2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 2017
DOI: 10.1109/dasc-picom-datacom-cyberscitec.2017.85
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Study of Algorithm for Computing Strongly Connected Components

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…There are efficient algorithms for computing the SCCs of a graph such as Tarjan, which take linear time O(|V |+|E|) assuming constant time for retrieving edges [9]. It is useful to observe that cycles in a graph G can never span across multiple SCCs (since if there were any such cycle, the SCCs involved would form a bigger SCC, which contradicts its maximality w.r.t.…”
Section: Preliminariesmentioning
confidence: 99%
“…There are efficient algorithms for computing the SCCs of a graph such as Tarjan, which take linear time O(|V |+|E|) assuming constant time for retrieving edges [9]. It is useful to observe that cycles in a graph G can never span across multiple SCCs (since if there were any such cycle, the SCCs involved would form a bigger SCC, which contradicts its maximality w.r.t.…”
Section: Preliminariesmentioning
confidence: 99%
“…To put a nutshell, our work that has been detailed in [2] consists primarily in constructing an ad hoc directed graph related to the RC5-CBC and then confirming its strong connectivity using the optimized method referred as Kosaraju's Depth First Traversal (DFS) algorithm [10], [14].…”
Section: A Proving Of Chaotic Behavior Of Rc5-cbc Block Ciphermentioning
confidence: 99%
“…We develop a new technique called connectivity augmentation to resolve the issue. We apply Kosaraju's algorithm [18] against the constructed routing layer. This step (line 6) adjusts the routing layer by adding minimal number of edges to make the graph strongly connected without destroying its small world properties.…”
Section: Routing Layer Constructionmentioning
confidence: 99%