Essays about: "complete graph"
Showing result 1 - 5 of 41 essays containing the words complete graph.
-
1. Distance Consistent Labellings and the Local List Number
University essay from Linköpings universitet/Algebra, geometri och diskret matematik; Linköpings universitet/Tekniska fakultetenAbstract : We study the local list number of graphs introduced by Lennerstad and Eriksson. A labelling of a graph on n vertices is a bijection from vertex set to the set {1,…, n}. Given such a labelling c a vertex u is distance consistent if for all vertices v and w |c(u)-c(v)|=|c(u)-c(w)|+1 implies d(u,w)≤ d(u,v). READ MORE
-
2. The cosmological polytope of the complete bipartite graph K_{2,n}
University essay from KTH/Matematik (Avd.)Abstract : A cosmological polytope of an undirected connected graph is a lattice polytope which when the graph is interpreted as a feynman diagram can be used to calculate the contribution of that feynman diagram to the wavefunction of some cosmological models. This contribution can be calculated using the canonical form of the cosmological polytope, which can be computed by taking the sum of the canonical forms of the facets of a subdivision of the cosmological polytope. READ MORE
-
3. Methods from Linear Algebra for the Enumeration of Spanning Trees
University essay from KTH/Skolan för teknikvetenskap (SCI)Abstract : In this report, we study the enumeration of spanning trees in graphs, using two methods withinlinear algebra, Kirchhoff’s Matrix Tree Theorem and an alternative method, also referred to asLemma 1, derived by S. Klee and M.T Stamps in [KS20]. READ MORE
-
4. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE
-
5. Machine Learning-Based Instruction Scheduling for a DSP Architecture Compiler : Instruction Scheduling using Deep Reinforcement Learning and Graph Convolutional Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Instruction Scheduling is a back-end compiler optimisation technique that can provide significant performance gains. It refers to ordering instructions in a particular order to reduce latency for processors with instruction-level parallelism. READ MORE