We study a point pattern detection problem on networks, motivated by applications in geographical analysis, such as crime hotspot detection. Given a network N (a connected graph with non-negative edge lengths) together with a set of sites, which lie on the edges or vertices of N, we look for a connected subnetwork F of N of small total length that contains many sites. The edges of F can form parts of the edges of N. We consider different variants of this problem where N is either a general graph or restricted to a tree, and the subnetwork F that we are looking for is either a simple path or a tree. We give polynomial-time algorithms, NP-hardness and NP-completeness proofs, approximation algorithms, and also fixed-parameter tractable algorit...
In this paper we introduce a new method to locate highly connected clusters in a network. Our propos...
This dissertation studies three newly introduced network optimization problems in separate chapters....
Abstract. Motivated by a security problem in geographic information systems, we study the following ...
We study a point pattern detection problem on networks, motivated by applications in geographical an...
We study a point pattern detection problem on networks, motivated by geographical analysis tasks, su...
Subnetwork mining is an essential issue in the analysis of biological, social and communication netw...
Suppose we are given a large graph in which, by some external process, a handful of nodes are marked...
One feature discovered in the study of complex networks is community structure, in which vertices ar...
In this thesis, we first explore two different approaches to efficient community detection that addr...
There has been considerable recent interest in algorithms for finding communities in networks—groups...
Abstract. A popular way of formalizing clusters in networks are highly connected subgraphs, that is,...
Community detection in graphs aims at identifying modules within a network and, possibly, their hier...
Finding meaningful communities - subnetworks of interest within a large scale network - is a problem...
Abstract. A popular way of formalizing clusters in networks are highly connected subgraphs, that is,...
The study of networks has received increased attention recently not only from the social sciences an...
In this paper we introduce a new method to locate highly connected clusters in a network. Our propos...
This dissertation studies three newly introduced network optimization problems in separate chapters....
Abstract. Motivated by a security problem in geographic information systems, we study the following ...
We study a point pattern detection problem on networks, motivated by applications in geographical an...
We study a point pattern detection problem on networks, motivated by geographical analysis tasks, su...
Subnetwork mining is an essential issue in the analysis of biological, social and communication netw...
Suppose we are given a large graph in which, by some external process, a handful of nodes are marked...
One feature discovered in the study of complex networks is community structure, in which vertices ar...
In this thesis, we first explore two different approaches to efficient community detection that addr...
There has been considerable recent interest in algorithms for finding communities in networks—groups...
Abstract. A popular way of formalizing clusters in networks are highly connected subgraphs, that is,...
Community detection in graphs aims at identifying modules within a network and, possibly, their hier...
Finding meaningful communities - subnetworks of interest within a large scale network - is a problem...
Abstract. A popular way of formalizing clusters in networks are highly connected subgraphs, that is,...
The study of networks has received increased attention recently not only from the social sciences an...
In this paper we introduce a new method to locate highly connected clusters in a network. Our propos...
This dissertation studies three newly introduced network optimization problems in separate chapters....
Abstract. Motivated by a security problem in geographic information systems, we study the following ...