Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,943,550 papers from all fields of science
Search
Sign In
Create Free Account
Adjacency list
Known as:
Edge list representation
, Adjacency list model
, Incidence list
Expand
In graph theory and computer science, an adjacency list is a collection of unordered lists used to represent a finite graph. Each list describes the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Adjacency matrix
Array data structure
Associative model of data
Breadth-first search
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Predicted Link Expiration Time Based Connected Dominating Sets for Mobile Ad hoc Networks
Pervis Fly
,
N. Meghanathan
2010
Corpus ID: 13391691
We propose an algorithm to determine stable connected dominating sets (CDS), based on the predicted link expiration time (LET…
Expand
2010
2010
A method for OWL ontology module partition
Yongquan Liang
,
Hongmei Zhu
,
Q. Tian
,
Shujuan Ji
IEEE 2nd Symposium on Web Society
2010
Corpus ID: 11125587
In semantic Web, the extensive reuse of existing ontology is a central idea of ontology engineering. Ontology partitioning…
Expand
2008
2008
Improved Data Structures for Fast Region Merging Segmentation Using a Mumford-Shah Energy Functional
D. Crisp
Digital Image Computing: Techniques and…
2008
Corpus ID: 17445025
One of the more successful approaches to image segmentation involves formulating the problem as the minimisation of a Mumford…
Expand
2006
2006
A Fixed-Parameter Algorithm for #SAT with Parameter Incidence Treewidth
M. Samer
,
Stefan Szeider
arXiv.org
2006
Corpus ID: 11991895
We present an efficient fixed-parameter algorithm for #SAT parameterized by the incidence treewidth, i.e., the treewidth of the…
Expand
2004
2004
Detection of Moving Objects Edges to Implement Home Security System in a Wireless Environment
Yonghak Ahn
,
Kiok Ahn
,
O. Chae
Communication Systems and Applications
2004
Corpus ID: 8289718
Recently, the IDS(Intrusion Detection System) with a use of a video camera is an important part of the home security systems…
Expand
2001
2001
Parallel Computing Techniques for Large-Scale Reservoir Simulation of Multi- Component and Multiphase Fluid Flow
Keni Zhang
,
Yu-Shu Wu
,
C. Ding
,
K. Pruess
,
E. Elmroth
2001
Corpus ID: 11267563
Massively parallel computing techniques can overcome limitations of problem size a nd space resolution for r eservoir simulation…
Expand
1998
1998
Edgebreaker: Compressing the incidence graph of triangle meshes
J. Rossignac
1998
Corpus ID: 9911374
Edgebreaker is a simple scheme for compressing the triangle/vertex incidence graphs (sometimes called topology) of…
Expand
1988
1988
A data structure for circuit net lists
Steve Meyer
25th ACM/IEEE, Design Automation Conference…
1988
Corpus ID: 26269928
A data structure for storing and processing electrical circuit net lists is described. The basic data structure is not new, but…
Expand
Review
1988
Review
1988
Transitive Closure Algorithms for Very Large Databases
J. Biskup
,
Holger Stiefeling
International Workshop on Graph-Theoretic…
1988
Corpus ID: 37524587
Nontraditional applications of database systems require the efficient evaluation of recursive queries. The transitive closure of…
Expand
1977
1977
Adjacency Table Method of Deriving Minimal Sums
H. A. Curtis
IEEE Trans. Computers
1977
Corpus ID: 28998726