2013
DOI: 10.1007/978-3-642-36530-0_7
|View full text |Cite
|
Sign up to set email alerts
|

Combining Graph Seriation and Substructures Mining for Graph Recognition

Abstract: Many interesting applications of Pattern Recognition techniques can take advantage in dealing with labeled graphs as input patterns. To this aim, the most important issue is the definition of a dissimilarity measure between graphs. In this paper, we outline an ensemble of methods for dealing with such data,focusing on two specific methods. The first one is simply based on a global alignment approach applied to seriated versions of the graphs. The second one is a two-stages method, which applies a recurrent substr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
8

Relationship

5
3

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 28 publications
(28 reference statements)
0
10
0
Order By: Relevance
“…Analogously, the concepts of hitting (average probability that two random walkers are in the same state at the same time) and commute time (average return time to the initial state) in random walks have been used by Qiu and Hancock [57] to characterize graphs for pattern recognition purpose. Other approaches include computation of Ihara coefficients and Laplacian spectrum [43,58]. Finally, various interpretations of the concept of network entropy are studied [21], such as entropy of continuous time quantum walks [4,49], network ensemble entropy [4,11], network transfer entropy [8], von Neumann (quantum) entropy [35,72], and fuzzy entropy [42].…”
Section: Introductionmentioning
confidence: 99%
“…Analogously, the concepts of hitting (average probability that two random walkers are in the same state at the same time) and commute time (average return time to the initial state) in random walks have been used by Qiu and Hancock [57] to characterize graphs for pattern recognition purpose. Other approaches include computation of Ihara coefficients and Laplacian spectrum [43,58]. Finally, various interpretations of the concept of network entropy are studied [21], such as entropy of continuous time quantum walks [4,49], network ensemble entropy [4,11], network transfer entropy [8], von Neumann (quantum) entropy [35,72], and fuzzy entropy [42].…”
Section: Introductionmentioning
confidence: 99%
“…4. In order to merge very similar stable regions, the BSAS clustering algorithm [26,40] is used. The clustering threshold used in this step is the segmentation parameter s fus .…”
Section: Appendix 1: the Image Segmentation Proceduresmentioning
confidence: 99%
“…In the Cluster-based Classifier (CC) a partition f of S tr is generated by means of the BSAS [26,40], a free-clustering algorithm that depends on the scale parameter #, which is the maximum allowed radius for the clusters. The BSAS processes sequentially each pattern in S tr and assigns it to the closest cluster or it generates a new cluster if the distance from the closest cluster is higher than #.…”
Section: Cluster-based Classifiermentioning
confidence: 99%
“…This set is generated using a stochastic procedure based on Markov Chains [12], [13]. If ||=n, the Markov generation process is entirely described by its transition matrix T, that is, if we are generating strings of length l, the first symbol is chosen with uniform probability on , the next symbol is chosen with conditional probability p(s 2 |s 1 ), that is with a probability that depends only on the last selected symbol.…”
Section: A Problem Definition and Synthetic Datasetsmentioning
confidence: 99%