Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
bipartite-vertex-cover
Advanced tools
Computes a minimum vertex cover of a bipartite graph. Internally, this implementation uses the Hopcroft-Karp algorithm and Konig's theorem to compute the minimal vertex cover of a bipartite graph in O(sqrt(V) * E) time. This code works in both node.js and in a modern browser via browserify.
var findCover = require("bipartite-vertex-cover")
var cover = findCover(4, 4, [
[0, 1],
[1, 0],
[1, 1],
[1, 2],
[2, 1],
[3, 2],
[3, 3]
])
// Cover = [ [3, 1], [1] ]
npm install bipartite-vertex-cover
require("bipartite-vertex-cover")(n, m, edges)
Finds a minimal vertex cover for a bipartite graph.
n
is the number of vertices in the left componentm
is the number of vertices in the right componentedges
is a list of edges from the left component connecting to the right component represented by pairs of integers between 0 and n-1,m-1 respectivelyReturns A pair of lists representing the vertices in the left component and the right component respectively which are in the cover.
(c) 2014 Mikola Lysenko. MIT License
FAQs
Minimal vertex cover for bipartite graphs
The npm package bipartite-vertex-cover receives a total of 5 weekly downloads. As such, bipartite-vertex-cover popularity was classified as not popular.
We found that bipartite-vertex-cover demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.