Describe the types of modifications necessary to adapt the frequent subgraph mining algorithm to handle:
(a) Directed graphs
(b) Unlabeled graphs
(c) Acyclic graphs
(d) Disconnected graphs
For each type of graph given above, describe which step of the algorithm will
be affected (candidate generation, candidate pruning, and support counting),
and any further optimization that can help improve the efficiency of the
algorithm.
(a) Adjacency matrix may not be symmetric, which affects candidate gen-
eration using vertex growing approach.
(b) An unlabeled graph is equivalent to a labeled graph where all the ver-
tices have identical labels.
(c) No effect on algorithm. If the graph is a rooted labeled tree, more
efficient techniques can be developed to encode the tree (see: M.J. Zaki,
Efficiently Mining Frequent Trees in a Forest, In Proc. of the Eighth
ACM SIGKDD Int’l Conf. on Knowledge Discovery and Data Mining,
2002).
You might also like to view...
The ______ effect changes the audio amplitude such that the highest is the amplitude you specify.
A. amplify B. envelope C. noise reduction D. normalize E. reverb
What value(s) will be contained in the variable NUMBERS in Function 1?
``` void Function1(int n[] ); int main() { int num [4] = {6, 23, 72, 24 }; Function1(num); } void Function1(int NUMBERS[]) { //inside the Function1 } ``` A. 6, 23, 72, 24 B. num and NUMBERS are different names. This would not compile. C. A hex address will be contained in NUMBERS. D. Four hex addresses will be contained in NUMBERS.
The expression following the switch keyword is called a
a) guard condition b) controlling expression c) selection expression d) case expression
When drawing a table, the pointer looks like a ________
A) pen B) vertical bar C) paint brush D) pencil