Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Structural cut-off

Known as: Structural cutoff, Structural degree correlation, Structural correlation 
The structural cut-off is a concept in network science which imposes a degree cut-off in the degree distribution of a finite size network due to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
We propose a new end-to-end single image dehazing method, called Densely Connected Pyramid Dehazing Network (DCPDN), which can… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2016
Highly Cited
2016
In this paper, we propose a novel structural correlation filter (SCF) model for robust visual tracking. The proposed SCF model… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2013
Highly Cited
2013
A bstractAnomalously light fermionic partners of the top quark often appear in explicit constructions, such as the 5d holographic… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
In this work, we study the correlation between attribute sets and the occurrence of dense subgraphs in large attributed graphs, a… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2012
2012
Algorithmic image quality metrics have been based on the assumption that an image is only distorted by a single distortion type… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Is this relevant?
2011
2011
Real-life graphs not only have nodes and edges, but also have events taking place, e.g., product sales in social networks and… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2009
2009
As security threats change and advance in a drastic way, most of the organizations implement multiple Network Intrusion Detection… Expand
  • figure 2
  • figure 4
  • table II
  • figure 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper presents an off-line signature verification method using a model-based approach. In this method, statistical models… Expand
  • figure 2
  • figure 1
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
In this paper, we investigate the feasibility of using graph-based descriptions to learn the view structure of 3D objects. The… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
1998
1998
Even though spread spectrum (SS) systems have high immunity to narrowband interference, it can be shown that structural… Expand
  • figure 2
  • figure 3
  • figure 4
  • table 1
  • figure 5
Is this relevant?