计算机科学 ›› 2026, Vol. 53 ›› Issue (3): 166-172.doi: 10.11896/jsjkx.250400086
侯景乐1, 李振军2, 代强强1, 李荣华1, 王国仁1
HOU Jingle1, LI Zhengjun2, DAI Qiangqiang1, LI Ronghua1, WANG Guoren1
摘要: 有向图的有向边可以表示关系的指向或数据的传递,在稠密子图挖掘中引入并拓展一些无向图的经典稠密子图模型对图挖掘工作有着重要帮助。为此,结合有向图的特点与k-plex的定义,称有向图中任意一个顶点的非出边邻居和非入边邻居均不超过k的子图结构为有向k-plex。已有工作给出了在无向图中枚举极大k-plex的输出敏感算法,然而它们无法直接应用于有向图。为了解决这一问题,提出了一种基于图分解的递归枚举算法。为了更进一步优化运行效率,引入了基于支撑点的剪枝策略,还提供了基于有向k-plex上界的优化算法来终止一些无效的搜索分支。在真实图数据上进行实验,结果表明,图分解算法与剪枝优化均取得了良好的效果,所提算法在处理真实图数据时具有很强的实用性,能在2 h内完成对KONECT数据集中数百组真实世界有向图的处理。
中图分类号:
| [1]DU N,WU B,PEI X,et al.Community detection in large-scale social networks[C]//Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis.2007:16-25. [2]XIE J,KELLEY S,SZYMANSKI B K.Overlapping community detection in networks:The state-ofthe-art and comparative study[J].ACM Computer Surveys,2013,45(4):43:1-43:35. [3]TANG G,PEI J,LUK W.Email mining:tasks,common techniques,and tools[J].Knowledge and Information Systems,2014,41(1):1-31. [4]CAPOCCI A,SERVEDIO V D,COLAIORI F,et al.Preferentialattachment in the growth of social networks:The internet encyclopedia Wikipedia[J].Physical Review E,2006,74(3):036116. [5]KLEINBERG J M.Authoritative sources in a hyperlinked environment[J].Journal of the ACM,1999,46(5):604-632. [6]LI Z,XIONG H,LIU Y,et al.Detecting blackhole and volcano patterns in directed networks[C]//Proceedings of the 2010 IEEE International Conference on Data Mining.2010:294-303. [7]ZHANG J,WANG C,WANG J.Who proposed the relation-ship?:recovering the hidden directions of undirected social networks[C]//Proceedings of the 23rd International Conference on World Wide Web.ACM,2014:807-818. [8]GIATSIDIS C,THILIKOS D M,VAZIRGIANNIS M.D-cores:measuring collaboration of directed graphs based on degeneracy[J].Knowledge and Information Systems,2013,35(2):311-343. [9]MA C,FANG Y,CHENG R,et al.Efficient algorithms for densest subgraph discovery on large directed graphs[C]//Procee-dings of the 2020 ACM SIGMOD International Conference on Management of Data.ACM,2020:1051-1066. [10]GUO G,YAN D,YUAN L,et al.Maximal directed quasi-clique mining[C]//Proceedings of the 38th IEEE International Confe-rence on Data Engineering.IEEE Computer Society,2022:1900-1913. [11]ALBA R D.A graph-theoretic definition of a sociometric clique[J].Journal of Mathematical Sociology,1973,3(1):113-126. [12]FREEMAN L C.The sociological concept of “group”:An empirical test of two models[J].American Journal of Sociology,1992,98(1):152-166. [13]BALASUNDARAM B,BUTENKO S,HICKS I V.Clique relaxations in social network analysis:The maximum k-plex problem[J].Operations Research,2011,59(1):133-142. [14]SEIDMAN S B,FOSTER B L.A graph-theoretic generalization of the clique concept[J].Journal of Mathematical sociology,1978,6(1):139-154. [15]BRON C,KERBOSCH J.Algorithm 457:Finding all cliques of an undirected graph[J].Communications of the ACM,1973,16(9):575-576. [16]WU B,PEI X.A parallel algorithm for enumerating all the maximal k-plexes[C]//Pacific-Asia Conference on Knowledge Discovery and Data Mining.2007:476-483. [17]CONTE A,FIRMANI D,MORDENTE C,et al.Fast enumeration of large k-plexes[C]//Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2017:115-124. [18]CONTE A,MATTEIS T D,SENSI D D,et al.D2K:scalablecommunity detection in massive networks via small-diameter k-plexes[C]//Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.2018:1272-1281. [19]CONTE A,KANTÉ M M,UNO T,et al.Maximal strongly connected cliques in directed graphs:algorithms and bounds[J].Discrete Applied Mathematics,2021,303:237-252. [20]CHEN J J,DAI Q Q,LI R H,et al.Research on directed clique enumeration algorithms that satisfy strong connectivity[J].Computer Science and Exploration,2024,18(5):1211-1222. [21]PEARCE D J,KELLY P H J,HANKIN C.Efficient field-sensitive pointer analysis of C[J].ACM Transactions on Programming Languages and Systems,2007,30(1):4. [22]SAITO H,TOYODA M,KITSUREGAWA M,et al.A large-scale study of link spam detection by graph algorithms[C]//Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web.ACM,2007:45-48. |
|
||