2011
DOI: 10.1007/s10115-010-0376-y
|View full text |Cite
|
Sign up to set email alerts
|

An efficient graph-mining method for complicated and noisy data with real-world applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(39 citation statements)
references
References 24 publications
0
38
0
1
Order By: Relevance
“…Within this framework, a subgraph is considered anomalous if it is infrequent or parts of it are rarely repeated in the analyzed network. Jia et al [16] introduce a framework for mining interesting or anomalous patterns and subgraphs out of noisy and distorted graphs. Eberle et al [11] consider a substructure as anomalous if it deviates from a "normative" substructure, discovered by compression, based on the MDL principle.…”
Section: Related Workmentioning
confidence: 99%
“…Within this framework, a subgraph is considered anomalous if it is infrequent or parts of it are rarely repeated in the analyzed network. Jia et al [16] introduce a framework for mining interesting or anomalous patterns and subgraphs out of noisy and distorted graphs. Eberle et al [11] consider a substructure as anomalous if it deviates from a "normative" substructure, discovered by compression, based on the MDL principle.…”
Section: Related Workmentioning
confidence: 99%
“…Graph mining [1,91,44] is closely related to subtree mining, in fact, tree mining can be viewed as a special case of graph mining. Reference [1] gives a comprehensive survey on the topic.…”
Section: Graph Mining and Itemset Miningmentioning
confidence: 99%
“…This approach is not feasible for large graphs with label multiplicities as there are potentially an exponential number of isomorphisms [2]. In [13], they proposed APGM to mine approximate frequent subgraphs from a database of graphs. The method is similar to the gApprox method, with the main difference being that the entire 1-hop neighborhood of the current embeddings is explored to enumerate all extensions of the frequent pattern and their corresponding embeddings, whereas gApprox enumerates the embeddings for a single extension in each step.…”
Section: Related Workmentioning
confidence: 99%
“…Request permissions from permissions@acm.org. KDD'13, August [11][12][13][14]2013, Chicago, Illinois, USA. Copyright 2013 ACM 978-1-4503-2174-7/13/08 ...$15.00.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation