This week: the arXiv Accessibility Forum

Help | Advanced Search

Computer Science > Data Structures and Algorithms

Title: graph theory and its uses in graph algorithms and beyond.

Abstract: Graphs are fundamental objects that find widespread applications across computer science and beyond. Graph Theory has yielded deep insights about structural properties of various families of graphs, which are leveraged in the design and analysis of algorithms for graph optimization problems and other computational optimization problems. These insights have also proved helpful in understanding the limits of efficient computation by providing constructions of hard problem instances. At the same time, algorithmic tools and techniques provide a fresh perspective on graph theoretic problems, often leading to novel discoveries. In this thesis, we exploit this symbiotic relationship between graph theory and algorithms for graph optimization problems and beyond. This thesis consists of three parts. In the first part, we study a graph routing problem called the Node-Disjoint Paths (NDP) problem. Given a graph and a set of source-destination pairs of its vertices, the goal is to route the maximum number of pairs via node-disjoint paths. We come close to resolving the approximability of NDP by showing that it is $n^{\Omega(1/poly\log\log n)}$-hard to approximate, even on grid graphs, where n is the number of vertices. In the second part of this thesis, we use graph decomposition techniques developed for efficient algorithms to derive a graph theoretic result. We show that for every n-vertex expander graph G, if H is any graph with at most $O(n/\log n)$ vertices and edges, then H is a minor of G. In the last part, we show that the graph theoretic tools and graph algorithmic techniques can shed light on problems seemingly unrelated to graphs. We show that the randomized space complexity of the Longest Increasing Subsequence (LIS) problem in the streaming model is intrinsically tied to the query-complexity of the Non-Crossing Matching problem on graphs in a new model of computation that we define.
Comments: PhD Thesis
Subjects: Data Structures and Algorithms (cs.DS); Computational Complexity (cs.CC)
Cite as: [cs.DS]
  (or [cs.DS] for this version)
  Focus to learn more arXiv-issued DOI via DataCite

Submission history

Access paper:.

  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

inventions-logo

Article Menu

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Graph theory: a comprehensive survey about graph theory applications in computer science and social networks.

thesis title for graph theory

1. Introduction

1.1. historical background of the graph theory, 1.2. overview of the existing surveys and applications of graph theory in computer science and social networks, 1.3. our contribution, 1.4. paper organization, 2. graph theory practical applications in the computer science field, 2.1. uses of graph theory in algorithms, 2.1.1. girl (graph information retrieval language), 2.1.2. gasp (graph algorithm software package), 2.1.3. gtpl (graph theoretic programming language), 2.2. group special mobile networks and maps coloring using graphs, 2.3. uses of graph algorithms/concepts in network security monitoring, 2.4. services connectivity analysis using graphs, 2.5. web documents clustering using graph theory concepts, 2.6. representing/modelling wireless sensor network as a graph, 2.7. uses of the graph theory in operational research problems, 2.7.1. use of graph coloring, 2.7.2. applications of graph theory in scheduling-related problems, 2.8. applications of graph theory in the internet of things (iot), 2.9. uses of graphs in a blockchin and related technologies, 2.10. uses of graph theory in a computer vision domain/applications, 3. applications of the graph theory in social networks (sn), 3.1. use of graphs for community clustering in a sn, 3.2. use of graphs for information diffusion in social networks, 3.3. users’ influence/trust score representation in a social networks via graphs, 3.4. similarity modeling/representing between social network users via graphs, 3.5. social network analysis via graphs, 3.5.1. closeness centrality, 3.5.2. degree centrality, 3.5.3. betweenness centrality, 3.5.4. eigenvalue centrality, 3.5.5. jordan centrality, 3.6. analyzing the modularity in a social network users’ graph, 3.7. topic of interest modelling using graphs in social networks, 3.8. user identification across social networks by analyzing structural properties of the graphs, 3.9. social-attribute network (san) modelling and analysis via graphs, 3.10. graph theory applications in recommendation systems, 3.11. social interactions modelling between users in social networks via graphs, 3.12. privacy-preserving social network data publishing with researchers/analysts for analysis, 3.13. community-based event detection in temporal networks via graph analysis, 3.14. affiliation network modelling using graphs in social network, 3.15. modelling of the sybil attack in social networks using graphs, 3.16. estimating and inferring the strengths of social relations among different people in sn using graphs, 4. summary and discussion, 5. conclusion and future works, author contributions, acknowledgments, conflicts of interest.

  • Sarma, S.V.M. Applications of Graph Theory in Human Life. Int. J. Comput. Appl. 2012 , 1 , 21–30. [ Google Scholar ]
  • Journal, I.; Core, O.; Ijcem, M. A study of Vertex—Edge Coloring Techniques with Application. Int. J. Core Eng. Manag. 2014 , 1 , 27–32. [ Google Scholar ]
  • Voloshin, V.I. Introduction to Graph Theory ; Nova Science Publishers: New York, NY, USA, 2009; pp. 1–144. [ Google Scholar ]
  • Kocay, W.; Kreher, D.L. Graphs, Algorithms, Optimization ; Chapman & Hall/CRC Press: Boca Raton, FL, USA, 2017; pp. 1–483. [ Google Scholar ]
  • Mondal, B.; De, K. Overview Applications of Graph Theory in Real Field. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2017 , 2 , 751–759. [ Google Scholar ]
  • Robertson, N.; Seymour, P.; Thomas, R. Quickly excluding a planar graph. J. Comb. Theory Ser. B 1994 , 62 , 323–348. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Kaundal, K. Applications of Graph Theory in Everyday Life and Technology. Imp. J. Interdiscip. Res. 2017 , 3 , 892–894. [ Google Scholar ]
  • Nagendram, N.V. A Note on Sufficient Cindition on Hamiltonian Path to Complete Graphs (SC-HPCG). IJMA 2011 , 2 , 1–6. [ Google Scholar ]
  • Gärtner, T.; Flach, P.; Wrobel, S. On graph kernels: Hardness results and efficient alternatives. Lect. Notes Artif. Intell. (Subser. Lect. Notes Comput. Sci. 2003 , 2777 , 129–143. [ Google Scholar ]
  • Bisen, S.K. Application of Graph Theory in Transportation Networks. Int. J. Sci. Res. Manag. 2017 , 5 , 10–12. [ Google Scholar ] [ CrossRef ]
  • Tyagi, S.S. Statical Analysis of Social Network ; JUIT (Jaypee university of information technology): Himachal Pradesh, India, 2014; pp. 1–99. [ Google Scholar ]
  • Plummer, M.D. Some covering concepts in graphs. J. Comb. Theory 1970 , 8 , 91–98. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Sciences, D.M. A Survey on some Applications of Graph Theory in Cryptography. J. Discret. Math. Sci. Cryptogr. 2015 , 18 , 209–217. [ Google Scholar ]
  • Ganzha, M.; Maciaszek, L. Position Papers of the 2019 Federated Conference on Computer Science and Information Systems ; Springer: Leipzig, Germany, 2019; p. 19. [ Google Scholar ]
  • Polak, M.; Roma, U. On the applications of Extremal Graph Theory to Coding Theory and Cryptography. Electron. Notes Discret. Math. 2013 , 43 , 329–342. [ Google Scholar ] [ CrossRef ]
  • Jaromczyk, J.W.; Lonc, Z.; Truszczy, M. Constructions of asymptotically shortest k-radius sequences. J. Comb. Theory Ser. A 2012 , 119 , 731–746. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Yuan, M.; Chen, L.; Yu, P.S.; Mei, H. Privacy preserving graph publication in a distributed environment. World Wide Web 2015 , 18 , 1481–1517. [ Google Scholar ] [ CrossRef ]
  • Iturria-medina, Y.; Sotero, R.C.; Canales-rodríguez, E.J.; Alemán-gómez, Y.; Melie-garcía, L. Studying the human brain anatomical network via diffusion-weighted MRI and Graph Theory. Neuroimage 2008 , 40 , 1064–1076. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Minor, E.S.; Urban, D.L. A Graph-Theory Framework for Evaluating Landscape Connectivity and Conservation Planning. Conserv. Biol. 2008 , 22 , 297–307. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Chrysochoos, A.; Louche, H. An infrared image processing to analyse the calorific effects accompanying strain localisation. Int. J. Eng. Sci. 2000 , 16 , 1759–1788. [ Google Scholar ]
  • Salembier, P.; Garrido, L. Binary Partition Tree as an Efficient Representation for Image Processing, Segmentation, and Information Retrieval. IEEE Trans. Image Process. 2000 , 9 , 561–576. [ Google Scholar ] [ CrossRef ]
  • Campbell, W.M.; Dagli, C.K.; Weinstein, C.J. Social network analysis with content and graphs. Linc. Lab. J. 2013 , 20 , 61–81. [ Google Scholar ]
  • Shuman, D.I.; Narang, S.K.; Frossard, P.; Ortega, A.; Vandergheynst, P. The Emerging Field of Signal Processing. IEEE Signal Process. Mag. 2013 , 30 , 83–98. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Cordero, P.; Enciso, M.; Mora, A.; Ojeda-aciego, M.; Rossi, C. Knowledge-Based Systems Knowledge discovery in social networks by using a logic-based treatment of implications. Knowl.-Based Syst. 2015 , 87 , 16–25. [ Google Scholar ] [ CrossRef ]
  • Lee, J. Kinematic Analysis of Tendon-Driven Robotic Mechanisms Using Graph Theory. ASME J. Mech. Trans. Automat. DXes. 1989 , 111 , 59–65. [ Google Scholar ]
  • Demange, M.; Ekim, T.; de Werra, D. Discrete Optimization A tutorial on the use of graph coloring for some problems in robotics. Eur. J. Oper. Res. 2009 , 192 , 41–55. [ Google Scholar ] [ CrossRef ]
  • Derrible, S.; Kennedy, C. Network Analysis of World Subway Systems Using Updated Graph Theory. Transp. Res. Rec. 2009 , 2112 , 17–25. [ Google Scholar ] [ CrossRef ]
  • De Klerk, E. Exploiting special structure in semidefinite programming: A survey of theory and applications. Eur. J. Oper. Res. 2010 , 201 , 1–10. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Man, A.; So, C.; Ye, Y. A Semidefinite Programming Approach to Tensegrity Theory and Realizability of Graphs. In Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2006, SMiami, FL, USA, 22–26 January 2006; Volume 6, pp. 1–17. [ Google Scholar ]
  • Saerens, M.; Fouss, F.; Yen, L.; Dupont, P. The Principal Components Analysis of a Graph, and Its Relationships to Spectral Clustering. In Proceedings of the European conference on machine learning, Pisa, Italy, 20–24 September 2004; pp. 371–383. [ Google Scholar ]
  • Qiantt, Y.; Suent, C.Y.; M, Q.H.G. Clustering Combination Method. In Proceedings of the 15th International Conference on Pattern Recognition, Barcelona, Spain, 3–7 September 2000; pp. 732–735. [ Google Scholar ]
  • Brás, H.; Brito, P.; Pinto, J. A partitional clustering algorithm validated by a clustering tendency index based on graph theory. Pattern Recognit. 2006 , 39 , 776–788. [ Google Scholar ] [ CrossRef ]
  • Brandes, U.; Gaertler, M.; Wagner, D. Experiments on Graph Clustering Algorithms. In Proceedings of the European Symposium on Algorithms, Copenhagen, Denmark, 7–9 September 2009; pp. 568–579. [ Google Scholar ]
  • Dodel, S.; Herrmann, J.M.; Geisel, T. Functional connectivity by cross-correlation clustering. Neurocomputing 2002 , 46 , 1065–1070. [ Google Scholar ] [ CrossRef ]
  • Pavan, M.; Pelillo, M.; Informatica, D.; Torino, V.; Mestre, V. A New Graph-Theoretic Approach to Clustering and Segmentation. In Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Madison, WI, USA, 18–20 June 2003. [ Google Scholar ]
  • Durand, G.; Belacel, N.; Laplante, F. Graph theory based model for learning path recommendation. Inf. Sci. 2013 , 251 , 10–21. [ Google Scholar ] [ CrossRef ]
  • Graves, M.; Bergeman, E.R.; Lawrence, C.B. A Graph-Theoretic Data Model for Genome Mapping Databases. In Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences, Wailea, HI, USA, 3–6 January 1995. [ Google Scholar ]
  • Kontokosta, C.E. Big Data + Big Cities: Graph Signals of Urban Air Pollution. IEEE Signal Process. Mag. 2014 , 31 , 130–136. [ Google Scholar ]
  • Siqueira, S.; Eduardo, C.; Junior, B.; Comfort, W.E.; Rohde, L.A.; Sato, J.R. Abnormal Functional Resting-State Networks in ADHD: Graph Theory and Pattern Recognition Analysis of fMRI Data. BioMed Res. Int. 2014 , 2014 , 380531. [ Google Scholar ]
  • Riaz, F.; Ali, K.M. Applications of Graph Theory in Computer Science. In Proceedings of the 2011 Third International Conference on Computational Intelligence, Communication Systems and Networks, Bali, Indonesia, 26–28 July 2011; pp. 142–145. [ Google Scholar ]
  • Appel, K. Applications of Graph Theory in Computer Science an Overview. Int. J. Eng. Sci. Technol. 2010 , 2 , 4610–4621. [ Google Scholar ]
  • Durgaprasad, D.; Snehadivya, M.; Kavitha, S. Applications of Computer Science Based on Graph theory. Int. J. Eng. Sci. 2017 , 6 , 1116–1122. [ Google Scholar ]
  • Liu, Y.; Safavi, T.; Dighe, A.; Koutra, D. Graph Summarization Methods and Applications: A Survey. ACM Comput. Surv. 2018 , 51 , 1–34. [ Google Scholar ] [ CrossRef ]
  • Yu, Q.; Du, Y.; Chen, J.; Sui, J.; Adalē, T.; Pearlson, G.D.; Calhoun, V.D. Application of Graph Theory to Assess Static and Dynamic Brain Connectivity: Approaches for Building Brain Graphs. Proc. IEEE 2018 , 106 , 886–906. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Sporns, O. Graph theory methods: Applications in brain networks. Dialogues Clin. Neurosci. 2018 , 20 , 111. [ Google Scholar ] [ PubMed ]
  • Goyal, P.; Ferrara, E. Knowle dge-Base d Systems Graph emb e dding techniques, applications, and performance: A survey. Knowledge-Based Syst. 2018 , 151 , 78–94. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Bondy, J.A.; Murty, U.S.R. Graph Theory with Applications ; Oxford: New York, NY, USA; Amsterdam, The Netherlands; Oxford, UK, 1982. [ Google Scholar ]
  • Farahani, F.V.; Karwowski, W.; Lighthall, N.R. Application of Graph Theory for Identifying Connectivity Patterns in Human Brain Networks: A Systematic Review. Front. Neurosci. 2019 , 13 , 585. [ Google Scholar ] [ CrossRef ]
  • Gupta, S.; Singh, M.; Madan, A.K. Application of graph theory: Relationship of eccentric connectivity index and Wiener’s index with anti-inflammatory activity. J. Math. Anal. Appl. 2002 , 266 , 259–268. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Pavlopoulos, G.A.; Secrier, M.; Moschopoulos, C.N.; Soldatos, T.G.; Kossida, S.; Aerts, J.; Schneider, R.; Bagos, P.G. Using graph theory to analyze biological networks. BioData Min. 2011 , 4 , 10. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Hansen, P.; Mélot, H. Computers and discovery in algebraic graph theory. Linear Algebra Appl. 2002 , 356 , 211–230. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Cvetković, D.; Simić, S. Graph spectra in Computer Science. Linear Algebra Appl. 2011 , 434 , 1545–1562. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • PalSingh, R.; Vandana, V. Application of Graph Theory in Computer Science and Engineering. Int. J. Comput. Appl. 2014 , 104 , 10–13. [ Google Scholar ] [ CrossRef ]
  • Spielman, D.A.; Sachs, H.; Theory, A.G.; Godsil, C. Spectral Graph Theory and its Applications. In Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, Providence, RI, USA, 21–23 October 2007; pp. 29–38. [ Google Scholar ]
  • Agarwal, S.; Mehta, S. Social Influence Maximization Using Genetic Algorithm with Dynamic Probabilities. In Proceedings of the 2018 Eleventh International Conference on Contemporary Computing (IC3), Noida, India, 2–4 August 2018; pp. 1–6. [ Google Scholar ]
  • Science, C. Related: An R package for analysing pairwise relatedness from codominant molecular markers. Mol. Ecol. Resour. 2015 , 15 , 557–561. [ Google Scholar ]
  • Hsiung, P.; Wang, F. A State Graph Manipulator Tool for Real-Time System Specification and Verification. In Proceedings of the Fifth International Conference on Real-Time Computing Systems and Applications, Hiroshima, Japan, 27–29 October 1998. [ Google Scholar ]
  • Hurd, J. Composable Packages for Higher Order Logic Theories. In Proceedings of the Verification Workshop, Edinburgh, UK, 20–21 July 2010; Volume 3, pp. 79–93. [ Google Scholar ]
  • Valdes, R. The Competitive Dynamics of the Consumer Web: Five Graphs Deliver a Sustainable Advantage ; Gartner: Stamford, CT, USA, 2012; Available online: https://www.gartner.com/doc/2081316/competitive-dynamics-consumer-web-graphs (accessed on 11 January 2019).
  • Wang, J.; Cong, G.; Zhao, W.X.; Li, X. Mining user intents in Twitter: A semi-supervised approach to inferring intent categories for tweets. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, Austin, TX, USA, 25–30 January 2015; pp. 318–324. [ Google Scholar ]
  • Reilly, K.D. The GPSS-GASP Combined (GGC) System. Int. J. Comput. Inf. Sci. 1983 , 12 , 111–136. [ Google Scholar ]
  • Chell, E.; Mercer, M.R. CADTOOLS: A CAD algorithm development system. In Proceedings of the 22nd ACM/IEEE Design Automation Conference, Las Vegas, NV, USA, 23 June 1985; pp. 658–666. [ Google Scholar ]
  • Rheinboldt, W.C.; Basilli, V.R.; Charles, K. Mesztenyi. On a programming language for graph algorithms. BIT Numer. Math. 1972 , 12 , 220–241. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Mokhtari, H.; Dadgar, M. A Flexible Job Shop Scheduling Problem with Controllable Processing Times to Optimize Total Cost of Delay and Processing. Int. J. Supply Oper. Manag. 2015 , 2 , 871. [ Google Scholar ]
  • Dawood, H.A.; William, R. Graph T Theory and Cyber Security. In Proceedings of the 2014 3rd International Conference on Advanced Computer Science Applications and Technologies, Amman, Jordan, 29–30 December 2014; pp. 90–96. [ Google Scholar ]
  • Majeed, A.; Farooq, R.; Masoom, A.; Nadeem, A. Near—Miss situation based visual analysis of SIEM rules for real time network security monitoring. J. Ambient. Intell. Humaniz. Comput. 2019 , 10 , 1509–1526. [ Google Scholar ] [ CrossRef ]
  • Majeed, A.; Rauf, I. MVC Architecture: A Detailed Insight to the Modern Web Applications Development. Peer Rev. J. Solar Photoenergy Syst. 2018 , 1 , 1–7. [ Google Scholar ]
  • Schenker, A.; Last, M.; Bunke, H.; Kandel, A. Chapter? Clustering of Web Documents Using a Graph Model. In Web Document Analysis: Challenges and Opportunities ; World Scientific Publishing Company: Singapore, 2003; pp. 3–18. [ Google Scholar ]
  • Jain, B.J.; Obermayer, K. Graph quantization. Comput. Vis. Image Underst. 2011 , 115 , 946–961. [ Google Scholar ] [ CrossRef ]
  • Kalogeratos, A.; Likas, A. Data & Knowledge Engineering Document clustering using synthetic cluster prototypes. Data Knowl. Eng. 2011 , 70 , 284–306. [ Google Scholar ]
  • Jarvenpaa, S.L.; Todd, P.A. Consumer reactions to electronic shopping on the World Wide Web. Int. J. Electron. Commer. 1996 , 1 , 59–88. [ Google Scholar ] [ CrossRef ]
  • Zhao, R.; Grosky, W.I. Narrowing the Semantic Gap—Improved Text-Based Web Document Retrieval Using Visual Features. IEEE Trans. Multimed. 2002 , 4 , 189–200. [ Google Scholar ] [ CrossRef ]
  • Zeithaml, V.A.; Parasuraman, A.; Malhotra, A. Service quality delivery through web sites: a critical review of extant knowledge. J. Acad. Mark. Sci. 2002 , 30 , 362–375. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Schenker, A.; Last, M.; Bunke, H.; Kandel, A. Graph Representations for Web Document Clustering. In Iberian Conference on Pattern Recognition and Image Analysis ; Springer: Berlin/Heidelberg, Germany, 2003; pp. 935–942. [ Google Scholar ]
  • Madan, R.; Cui, S.; Lall, S.; Goldsmith, A. Modeling and Optimization of Transmission Schemes in Energy Constrained Wireless Sensor Networks. IEEE/ACM Trans. Netw. 2007 , 15 , 1359–1372. [ Google Scholar ] [ CrossRef ]
  • Du, C.; Shao, S.; Qi, F.; Meng, L. Multi-requests satisfied based on energy optimization for the service composition in wireless sensor network. Int. J. Distrib. Sens. Netw. 2019 , 15 , 1550147719879049. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Kumar, J.S.; Zaveri, M.A. Graph based clustering for two-tier architecture in Internet of things. In Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Chengdu, China, 15–18 December 2016; pp. 229–233. [ Google Scholar ]
  • Shivraj, V.L.; Rajan, M.A.; Balamuralidhar, P. A Graph theory based Generic Risk Assessment framework for Internet of Things (IoT). In Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bhubaneswar, India, 17–20 December 2017; pp. 1–6. [ Google Scholar ]
  • Yao, B.; Liu, X.; Zhang, W.; Chen, X. Applying Graph Theory To The Internet of Things. In Proceedings of the 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, Zhangjiajie, China, 13–15 November 2013; pp. 2354–2361. [ Google Scholar ]
  • Ning, Z.; Wang, X.; Member, S. A Social-Aware Group Formation Framework for Information Diffusion in Narrowband Internet of Things. IEEE Internet Things J. 2018 , 5 , 1527–1538. [ Google Scholar ] [ CrossRef ]
  • Rathore, M.M.; Ahmad, A.; Paul, A. Efficient Graph-Oriented Smart Transportation using Internet of Things generated Big Data. In Proceedings of the 2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Bangkok, Thailand, 23–27 November 2015; pp. 512–519. [ Google Scholar ]
  • Wang, H.; Chen, Z.; Zhao, J.; Di, X.; Liu, D.A.N. A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow. IEEE Access 2018 , 6 , 8599–8609. [ Google Scholar ] [ CrossRef ]
  • Chen, P.; Member, S.; Cheng, S.; Chen, K. Information Fusion to Defend Intentional Attack in Internet of Things. IEEE Internet Things J. 2014 , 1 , 337–348. [ Google Scholar ] [ CrossRef ]
  • Abdellatif, K.; Abdelmouttalib, C. Graph-Based Computing Resource Allocation for Mobile Blockchain. In Proceedings of the 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), Marrakesh, Morocco, 16–19 October 2018; pp. 1–4. [ Google Scholar ]
  • Akcora, C.G.; Gel, Y.R.; Kantarcioglu, M. 1 Blockchain: A Graph Primer. arXiv 2017 , arXiv:1708.08749. [ Google Scholar ]
  • Salah, K.; Member, S.; Rehman, M.H.U.R. Blockchain for AI: Review and Open Research Challenges. IEEE Access 2019 , 7 , 10127–10149. [ Google Scholar ] [ CrossRef ]
  • Wang, S.; Wang, J.; Wang, X.; Qiu, T.; Yuan, Y.; Ouyang, L.; Guo, Y.; Wang, F.Y. Blockchain-Powered Parallel Healthcare Systems Based on the ACP Approach. IEEE Trans. Comput. Soc. Syst. 2018 , 5 , 942–950. [ Google Scholar ] [ CrossRef ]
  • Di, D.; Maesa, F.; Marino, A.; Ricci, L. Uncovering the Bitcoin blockchain: An analysis of the full users graph. In Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), Montreal, QC, Canada, 17–19 October 2016; pp. 537–546. [ Google Scholar ]
  • He, Y.; Gao, C.; Sang, N.; Qu, Z.; Han, J. Neurocomputing Graph coloring based surveillance video synopsis. Neurocomputing 2017 , 225 , 64–79. [ Google Scholar ] [ CrossRef ]
  • Feng, P.; Xu, C.; Zhao, Z.; Liu, F.; Yuan, C.; Wang, T. Neurocomputing Sparse representation combined with context information for visual tracking. Neurocomputing 2017 , 225 , 92–102. [ Google Scholar ] [ CrossRef ]
  • Malyshev, D.S. The weighted coloring problem for two graph classes characterized by small forbidden induced structures. Discret. Appl. Math. 2018 , 247 , 423–432. [ Google Scholar ] [ CrossRef ]
  • Dabrowski, K.K.; Lozin, V.; Raman, R.; Ries, B. Colouring vertices of triangle-free graphs without forests. Discret. Math. 2012 , 312 , 1372–1385. [ Google Scholar ] [ CrossRef ]
  • Dickinson, S. Introduction to the Special Section on Graph Algorithms in Computer Vision. IEEE Trans. Pattern Anal. Mach. Intell. 2001 , 10 , 1049–1052. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Durst, C.; Durst, C. Online Social Networks, Social Capital and Health- related Behaviors: A State-of-the-art Analysis. Commun. Assoc. Inf. Syst. 2013 , 32 , 5. [ Google Scholar ] [ CrossRef ]
  • Jin, R.; Zhang, H.; Zhang, Y. The social negative mood index for social networks. In Proceedings of the 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), Guangzhou, Chin, 18–21 June 2018; pp. 1–5. [ Google Scholar ]
  • Kolli, N.; Balakrishnan, N. Analysis of e-mail Communication Using a Social Network Framework for Crisis Detection in an Organization Science Direct. Procedia—Soc. Behav. Sci. 2013 , 100 , 57–67. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • He, C.; Li, H.; Fei, X.; Tang, Y.; Zhu, J. A Topic Community-based Method for Friend Recommendation in Online Social Networks via Joint Nonnegative Matrix Factorization. In Proceedings of the 2015 Third International Conference on Advanced Cloud and Big Data, Yangzhou, China, 30 October–1 November 2015; pp. 28–35. [ Google Scholar ]
  • Wieringa, J.; Kannan, P.K.; Ma, X.; Reutterer, T.; Risselada, H.; Skiera, B. Data analytics in a privacy-concerned world. J. Bus. Res. 2019 . [ Google Scholar ] [ CrossRef ]
  • Liu, F.; Joo, H. Expert Systems with Applications Use of social network information to enhance collaborative filtering performance. Expert Syst. Appl. 2010 , 37 , 4772–4778. [ Google Scholar ] [ CrossRef ]
  • Liu, D.; Wang, L.; Zheng, J.; Ning, K.; Zhang, L. Social Network. In Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, 28 June–3 July 2013; pp. 368–375. [ Google Scholar ]
  • Beach, A.; Gartrell, M.; Han, R. Social-K: Real-Time K-Anonymity Guarantees for Social Network Applications. In Proceedings of the 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Mannheim, Germany, 29 March–2 April 2010; pp. 600–606. [ Google Scholar ]
  • Zin, T.T.; Tin, P.; Hama, H.; Toriu, T. Knowledge based Social Network Applications to Disaster Event Analysis. In Proceedings of the International Multi Conference of Engineers and Computer Scientists, Hong Kong, China, 13–15 March 2013. [ Google Scholar ]
  • Li, Y.; Hsiao, H.; Lee, Y. Infor mation Sciences Recommending social network applications via social filtering mechanisms. Inf. Sci. 2013 , 239 , 18–30. [ Google Scholar ] [ CrossRef ]
  • Zhang, N. Preserving Relation Privacy in Online Social Network Data. IEEE Internet Comput. 2011 , 15 , 35–42. [ Google Scholar ]
  • Izuan, M.; Ninggal, H. Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing. In Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 16–18 November 2011; pp. 847–852. [ Google Scholar ]
  • Chow, W.S.; Chan, L.S. Information & Management Social network, social trust and shared goals in organizational knowledge sharing. Inf. Manag. 2008 , 45 , 458–465. [ Google Scholar ]
  • Li, P.; Yu, J.; Liu, J.; Zhou, D.; Cao, B. Generating weighted social networks using multigraph. Phys. A Stat. Mech. Its Appl. 2020 , 539 , 122894. [ Google Scholar ] [ CrossRef ]
  • Zhou, B. A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data. ACM Sigkdd Explor. Newsl. 2008 , 10 , 12–22. [ Google Scholar ] [ CrossRef ]
  • Li, M.; Wang, X.; Gao, K.; Zhang, S. A Survey on Information Diffusion in Online Social Networks: Models and Methods. Information 2017 , 8 , 118. [ Google Scholar ]
  • Tabrizi, S.A.; Shakery, A.; Asadpour, M.; Abbasi, M.; Tavallaie, M.A. Personalized PageRank Clustering: A graph clustering algorithm based on random walks. Phys. A Stat. Mech. Appl. 2013 , 392 , 5772–5785. [ Google Scholar ] [ CrossRef ]
  • Rehman, A.U.; Jiang, A.; Rehman, A.; Paul, A.; Sadiq, M.T. Identification and role of opinion leaders in information diffusion for online discussion network. J. Ambient. Intell. Humaniz. Comput. 2020 , 1–13. [ Google Scholar ] [ CrossRef ]
  • Guille, A.; Hacid, H.; Zighed, D.A. Information Diffusion in Online Social Networks: A Survey. ACM Sigmod Rec. 2013 , 42 , 17–28. [ Google Scholar ] [ CrossRef ]
  • Bian, T.; Deng, Y. Identifying influential nodes in complex networks: A node information dimension approach. Chaos: Interdiscip. J. Nonlinear Sci. 2018 , 28 , 043109. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Li, C.; Wang, L.; Sun, S.; Xia, C. Identification of influential spreaders based on classified neighbors in real-world complex networks. Appl. Math. Comput. 2018 , 320 , 512–523. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Zeng, A.; Zhang, C. Ranking spreaders by decomposing complex networks. Phys. Lett. A 2013 , 377 , 1031–1035. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Mao, C. Research Article A Comprehensive Algorithm for Evaluating Node Influences in Social Networks Based on Preference Analysis and Random Walk. Complexity 2018 , 2018 , 1528341. [ Google Scholar ] [ CrossRef ]
  • Zheng, Y.; Xu, J. A trust transitivity model for group decision making in social network with intuitionistic fuzzy information. Filomat 2018 , 32 , 1937–1945. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Davies, R.; Ghosh-dastidar, U.; Knisley, J.; Samyono, W. Function: Identifying Biologically Relevant Clusters with Graph Spectral Methods ; Elsevier Inc.: Geneva, Switzerland, 2019. [ Google Scholar ]
  • Cacheda, F.; Fernandez, D.; Novoa, F.J.; Carneiro, V. Early Detection of Depression: Social Network Analysis and Random Forest Techniques. J. Med. Internet Res. 2019 , 21 , e12554. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Lee, S.; Cha, Y.; Han, S.; Hyun, C. Application of Association Rule Mining and Social Network Analysis for Understanding Causality of Construction Defects. Sustainability 2019 , 11 , 618. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Atzmueller, M. Modeling and Mining Feature-Rich Networks. In Companion Proceedings of the 2019 World Wide Web Conference, San Francisco, CA, USA, May 2019; pp. 16–17. [ Google Scholar ]
  • Anufrieva, E.; Borodina, E. Analysis of the social well-being of urban citizens: Gender aspect in the conditions of digital transformation. In Proceedings of the 1st International Scientific Practical Conference the Individual and Society in the Modern Geopolitical Environmentvol ; Atlantis Press: Prague, Czech Republic, 2019; pp. 34–39. [ Google Scholar ]
  • Mahmoudi, A.; Ridzwan, M.; Azuraliza, Y.; Bakar, A. A new method to discretize time to identify the milestones of online social networks. Soc. Netw. Anal. Min. 2018 , 8 , 34. [ Google Scholar ] [ CrossRef ]
  • Dekker, A. Centrality in social networks: Theoretical and simulation approaches. In Proceedings of the SimTect, Melbourne, Australia, 12–15 May 2008; pp. 33–38. [ Google Scholar ]
  • Shelke, S.; Attar, V. Source detection of rumor in social network—A review. Online Soc. Netw. Media 2019 , 9 , 30–42. [ Google Scholar ] [ CrossRef ]
  • Shiokawa, H.; Fujiwara, Y.; Onizuka, M. Fast Algorithm for Modularity-Based Graph Clustering. In Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, Bellevue, WA, USA, 14–18 July 2013; pp. 1170–1176. [ Google Scholar ]
  • Radley, S.; Sybi, C.J.; Premkumar, K. Multi Information Amount Movement Aware—Routing in FANET: Flying Ad-hoc Networks. In Mobile Networks and Applications ; Springer: New York, USA, 2019. [ Google Scholar ]
  • Newman, M.E.J. Modularity and community structure in networks. Proc. Natl. Acad. Sci. USA 2006 , 103 , 8577–8582. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Chen, Z.; Liu, B. Mining Topics in Documents: Standing on the Shoulders of Big Data. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge discovery and Data Mining, New York, NY, USA, 24–27 August 2014; pp. 1116–1125. [ Google Scholar ]
  • Poria, S.; Cambria, E.; Gelbukh, A. Knowle dge-Base d Systems Aspect extraction for opinion mining with a deep convolutional neural network. Knowl.-Based Syst. 2016 , 108 , 42–49. [ Google Scholar ] [ CrossRef ]
  • Chen, A.Z.; Mukherjee, M.; Hsu, M. Castellanos, Exploiting Domain Knowledge in Aspect Extraction. In Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, Seattle, WA, USA, 18–21 October 2013; pp. 1655–1667. [ Google Scholar ]
  • Xing, L.; Deng, K.; Wu, H.; Xie, P.; Gao, J. Behavioral Habits-Based User Identification across Social Networks. Symmetry 2019 , 11 , 1134. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Xing, L.; Deng, K.; Wu, H.; Xie, P.; Zhao, H.V.; Gao, F. A Survey of Across Social Networks User Identification. IEEE Access 2019 , 7 , 137472–137488. [ Google Scholar ] [ CrossRef ]
  • Liao, L.; He, X.; Zhang, H.; Chua, T.S. Attributed social network embedding. IEEE Trans. Knowl. Data Eng. 2018 , 30 , 2257–2270. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Ok, M.; Lee, J.S.; Kim, Y.B. Recommendation framework combining user interests with fashion trends in apparel online shopping. Appl. Sci. 2019 , 9 , 2634. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Type, I.; Dissertation, E. Graph-Based Analysis for E-In the Graduate College ; Academic Press: New York, NY, USA, 2019. [ Google Scholar ]
  • Feng, Z.; Lien, J.W.; Zheng, J. Keeping up with the Neighbors: Social Interaction in a Production Economy. Mathematics 2018 , 6 , 162. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Shi, C. A Survey of Heterogeneous Information Network Analysis. IEEE Trans. Knowl. Data Eng. 2016 , 29 , 17–37. [ Google Scholar ] [ CrossRef ]
  • Yang, D.; Qu, B.; Cudre-mauroux, P. Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation. IEEE Trans. Knowl. Data Eng. 2019 , 31 , 507–520. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Abawajy, J.H.; Member, S.; Izuan, M.; Ninggal, H.; Herawan, T. Privacy Preserving Social Network Data Publication. IEEE Commun. Surv. Tutor. 2016 , 18 , 1974–1997. [ Google Scholar ] [ CrossRef ]
  • Xu, L.E.I.; Jiang, C.; Wang, J. Information Security in Big Data: Privacy and Data Mining. IEEE Access 2014 , 2 , 1149–1176. [ Google Scholar ]
  • Zhou, P.; Wang, K.; Guo, L. A Privacy-Preserving Distributed Contextual Federated Online Learning Framework with Big Data Support in Social Recommender Systems. IEEE Trans. Knowl. Data Eng. 2019 . [ Google Scholar ] [ CrossRef ]
  • Majeed, A. Attribute-centric anonymization scheme for improving user privacy and utility of publishing e-health data. J. King Saud Univ.-Comput. Inf. Sci. 2019 , 31 , 426–435. [ Google Scholar ] [ CrossRef ]
  • Wang, S.; Tsai, Z.; Hong, T.; Ting, I.; Engineering, I. A Nonymizing Shortest Paths on Social Network Graphs 1 Introduction. In Proceedings of the Asian Conference on Intelligent Information and Database Systems, Daegu, Korea, 20–22 April 2011. [ Google Scholar ]
  • Kiabod, M.; Dehkordi, M.N.; Barekatain, B. TSRAM: A time-saving k-degree anonymization method in social network. Expert Syst. Appl. 2019 , 125 , 378–396. [ Google Scholar ] [ CrossRef ]
  • Herrera-joancomartí, J.C.J. A survey of graph-modification techniques for privacy-preserving on networks. Artif. Intell. Rev. 2017 , 47 , 341–366. [ Google Scholar ]
  • Bhattacharya, M. Preserving Privacy in Social Network Graph with K-anonymize Degree Sequence Generation. In Proceedings of the 2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), Kathmandu, Nepal, 15–17 December 2015. [ Google Scholar ]
  • Liu, P.; Li, X. An Improved Privacy Preserving Algorithm for Publishing Social Network Data. In Proceedings of the 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, Zhangjiajie, China, 13–15 November 2013; pp. 888–895. [ Google Scholar ]
  • Madan, S. A Privacy Preserving Scheme for Big data Publishing in the Cloud using k-Anonymization and Hybridized Optimization Algorithm. In Proceedings of the 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET), Kottayam, India, 21–22 December 2018; pp. 1–7. [ Google Scholar ]
  • Chakraborty, S.; Ambooken, J.G.; Tripathy, B.K.; Purushotham, S. Analysis and performance enhancement to achieve recursive (c, l) diversity anonymization in social networks. Trans. Data Priv. 2015 , 8 , 173–215. [ Google Scholar ]
  • Casas-Roma, J. An evaluation of vertex and edge modification techniques for privacy-preserving on graphs. J. Ambient. Intell. Humaniz. Comput. 2019 , 11 , 1–17. [ Google Scholar ] [ CrossRef ]
  • Moriano, P.; Finke, J.; Ahn, Y.Y. Community-Based Event Detection in Temporal Networks. Sci. Rep. 2019 , 9 , 1–9. [ Google Scholar ] [ CrossRef ]
  • Zheleva, E.; Getoor, L. Social Network Data Analytics. Soc. Netw. Data Anal. 2011 , 196–210. Available online: https://link.springer.com/chapter/10.1007/978-1-4419-8462-3_10 (accessed on 20 February 2020).
  • Kayes, I.; Iamnitchi, A. Privacy and security in online social networks: A survey. Online Soc. Netw. Media 2017 , 3 , 1–21. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Huber, M.; Mulazzani, M.; Weippl, E.; Kitzler, G.; Goluch, S. Friend-in-the-middle attacks: Exploiting social networking sites for spam. IEEE Internet Comput. 2011 , 15 , 28–34. [ Google Scholar ] [ CrossRef ]
  • Yeung, A.C.M.A.; Iwata, T. Research on social network mining and its future development. NTT Technol. Rev. 2011 , 9 , 1–4. [ Google Scholar ]
  • Can, U.; Alatas, B. A new direction in social network analysis: Online social network analysis problems and applications. Phys. A Stat. Mech. Appl. 2019 , 535 , 122372. [ Google Scholar ] [ CrossRef ]
  • Sahu, S.; Mhedhbi, A.; Salihoglu, S.; Lin, J.; Özsu, M.T. The ubiquity of large graphs and surprising challenges of graph processing: Extended survey. VLDB J. 2019 , 29 , 1–24. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Bliss, N.T.; Schmidt, M.C. Confronting the Challenges of Graphs and Networks. Linc. Lab. J. 2013 , 20 , 4–9. [ Google Scholar ]
  • Ren, X.; Wang, Y.; Yu, X.; Yan, J.; Chen, Z.; Han, J. Heterogeneous graph-based intent learning with queries, web pages and Wikipedia concepts. In Proceedings of the 7th ACM International Conference on Web Search and Data Mining, New York, NY, USA, 24–28 February 2014; pp. 23–32. [ Google Scholar ]

Click here to enlarge figure

ADVANCEGENERATEPRIORITYSEIZE
ALTERJOINQUEUESPLIT
ASSIGNLEAVERELEASETABULATE
BUFFERLINKREMOVETERMINATE
DEPARTMARKRETURNTEST
ENTERMSA VEVALUESAVE VALUETANSFER
EXAMINEPREEMPTSCANUNLINK
Professor\SubjectsN N N N N
M 10110
M 01010
M 01110
M 10011
Professor\Subjects123
N N N
Customer/MovieMovie 1Movie 2Movie 3Movie 4
Customer 10101
Customer 20111
Customer 31010

Share and Cite

Majeed, A.; Rauf, I. Graph Theory: A Comprehensive Survey about Graph Theory Applications in Computer Science and Social Networks. Inventions 2020 , 5 , 10. https://doi.org/10.3390/inventions5010010

Majeed A, Rauf I. Graph Theory: A Comprehensive Survey about Graph Theory Applications in Computer Science and Social Networks. Inventions . 2020; 5(1):10. https://doi.org/10.3390/inventions5010010

Majeed, Abdul, and Ibtisam Rauf. 2020. "Graph Theory: A Comprehensive Survey about Graph Theory Applications in Computer Science and Social Networks" Inventions 5, no. 1: 10. https://doi.org/10.3390/inventions5010010

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

UWE Logo

Research Repository

All Output Person Project

Research Topics in Graph Theory and Its Applications

Zverovich, vadim.

Profile Image

Dr Vadim Zverovich [email protected] Associate Professor

This book includes a number of research topics in graph theory and its applications. We discuss various research ideas devoted to alpha-discrepancy, strongly perfect graphs, the reconstruction conjectures, graph invariants, hereditary classes of graphs, embedding graphs on topological surfaces, as well as applications of graph theory, such as transport networks and hazard assessments based on unified networks. The book has a free-form structure that allows the reader freedom, that is, the chapters are independent and can be read in any order. This book is ideal for developers of grant proposals, as well as for researchers interested in exploring new areas of graph theory and its applications. Advanced students in graph theory may use the topics presented in this book to develop their final-year projects, master's theses or doctoral dissertations. It is the author's hope that this publication of original research ideas, problems and conjectures will instigate further research, or even a resurgence of interest, in the aforementioned important areas of graph theory.

Book Type Authored Book
Publication Date Aug 1, 2019
Peer Reviewed Not Peer Reviewed
ISBN 9781527535336
Public URL
Publisher URL

You might also like

On general frameworks and threshold functions for multiple domination (2015) Journal Article

Braess’ paradox in asymmetrical traffic networks (2014) Presentation / Conference Contribution

Bounds and algorithms for limited packings in graphs (2014) Presentation / Conference Contribution

Threat assessment algorithm for prioritisation of moving objects in a secure compound (-0001) Report

The probabilistic approach to limited packings in graphs (2015) Journal Article

Downloadable Citations

About UWE Bristol Research Repository

Administrator e-mail: [email protected]

This application uses the following open-source libraries:

SheetJS Community Edition

Apache License Version 2.0 ( http://www.apache.org/licenses/ )

Font Awesome

SIL OFL 1.1 ( http://scripts.sil.org/OFL )

MIT License ( http://opensource.org/licenses/mit-license.html )

CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/ )

Powered by Worktribe © 2024

Advanced Search

all of any of

  • Bibliography
  • More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
  • Automated transliteration
  • Relevant bibliographies by topics
  • Referencing guides

Shodhganga : a reservoir of Indian theses @ INFLIBNET

  • Shodhganga@INFLIBNET
  • Madurai Kamaraj University
  • Department of Mathematics
Title: Studies in graph theory
Researcher: C.SEKAR
Guide(s): 
Keywords: graph
Studies
theory
University: Madurai Kamaraj University
Completed Date: 2002
Abstract: newline
Pagination: p.182
URI: 
Appears in Departments:
File Description SizeFormat 
Attached File88.27 kBAdobe PDF
226.54 kBAdobe PDF
201.08 kBAdobe PDF
2.61 MBAdobe PDF
1.87 MBAdobe PDF
2.17 MBAdobe PDF
3.15 MBAdobe PDF
228.04 kBAdobe PDF
2.05 MBAdobe PDF

Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Shodhganga

Topics in Graph Theory

  • First Online: 09 November 2019

Cite this chapter

thesis title for graph theory

  • Calvin Jongsma 13  

Part of the book series: Undergraduate Texts in Mathematics ((UTM))

4170 Accesses

Graph Theory is an area of modern mathematics with many applications in today’s world, but its roots lie in several recreational puzzles going back to the mid-eighteenth century. This chapter will introduce a few main topics in Graph Theory , drawing upon this history. The first two sections look at ways one can traverse a graph (Eulerian trails and Hamiltonian paths), while the last two sections deal with planar graphs (ones that can be drawn so their edges don’t cross) and graph coloring (graphs whose adjacent vertices have different colors). While connected to a couple of earlier topics, this concluding chapter has a more geometric character, balancing out the algebraic emphasis of the rest of the text.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
  • Durable hardcover edition

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

See The Truth about Königsberg by Brian Hopkins and Robin J. Wilson in the May 2004 issue, of The College Mathematics Journal for a nice discussion of Euler’s argument. Euler’s paper (and lots more) is in Graph Theory : 1736–1936 (Oxford University Press, 1976) by Norman L. Biggs, E. Keith Lloyd, and Robin J. Wilson.

See Joseph Malkevitch’s two 2005 AMS Feature Columns on Euler’s Polyhedral Formula at http://www.ams.org/samplings/feature-column/fcarc-eulers-formula

Robin Wilson’s Four Colors Suffice (Princeton University Press, 2013) gives a fascinating and very readable account of the entire history of the four-color problem.

This is Alexander Soifer’s minimal counterexample.  See The Mathematical Coloring Book (Springer, 2009), p. 182. The Fritsch Graph  provides another counterexample on nine vertices.

For more information on Gardner’s map and its four-coloring, see the Wolfram MathWorld posting on the Four-Color Theorem at http://mathworld.wolfram.com/Four-ColorTheorem.html.

Author information

Authors and affiliations.

Dordt University, Sioux Center, IA, USA

Calvin Jongsma

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Calvin Jongsma .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Jongsma, C. (2019). Topics in Graph Theory. In: Introduction to Discrete Mathematics via Logic and Proof. Undergraduate Texts in Mathematics. Springer, Cham. https://doi.org/10.1007/978-3-030-25358-5_8

Download citation

DOI : https://doi.org/10.1007/978-3-030-25358-5_8

Published : 09 November 2019

Publisher Name : Springer, Cham

Print ISBN : 978-3-030-25357-8

Online ISBN : 978-3-030-25358-5

eBook Packages : Mathematics and Statistics Mathematics and Statistics (R0)

Share this chapter

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research
  • Corpus ID: 60943646

Graph Theory with Applications

  • E. S. Buffa
  • Published 1977
  • Mathematics
  • Journal of the Operational Research Society

5,392 Citations

Lecture iv pure graph algorithms, enumeration of spanning trees of graphs with rotational symmetry, circuits in graphs and the hamiltonian index.

  • Highly Influenced

A Glance at Graph Theory—Part I

Decomposition and domination of some graphs, on set-indexers of graphs, three years of graphs and music : some results in graph theory and its applications, hamiltonian cycles in sparse graphs.

  • 16 Excerpts

A survey on the Chvátal-Erdös theorem

Applications of graph theory, one reference, related papers.

Showing 1 through 3 of 0 Related Papers

IMAGES

  1. A Graph Theory Based Systematic Literature Network

    thesis title for graph theory

  2. graph theory master thesis

    thesis title for graph theory

  3. How to Formulate a Thesis Title

    thesis title for graph theory

  4. Graph Theory

    thesis title for graph theory

  5. Thesis Title Page Sample

    thesis title for graph theory

  6. Applied Graph Theory: An Introduction with Graph Optimization and

    thesis title for graph theory

VIDEO

  1. Graph Theory Part 23 Line Graph and its examples

  2. Fixed Point Theory. Ph.D. Thesis Defense

  3. PhD Thesis Defense. Mariia Vlasenok

  4. LEC38| DATA STRUCTURES| Graph Introduction by Mrs. N. Thulasi Chitra Associate Professor

  5. Graph Theory Part 33 Dual Graphs/ Geometric Dual Graphs and examples

  6. What Is a master's Thesis (5 Characteristics of an A Plus Thesis)

COMMENTS

  1. PDF Research Topics in Graph Theory and Its Applications

    f this graph is not F-free, then do this step again.Step 2 Generate a random number. between 1 and 10, and repeat the next step r times.Step 3 Add a vertex v to G and rand. mly generate edges be-tween v and the vertices of G. If the resulting graph is not F-free, then remove the edges incident to v and generate th.

  2. PDF Contributions to Graph Theory

    This thesis is the result of research between January 2002 and February 2005 in three topics of graph theory, namely: spanning 2-connected subgraphs of some classes of grid graphs, Ramsey numbers for paths versus other graphs, and λ-backbone colorings. The papers that together underlay this thesis are listed below. Publications in refereed ...

  3. PDF Some Applications of Graph Theory

    L(2,1)-labelling on a planar graph was proposed during a stay at INRIA in Nice. The work on the clustering coefficient was mainly carried out at Brunel University. Two chapters of this thesis are dedicated to the investigation of properties of scale-free graphs. These are graphs which have a degree distribution obey-

  4. Graph Theory and Its Uses in Graph Algorithms and Beyond

    In this thesis, we exploit this symbiotic relationship between graph theory and algorithms for graph optimization problems and beyond. This thesis consists of three parts. In the first part, we study a classical graph routing problem called the Node-Disjoint Paths (NDP) problem. Given an undirected graph and a set of source-destination pairs of

  5. PDF A Study of Graph Theory With Matrix Representation

    De nition 1.1.1 Let G=(V,E) be undirected graph with vertex set V=fv 1;v 2;:::;v ng, the degree of a vertex v V, is the number of edges for which v is an end vertex, denoted deg(v)or d(v). The maximum degree of a graph G, denoted by ( G) and the minimum degree of a graph G denoted by (G) are de ned as follows the maximum degree of G is the largest

  6. Title: Graph Theory and its Uses in Graph Algorithms and Beyond

    In this thesis, we exploit this symbiotic relationship between graph theory and algorithms for graph optimization problems and beyond. This thesis consists of three parts. In the first part, we study a graph routing problem called the Node-Disjoint Paths (NDP) problem. Given a graph and a set of source-destination pairs of its vertices, the ...

  7. PDF Graph-based Machine Learning: Applications, Challenges and Case Study

    1.2 Graph Theory Basics 1.2.1 From Bridges to Abstractions The origins of graph theory are often attributed to the 18th-century mathematician, Leon-hard Euler. Euler's investigation of the Königsberg Bridge Problem in 1736 marked the seminal moment in the discipline [11]. The problem revolved around the city of Königs-

  8. Graph-Theoretic Problems and Their New Applications

    Graph theory is an important area of Applied Mathematics with a broad spectrum of applications in many fields. In the Call for Papers for this issue, I asked for submissions presenting new and inoovative approaches for traditional graph-theoretic problems as well as for new applications of graph theory in emerging fields, such as network security, computer science and data analysis ...

  9. PDF Graph Theory and Its Applications

    graph is a graph that does not contain any arrows on its edges, indicating which way to go. A directed graph, on the other hand, is a graph in which its edges contain arrows indicating which way to go. 2.2 Properties of graph In this section we will cover key properties of a graph. There are two main properties of a graph: degrees and walks.

  10. 'Distance measures for graph theory'

    Distance measures for graph theory : Comparisons and analyzes of different methods Dissertation presented by ... and his precious help throughout the realization of this thesis. Second, I would also like to thank Bertrand Lebichot and Guillaume Guex for agreeing to ... a graph is a mathematical structure that contains a certain number of

  11. PDF Two Problems in Graph Theory

    In the thesis we study two topics in graph theory. The first one is concerned with the famous conjecture of Hadwiger that every graph G without a minor of a complete graph on t +1 vertices can be coloured with t colours. We investigate how large an induced subgraph of G can be, so that the subgraph can be coloured with t colours.

  12. Shodhganga@INFLIBNET: A detailed investigation of Graph Theory and its

    Shodhganga : a reservoir of Indian theses @ INFLIBNET. Shodhganga. The Shodhganga@INFLIBNET Centre provides a platform for research students to deposit their Ph.D. theses and make it available to the entire scholarly community in open access. Shodhganga@INFLIBNET. Gondwana University.

  13. Graph Theory: A Comprehensive Survey about Graph Theory ...

    Graph Theory: A Comprehensive Survey about ... - MDPI

  14. RECENT ADVANCES IN GRAPH THEORY AND ITS APPLICATIONS

    mathematics, graph theory is one of the important fields used in structural. models. This structural structure of different objects or technologies leads to. new developments and changes in the ...

  15. Research Topics in Graph Theory and Its Applications

    Abstract. This book includes a number of research topics in graph theory and its applications. We discuss various research ideas devoted to alpha-discrepancy, strongly perfect graphs, the reconstruction conjectures, graph invariants, hereditary classes of graphs, embedding graphs on topological surfaces, as well as applications of graph theory, such as transport networks and hazard assessments ...

  16. Dissertations / Theses on the topic 'Graph theory'

    Consult the top 50 dissertations / theses for your research on the topic 'Graph theory.'. Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

  17. PDF Graph Theory: An Excellent Research Topic for Mathematics Students

    Graph theory is applicable to a wide range of practical problems and interacts nicely with computer science. I interviewed a Professor Emeritus of Mathematics, to understand more about the mentoring of graph theory research, including his role in mentoring ve Intel Science Research semi nalists.

  18. Shodhganga@INFLIBNET: Studies in graph theory

    The Shodhganga@INFLIBNET Centre provides a platform for research students to deposit their Ph.D. theses and make it available to the entire scholarly community in open access. Shodhganga@INFLIBNET. Madurai Kamaraj University. Department of Mathematics.

  19. Topics in Graph Theory

    Graph Theory is an area of modern mathematics with many applications in today's world, but its roots lie in several recreational puzzles going back to the mid-eighteenth century. This chapter will introduce a few main topics in Graph Theory, drawing upon this history.The first two sections look at ways one can traverse a graph (Eulerian trails and Hamiltonian paths), while the last two ...

  20. [PDF] Graph Theory with Applications

    The burgeoning of Graph Theory was first aware when I studied the 1940 paper of Brooks, Smith, Stone and Tutte in the Duke Mathematical Journal, ostensibly on squared rectangles, all in the Quest of the Perfect Square. When I first entered the world of Mathematics, I became aware of a strange and little-regarded sect of "Graph Theorists", inhabiting a shadowy borderland known to the rest of ...

  21. Application of graph theory in the library domain—Building a faceted

    Kraft et al. (1991) give a superficial overview of graph theory in libraries. Powell et al. (2011) and Powell and Hopkins (2015) specify use cases in which concepts from graph theory are or could be applied to library data, focussing on citation, co-author, subject-author, and usage data. However, they give only a brief overview and do not go ...

  22. (PDF) Some Topics in Graph Theory

    Abstract. In this short introductory course to graph theory, possibly one of the most propulsive areas of contemporary mathematics, some of the basic graph-theoretic concepts together with some ...