1973
DOI: 10.1145/362248.362272
|View full text |Cite
|
Sign up to set email alerts
|

Algorithm 447: efficient algorithms for graph manipulation

Abstract: Submittal of an algorithm for consideration for publication in Communications of the ACM implies unrestricted use of the algorithm within a computer is permissible.Abstract: Efficient algorithms are presented for partitioning a graph into connected components, biconnected components and simple paths. The algorithm for partitioning of a graph into simple paths is iterative and each iteration produces a new path between two vertices already on paths. (The start vertex can be specified dynamically.) If V is the n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
548
0
3

Year Published

1992
1992
2017
2017

Publication Types

Select...
5
2
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 896 publications
(551 citation statements)
references
References 4 publications
0
548
0
3
Order By: Relevance
“…In our context, a high entropy value associated with a random walk means that there is a lot of information available for the user to possibly learn when browsing the graph. The specific entropy measures we use relate to the following sets of nodes: (D) abstract MeSH clusters, path only; (E) specific MeSH clusters, path only; (F) abstract MeSH clusters, path and envelope; (G) specific MeSH clusters, path and envelope; (H) clusters defined by biconnected components [Hopcroft and Tarjan, 1973] in the envelope 11 . The entropies of the sets (D-G) are defined by formulae (9-10) in Appendix A.3.…”
Section: Running and Measuring The Random Walksmentioning
confidence: 99%
“…In our context, a high entropy value associated with a random walk means that there is a lot of information available for the user to possibly learn when browsing the graph. The specific entropy measures we use relate to the following sets of nodes: (D) abstract MeSH clusters, path only; (E) specific MeSH clusters, path only; (F) abstract MeSH clusters, path and envelope; (G) specific MeSH clusters, path and envelope; (H) clusters defined by biconnected components [Hopcroft and Tarjan, 1973] in the envelope 11 . The entropies of the sets (D-G) are defined by formulae (9-10) in Appendix A.3.…”
Section: Running and Measuring The Random Walksmentioning
confidence: 99%
“…In graph theory, links with a bike lane should form a number of connected components that have at least one destination node (vertex). This constraint can be verified with graph theory methods such as breadth-first search or depth-first search (10) or, more specifically, with Dijkstra's shortest path algorithm (11). Computation of flow and travel time at the lower level is based on the set of decision variables in the upper level.…”
Section: Upper-level Formulationmentioning
confidence: 99%
“…Unlike finding the expansion coefficient of a graph, calculating the number of components can be done in linear time using depth-first search, as described in [15]. The global connectivity of a graph is the number of nodes in its largest component divided by the total number of nodes.…”
Section: Using Expansion As a Metricmentioning
confidence: 99%