2015 IEEE 31st International Conference on Data Engineering 2015
DOI: 10.1109/icde.2015.7113281
|View full text |Cite
|
Sign up to set email alerts
|

Making pattern queries bounded in big graphs

Abstract: It is cost-prohibitive to find matches Q(G) of a pattern query Q in a big graph G. We approach this by fetching a small subgraph GQ of G such that Q(GQ) = Q(G). We show that many practical patterns are effectively bounded under access constraints A commonly found in real life, such that GQ can be identified in time determined by Q and A only, independent of the size |G| of G. This holds no matter whether pattern queries are localized (e.g., via subgraph isomorphism) or non-localized (graph simulation). We prov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
17
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1
1

Relationship

4
3

Authors

Journals

citations
Cited by 14 publications
(18 citation statements)
references
References 24 publications
1
17
0
Order By: Relevance
“…Experimenting with real-life Web graphs of billions of nodes and edges, we find that 60% of graph pattern queries via subgraph isomorphism are boundedly evaluable under simple access constraints, and that our bounded-evaluation approach outperforms conventional subgraph isomorphism methods by 4 orders of magnitude on average [11]. ✷ These experimental findings verify that the bounded evaluability analysis yields a practical approach to optimizing queries on big data.…”
Section: Introductionsupporting
confidence: 62%
See 3 more Smart Citations
“…Experimenting with real-life Web graphs of billions of nodes and edges, we find that 60% of graph pattern queries via subgraph isomorphism are boundedly evaluable under simple access constraints, and that our bounded-evaluation approach outperforms conventional subgraph isomorphism methods by 4 orders of magnitude on average [11]. ✷ These experimental findings verify that the bounded evaluability analysis yields a practical approach to optimizing queries on big data.…”
Section: Introductionsupporting
confidence: 62%
“…The need for studying bounded evaluability is evident: if Q is boundedly evaluable, then Q(D) can be computed by accessing (identifying and fetching) a small DQ by using the indices in A, in time determined by Q and A, not by the size of D, no matter how big D grows. Experimenting with real-life data, we find that a large number of queries are boundedly evaluable under a small number of simple access constraints, and that such queries can be efficiently answered in big datasets that satisfy the constraints [11,12].…”
Section: Introductionmentioning
confidence: 98%
See 2 more Smart Citations
“…Bounded evaluation has proven useful [Cao et al 2014;Cao et al 2015;Cao and Fan 2016]. Experimenting with several real-life datasets, it was shown that under a couple of hundreds of access constraints, 77% of randomly generated conjunctive queries (a.k.a.…”
Section: Introductionmentioning
confidence: 99%