Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1557626.1557665acmotherconferencesArticle/Chapter ViewAbstractPublication PagesuccsConference Proceedingsconference-collections
research-article

General spanning trees and reachability query evaluation

Published: 19 May 2009 Publication History

Abstract

Graph reachability is fundamental to a wide range of applications, including CAD/CAM, CASE, office systems, software management, as well as geographical navigation and internet routing. Many applications involve huge graphs and requires fast answering of reachability queries. Several reachability labeling methods have been proposed for this purpose. They assign labels to the nodes, such that the reachability between any two nodes can be determined using their labels only. In this paper, we propose a new data structure, called a general spanning tree of a directed acyclic graph (DAG) to minimize label space. Different from a traditional spanning tree, an edge in a general spanning tree T of a DAG G may corresponds to a path in G. That is, for each edge uv in T, we have a path from u to v in G. An algorithm is discussed to find such a tree with the least number of leaf nodes in O(bn √b) time, where n is the number of the nodes of G, and b is the number of the leaf nodes of T. It can be proven that b equals G's width, defined to be the size of a largest node subset U of G such that for every pair of nodes u, v ∈ U, there does not exist a path from u to v or from v to u. Based on T, we are able to reduce the label space to O(bn) with O(logb) reachability query time. Our method can also be extended for graphs containing cycles.

References

[1]
R. Agrawal, A. Borgida and H. V. Jagadish, "Efficient management of transitive relationships in large data and knowledge bases," Proc. of the 1989 ACM SIG-MOD Intl. Conf. on Management of Data, Oregon, 1989, pp. 253--262.
[2]
A. S. Asratian, T. Denley, and R. Haggkvist, Bipartite Graphs and their Applications, Cambridge University, 1998.
[3]
K. S. Booth and G. S. Leuker, "Testing for the consecutive ones property, interval graphs, and graph planarity using PQ-tree algorithms," J. Comput. Sys. Sci., 13(3):335--379, Dec. 1976.
[4]
Y. Chen, Graph Decomposition and Recursive Closures, in Proc. CaiSE 2003 Forum at 15th Conf. on Advanced Information Systems Engineering, June 2003, Klagenfurt/Velden, Austria, pp. 5--8.
[5]
Y. Chen and Y. Chen, An Efficient Algorithm for Answering Graph Reachability Queries, Proceedings of ICDE, 2008, pp. 893--902.
[6]
J. Cheng, J. X. Yu, X. Lin, H. Wang, and P. S. Yu, Fast computation of reachability labeling for large graphs, in Proc. EDBT, Munich, Germany, May 26--31, 2006.
[7]
V. Christophides, D. Plexousakis, and et al. On Labeling schemes for the semantic web, in Proc. of 12th Intl. Conf. on WWW, 2003.
[8]
N. H. Cohen, "Type-extension tests can be performed in constant time," ACM Transactions on Programming Languages and Systems, 13:626--629, 1991.
[9]
E. Cohen, E. Halperin, H. Kaplan, and U. Zwick, Reachability and distance queries via 2-hop labels, SIAM J. Comput, vol. 32, No. 5, pp. 1338--1355, 2003.
[10]
D. Coppersmith, and S. Winograd. Matrix multiplication via arithmetic progression. Journal of Symbolic Computation, vol. 9, pp. 251--280, 1990.
[11]
T. H. Corman, C. E. Leiserson, R. L. Rivest, C. Stein, Introduction to Algorithms, 2nd. ed., McGraw-Hill Book Company, Boston, 2007.
[12]
R. P. Dilworth, A decomposition theorem for partially ordered sets, Ann. Math. 51 (1950), pp. 161--166.
[13]
E. A. Dinic, Algorithm for solution of a problem of maximum flow in a network with power estimation, Soviet Mathematics Doklady, 11(5):1277--1280, 1970.
[14]
S. Even, Graph Algorithms, Computer Science Press, Inc., Rockville, Maryland, 1979.
[15]
J. E. Hopcroft, and R. M. Karp, An n2.5 algorithm for maximum matching in bipartite graphs, SIAM J. Comput. 2(1973), 225--231.
[16]
H. V. Jagadish, "A Compression Technique to Materialize Transitive Closure," ACM Trans. Database Systems, Vol. 15, No. 4, 1990, pp. 558--598.
[17]
A. V. Karzanov, Determining the Maximal Flow in a Network by the Method of Preflow, Soviet Math. Dokl., Vol. 15, 1974, pp. 434--437.
[18]
T. Keller, G. Graefe and D. Maier, "Efficient Assembly of Complex Objects," Proc. ACM SIGMOD Conf., Denver, Colo., 1991, pp. 148--157.
[19]
W. Kim, "Object-Oriented Database Systems: Promises, Reality, and Future," Proc. 19th VLDB conf., Dublin, Ireland, 1993, pp. 676--687.
[20]
H. A. Kuno and E. A. Rundensteiner, "Incremental Maintenance of Materialized Object-Oriented Views in MultiView: Strategies and Performance Evaluation," IEEE Transactions on Knowledge and Data Engineering, vol. 10. No. 5, 1998, pp. 768--792.
[21]
E. L. Lawler, Combinatorial Optimization and Matroids, Holt, Rinehart, and Winston, New York (1976).
[22]
R. Schenkel, A. Theobald, and G. Weikum, HOPI: an efficient connection index for complex XML document collections, in Proc. EDBT, 2004.
[23]
R. Schenkel, A. Theobald, and G. Weikum, Efficient creation and incrementation maintenance of HOPI index for complex xml document collection, in Proc. ICDE, 2006.
[24]
R. Tarjan: Depth-first Search and Linear Graph Algorithms, SIAM J. Compt. Vol. 1. No. 2. June 1972, pp. 146--140.
[25]
J. Teuhola, "Path Signatures: A Way to Speed up Recursion in Relational Databases," IEEE Trans. on Knowledge and Data Engineering, Vol. 8, No. 3, June 1996, pp. 446--454.
[26]
H. S. Warren, "A Modification of Warshall's Algorithm for the Transitive Closure of Binary Relations," Commun. ACM 18, 4 (April 1975), 218--220.
[27]
H. Wang, H. He, J. Yang, P. S. Yu, and J. X. Yu, Dual Labeling: Answering Graph Reachability Queries in Constant time, in Proc. of Int. Conf. on Data Engineering, Atlanta, USA, April -8 2006.
[28]
S. Warshall, "A Theorem on Boolean Matrices," JACM, 9. 1(Jan. 1962), 11--12.
[29]
D. West, Parameters of partial orders and graphs: packing, covering and representation, in: I. Rival (ed.), Graphs and Orders, Dordrecht-Reidel, 1985, pp. 267--350.
[30]
C. Zhang, J. Naughton, D. DeWitt, Q. Luo and G. Lohman, "On Supporting Containment Queries in Relational Database Management Systems, in Proc. of ACM SIGMOD Intl. Conf. on Management of Data, California, USA, 2001.
[31]
Y. Zibin and J. Gil, "Efficient Subtyping Tests with PQ-Encoding," Proc. of the 2001 ACM SIGPLAN Conf. on Object-Oriented Programming Systems, Languages and Application, Florida, October 14--18, 2001, pp. 96--107.

Cited By

View all
  • (2024)Enabling Privacy-Preserving K-Hop Reachability Query Over Encrypted GraphsIEEE Transactions on Services Computing10.1109/TSC.2024.338295417:3(893-904)Online publication date: May-2024
  • (2023)Answering reachability queries with ordered label constraints over labeled graphsFrontiers of Computer Science10.1007/s11704-022-2368-y18:1Online publication date: 12-Aug-2023
  • (2022)Providing Fast Reachability Query Services With MGTag: A Multi-Dimensional Graph Labeling MethodIEEE Transactions on Services Computing10.1109/TSC.2020.296989815:2(1000-1011)Online publication date: 1-Mar-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
C3S2E '09: Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering
May 2009
266 pages
ISBN:9781605584010
DOI:10.1145/1557626
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • BytePress
  • Concordia University: Concordia University

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 May 2009

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

C3S2E '09
Sponsor:
  • Concordia University
C3S2E '09: Proceedings of the 2009 C3S2E conference
May 19 - 21, 2009
Quebec, Montreal, Canada

Acceptance Rates

Overall Acceptance Rate 12 of 42 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Enabling Privacy-Preserving K-Hop Reachability Query Over Encrypted GraphsIEEE Transactions on Services Computing10.1109/TSC.2024.338295417:3(893-904)Online publication date: May-2024
  • (2023)Answering reachability queries with ordered label constraints over labeled graphsFrontiers of Computer Science10.1007/s11704-022-2368-y18:1Online publication date: 12-Aug-2023
  • (2022)Providing Fast Reachability Query Services With MGTag: A Multi-Dimensional Graph Labeling MethodIEEE Transactions on Services Computing10.1109/TSC.2020.296989815:2(1000-1011)Online publication date: 1-Mar-2022
  • (2022)Evaluation of Reachability Queries Based on Recursive DAG DecompositionIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2022.3220191(1-18)Online publication date: 2022
  • (2019)Mathematical analysis of the emergence of communities based on coevolution of social contagion and bonding by homophilyApplied Network Science10.1007/s41109-019-0130-74:1Online publication date: 25-Jun-2019
  • (2019)Ins and Outs of Network-Oriented ModelingNetwork-Oriented Modeling for Adaptive Networks: Designing Higher-Order Adaptive Biological, Mental and Social Network Models10.1007/978-3-030-31445-3_2(25-55)Online publication date: 2-Nov-2019
  • (2019)Analysis of a Network’s Emerging Behaviour via Its Structure Involving Its Strongly Connected ComponentsNetwork-Oriented Modeling for Adaptive Networks: Designing Higher-Order Adaptive Biological, Mental and Social Network Models10.1007/978-3-030-31445-3_12(281-318)Online publication date: 2-Nov-2019
  • (2018)The Ins and Outs of Network-Oriented Modeling: From Biological Networks and Mental Networks to Social Networks and BeyondTransactions on Computational Collective Intelligence XXXII10.1007/978-3-662-58611-2_2(120-139)Online publication date: 19-Dec-2018
  • (2018)Mathematical Analysis of a Network’s Asymptotic Behaviour Based on Its Strongly Connected ComponentsComplex Networks and Their Applications VII10.1007/978-3-030-05411-3_53(663-679)Online publication date: 2-Dec-2018
  • (2014)A Reachability Query Approach with Path Interval LabelingProceedings of the 2014 11th Web Information System and Application Conference10.1109/WISA.2014.39(172-177)Online publication date: 12-Sep-2014
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media