Proceedings of the 2019 International Conference on Management of Data 2019
DOI: 10.1145/3299869.3319890
|View full text |Cite
|
Sign up to set email alerts
|

Answering Why-questions by Exemplars in Attributed Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…In this section, we describe the survey related to constraint reachability techniques [9,11,20,23,42,43] and attributed graph clustering techniques [2,4,6,8,14,16,22,[32][33][34][39][40][41]. We also discuss our important observations derived to solve MCR queries efficiently and effectively.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we describe the survey related to constraint reachability techniques [9,11,20,23,42,43] and attributed graph clustering techniques [2,4,6,8,14,16,22,[32][33][34][39][40][41]. We also discuss our important observations derived to solve MCR queries efficiently and effectively.…”
Section: Related Workmentioning
confidence: 99%
“…They developed sampling-based estimation algorithms to find the matching of the spatial path patterns. Namaki et al [14] developed Q-Chase based algorithms to handle unexpected entities and missing entities during pattern matching. The Q-Chase algorithms perform query writing and query optimization using atomic operators and pruning.…”
Section: Constraint Reachability Techniquesmentioning
confidence: 99%
“…It can be as coarse-grain as datasets, files, and their dependencies [14] or fine-grain including dependencies between input, intermediate, and output records [20,35,51]. The value of provenance is most exaggerated by the applications that it can support including, but not limited to, explanations [44,65,24]; interactive visualizations [51,50,52,30]; verification and recomputation when data sources are outdated or not reliable [32], debugging [33,36,21]; data integration [22]; auditing and compliance [4]; and security [19,35]. Finally, central to how provenance is utilized across domains is the task of provenance querying, a task complementary to the task of provenance capture.…”
Section: Related Workmentioning
confidence: 99%
“…Two recent work GQBE [38] and Exemplar queries [39] are proposed for searching matches that are same as their counterparts from the examples. Moreover, [40], [41] are proposed to pose exemplars characterized by tuple patterns, and identify both query rewrites and their answers close to exemplar. Our approach can be deployed in these QBE methods to extend them by returning more reasonable answers that are semantically similar to the given exemplar queries.…”
Section: Related Workmentioning
confidence: 99%