期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Simulated annealing algorithm for detecting graph isomorphism 被引量:4
1
作者 Geng Xiutang Zhang Kai 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第5期1047-1052,共6页
Evolutionary computation techniques have mostly been used to solve various optimization problems, and it is well known that graph isomorphism problem (GIP) is a nondeterministic polynomial problem. A simulated annea... Evolutionary computation techniques have mostly been used to solve various optimization problems, and it is well known that graph isomorphism problem (GIP) is a nondeterministic polynomial problem. A simulated annealing (SA) algorithm for detecting graph isomorphism is proposed, and the proposed SA algorithm is well suited to deal with random graphs with large size. To verify the validity of the proposed SA algorithm, simulations are performed on three pairs of small graphs and four pairs of large random graphs with edge densities 0.5, 0.1, and 0.01, respectively. The simulation results show that the proposed SA algorithm can detect graph isomorphism with a high probability. 展开更多
关键词 graph isomorphism problem simulated annealing algorithm nondeterministic polynomial problem local search.
下载PDF
GPU acceleration of subgraph isomorphism search in large scale graph 被引量:1
2
作者 杨博 卢凯 +2 位作者 高颖慧 王小平 徐凯 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第6期2238-2249,共12页
A novel framework for parallel subgraph isomorphism on GPUs is proposed, named GPUSI, which consists of GPU region exploration and GPU subgraph matching. The GPUSI iteratively enumerates subgraph instances and solves ... A novel framework for parallel subgraph isomorphism on GPUs is proposed, named GPUSI, which consists of GPU region exploration and GPU subgraph matching. The GPUSI iteratively enumerates subgraph instances and solves the subgraph isomorphism in a divide-and-conquer fashion. The framework completely relies on the graph traversal, and avoids the explicit join operation. Moreover, in order to improve its performance, a task-queue based method and the virtual-CSR graph structure are used to balance the workload among warps, and warp-centric programming model is used to balance the workload among threads in a warp. The prototype of GPUSI is implemented, and comprehensive experiments of various graph isomorphism operations are carried on diverse large graphs. The experiments clearly demonstrate that GPUSI has good scalability and can achieve speed-up of 1.4–2.6 compared to the state-of-the-art solutions. 展开更多
关键词 parallel graph isomorphism GPU backtrack paradigm
下载PDF
Subgraph Isomorphism Based Intrinsic Function Reduction in Decompilation
3
作者 Yanzhao Liu Yinliang Zhao +1 位作者 Lei Zhang Kai Liu 《Journal of Software Engineering and Applications》 2016年第3期80-90,共11页
Program comprehension is one of the most important applications in decompilation. The more abstract the decompilation result the better it is understood. Intrinsic function is introduced by a compiler to reduce the ov... Program comprehension is one of the most important applications in decompilation. The more abstract the decompilation result the better it is understood. Intrinsic function is introduced by a compiler to reduce the overhead of a function call and is inlined in the code where it is called. When analyzing the decompiled code with lots of inlined intrinsic functions, reverse engineers may be confused by these detailed and repeated operations and lose the goal. In this paper, we propose a method based graph isomorphism to detect intrinsic function on the CFG (Control Flow Graph) of the target function first. Then we identify the boundary of the intrinsic function, determine the parameter and return value and reduce the intrinsic function to a single function call in the disassembled program. Experimental results show that our method is more efficient at reducing intrinsic functions than the state-of-art decompilers such as Hex-Rays, REC and RD (Retargetable Decompiler). 展开更多
关键词 Program Comprehension DECOMPILATION graph Isomorphism Intrinsic Function
下载PDF
Dynamic Web services discovery based on similarity computation 被引量:1
4
作者 陈江锋 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2010年第1期119-122,共4页
A new approach for dynamic Web services discovery based on similarity computation in the treatment of massive Web information resource is put forward. Firstly, three kinds of service description information, textual, ... A new approach for dynamic Web services discovery based on similarity computation in the treatment of massive Web information resource is put forward. Firstly, three kinds of service description information, textual, semantic and structural information, were modeled to compute the similarity of services. Then a novel dynamic Web services discovery mechanism was provided and the experiment on it was carried out. Results show that the new approach achieves considerable performance on precision and efficiency metrics for dynamic Web services discovery. 展开更多
关键词 Web services ontology VSM graph isomorphism
下载PDF
Construction of Short-Block Nonbinary LDPC Codes Based on Cyclic Codes 被引量:1
5
作者 Hengzhou Xu Baoming Bai +2 位作者 Min Zhu Bo Zhang Yulong Zhang 《China Communications》 SCIE CSCD 2017年第8期1-9,共9页
In this paper, we focus on shortblock nonbinary LDPC(NB-LDPC) codes based on cyclic codes. Based on Tanner graphs' isomorphism, we present an efficient search algorithm for finding non-isomorphic binary cyclic LDP... In this paper, we focus on shortblock nonbinary LDPC(NB-LDPC) codes based on cyclic codes. Based on Tanner graphs' isomorphism, we present an efficient search algorithm for finding non-isomorphic binary cyclic LDPC codes. Notice that the parity-check matrix H of the resulting code is square and not of full rank, and its row weight and column weight are the same. By replacing the ones in the same column of H with a nonzero element of fi nite fi elds GF(q), a class of NB-LDPC codes over GF(q) is obtained. Numerical results show that the constructed codes perform well over the AWGN channel and have fast decoding convergence. Therefore, the proposed NB-LDPC codes provide a promising coding scheme for low-latency and high-reliability communications. 展开更多
关键词 nonbinary LDPC codes tanner graph isomorphism iterative decoding
下载PDF
Isomorphisms of Cubic Cayley Graphs on Dihedral Groups and Sparse Circulant Matrices
6
作者 Istvan KOVACS 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2023年第4期618-632,共15页
We show that,up to isomorphism,there is a unique non-CI connected cubic Cayley graph on the dihedral group of order 2n for each even number n≥4.This answers in the negative the question of Li whether all connected cu... We show that,up to isomorphism,there is a unique non-CI connected cubic Cayley graph on the dihedral group of order 2n for each even number n≥4.This answers in the negative the question of Li whether all connected cubic Cayley graphs are CI-graphs(Discrete Math.,256,301-334(2002)).As an application,a formula is derived for the number of isomorphism classes of connected cubic Cayley graphs on dihedral groups,which generalises the earlier formula of Huang et al.dealing with the particular case when n is a prime(Acta Math.Sin.,Engl.Ser.,33,996-1011(2017)).As another application,a short proof is also given for a result on sparse circulant matrices obtained by Wiedemann and Zieve(arXiv preprint,(2007)). 展开更多
关键词 Cayley graph graph isomorphism dihedral group circulant matrix
原文传递
Extended Methodology of RS Design and Instances Based on GIP 被引量:1
7
作者 Qian-HongWu BoQin Yu-MinWang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第2期270-275,共6页
Abe et al. proposed the methodology of ring signature (RS) design in 2002 andshowed how to construct RS with a mixture of public keys based on factorization and/or discretelogarithms. Their methodology cannot be appli... Abe et al. proposed the methodology of ring signature (RS) design in 2002 andshowed how to construct RS with a mixture of public keys based on factorization and/or discretelogarithms. Their methodology cannot be applied to knowledge signatures (KS) using the Fiat-Shamirheuristic and cut-and-choose techniques, for instance, the Goldreich KS. This paper presents a moregeneral construction of RS from various public keys if there exists a secure signature using such apublic key and an efficient algorithm to forge the relation to be checked if the challenges in sucha signature are known in advance. The paper shows how to construct RS based on the graph isomorphismproblem (GIP). Although it is unknown whether or not GIP is NP-Complete, there are no knownarguments that it can be solved even in the quantum computation model. Hence, the scheme has abetter security basis and it is plausibly secure against quantum adversaries. 展开更多
关键词 ring signature knowledge signature graph isomorphism problem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部