2011 IEEE 27th International Conference on Data Engineering 2011
DOI: 10.1109/icde.2011.5767858
|View full text |Cite
|
Sign up to set email alerts
|

Adding regular expressions to graph reachability and pattern queries

Abstract: Abstract-It is increasingly common to find graphs in which edges bear different types, indicating a variety of relationships. For such graphs we propose a class of reachability queries and a class of graph patterns, in which an edge is specified with a regular expression of a certain form, expressing the connectivity in a data graph via edges of various types. In addition, we define graph pattern matching based on a revised notion of graph simulation. On graphs in emerging applications such as social networks,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
58
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 112 publications
(60 citation statements)
references
References 32 publications
1
58
0
Order By: Relevance
“…Then an answer to Q over G under the simulation-based semantics is any simulation S between Q and G. As shown in the literature, simulation-based semantics is computationally lighter for certain problems [Henzinger et al 1995;Fan et al 2011] and is more versatile when handling large graphs that might contain incomplete information [Fan et al 2010a;Fan 2012;Fan et al 2010b]. …”
Section: Anna Levine Anna Levine Unforgivenmentioning
confidence: 99%
“…Then an answer to Q over G under the simulation-based semantics is any simulation S between Q and G. As shown in the literature, simulation-based semantics is computationally lighter for certain problems [Henzinger et al 1995;Fan et al 2011] and is more versatile when handling large graphs that might contain incomplete information [Fan et al 2010a;Fan 2012;Fan et al 2010b]. …”
Section: Anna Levine Anna Levine Unforgivenmentioning
confidence: 99%
“…If the current signature value is within the size of an integer, the new edge factor is multiplied into it; otherwise a new signature integer value is initiated (lines 6-7). Similarly, the algorithm goes through each vertex and calculates the degree factors (lines [8][9][10][11][12]. For clarity, we omit the step in 1. for each ← 0…”
Section: Number Theoretic Signature Methodsmentioning
confidence: 99%
“…Ma et al [17] find that the simulation itself in [9,8] often fails to capture the topology of query graphs, yielding false matches or too large a match relation. They rectify this problem by adding constraints dual simulation and locality [17].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations