The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the real world, many problems on massive graphs can be mapped to an underlying critical problem of discovering top-k subgraphs. For massive graphs, subgraph queries may have enormous number of matches, and so it is inefficient to compute all matches when only top-k matches are desired. Meanwhile, parallel algorithm is urgent for the scalability of massive graph computing. In this paper, we address...
In this paper, to study rum or spreading model for the web forum of which the topological structure has a strong heterogeneity, we propose a novel susceptible-exposed-infected-removed (SEIR) model by introducing the importance and fuzziness of the content of the rum or. We derive mean-field equations characterizing the dynamics of the SEIR model on heterogeneous network. Then a steady-state analysis...
Web applications are widely used in people's everyday life. They have permeated financial sectors, banking sectors, e-business and online shopping. Usually, different users have different permissions on these applications. Additionally, role-based access control (RBAC) mechanisms have been wildly integrated into web applications. The security and correctness of web applications are the most fundamental,...
Nowadays, with the prevalence of Web applications, more and more services and information are available over the Internet while their correctness, security and reliability are often crucial to the success of business and organizations. Web testing is one of the methods to ensure the Web security. However, due to the special characters of Web applications, traditional testing methods are not suitable...
In this paper we discuss how to precisely reconstruct porous media 3D model and simulate the fluid flow in the porous media. Considering the characteristics of the porous media's fault slice images, we present a contour extraction algorithm and based on the extracted contour we acquire the sandwich fault images. We modify the original MC algorithm with bounding box technology to accelerate the running...
Appropriate dealing with boundary conditions is very important for SPH. Current boundary treatment methods like boundary force method, ghost particle method and virtual boundary layer method, when dealing with complex boundaries, they will have to compute much on putting external particles. For resolving this problem, we propose a new method assuming part of boundary surface instead of external particles,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.