2009
DOI: 10.1007/s10044-008-0141-y
|View full text |Cite
|
Sign up to set email alerts
|

A survey of graph edit distance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
273
0
4

Year Published

2011
2011
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 534 publications
(277 citation statements)
references
References 56 publications
0
273
0
4
Order By: Relevance
“…It is based on heuristics that are experimentally studied without rigorous proofs of approximation guarantees. Similarly, the general problem of graph edit distance [10] also encompasses approximate graph isomorphism. Both graph matchings and graph edit distance give rise to a variety of natural computational problems that are well studied.…”
Section: Introductionmentioning
confidence: 99%
“…It is based on heuristics that are experimentally studied without rigorous proofs of approximation guarantees. Similarly, the general problem of graph edit distance [10] also encompasses approximate graph isomorphism. Both graph matchings and graph edit distance give rise to a variety of natural computational problems that are well studied.…”
Section: Introductionmentioning
confidence: 99%
“…1 The majority of the works focuses on how to compare different graph snapshots, and aims to detect those snapshots where the graph structure changes significantly. The research tools developed in this area include novel metrics for graph similarity [48] and graph distance, (see the survey of Gao et al [24]), as well as extending scan-statistics methods for graphs [50], while a number of papers relies on matrix-decomposition methods [5,32].…”
Section: Snapshot-based Community Detectionmentioning
confidence: 99%
“…Hu et al [6], who consider several electronic versions of historical manuscripts. There exists extensive research on reconstructing sequences of operations based on input and output data, but either the entities and operations involved are very simple [5,14,8] or they are tailored to a specific situation [23]. Other approaches require a lot of knowledge, either a formal description of the operations and user requirements on the composite operation (e.g.…”
Section: Related Workmentioning
confidence: 99%