• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Xiong, Dong Yihong, Shi Weijie, Pan Jianfei. Progress and Challenges of Graph Summarization Techniques[J]. Journal of Computer Research and Development, 2019, 56(6): 1338-1355. DOI: 10.7544/issn1000-1239.2019.20180371
Citation: Wang Xiong, Dong Yihong, Shi Weijie, Pan Jianfei. Progress and Challenges of Graph Summarization Techniques[J]. Journal of Computer Research and Development, 2019, 56(6): 1338-1355. DOI: 10.7544/issn1000-1239.2019.20180371

Progress and Challenges of Graph Summarization Techniques

Funds: This work was supported by the National Natural Science Foundation of China (61572266), the Natural Science Foundation of Zhejiang Province of China (LY16F020003), and the Natural Science Foundation of Ningbo City of China (2017A610114).
More Information
  • Published Date: May 31, 2019
  • Graph summarization aims to search a group of simple hypergraphs or sparse graphs, which illustrate the main structural information or change trend of the original graph. Based on the application field and background of original graph, different graph summarization techniques are used to construct a specific summary graph, which can solve the problems of information overload, query optimization, spatial compression, impact analysis, social network visualization and so on. According to the classification criteria of the main purpose of the summary, the existing graph summarization techniques are divided into four categories: the graph summarization based on spatial compression, the graph summarization based on query optimization, the graph summarization based on pattern visualization and the graph summarization based on impact analysis. The partial graph summarization algorithms of non-attribute graphs and attribute graphs are tested on real data sets to analyze the indexes of information retention rate, compression rate, information entropy and running time experimentally. At last, not only the development trends of the graph summarization are highlighted, but also the challenges and the future research directions that can be explored in depth are pointed out. Combining with the popular deep learning technology, some valuable and potential Macro coutermeasures are put forward to solve these challenges.
  • Related Articles

    [1]He Xianmin, Li Maoxi, He Yanqing. Siamese BERT-Networks Based Classification Mapping of Scientific and Technological Literature[J]. Journal of Computer Research and Development, 2021, 58(8): 1751-1760. DOI: 10.7544/issn1000-1239.2021.20210323
    [2]Liu Zihao, Zhang Bin, Zhu Ning, Tang Huilin. Adaptive App-DDoS Detection Method Based on Improved AP Algorithm[J]. Journal of Computer Research and Development, 2018, 55(6): 1236-1246. DOI: 10.7544/issn1000-1239.2018.20170124
    [3]Zhou Quanbiao, Zhang Xingjun, Liang Ningjing, Huo Wenjie, Dong Xiaoshe. FTL Address Mapping Method Based on Mapping Entry Inter-Reference Recency[J]. Journal of Computer Research and Development, 2018, 55(5): 1065-1077. DOI: 10.7544/issn1000-1239.2018.20170254
    [4]Wang Yizhuo, Zuo Qi, Ji Weixing, Wang Xiaojun, Shi Feng. Memory-Aware Incremental Mapping of Applications to MPSoC[J]. Journal of Computer Research and Development, 2015, 52(5): 1198-1209. DOI: 10.7544/issn1000-1239.2015.20131960
    [5]Zhu Hong, Ding Shifei, Xu Xinzheng. An AP Clustering Algorithm of Fine-Grain Parallelism Based on Improved Attribute Reduction[J]. Journal of Computer Research and Development, 2012, 49(12): 2638-2644.
    [6]Zuo Yayao, Tang Yong, Shu Zhongmei. Subtraction Operation between Temporal Points with Granularities Based on Granularity Hierarchy Mapping[J]. Journal of Computer Research and Development, 2012, 49(11): 2320-2327.
    [7]Zhu Sifeng, Liu Fang, Chai Zhengyi, Qi Yutao. Immune-Computing-Based Location Planning of Base Station and Relay Station in IEEE 802.16j Network[J]. Journal of Computer Research and Development, 2012, 49(8): 1649-1654.
    [8]Li Xiaoling, Guo Changguo, Li Xiaoyong, Wang Huaimin. A Constraint Optimization Based Mapping Method for Virtual Network[J]. Journal of Computer Research and Development, 2012, 49(8): 1601-1610.
    [9]Cao Chunjie, Yang Chao, Ma Jianfeng, Zhu Jianming. An Authentication Protocol for Station Roaming in WLAN Mesh[J]. Journal of Computer Research and Development, 2009, 46(7): 1102-1109.
    [10]Yang Renzhong, Hou Zifeng, Li Jingxia. A Resource Reservation Scheme for PCF Handoff Station in WLAN[J]. Journal of Computer Research and Development, 2005, 42(11): 1962-1968.

Catalog

    Article views (1436) PDF downloads (701) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return