19th IEEE International Conference on Tools With Artificial Intelligence(ICTAI 2007) 2007
DOI: 10.1109/ictai.2007.59
|View full text |Cite
|
Sign up to set email alerts
|

Constructing VEGGIE: Machine Learning for Context-Sensitive Graph Grammars

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…This is achieved by mining recurring behavioral patterns from execution traces using VEGGIE with SubdueGL [4,5], a Minimum Description Length (MDL)-based compression algorithm. The inferred graph grammar and a syntactic parse tree visually represent reused structures found.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This is achieved by mining recurring behavioral patterns from execution traces using VEGGIE with SubdueGL [4,5], a Minimum Description Length (MDL)-based compression algorithm. The inferred graph grammar and a syntactic parse tree visually represent reused structures found.…”
Section: Related Workmentioning
confidence: 99%
“…Overgeneralization occurs when the inference process produces a grammar whose language is larger than the unknown language. The use of negligible items results in an unnecessarily evolutionary GA-based [42] L A g t s [ 8] heuristic ALLiS [13] Inductive CYK [36] ABL [54] MDL e-GRIDS [38] CDC [10] VEGGIE [4,5] Eiland et al [17] greedy search ADIOS CDC Incremental parsing [3,44] Sequitur [37] GraphViz [45,46] clustering EMILE [1] C D C large grammar. To limit the impact of over-generalization, it is recommended to also use a set of negative examples.…”
Section: Grammar Inferencementioning
confidence: 99%
“…The terminal nodes represent the invoked methods in the given program. We can perform two types of behavior verification: (1) verifying the acceptable call sequences in the scenario; (2) detecting illegal behaviors or security related activities. Suppose in a application, object A does not have the authority to access methods on object C, thus object A can only indirectly invoke object C via some method in object B.…”
Section: Graph Grammar Parsingmentioning
confidence: 99%
“…In this way, the behavior verification problem is cast to the problem of graph parsing. The framework is supported by a visual language environment called VEGGIE [1], an integrated graph grammar induction and parsing system. Fig.1 depicts an overview of the framework, which includes two stages.…”
Section: Introductionmentioning
confidence: 99%
“…A substructure is defined as a representation of the recurring subgraphs. An instance is defined as one instance of such substructure in the graph dataset [2].…”
Section: The Grammar Induction Systemmentioning
confidence: 99%