Proceedings of the 2002 SIAM International Conference on Data Mining 2002
DOI: 10.1137/1.9781611972726.10
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Substructure Discovery from Large Semi-structured Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
288
0
1

Year Published

2007
2007
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 305 publications
(289 citation statements)
references
References 15 publications
0
288
0
1
Order By: Relevance
“…The next step is similar to the one described before: A collection of reduced call graphs representing correct and failing program executions is analysed with graph mining. The authors use the tree miner FREQT [16] to find all frequent subtrees. The call trees analysed are large and lead to scalability problems of the algorithm.…”
Section: Call Graph Based Fault Detectionmentioning
confidence: 99%
“…The next step is similar to the one described before: A collection of reduced call graphs representing correct and failing program executions is analysed with graph mining. The authors use the tree miner FREQT [16] to find all frequent subtrees. The call trees analysed are large and lead to scalability problems of the algorithm.…”
Section: Call Graph Based Fault Detectionmentioning
confidence: 99%
“…, a m , b), (2) whether to be minimal, and (3) whether to be frequent. We note that the edge extension defined by (1) and (2) is also known as rightmost extension, which was originally defined for enumerating frequent subtrees (Asai et al 2002). Practically, the above procedure is done as follows: We first find all frequent 1-edge subgraphs as frequent patterns and save the locations where corresponding graphs are found in given graphs.…”
Section: Reverse Search Reformulation For Enumerating Frequent Subgraphsmentioning
confidence: 99%
“…Algorithms Several algorithms have been designed to address the problem of tree mining: T reeM iner in [17], F reqT in [1], Chopper [13], F reeT reeM iner [4] and CM T reeM iner [3]. All of them is based on a levelwise process consisting of the following two recursive steps: generation of candidates and validation of candidates.…”
Section: Support(s) = # Of Trees Where S Is Embeddedmentioning
confidence: 99%
“…This research area has several applications, including the discovery of mediator schemas. The background in this research is mainly constituted by the work by Asai et al and Zaki et al [1,9,12,16,17]. This work addresses the problem of tree mining considering several ways to define when a tree S is included within another one T .…”
Section: Introductionmentioning
confidence: 99%