2012
DOI: 10.1007/s10115-012-0528-3
|View full text |Cite
|
Sign up to set email alerts
|

Graph mining for discovering infrastructure patterns in configuration management databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…Since the search space is exponential, sampling methods have gained traction recently [4,9]. In our algorithm we employ the depth-first random edge extension strategy we proposed in [2], i.e., we employ random walks over the chains of the frequent subgraph partial order. Each random walk starts with an empty pattern and repeatedly adds a new edge to a new vertex, or connects two existing vertices in the pattern, to generate a new candidate.…”
Section: Candidate Generationmentioning
confidence: 99%
See 4 more Smart Citations
“…Since the search space is exponential, sampling methods have gained traction recently [4,9]. In our algorithm we employ the depth-first random edge extension strategy we proposed in [2], i.e., we employ random walks over the chains of the frequent subgraph partial order. Each random walk starts with an empty pattern and repeatedly adds a new edge to a new vertex, or connects two existing vertices in the pattern, to generate a new candidate.…”
Section: Candidate Generationmentioning
confidence: 99%
“…Hence, sup(P ) is at least as large as MIS support. Other upper bounds for the MIS value have been proposed in gApprox [5] and CMDB-Miner [2] algorithms. The support function used in gApprox can be computed from the representative sets by enumerating the isomorphisms as described in the Sec.…”
Section: {|R(u)|}mentioning
confidence: 99%
See 3 more Smart Citations