• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Dong Rongsheng, Zhang Xinkai, Liu Huadong, Gu Tianlong. Representation and Operations Research of k\+2-MDD in Large-Scale Graph Data[J]. Journal of Computer Research and Development, 2016, 53(12): 2783-2792. DOI: 10.7544/issn1000-1239.2016.20160589
Citation: Dong Rongsheng, Zhang Xinkai, Liu Huadong, Gu Tianlong. Representation and Operations Research of k\+2-MDD in Large-Scale Graph Data[J]. Journal of Computer Research and Development, 2016, 53(12): 2783-2792. DOI: 10.7544/issn1000-1239.2016.20160589

Representation and Operations Research of k\+2-MDD in Large-Scale Graph Data

More Information
  • Published Date: November 30, 2016
  • Efficient and compact representation and operation of graph data which contains hundreds of millions of vertices and edges are the basis of analyzing and processing the large scale of graph data. Aiming at the problem, this paper proposes a representation of large-scale graph data based on the decision diagram, that is k\+2-MDD, providing the initialization of k\+2-MDD and the basic operation such as the edge query, inner(outer) neighbor query, finding out(in)-degree, adding(deleting) edge, etc. The representation method is optimized and improved on the basis of k\+2 tree, and after dividing the adjacency matrix of graph into k\+2, it is stored with the multi valued decision diagram, so as to achieve a more compact storage structure. According to the experimental results of a series of real Web graph and the social network graph data (cnr-2000, dewiki-2013, etc.) derived from the LAW laboratory at the University of Milan, it can be seen that the number of k\+2-MDD’ nodes is only 259%-451% of the k\+2 tree, which achieving the desired effect. According to the experimental results of random graphs, it can be seen that the k\+2-MDD structure is not only suitable for sparse graphs, but also for dense graphs. The graph data of k\+2-MDD shows that both containing the compact and query efficiency representation of k\+2 tree and realizing the efficient operation of the graph model can thus achieve the unity of description and computing power.
  • Related Articles

    [1]Zhang Yuhong, Zhi Wenwu, Li Peipei, Hu Xuegang. Semi-Supervised Method for Cross-Lingual Word Embedding Based on an Adversarial Model with Double Discriminators[J]. Journal of Computer Research and Development, 2023, 60(9): 2127-2136. DOI: 10.7544/issn1000-1239.202220036
    [2]Liu Jiefang, Wang Shitong, Wang Jun, Deng Zhaohong. Core Vector Regression for Attribute Effect Control on Large Scale Dataset[J]. Journal of Computer Research and Development, 2017, 54(9): 1979-1991. DOI: 10.7544/issn1000-1239.2017.20160519
    [3]Shu Jian, Tang Jin, Liu Linlan, Hu Gang, Liu Song. Fuzzy Support Vector Regression-Based Link Quality Prediction Model for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(8): 1842-1851. DOI: 10.7544/issn1000-1239.2015.20140670
    [4]Huang Huajuan, Ding Shifei, Shi Zhongzhi. Smooth CHKS Twin Support Vector Regression[J]. Journal of Computer Research and Development, 2015, 52(3): 561-568. DOI: 10.7544/issn1000-1239.2015.20131444
    [5]Yang Chunfang, Liu Fenlin, and Luo Xiangyang. Histograms Difference and Quantitative Steganalysis of JPEG Steganography Based on Relative Entropy[J]. Journal of Computer Research and Development, 2011, 48(8): 1563-1569.
    [6]Xiong Jinzhi, Xu Jianmin, and Yuan Huaqiang. Convergenceness of a General Formulation for Polynomial Smooth Support Vector Regressions[J]. Journal of Computer Research and Development, 2011, 48(3): 464-470.
    [7]Zeng Fanzi, Liang Zhenhua, and Li Renfa. An Approach to Mobile Position Tracking Based on Support Vector Regression and Game Theory[J]. Journal of Computer Research and Development, 2010, 47(10): 1709-1713.
    [8]Ling Ping, Wang Zhe, Zhou Chunguang, Huang Lan. Reduced Support Vector Clustering[J]. Journal of Computer Research and Development, 2010, 47(8): 1372-1381.
    [9]Qiao Lishan, Chen Songcan, Wang Min. Image Thresholding Based on Relevance Vector Machine[J]. Journal of Computer Research and Development, 2010, 47(8): 1329-1337.
    [10]Liu Xiangdong, Luo Bin, and Chen Zhaoqian. Optimal Model Selection for Support Vector Machines[J]. Journal of Computer Research and Development, 2005, 42(4): 576-581.
  • Cited by

    Periodical cited type(2)

    1. 刘梦君,蒋新宇,石斯瑾,江南,吴笛. 人工智能教育融合安全警示:来自机器学习算法功能的原生风险分析. 江南大学学报(人文社会科学版). 2022(05): 89-101 .
    2. 刘波涛,彭长根,吴睿雪,丁红发,谢明明. 面向数字型的轻量级保形加密算法研究. 计算机研究与发展. 2019(07): 1488-1497 . 本站查看

    Other cited types(4)

Catalog

    Article views (1243) PDF downloads (438) Cited by(6)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return