Describe the types of modifications necessary to adapt the frequent subgraph mining algorithm to handle:

(a) Directed graphs
(b) Unlabeled graphs
(c) Acyclic graphs
(d) Disconnected graphs
For each type of graph given above, describe which step of the algorithm will
be affected (candidate generation, candidate pruning, and support counting),
and any further optimization that can help improve the efficiency of the
algorithm.


(a) Adjacency matrix may not be symmetric, which affects candidate gen-
eration using vertex growing approach.

(b) An unlabeled graph is equivalent to a labeled graph where all the ver-
tices have identical labels.

(c) No effect on algorithm. If the graph is a rooted labeled tree, more
efficient techniques can be developed to encode the tree (see: M.J. Zaki,
Efficiently Mining Frequent Trees in a Forest, In Proc. of the Eighth
ACM SIGKDD Int’l Conf. on Knowledge Discovery and Data Mining,
2002).

Computer Science & Information Technology

You might also like to view...

The ______ effect changes the audio amplitude such that the highest is the amplitude you specify.

A. amplify B. envelope C. noise reduction D. normalize E. reverb

Computer Science & Information Technology

What value(s) will be contained in the variable NUMBERS in Function 1?

``` void Function1(int n[] ); int main() { int num [4] = {6, 23, 72, 24 }; Function1(num); } void Function1(int NUMBERS[]) { //inside the Function1 } ``` A. 6, 23, 72, 24 B. num and NUMBERS are different names. This would not compile. C. A hex address will be contained in NUMBERS. D. Four hex addresses will be contained in NUMBERS.

Computer Science & Information Technology

The expression following the switch keyword is called a

a) guard condition b) controlling expression c) selection expression d) case expression

Computer Science & Information Technology

When drawing a table, the pointer looks like a ________

A) pen B) vertical bar C) paint brush D) pencil

Computer Science & Information Technology