2010 IEEE 26th International Conference on Data Engineering (ICDE 2010) 2010
DOI: 10.1109/icde.2010.5447882
|View full text |Cite
|
Sign up to set email alerts
|

Hashing tree-structured data: Methods and applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(24 citation statements)
references
References 30 publications
0
24
0
Order By: Relevance
“…Tatikonda and Parthasarathy [34] introduce embedded pivots for computing the distance between unordered trees. An embedded pivot consists of two nodes and their least common ancestor, unless the least common ancestor is one of the two nodes.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Tatikonda and Parthasarathy [34] introduce embedded pivots for computing the distance between unordered trees. An embedded pivot consists of two nodes and their least common ancestor, unless the least common ancestor is one of the two nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Next, we show the scalability of windowed pq-grams (w = 3, p = 1, q = 2) and compare them to embedded pivots [34]. Embedded pivots are snippets that consist of two nodes and their least common ancestor (cf.…”
Section: Scalability Of Profile and Index Computationmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently in [18], each tree is transformed into a set of pivots and the Jaccard Coefficient between two sets of pivots are used to approximate the tree edit distance. As is shown in [18], for unordered trees, their method approximates tree edit distance more accurately than pq-gram. In the case of ordered trees, their matching quality is lower than that using pq-gram [11].…”
Section: Related Workmentioning
confidence: 99%