Auswahl der wissenschaftlichen Literatur zum Thema „Behavioral graph“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Behavioral graph" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Behavioral graph"

1

RAFE, VAHID, und ADEL T. RAHMANI. „A NOVEL APPROACH TO VERIFY GRAPH SCHEMA-BASED SOFTWARE SYSTEMS“. International Journal of Software Engineering and Knowledge Engineering 19, Nr. 06 (September 2009): 857–70. http://dx.doi.org/10.1142/s0218194009004398.

Der volle Inhalt der Quelle
Annotation:
Graph Grammars have recently become more and more popular as a general formal modeling language. Behavioral modeling of dynamic systems and model to model transformations are a few well-known examples in which graphs have proven their usefulness in software engineering. A special type of graph transformation systems is layered graphs. Layered graphs are a suitable formalism for modeling hierarchical systems. However, most of the research so far concentrated on graph transformation systems as a modeling means, without considering the need for suitable analysis tools. In this paper we concentrate on how to analyze these models. We will describe our approach to show how one can verify the designed graph transformation systems. To verify graph transformation systems we use a novel approach: using Bogor model checker to verify graph transformation systems. The AGG-like graph transformation systems are translated to BIR — the input language of Bogor — and Bogor verifies that model against some properties defined by combining LTL and special purpose graph rules. Supporting schema-based and layered graphs characterize our approach among existing solutions for verification of graph transformation systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Heckel, Reiko, und Sebastian Thöne. „Behavioral Refinement of Graph Transformation-Based Models“. Electronic Notes in Theoretical Computer Science 127, Nr. 3 (April 2005): 101–11. http://dx.doi.org/10.1016/j.entcs.2004.08.037.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

DU, XUEHONG, JIANXIN JIAO und MITCHELL M. TSENG. „Product family modeling and design support: An approach based on graph rewriting systems“. Artificial Intelligence for Engineering Design, Analysis and Manufacturing 16, Nr. 2 (April 2002): 103–20. http://dx.doi.org/10.1017/s0890060402020097.

Der volle Inhalt der Quelle
Annotation:
Earlier research on product family design (PFD) often highlights isolated and successful empirical studies with a limited attempt to explore the modeling and design support issues surrounding this economically important class of engineering design problems. This paper proposes a graph rewriting system to organize product family data according to the underpinning logic and to model product derivation mechanisms for PFD. It represents the structural and behavioral aspects of product families as family graphs and related graph operations, respectively. The derivation of product variants becomes a graph rewriting process, in which family graphs are transformed to variant graphs by applying appropriate graph rewriting rules. The system is developed in the language of programmed graph rewriting systems or PROGRES, which supports the specification of hierarchical graph schema and parametric rewriting rules. A meta model is defined for family graphs to factor out those entities common to all product families. A generic model is defined to describe all specific entities relevant to particular families. An instance model describes all product variants for individual customer orders. A prototype of a graph-based PFD system for office chairs is also developed. The system can provide an interactive environment for customers to make choices among product offerings. It also facilitates design automation of product families and enhances interactions and negotiations among sales, design, and manufacturing.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Wang, Yingxu, und Aderemi Adewumi. „The Formal Design Models of Digraph Architectures and Behaviors“. International Journal of Software Science and Computational Intelligence 4, Nr. 1 (Januar 2012): 100–129. http://dx.doi.org/10.4018/jssci.2012010105.

Der volle Inhalt der Quelle
Annotation:
Graphs are one of the most fundamental and widely used non-linear hierarchical structures of linked nodes. Problems in sciences and engineering can be formulated and solved by the graph model. This paper develops a comprehensive design pattern of formal digraphs using the Doubly-Linked List (DLL) architecture. The most complicated form of graphs known as the weighted digraph is selected as a general graph model, based on it simple graphs such as nondirected and/or nonweighted ones can be easily derived and tailored. A rigorous denotational mathematics, Real-Time Process Algebra (RTPA), is adopted, which allows both architectural and behavioral models of digraphs to be rigorously designed and implemented in a top-down approach. The architectural models of digraphs are created using RTPA architectural modeling methodologies known as the Unified Data Models (UDMs). The physical model of digraphs is implemented using nodes of DLL dynamically created in the memory. The behavioral models of digraphs are specified and refined by a set of 18 Unified Process Models (UPMs) in three categories namely the management operations, traversal operations, and node manipulation operations. This work has been applied in a number of real-time and nonreal-time system designs and specifications such as a Real-Time Operating System (RTOS+), graph-based and tree-based applications, and the ADT library for an RTPA-based automatic code generation tool.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Garnier, Elodie M., Nastasia Fouret und Médéric Descoins. „ViSiElse: an innovative R-package to visualize raw behavioral data over time“. PeerJ 8 (03.02.2020): e8341. http://dx.doi.org/10.7717/peerj.8341.

Der volle Inhalt der Quelle
Annotation:
The scientific community encourages the use of raw data graphs to improve the reliability and transparency of the results presented in articles. However, the current methods used to visualize raw data are limited to one or two numerical variables per graph and/or small sample sizes. In the behavioral sciences, numerous variables must be plotted together in order to gain insight into the behavior in question. In this article, we present ViSiElse, an R-package offering a new approach in the visualization of raw data. ViSiElse was developed with the open-source software R to visualize behavioral observations over time based on raw time data extracted from visually recorded sessions of experimental observations. ViSiElse gives a global overview of a process by creating a visualization of the timestamps for multiple actions and all participants into a single graph; individual or group behavior can then be easily assessed. Additional features allow users to further inspect their data by including summary statistics and time constraints.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Xiao, Fei, Yi Sun, Donggao Du, Xuelei Li und Min Luo. „A Novel Malware Classification Method Based on Crucial Behavior“. Mathematical Problems in Engineering 2020 (21.03.2020): 1–12. http://dx.doi.org/10.1155/2020/6804290.

Der volle Inhalt der Quelle
Annotation:
Recently, some graph-based methods have been proposed for malware detection. However, current malware is generally characterized by sophisticated behaviors, which makes graph-based malware detection extremely challenging. To address this issue, we propose a graph repartition algorithm by transforming API call graphs into fragment behaviors based on programs’ dynamic execution traces. The proposed algorithm relies on the N-order subgraph (NSG) for constructing the appropriate fragment behavior. Moreover, we improve the term frequency-inverse document frequency- (TF-IDF-) like measure and information gain (IG) to extract the crucial N-order subgraph (CNSG). This novel behavioral representation and improved extraction method can accurately represent crucial behaviors of malware. Experiments on 4,400 samples demonstrate that the proposed method achieves a high accuracy of 99.75% in malware detection and promising performance of 95.27% in malware classification.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Kong, Jun, Kang Zhang, Jing Dong und Dianxiang Xu. „Specifying behavioral semantics of UML diagrams through graph transformations“. Journal of Systems and Software 82, Nr. 2 (Februar 2009): 292–306. http://dx.doi.org/10.1016/j.jss.2008.06.030.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Wang, Junjie, Keith W. Hipel, Liping Fang, Haiyan Xu und D. Marc Kilgour. „Behavioral Analysis in the Graph Model for Conflict Resolution“. IEEE Transactions on Systems, Man, and Cybernetics: Systems 49, Nr. 5 (Mai 2019): 904–16. http://dx.doi.org/10.1109/tsmc.2017.2689004.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Ali, Nadia, und David Peebles. „The Effect of Gestalt Laws of Perceptual Organization on the Comprehension of Three-Variable Bar and Line Graphs“. Human Factors: The Journal of the Human Factors and Ergonomics Society 55, Nr. 1 (16.07.2012): 183–203. http://dx.doi.org/10.1177/0018720812452592.

Der volle Inhalt der Quelle
Annotation:
Objective: We report three experiments investigating the ability of undergraduate college students to comprehend 2 × 2 “interaction” graphs from two-way factorial research designs. Background: Factorial research designs are an invaluable research tool widely used in all branches of the natural and social sciences, and the teaching of such designs lies at the core of many college curricula. Such data can be represented in bar or line graph form. Previous studies have shown, however, that people interpret these two graphical forms differently. Method: In Experiment 1, participants were required to interpret interaction data in either bar or line graphs while thinking aloud. Verbal protocol analysis revealed that line graph users were significantly more likely to misinterpret the data or fail to interpret the graph altogether. Results: The patterns of errors line graph users made were interpreted as arising from the operation of Gestalt principles of perceptual organization, and this interpretation was used to develop two modified versions of the line graph, which were then tested in two further experiments. One of the modifications resulted in a significant improvement in performance. Conclusion: Results of the three experiments support the proposed explanation and demonstrate the effects (both positive and negative) of Gestalt principles of perceptual organization on graph comprehension. Application: We propose that our new design provides a more balanced representation of the data than the standard line graph for nonexpert users to comprehend the full range of relationships in two-way factorial research designs and may therefore be considered a more appropriate representation for use in educational and other nonexpert contexts.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Vodyaho, Alexander, Nataly Zhukova, Igor Kulikov und Saddam Abbas. „Using the Context-Sensitive Policy Mechanism for Building Data Acquisition Systems in Large Scale Distributed Cyber-Physical Systems Built on Fog Computing Platforms“. Computers 10, Nr. 8 (18.08.2021): 101. http://dx.doi.org/10.3390/computers10080101.

Der volle Inhalt der Quelle
Annotation:
The article deals with the use of context-sensitive policies in the building of data acquisition systems in large scale distributed cyber-physical systems built on fog computing platforms. It is pointed out that the distinctive features of modern cyber-physical systems are their high complexity and constantly changing structure and behavior, which complicates the data acquisition procedure. To solve this problem, it is proposed to use an approach according to which the data acquisition procedure is divided into two phases: model construction and data acquisition, which allows parallel realization of these procedures. A distinctive feature of the developed approach is that the models are built in runtime automatically. As a top-level model, a multi-level relative finite state operational automaton is used. The automaton state is described using a multi-level structural-behavioral model, which is a superposition of four graphs: the workflow graph, the data flow graph, the request flow graph and the resource graph. To implement the data acquisition procedure using the model, the context-sensitive policy mechanism is used. The article discusses possible approaches to implementation of suggested mechanisms and describes an example of application.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Behavioral graph"

1

Torbey, Elie. „Control/data flow graph synthesis using evolutionary computation and behavioral estimation“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ37080.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Torbey, Elie Carleton University Dissertation Engineering Electronics. „Control/data flow graph synthesis using evolutionary computation and behavioral estimation“. Ottawa, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Bodily, Ty Alvin. „A Graph Theoretical Analysis of Functional Brain Networks Related to Memory and Healthy Aging“. BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7567.

Der volle Inhalt der Quelle
Annotation:
The cognitive decline associated with healthy aging begins in early adulthood and is important to understand as a precursor of and relative to mild cognitive impairment and Alzheimer disease. Anatomical atrophy, functional compensation, and network reorganization have been observed in populations of older adults. In the current study, we examine functional network correlates of memory performance on the Wechsler Memory Scale IV and the Mnemonic Discrimination Task (MST). We report a lack of association between global graph theory metrics and age or memory performance. In addition, we observed a positive association between lure discrimination scores from the MST and right hippocampus centrality. Upon further investigation, we confirmed that old subjects with poor memory performance had lower right hippocampus centrality scores than young subjects with high average memory performance. These novel results connect the role of the hippocampus in global brain network information flow to cognitive function and have implications for better characterizing and predicting memory decline in aging.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Mahamadi, Abdelrhman. „Bond Graph Models for Human Behavior“. University of Akron / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=akron1479485016074583.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Janssen, Alisha L. „Physical Activity and Working Memory in Multiple Sclerosis: An Investigation of Neuropsychological and NeuroImaging Associations“. The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu149788064943423.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Fleig, John David. „Citationally Enhanced Semantic Literature Based Discovery“. Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1082.

Der volle Inhalt der Quelle
Annotation:
We are living within the age of information. The ever increasing flow of data and publications poses a monumental bottleneck to scientific progress as despite the amazing abilities of the human mind, it is woefully inadequate in processing such a vast quantity of multidimensional information. The small bits of flotsam and jetsam that we leverage belies the amount of useful information beneath the surface. It is imperative that automated tools exist to better search, retrieve, and summarize this content. Combinations of document indexing and search engines can quickly find you a document whose content best matches your query - if the information is all contained within a single document. But it doesn’t draw connections, make hypotheses, or find knowledge hidden across multiple documents. Literature-based discovery is an approach that can uncover hidden interrelationships between topics by extracting information from existing published scientific literature. The proposed study utilizes a semantic-based approach that builds a graph of related concepts between two user specified sets of topics using semantic predications. In addition, the study includes properties of bibliographically related documents and statistical properties of concepts to further enhance the quality of the proposed intermediate terms. Our results show an improvement in precision-recall when incorporating citations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

MacKelvie, Erin. „A Comparison of Traditional Aggregated Data to a Comprehensive Second-by-Second Data Depiction in Functional Analysis Graphs“. Scholarly Commons, 2021. https://scholarlycommons.pacific.edu/uop_etds/3730.

Der volle Inhalt der Quelle
Annotation:
Functional analyses (FAs) are an important component of treatment and the data gathered from FAs are often graphed in an aggregate or summary format, such as mean rate per session. Given the prevalence of undifferentiated analyses, it may be that this common method of data depiction is incomplete. In this paper, we compare the traditional aggregate method to a comprehensive second-by-second demonstration of the data including all appropriate and inappropriate responses emitted, as well as programmed and accidental antecedent and consequent variables, which may help further clarify the results of a functional analysis. We compared the functional analysis results of two participants when the data were depicted using the traditional rate aggregate method and depicted using a comprehensive second-by-second method. Although both rate and comprehensive second-by-second data depiction resulted in similar conclusions regarding the maintaining variables for the participants, comprehensive second-by-second data depiction allowed us to draw the conclusions in less time. Additional advantages and disadvantages of each method as it relates to efficiency, therapeutic risk and safety, and practicality are also discussed. Keywords: efficiency, functional analysis, problem behavior, safety, within-session second-by-second analysis.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Heyman, Susanna. „Visualizing Financial Futures“. Doctoral thesis, KTH, Medieteknik och interaktionsdesign, MID, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211657.

Der volle Inhalt der Quelle
Annotation:
Research on financial decision aids, systems designed to help people make financial decisions, is sparse. Previous research has often focused on the theoretical soundness of the advice that the systems provide.The original contribution of this doctoral thesis is a set of empirical studies of how non-expert people understand the advice provided by financial decision aids. Since every piece of advice must be interpreted by a receiver, the accuracy of the advice can be corrupted along the way if the receiver does not understand complicated terminology, probabilistic reasoning, or abstract concepts.The design concept resulting from the studies visualizes a unique combination of short-term and long-term variables that are usually treated as separate and not interacting with each other; loans and amortizations, insurance, retirement saving, and consumption. The aim is to visualize the consequences of different decisions and possible adverse events in terms of their effect on the user’s future consumption, rather than abstract numbers detached from the user’s lived experience.The design concept was tested and evaluated by personal finance experts and professional financial advisors, as well as students and people without financial education, who represented the target users of the system. Results indicate that the system has a learning curve, but that once users understand how to read the graph, they find it more informative than conventional financial planning tools.

QC 20170809

APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Varga, Adam. „Identifikace a charakterizace škodlivého chování v grafech chování“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442388.

Der volle Inhalt der Quelle
Annotation:
Za posledné roky je zaznamenaný nárast prác zahrňujúcich komplexnú detekciu malvéru. Pre potreby zachytenia správania je často vhodné pouziť formát grafov. To je prípad antivírusového programu Avast, ktorého behaviorálny štít deteguje škodlivé správanie a ukladá ich vo forme grafov. Keďže sa jedná o proprietárne riešenie a Avast antivirus pracuje s vlastnou sadou charakterizovaného správania bolo nutné navrhnúť vlastnú metódu detekcie, ktorá bude postavená nad týmito grafmi správania. Táto práca analyzuje grafy správania škodlivého softvéru zachytené behavioralnym štítom antivírusového programu Avast pre proces hlbšej detekcie škodlivého softvéru. Detekcia škodlivého správania sa začína analýzou a abstrakciou vzorcov z grafu správania. Izolované vzory môžu efektívnejšie identifikovať dynamicky sa meniaci malware. Grafy správania sú uložené v databáze grafov Neo4j a každý deň sú zachytené tisíce z nich. Cieľom tejto práce bolo navrhnúť algoritmus na identifikáciu správania škodlivého softvéru s dôrazom na rýchlosť skenovania a jasnosť identifikovaných vzorcov správania. Identifikácia škodlivého správania spočíva v nájdení najdôležitejších vlastností natrénovaných klasifikátorov a následnej extrakcie podgrafu pozostávajúceho iba z týchto dôležitých vlastností uzlov a vzťahov medzi nimi. Následne je navrhnuté pravidlo pre hodnotenie extrahovaného podgrafu. Diplomová práca prebehla v spolupráci so spoločnosťou Avast Software s.r.o.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Kuhlman, Christopher James. „Generalizations of Threshold Graph Dynamical Systems“. Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/76765.

Der volle Inhalt der Quelle
Annotation:
Dynamics of social processes in populations, such as the spread of emotions, influence, language, mass movements, and warfare (often referred to individually and collectively as contagions), are increasingly studied because of their social, political, and economic impacts. Discrete dynamical systems (discrete in time and discrete in agent states) are often used to quantify contagion propagation in populations that are cast as graphs, where vertices represent agents and edges represent agent interactions. We refer to such formulations as graph dynamical systems. For social applications, threshold models are used extensively for agent state transition rules (i.e., for vertex functions). In its simplest form, each agent can be in one of two states (state 0 (1) means that an agent does not (does) possess a contagion), and an agent contracts a contagion if at least a threshold number of its distance-1 neighbors already possess it. The transition to state 0 is not permitted. In this study, we extend threshold models in three ways. First, we allow transitions to states 0 and 1, and we study the long-term dynamics of these bithreshold systems, wherein there are two distinct thresholds for each vertex; one governing each of the transitions to states 0 and 1. Second, we extend the model from a binary vertex state set to an arbitrary number r of states, and allow transitions between every pair of states. Third, we analyze a recent hierarchical model from the literature where inputs to vertex functions take into account subgraphs induced on the distance-1 neighbors of a vertex. We state, prove, and analyze conditions characterizing long-term dynamics of all of these models.
Master of Science
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Behavioral graph"

1

Bonato, Anthony. The game of cops and robbers on graphs. Providence, R.I: American Mathematical Society, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

White, Robert E. Soils for Fine Wines. Oxford University Press, 2003. http://dx.doi.org/10.1093/oso/9780195141023.001.0001.

Der volle Inhalt der Quelle
Annotation:
In recent years, viticulture has seen phenomenal growth, particularly in such countries as Australia, New Zealand, the United States, Chile, and South Africa. The surge in production of quality wines in these countries has been built largely on the practice of good enology and investment in high technology in the winery, enabling vintners to produce consistently good, even fine wines. Yet less attention has been paid to the influence of vineyard conditions on wines and their distinctiveness-an influence that is embodied in the French concept of terroir. An essential component of terroir is soil and the interaction between it, local climate, vineyard practices, and grape variety on the quality of grapes and distinctiveness of their flavor. This book considers that component, providing basic information on soil properties and behavior in the context of site selection for new vineyards and on the demands placed on soils for grape growth and production of wines. Soils for Fine Wines will be of interest to professors and upper-level students in enology, viticulture, soils and agronomy as well as wine enthusiasts and professionals in the wine industry.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Trinkaus, Erik, Alexandra P. Buzhilova, Maria B. Mednikova und Maria V. Dobrovolskaya. The People of Sunghir. Oxford University Press, 2014. http://dx.doi.org/10.1093/oso/9780199381050.001.0001.

Der volle Inhalt der Quelle
Annotation:
In this latest volume in the Human Evolution Series, Erik Trinkaus and his co-authors synthesize the research and findings concerning the human remains found at the Sunghir archaeological site. It has long been apparent to those in the field of paleoanthropology that the human fossil remains from the site of Sunghir are an important part of the human paleoanthropological record, and that these fossil remains have the potential to provide substantial data and inferences concerning human biology and behavior, both during the earlier Upper Paleolithic and concerning the early phases of human occupation of high latitude continental Eurasia. But despite many separate investigations and published studies on the site and its findings, a single and definitive volume does not yet exist on the subject. This book combines the expertise of four paleoanthropologists to provide a comprehensive description and paleobiological analysis of the Sunghir human remains. Since 1990, Trinkaus et al. have had access to the Sunghir site and its findings, and the authors have published frequently on the topic. The book places these human fossil remains in context with other Late Pleistocene humans, utilizing numerous comparative charts, graphs, and figures. As such, the book is highly illustrated, in color. Trinkaus and his co-authors outline the many advances in paleoanthropology that these remains have helped to bring about, examining the Sunghir site from all angles.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Algebraic And Geometric Aspects Of Integrable Systems And Random Matrices Ams Special Session Algebraic And Geometric Aspects Of Integrable Systems And Random Matrices January 67 2012 Boston Ma. American Mathematical Society, 2013.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Behavioral graph"

1

Harel, David. „Can Behavioral Requirements Be Executed? (And Why Would We Want to Do So?)“. In Graph Transformation, 6–7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45832-8_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Gosti, Giorgio, und William H. Batchelder. „Naming on a Directed Graph“. In Social Computing, Behavioral-Cultural Modeling and Prediction, 358–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19656-0_49.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Dineen, Jacob, A. S. M. Ahsan-Ul Haque und Matthew Bielskas. „Reinforcement Learning for Data Poisoning on Graph Neural Networks“. In Social, Cultural, and Behavioral Modeling, 141–50. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80387-2_14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Mankowski, Walter C., Peter Bogunovich, Ali Shokoufandeh und Dario D. Salvucci. „On Computing Canonical Subsets of Graph-Based Behavioral Representations“. In Graph-Based Representations in Pattern Recognition, 215–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02124-4_22.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Marburger, André, und Bernhard Westfechtel. „Behavioral Analysis of Telecommunication Systems by Graph Transformations“. In Applications of Graph Transformations with Industrial Relevance, 202–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25959-6_15.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Maximova, Maria, Sven Schneider und Holger Giese. „Compositional Analysis of Probabilistic Timed Graph Transformation Systems“. In Fundamental Approaches to Software Engineering, 196–217. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_10.

Der volle Inhalt der Quelle
Annotation:
AbstractThe analysis of behavioral models is of high importance for cyber-physical systems, as the systems often encompass complex behavior based on e.g. concurrent components with mutual exclusion or probabilistic failures on demand. The rule-based formalism of probabilistic timed graph transformation systems is a suitable choice when the models representing states of the system can be understood as graphs and timed and probabilistic behavior is important. However, model checking PTGTSs is limited to systems with rather small state spaces.We present an approach for the analysis of large-scale systems modeled as probabilistic timed graph transformation systems by systematically decomposing their state spaces into manageable fragments. To obtain qualitative and quantitative analysis results for a large-scale system, we verify that results obtained for its fragments serve as overapproximations for the corresponding results of the large-scale system. Hence, our approach allows for the detection of violations of qualitative and quantitative safety properties for the large-scale system under analysis. We consider a running example in which we model shuttles driving on tracks of a large-scale topology and for which we verify that shuttles never collide and are unlikely to execute emergency brakes. In our evaluation, we apply an implementation of our approach to the running example.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Ogaard, Kirk, Heather Roy, Sue Kase, Rakesh Nagi, Kedar Sambhoos und Moises Sudit. „Discovering Patterns in Social Networks with Graph Matching Algorithms“. In Social Computing, Behavioral-Cultural Modeling and Prediction, 341–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37210-0_37.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Bui, Ngot, und Vasant Honavar. „Labeling Actors in Social Networks Using a Heterogeneous Graph Kernel“. In Social Computing, Behavioral-Cultural Modeling and Prediction, 27–34. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05579-4_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Alassad, Mustafa, Muhammad Nihal Hussain und Nitin Agarwal. „Developing Graph Theoretic Techniques to Identify Amplification and Coordination Activities of Influential Sets of Users“. In Social, Cultural, and Behavioral Modeling, 192–201. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61255-9_19.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Said, Yasmin H., und Edward J. Wegman. „Estimating Cyclic and Geospatial Effects of Alcohol Usage in a Social Network Directed Graph Model“. In Social Computing and Behavioral Modeling, 1–8. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-0056-2_22.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Behavioral graph"

1

Bergamaschi, Reinaldo A. „Behavioral network graph“. In the 36th ACM/IEEE conference. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/309847.309916.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Huajian Zhang. „Balanced Graph Partitioning: Optimizing graph cut based on Label Swapping“. In 2015 International Conference on Behavioral, Economic and Socio-cultural Computing (BESC). IEEE, 2015. http://dx.doi.org/10.1109/besc.2015.7365980.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Kuai Xu und Feng Wang. „Behavioral Graph Analysis of Internet Applications“. In 2011 IEEE Global Communications Conference (GLOBECOM 2011). IEEE, 2011. http://dx.doi.org/10.1109/glocom.2011.6133613.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Szummer, Martin, und Nick Craswell. „Behavioral classification on the click graph“. In Proceeding of the 17th international conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1367497.1367746.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Wu, Bin, Shuiguang Deng, Jian Wu, Ying Li, Li Kuang und Jianwei Yin. „Service Behavioral Adaptation Based on Dependency Graph“. In 2008 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2008. http://dx.doi.org/10.1109/apscc.2008.26.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Sangeetha, Dr M., Dr R. Vani und T. Vijayan. „Resource Constrained Scheduling using Behavioral Network Graph“. In Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India. EAI, 2021. http://dx.doi.org/10.4108/eai.7-6-2021.2308871.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Yonggen Wang, Yanhui Gu, Junsheng Zhou und Weiguang Qu. „A graph-based approach for semantic similar word retrieval“. In 2015 International Conference on Behavioral, Economic and Socio-cultural Computing (BESC). IEEE, 2015. http://dx.doi.org/10.1109/besc.2015.7365952.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Park, Younghee, Douglas Reeves, Vikram Mulukutla und Balaji Sundaravel. „Fast malware classification by automated behavioral graph matching“. In the Sixth Annual Workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1852666.1852716.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Pham, Thuan, Xiaohui Tao, Ji Zhanag, Jianming Yong, Wenping Zhang und Yi Cai. „Mining Heterogeneous Information Graph for Health Status Classification“. In 2018 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC). IEEE, 2018. http://dx.doi.org/10.1109/besc.2018.8697292.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

An, Shushan, Yidong Li, Tao Wang und Yi Jin. „Contact Graph Based Anonymization for Geosocial Network Datasets“. In 2018 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC). IEEE, 2018. http://dx.doi.org/10.1109/besc.2018.8697836.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Behavioral graph"

1

Financial Stability Report - First Semester of 2020. Banco de la República de Colombia, März 2021. http://dx.doi.org/10.32468/rept-estab-fin.1sem.eng-2020.

Der volle Inhalt der Quelle
Annotation:
In the face of the multiple shocks currently experienced by the domestic economy (resulting from the drop in oil prices and the appearance of a global pandemic), the Colombian financial system is in a position of sound solvency and adequate liquidity. At the same time, credit quality has been recovering and the exposure of credit institutions to firms with currency mismatches has declined relative to previous episodes of sudden drops in oil prices. These trends are reflected in the recent fading of red and blue tonalities in the performance and credit risk segments of the risk heatmaps in Graphs A and B.1 Naturally, the sudden, unanticipated change in macroeconomic conditions has caused the appearance of vulnerabilities for short-term financial stability. These vulnerabilities require close and continuous monitoring on the part of economic authorities. The main vulnerability is the response of credit and credit risk to a potential, temporarily extreme macroeconomic situation in the context of: (i) recently increased exposure of some banks to household sector, and (ii) reductions in net interest income that have led to a decline in the profitability of the banking business in the recent past. Furthermore, as a consequence of greater uncertainty and risk aversion, occasional problems may arise in the distribution of liquidity between agents and financial markets. With regards to local markets, spikes have been registered in the volatility of public and private fixed income securities in recent weeks that are consistent with the behavior of the international markets and have had a significant impact on the liquidity of those instruments (red portions in the most recent past of some market risk items on the map in Graph A). In order to adopt a forward-looking approach to those vulnerabilities, this Report presents a stress test that evaluates the resilience of credit institutions in the event of a hypothetical scenario thatseeks to simulate an extreme version of current macroeconomic conditions. The scenario assumes a hypothetical negative growth that is temporarily strong but recovers going into the middle of the coming year and has extreme effects on credit quality. The results suggest that credit institutions have the ability to withstand a significant deterioration in economic conditions in the short term. Even though there could be a strong impact on credit, liquidity, and profitability under the scenario being considered, aggregate capital ratios would probably remain at above their regulatory limits over the horizon of a year. In this context, the recent measures taken by both Banco de la República and the Office of the Financial Superintendent of Colombia that are intended to help preserve the financial stability of the Colombian economy become highly relevant. In compliance with its constitutional objectives and in coordination with the financial system’s security network, Banco de la República will continue to closely monitor the outlook for financial stability at this juncture and will make the decisions that are necessary to ensure the proper functioning of the economy, facilitate the flow of sufficient credit and liquidity resources, and further the smooth functioning of the payment system. Juan José Echavarría Governor
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie