2019 IEEE 35th International Conference on Data Engineering (ICDE) 2019
DOI: 10.1109/icde.2019.00100
|View full text |Cite
|
Sign up to set email alerts
|

Time Constrained Continuous Subgraph Search Over Streaming Graphs

Abstract: The growing popularity of dynamic applications such as social networks provides a promising way to detect valuable information in real time. These applications create highspeed data that can be easily modeled as streaming graph. Efficient analysis over these data is of great significance. In this paper, we study the subgraph (isomorphism) search over streaming graph data that obeys timing order constraints over the occurrence of edges in the stream. We propose a solution to efficiently answer subgraph search, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(23 citation statements)
references
References 16 publications
0
23
0
Order By: Relevance
“…Proposition 3.1. The log-Hadamard representation (•) is a monomorphism 5 between the additive group on the set S N (Z 2 ) and the corresponding group of unitary operators under composition. That is, for all A, B ∈ S N (Z 2 ), we have:…”
Section: Operations On the Representationmentioning
confidence: 99%
See 1 more Smart Citation
“…Proposition 3.1. The log-Hadamard representation (•) is a monomorphism 5 between the additive group on the set S N (Z 2 ) and the corresponding group of unitary operators under composition. That is, for all A, B ∈ S N (Z 2 ), we have:…”
Section: Operations On the Representationmentioning
confidence: 99%
“…The sub-graph isomorphism problem (under all its embodiments) has numerous applications when data can represented as networks, and notably in graph databases, biochemistry, computer vision, social network analysis, knowledge graph query, among many others [2][3][4]. Other important examples include finding patterns to detect cyber-attacks or credit card fraud [5].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, Li et al, [25] proposed a method to seek cohesive subgraphs in a signed network, in which each edge can be positive or negative, denoting friendship or conflict respectively. Li et al, [26] proposed a solution to efficiently answer subgraph search in streaming graph data. In the method, they designed concurrency management strategies to improve system throughput.…”
Section: Related Workmentioning
confidence: 99%
“…The input of S-BENU contains the pattern graph P , the initial data graph G 0 , and the batch update ∆o t at each time step t. S-BENU outputs ∆R + t and ∆R − t at each time step. Some existing continuous subgraph enumeration methods [25] [26] [27] [28] maintain the (partial) matching results of each time step in memory or on disk. They use the matching results of the time step t to compute the matching results of the time step t + 1, avoiding re-computing some intermediate results.…”
Section: S-benu Frameworkmentioning
confidence: 99%