Computer Science ›› 2013, Vol. 40 ›› Issue (4): 172-176.

Previous Articles     Next Articles

All Pairs Label-constraint Path Query in Large Graph

BAO Jia-jia and TIAN Wei   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Graph data has been used to model open and heterogeneous data such as social network,biological network and semantic Web.The edge-labeled graphs are drawing the attention of researchers for its scalability to describe the path reachability.Its fundamental problem is about returning true or false of the label-constraint path query.Based on this,we put forward all pairs label-constraint path query problem.There are two kinds of difficulty to solve this problem:1) It needs to enumerate all pairs of vertices exhaustively if taking the label-constraint path query to solve it;2) The spanning tree method can’t support the all pairs path query problem even though it can answer the path query efficiently.In this work,we compressed the label path transitive closure through spanning tree and quickened the query time by inverted index technique.We also gave two optimal algorithms for the query when searching answers on the spanning tree.The extensive experiments value the effectiveness and efficiency of our approach both on computing time and storage space.

Key words: Graph,Label-constraint path query,All pairs label-constraint path query,Inverted index

[1] Jin Ruo-ming,Hong Hui,Wang Hai-xun,et al.Computing Label-Constraint Reachability in Graph Database [C]∥SIGMOD’10.2010:123-134
[2] Zou Lei,Xu Kun,Yu J X.Answering Label-Constraint Reachability in Large Graphs[R].TR-DB-ICST-PKU-2011-002.Institute of Computer Science and Techniloge
[3] Fang Wei.TEDI:Efficient Shortest Path Query Answering on Graphs [C]∥SIGMOD ’10.2010:99-110
[4] Jin Ruo-ming,Xiang Yang,Ruan Ning,et al.3-HOP:A High-Compression Indexing Scheme for Reachability Query [C]∥SIGMOD ’09.2009:813-826
[5] Wang Hai-xun,He Hao,Yang Jun,et al.Dual labeling:Answering graph reachability queries in constant time [C]∥ICDE ’06.2006:75
[6] Yan Y,Wang C,Zhou A,et al.Efficiently querying RDF data in triple stores [R]∥Tech report.2008
[7] Gou Gang,Chirkova R.Efficiently querying large xml data repositories:A survey [J].IEEE Trans.Knowl.Data Eng.,2007,19(10):1381-1403
[8] Jagadish H V.A compression technique to materialize transitive closure[J].ACM Trans.Database Syst.,1990,15(4):558-598
[9] Cohen E,Halperin E,Kaplan H,et al.Reachability and distance queries via 2-hop labels [C]∥Proc of the 13th annual ACM-SIAM Symp on Discrete Algorithms.2002:937-946
[10] Chomsky,Noam.Three Models for the Description of Language [J].IRE Transactions on Information Theory,1956,2(3):113-124
[11] Barabasi A L,Albert R.Emergence of scaling in random net-works [J].Science,1999,286(5439):509-512
[12] Abiteboul S,Vianu V.Regular path queries with constraints[C]∥PODS.1997:122-133
[13] Ramasamy K,Patel J M,Naughton J F.Set Containment Joins:The Good,The Bad and The Ugly [C]∥Proc of the 26th VLDB Conf.Cairo,Egypt,2000
[14] Mendelzon A O,Wood P T.Finding regular simple paths ingraph databases[J].SIAM J.Comput.,1995,24(6):1235-1258
[15] Leskovec J,Singh A,Kleinberg J M.Patterns of influence in a recommendation network [C]∥PAKDD’06.2006:380-389

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!