In the mathematical field of graph theory, the butterfly graph (also called the bowtie graph and the hourglass graph) is a planar undirected graphâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

2017

2017

- Lambert Pp, P.Vijaya Jyothi
- 2017

Domination Theory is an important branch of Graph Theory that has wide range of applications to various branches of Science andâ€¦Â (More)

Is this relevant?

2014

2014

- Indrani Kelkar, Bhavna Maheswari
- 2014

Butterfly graphs are very important structures in computer architecture and communication techniques. Total Domination is anâ€¦Â (More)

Is this relevant?

2009

2009

- Zhishou Zhang, Qibin Sun, John G. Apostolopoulos, Lawrence Wai-Choong Wong
- IEEE Transactions on Circuits and Systems forâ€¦
- 2009

This paper presents the generalized butterfly graph (GBG) and its application to video stream authentication. Compared with theâ€¦Â (More)

Is this relevant?

2008

2008

- Zhishou Zhang, Qibin Sun, John G. Apostolopoulos, Lawrence Wai-Choong Wong
- 2008 15th IEEE International Conference on Imageâ€¦
- 2008

This paper shows how Rate-Distortion-Authentication (R-D-A) optimized streaming may be performed with the Generalized Butterflyâ€¦Â (More)

Is this relevant?

2007

2007

- Zhishou Zhang, John G. Apostolopoulos, Qibin Sun, Susie Wee, Lawrence Wai-Choong Wong
- 2007 IEEE International Conference on Imageâ€¦
- 2007

This paper proposes a stream authentication method based on the generalized butterfly graph (GBG) framework. Compared with theâ€¦Â (More)

Is this relevant?

Highly Cited

2007

Highly Cited

2007

- Chih-Chun Wang, N. B. Shroff
- 2007 IEEE International Symposium on Informationâ€¦
- 2007

The problem of network coding with two simple unicast sessions is considered for general directed acyclic graphs. An explicitâ€¦Â (More)

Is this relevant?

2005

2005

- Zhishou Zhang, Qibin Sun, Lawrence Wai-Choong Wong
- 2005 IEEE International Conference on Multimediaâ€¦
- 2005

In this paper, we propose a butterfly-graph based stream authentication scheme for lossy networks where the streaming packetsâ€¦Â (More)

Is this relevant?

2005

2005

- Zhishou Zhang, Qibin Sun, W. S. Wong
- 2005

In this paper, we propose a butterflyâˆ’graph based stream authentication scheme for lossy networks where the streaming packetsâ€¦Â (More)

Is this relevant?

1994

1994

- Dominique Barth, AndrÃ© Raspaud
- Inf. Process. Lett.
- 1994

We show that the butterfly graph contains two edge-disjoint hamiltonian cycles by giving a recursive method of construction ofâ€¦Â (More)

Is this relevant?

1990

1990

- David S. Greenberg, Lenwood S. Heath, Arnold L. Rosenberg
- Mathematical systems theory
- 1990

We present optimal embeddings of three genres of butterfly-like graphs in the (boolean) hypercube; each embedding is specifiedâ€¦Â (More)

Is this relevant?