2012. 109-119. [doi: 10.1145/2247596.2247610].
  • 9Gao J, Xu JY, Jin R, Zhou J, Wang T, Yang D. Neighborhood-Privacy protected shortest distance computing in cloud. In: Proc. of the 2011 ACM SIGMOD Int'l Conf. on Management of Data. 2011. 409-420. [doi: 10.1145/1989323.1989367].
  • 10Wang Y, Zheng B. Preserving privacy in social networks against connection fingerprint attacks. In: Proc. of the 2015 IEEE Int'l Conf. on Data Engineering. 2015.54-65. [doi: 10.1109/ICDE.2015.7113272].

共引文献45

同被引文献17

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部