Dissertations / Theses on the topic 'Node embeddings'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 15 dissertations / theses for your research on the topic 'Node embeddings.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Li, Mengzhen. "Integration of Node Embeddings for Multiple Versions of A Network." Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1595435155975104.
Full textYandrapally, Aruna Harini. "Combining Node Embeddings From Multiple Contexts Using Multi Dimensional Scaling." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1627658906149105.
Full textSabo, Jozef. "Aplikace metody učení bez učitele na hledání podobných grafů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445517.
Full textWåhlin, Lova. "Towards Machine Learning Enabled Automatic Design of IT-Network Architectures." Thesis, KTH, Matematisk statistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-249213.
Full textDet är många maskininlärningstekniker som inte kan appliceras på data i form av en graf. Tekniker som graph embedding, med andra ord att mappa en graf till ett vektorrum, can öppna upp för en större variation av maskininlärningslösningar. Det här examensarbetet evaluerar hur väl statiska graph embeddings kan fånga viktiga säkerhetsegenskaper hos en IT-arkitektur som är modellerad som en graf, med syftet att användas i en reinforcement learning algoritm. Dom egenskaper i grafen som används för att validera embedding metoderna är hur lång tid det skulle ta för en obehörig attackerare att penetrera IT-arkitekturen. Algorithmerna som implementeras är node embedding metoderna node2vec och gat2vec, samt graph embedding metoden graph2vec. Dom prediktiva resultaten är jämförda med två basmetoder. Resultaten av alla tre metoderna visar tydliga förbättringar relativt basmetoderna, där F1 värden i några fall uppvisar en fördubbling. Det går alltså att dra slutsatsen att att alla tre metoder kan fånga upp säkerhetsegenskaper i en IT-arkitektur. Dock går det inte att säga att statiska graph embeddings är den bästa lösningen till att representera en graf i en reinforcement learning algoritm, det finns andra komplikationer med statiska metoder, till exempel att embeddings från dessa metoder inte kan generaliseras till data som inte var använd till träning. För att kunna dra en absolut slutsats krävs mer undersökning, till exempel av dynamiska graph embedding metoder.
Zhu, Xiaoting. "Systematic Assessment of Structural Features-Based Graph Embedding Methods with Application to Biomedical Networks." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1592394966493963.
Full textJmila, Houda. "Dynamic resource allocation and management in virtual networks and Clouds." Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0023/document.
Full textCloud computing is a promising technology enabling IT resources reservation and utilization on a pay-as-you-go manner. In addition to the traditional computing resources, cloud tenants expect compete networking of their dedicated resources to easily deploy network functions and services. They need to manage an entire Virtual Network (VN) or infrastructure. Thus, Cloud providers should deploy dynamic and adaptive resource provisioning solutions to allocate virtual networks that reflect the time-varying needs of Cloud-hosted applications. Prior work on virtual network resource provisioning only focused on the problem of mapping the virtual nodes and links composing a virtual network request to the substrate network nodes and paths, known as the Virtual network embedding (VNE) problem. Little attention was paid to the resource management of the allocated resources to continuously meet the varying demands of embedded virtual networks and to ensure efficient substrate resource utilization. The aim of this thesis is to enable dynamic and preventive virtual network resources provisioning to deal with demand fluctuation during the virtual network lifetime, and to enhance the substrate resources usage. To reach these goals, the thesis proposes adaptive resource allocation algorithms for evolving virtual network requests. We adress the extension of an embedded virtual node requiring more resources and consider the substrate network profitability. We also deal with the bandwidth demand variation in embedded virtual links. We first provide a heuristic algorithm to deal with virtual nodes demand fluctuation. The work is extended by designing a preventive re-configuration scheme to enhance substrate network profitability. Finally, a distributed, local-view and parallel framework was devised to handle embedded virtual links bandwidth fluctuations. The approach is composed of a controller and three algorithms running in each substrate node in a distributed and parallel manner. The framework is based on the self-stabilization approach, and can manage various forms of bandwidth demand variations simultaneously
Lin, Christy. "Unsupervised random walk node embeddings for network block structure representation." Thesis, 2021. https://hdl.handle.net/2144/43083.
Full text2023-09-24T00:00:00Z
Feng, Ming-Han, and 馮銘漢. "Multi-relational Network Embeddings Considering Link Structures and Node Attributes." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/466w9j.
Full text國立臺灣大學
資訊網路與多媒體研究所
105
Multi-relational networks are ubiquitous in real world. It is, however, difficult to be analyzed due to the complex structure of the network. A plausible approach to analyze such network is to embed the entity information as an informative feature vector. However, present embedding methods either consider only single-relational information, or neglect the importance of structural information. In addition, some of them require fine-tuning of hyperparameters, which might not be feasible for an unsupervised embedding generation task. In this work we propose MUSE, a Multi-relational Unsupervised link-Structure preserving Embeddings method, which learns the representations for each node and relation by maximizing the likelihood of observations on the given network. Additional node attributes are also preserved under our design. Besides, MUSE features less sensitive hyperparameters and scalablility by edge-sampling strategy. The extensive experiments on various real-world applications also demonstrate the effectiveness and robustness of our model.
"Numerical Performance of the Holomorphic Embedding Method." Master's thesis, 2018. http://hdl.handle.net/2286/R.I.50476.
Full textDissertation/Thesis
Masters Thesis Electrical Engineering 2018
Liu, Hsien Jen, and 劉獻仁. "Node Fault Tolerant Hamiltonian Cycle Embedding in Honeycomb Rectangular Torus Network." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/41779530434993281960.
Full text國立交通大學
資訊科學系
89
In this thesis, we propose a variation of Honeycomb Torus, called Honeycomb Rectangular Torus Networks.The Honeycomb Rectangular Torus is Hamlitonian and to remove a pair of nodes from each partite sets of graph, still has Hamlitonian cycle. Honeycomb Rectangular Torus Network is homogeneous graph. This property is very helpful, because we can reduce the complexity of the Honeycomb Rectangular Torus. The Honeycomb Rectangular Torus HReT(m,n) is defined in the paper written by Stojmenovic Honeycomb Rectangular Torus has many good properties including homogeneous graph, 3-regular graph, Bipartite graph , hamiltonian cycle, 1-p hamiltonian cycle, hamiltonian connectivity etc. Since $HReT(m,n)$ is regular of degree 3, it can tolerate at most two node faults in the worst case in order to construct a hamiltonian cycle. In this paper, we will prove that all the honeycomb rectangular torus have hamiltonian cycle, when any one pair nodes fault.
DiCarlo, Cynthia F. "Embedding sensory preferences into toys to enhance play in toddlers with disabilities." 2004. http://louisdl.louislibraries.org/u?/NOD,123.
Full textTitle from electronic submission form. "A dissertation ... in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Special Education and Habililative Services."--Dissertation t.p. Vita. Includes bibliographical references.
Chien, Li-Hsin, and 錢力新. "Embedding of Complete Binary Trees onto Supercubes Faulty Nodes." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/76961995078735199080.
Full textJiang, Feng Shr, and 江逢時. "Embedding of Generalized Fibonacci Cubes in Hypercubes with Faulty Nodes." Thesis, 1994. http://ndltd.ncl.edu.tw/handle/77547631018104810862.
Full text國立臺灣科技大學
電機工程研究所
82
The generalized Fibonacci cubes ( abbreviated to GFCs ) were recently proposed as a class of interconnection topologies, which cover a spectrum ranging from regular graphs such as the hypercube to semi-regular graphs such as the second order Fibonacci cube. It has been shown that the kth order GFC of dimension n + k is equivalent to an n cube for 0 .ltoreq. n < k; and it is a proper subgraph of an n-cube for n. gtoreq. k. Thus, a kth order GFC of dimension n + k can be obtained from the n-cube for all n.gtoreq. k by removing certain nodes from an n-cube. This problem is very simple when no faulty node exists in an n-cube; but it becomes very complex if some faulty nodes appear in an n-cube. In this paper, first, we concern the following open problem: How to identify a maximal ( in terms of the number of nodes ) generalized Fibonacci cube from a faulty hypercube which can also be considered as a Fault-tolerant embedding in hypercubes. Then, we shall show how to directly embed a GFC into a faulty hypercube and prove that if no more than three faulty nodes, then an [ n / 2 ]th order GFC of dimension n + [ n / 2 ] can be directly embedded into an n-cube in the worst case, for n = 4 or n.gtoreq. 6.
"Exploration of a Scalable Holomorphic Embedding Method Formulation for Power System Analysis Applications." Doctoral diss., 2017. http://hdl.handle.net/2286/R.I.45022.
Full textDissertation/Thesis
Doctoral Dissertation Electrical Engineering 2017
Zou, Yun-Hao, and 鄒雲豪. "A study on the Path Embedding of Various Lengths in Crossed Cube with Faulty Nodes." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/23599247148482788071.
Full text國立勤益科技大學
資訊管理系
102
In computer science, network topology is important and widely discussed by researchers since it is essential for parallel and distributed computation. Recently, many network topologies have been proposed. Among these topologies, the hypercube is one of the most popular topologies since it has good properties such as regularity, symmetry, small diameter, strong connectivity, recursive structure, flexible partition, and relatively low link complexity. Not only is it ideally suited to both special-purpose and general-purpose tasks, but it can efficiently simulate many other networks. The crossed cube has a structure similar to the hypercube, including recursive structure, the same number of vertices, and the same number of edges. However, the diameter of the crossed cube is only about one half of that of the hypercube. The diameter is an important factor for parallel computing speed. In this study, we improve the previous result of Meijie Ma et al. that an n-dimensional crossed cube with up to n – 3 faults has a fault-free path of various length satisfying 2n-1-1 to the number of all vertices minus the faulty vertices and minus one. We also improve the result of Jung-Heum Park et al. that an n-dimensional HL-graph with up to n – 3 that has a fault-free path of various lengths with minimum 2n-3. In our main result, we prove that an n-dimensional crossed cube with up to n – 3 faulty vertices has a fault-free path of various length short than 2n-3. The result of this study indicates that for an n-dimensional crossed cube with up to n – 3 faulty vertices, where n ≥ 5, there exists a fault-free path of various length satisfying 2n – 5 to 2n – f – 1, where f denotes the number of faulty vertices.