Stipulanti, Manon

The Pascal triangle and the corresponding Sierpiński fractal are fairly well-studied mathematical objects, which both exhibit connections with many different scientific areas. The first is made of binomial coefficients of integers that notably appear in combinatorics to tackle counting problems (for instance, they provide the number of possible way...

Stipulanti, Manon

The Pascal triangle and the corresponding Sierpiński fractal are fairly well-studied mathematical objects, which both exhibit connections with many different scientific areas. The first is made of binomial coefficients of integers that notably appear in combinatorics to tackle counting problems (for instance, they provide the number of possible way...

Ramírez, Juan Pablo

s identification problem by giving a canonical representation of natural numbers, and then real numbers, in the universe of sets. In the last section, we provide a series of graphic representations and physical models of the real number system. We conclude that the system of real numbers is completely defined by the order structure of natural numbe...

Pawliuk, Micheal Waddell, Michael Alexander

s theorem. By combining statistical tools with Ramsey theory of graphs, we give a nuanced understanding of how far away a dataset is from correlated, and what qualifies as a meaningful pattern. This method is applicable to a wide range of datasets. As examples, we analyze two very different datasets. The first is a dataset of repeated voters ( n = ...

Olifer, Dmitrij Goranin, Nikolaj Cenys, Antanas Kaceniauskas, Arnas Janulevicius, Justinas

s assets is to implement security requirements defined by different standards or best practices. However, such an approach is complicated and requires specific skills and knowledge. In case an organization applies multiple security standards, several problems can arise related to overlapping or conflicting security requirements, increased expenses ...

Villez, Kris Billeter, Julien Bonvin, Dominique

-pinene. Most importantly, the obtained results indicate that an important barrier to the application of extent-based frameworks for process modeling and monitoring tasks has been lifted.

Malliaros, Fragkiskos Giatsidis, Christos Papadopoulos, Apostolos Vazirgiannis, Michalis

The core decomposition of networks has attracted significant attention due to its numerous applications in real-life problems. Simply stated, the core decomposition of a network (graph) assigns to each graph node v, an integer number c(v) (the core number), capturing how well v is connected with respect to its neighbors. This concept is strongly re...

Malliaros, Fragkiskos Giatsidis, Christos Papadopoulos, Apostolos Vazirgiannis, Michalis

The core decomposition of networks has attracted significant attention due to its numerous applications in real-life problems. Simply stated, the core decomposition of a network (graph) assigns to each graph node v, an integer number c(v) (the core number), capturing how well v is connected with respect to its neighbors. This concept is strongly re...

Malliaros, Fragkiskos Giatsidis, Christos Papadopoulos, Apostolos Vazirgiannis, Michalis

The core decomposition of networks has attracted significant attention due to its numerous applications in real-life problems. Simply stated, the core decomposition of a network (graph) assigns to each graph node v, an integer number c(v) (the core number), capturing how well v is connected with respect to its neighbors. This concept is strongly re...

Malliaros, Fragkiskos Giatsidis, Christos Papadopoulos, Apostolos Vazirgiannis, Michalis

The core decomposition of networks has attracted significant attention due to its numerous applications in real-life problems. Simply stated, the core decomposition of a network (graph) assigns to each graph node v, an integer number c(v) (the core number), capturing how well v is connected with respect to its neighbors. This concept is strongly re...