2013
DOI: 10.1007/978-3-642-38221-5_15
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Software Toolkit for Graph Edit Distance Computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 66 publications
(33 citation statements)
references
References 19 publications
0
33
0
Order By: Relevance
“…We consider also the dissimilarity representation, Dissimilarity Repr., as further element of comparison [6]. Experiments in the graph domain are performed by monitoring statistic d(µ[g 0 ], g t ), where g 0 is a set of training graphs on which we estimated µ[Q] and d(·, ·) is the graph edit distance [8]. The experiments denoted with Spherical Man., Euclidean Man., and Hyperbolic Man.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We consider also the dissimilarity representation, Dissimilarity Repr., as further element of comparison [6]. Experiments in the graph domain are performed by monitoring statistic d(µ[g 0 ], g t ), where g 0 is a set of training graphs on which we estimated µ[Q] and d(·, ·) is the graph edit distance [8]. The experiments denoted with Spherical Man., Euclidean Man., and Hyperbolic Man.…”
Section: Methodsmentioning
confidence: 99%
“…Embedding distortion of Equation(8) observed for different curvatures κ. The logarithm of the distortion is computed in the first step of the training stage.…”
mentioning
confidence: 99%
“…For example, if we want to retrieve ΨD [14] (suppose that the subscript starts from 0 and b = 4) shown in Figure 6 As discussed above, the core operation in a succinct q-gram tree is to calculate ΨX [j] by formula (2), i.e., the decompress operation. In order to accelerate the decompress process, we use the look up table technique proposed in [5] to ensure that the decompress operation takes a constant time.…”
Section: Access To ψXmentioning
confidence: 99%
“…Then we only need to perform the query on the q-gram trees Ti,j built on these subregions Ai,j satisfying Ai,j ⊆ Q h in lines 3-5. For each candidate graph g in Cand , we can use the methods in [10,14,24] to compute the edit distance between g and h to seek for the required graphs.…”
Section: Query Algorithmmentioning
confidence: 99%
“…The edit path γ corresponds to an optimal edit path. GED has been widely used by the structural pattern recognition community [15,4,11,12] despite the fact that such distance comes along with several drawbacks. First of all, computing the GED of two graphs requires to find a path having a minimal cost among all possible paths, which is a NP-complete problem [8].…”
Section: Introductionmentioning
confidence: 99%