2017 IEEE 33rd International Conference on Data Engineering (ICDE) 2017
DOI: 10.1109/icde.2017.95
|View full text |Cite
|
Sign up to set email alerts
|

Fast Computation of Dense Temporal Subgraphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 49 publications
(23 citation statements)
references
References 26 publications
0
23
0
Order By: Relevance
“…Another is to build snapshots for the time-dependent graph, that is, the time-dependent graph is considered as an ordered pair of disjoint sets [9,49,80]. A time-dependent graph is denoted by G = (V, A) , where A is a set of time-dependent edges.…”
Section: Models For Discrete Time-dependent Graphsmentioning
confidence: 99%
See 2 more Smart Citations
“…Another is to build snapshots for the time-dependent graph, that is, the time-dependent graph is considered as an ordered pair of disjoint sets [9,49,80]. A time-dependent graph is denoted by G = (V, A) , where A is a set of time-dependent edges.…”
Section: Models For Discrete Time-dependent Graphsmentioning
confidence: 99%
“…The problem of finding a set of vertices with certain features and closely interacting with each other in graphs is called a subgraph mining problem. A time-dependent graph mining problem seeks to mine subgraph structures with timedependent information, such as relaxed moving object clusters [47], heavy subgraphs [7], diversified subgraphs [79], and dense subgraphs [49].…”
Section: Time-dependent Subgraph Miningmentioning
confidence: 99%
See 1 more Smart Citation
“…Performing threat hunting through graph computations establishes new programmability requirements beyond existing graph programming platforms [12,65] (discussed in Section 2). Automation based on existing threat hunting practices [8,13,27,32,33,43,66,67], graph-based forensics [53,63,90], and temporal graph retrieval development [56,93,99] inspired the design of τ -calculus.…”
Section: Dynamic Threat Model Approachesmentioning
confidence: 99%
“…The studies of behavior mining in temporal networks are related to our work. Besides the aforementioned relevant research [3,6,7], Ma et al [5] devised a dense subgraph mining algorithm to identify cohesive subgraphs in a temporal network. Li et al [4] addressed the problem of mining periodic behaviors for moving objects.…”
Section: Introductionmentioning
confidence: 99%