Coherent Closed Quasi-Clique Discovery from Large Dense Graph Databases

Size: px
Start display at page:

Download "Coherent Closed Quasi-Clique Discovery from Large Dense Graph Databases"

Transcription

1 Coherent Closed Qusi-Clique Discovery from Lrge Dense Grph Dtbses Zhiping Zeng, Jinyong Wng, Lizhu Zhou, George Krypis Tsinghu University, Beijing, 00084, P.R.Chin University of Minnesot, Minnepolis, MN 55455, USA ABSTRACT Frequent coherent subgrphscn provide vluble knowledge bout the underlying internl structure of grph dtbse, nd mining frequently occurring coherent subgrphs from lrge dense grph dtbseshs been witnessed severl pplictions nd received considerble ttention in the grph mining community recently. In this pper, we study how to efficiently mine the complete set of coherent closed qusi-cliques from lrge dense grph dtbses, which is n especilly chllenging tsk due to the downwrd-closure property no longer holds. By fully exploring some properties of qusicliques, we propose severl novel optimiztion techniques, which cn prune the unpromising nd redundnt sub-serch spces effectively. Menwhile, we devise n efficient closure checking scheme to fcilitte the discovery of only closed qusi-cliques. We lso develop coherent closed qusi-clique mining lgorithm, Cocin. Thorough performnce study shows tht Cocin is very efficient nd sclble for lrge dense grph dtbses. Ctegories nd Subject Descriptors: H..8 [Dtbse Mngement]: Dt Mining Generl Terms: Algorithms Keywords: Grph mining, Qusi-clique, Coherent subgrph.. INTRODUCTION Recently severl studies hve shown tht mining frequent coherent subgrphs is especilly useful, where coherent subgrph cn be informlly defined s subgrph tht stisfies minimum cut bound (nd the forml definition cn be found in Section.), s the set of frequent coherent subgrphs mined from grph dtbse usully reflects the density distribution of the reltionships mong the objects in the dtbse, nd cn provide vluble knowledge bout the internl structure of the grph dtbse. Coherent subgrph mining hs lso been witnessed severl pplictions such s This work ws supported by Ntionl Nturl Science Foundtion of Chin (NSFC) under Grnt No nd Bsic Reserch Foundtion of Tsinghu Ntionl Lbortory for Informtion Science nd Technology(TNList). Cocin stnds for Coherent closed qusi-clique mining. Permission to mke digitl or hrd copies of ll or prt of this work for personl or clssroom use is grnted without fee provided tht copies re not mde or distributed for profit or commercil dvntge nd tht copies ber this notice nd the full cittion on the first pge. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission nd/or fee. KDD 06, August 0 3, 006, Phildelphi, Pennsylvni, USA. Copyright 006 ACM /06/0008 $5.00. highly correlted stock discovery[5], gene function nnottion nd functionl module discovery[3]. Severl coherent subgrph discovery lgorithms hve been recently developed [3, 4, 6, 5]. However, ech of the previously proposed lgorithms hs its own limittions. For exmple, the lgorithm proposed in [4] cn only mine qusi-cliques with exct 00% support threshold; the lgorithms proposed in [6] cn only work on reltionl subgrphs, where vertex lbels re distinct in ech grph; similrly, the CLAN lgorithm [5] mines fully connected frequent subgrphs (i.e., frequent cliques). In this pper, we study more generl problem formultion: mining frequent qusi-cliques from lrge dense grph dtbses, tht is, we neither limit the minimum support to be 00% nor require the input grphs to be reltionl. While the problem becomes more generl, it gets more tough. As we will see lter, the downwrd-closure property[] no longer holds, devising some effective serch spce pruning techniques is especilly chllenging. By fully exploring some properties of qusicliques, we propose severl novel optimiztion techniques, menwhile, we devise n efficient closure checking scheme to fcilitte the discovery of only closed qusi-cliques. We lso develop n efficient coherent closed qusi-clique mining lgorithm, Cocin. The remining of this pper is orgnized s follows. Section introduces the problem formultion. In Section 3, we present lgorithm Cocin by focusing on severl optimiztion techniques. The empiricl results re exmined in Section 4. Finlly, we conclude our study in Section 5.. PROBLEM FORMULATION In this section, we introduce some preliminry concepts, nottions, nd terms in order to simplify our discussion. We lso formulte the problem we study. Tble summrizes the nottions we use in this pper nd their menings. Nottions V E L F G G G(S) N G (v) deg G (v) dis G (u, v) Description V = {v,v,, v k }, the set of vertices E V V, the set of edges the set of vertex lbels F :V L, the mpping function from lbels to vertices G =(V,E,L,F), n undirected vertex-lbeled grph G = V, the crdinlity of G the induced subgrph on S from G, S V (G) N G (v) ={u (v, u) E(G)} deg G (v) = N G (v) the number of edges in the shortest pth between u nd v Tble : Nottions used in this pper. Preliminries In this pper, we consider simple grph only, which does not contin self-loops, multi-edges, nd edge lbels. An undirected

2 vertex-lbeled grph trnsction, G, cn be represented by 4- tuple, G=(V, E,L,F). An induced subgrph of grph G is subset of the vertices of V (G) together with ny edges whose endpoints re ll in this subset. In the following discussions, the term grph mens the undirected vertex-lbeled grph, unless otherwise stted. DEFINITION.. (γ-qusi-clique) A k-grph(k ) G is γ- qusi-clique (0 γ ) if v V (G), deg G (v) γ (k ). From the definition we cn see tht qusi-cliques re subgrphs tht stisfy user-specifiedminimum vertex degree bound, γ (k ). Apprently, γ-qusi-clique must be fully connected grph when γ =, nd singleton grphs re considered s γ-qusi-cliques. If v V (G) such tht deg G (v)= γ (k ) nd γ (k ) γ k, v is clled criticl vertex of G w.r.t γ. Most of the existing frequent subgrph mining lgorithms re bsed on the downwrd-closure property. Unfortuntely, this property does not hold for qusi-clique ptterns. An induced subgrph of γ-qusi-clique my not be γ-qusi-clique. For instnce, in Figure, G ({v,v 3,v 4,v 5,u 6}) is 0.5-qusi-clique, but one of its induced subgrphs, G ({v,v 3,v 5,u 6}) is not 0.5-qusi-clique. DEFINITION.. (Edge Cut nd Edge Connectivity) Given connected grph G =(V, E), n edge cut is set of edges E c such tht G =(V,E E c) is disconnected. A minimum cut is the smllest set mong ll edge cuts. The edge connectivity of G, denoted by κ(g), is the size of the minimum cut. As shown in [6], the minimum vertex degree cn reflect the level of connectivity to some extent in grph, but they cnnot gurntee the grph is connected in blnced wy. However, the following lemm gives lower bound on the minimum cut when γ 0.5, which gurntees the coherency of γ-qusi-cliques. LEMMA.. (Minimum Edge Connectivity) Let n-grph Q = (V, E) be γ-qusi-clique (0.5 γ,n ). The edge connectivity of Q must be no smller thn n, i.e., κ(q) n. PROOF. Let us divide V into two sets, V nd V, nd suppose V V nd V =k, k n must hold. Since Q is γ-qusi-clique, v V, deg Q (v) γ (n ). However, v is t most djcent to other k vertices in V, nd k n < γ(n ). Therefore, v must be djcent to vertices belonging to V, nd the number of edges which connect v nd vertices in V must be no smller thn γ (n ) (k ). There re k vertices in V, so there exist t lest k ( γ (n ) (k )) edges between V nd V. Let f(k)=k ( γ (n ) (k )), then f(k) = k + k ( γ (n ) +) () d f(k) The second-order derivtive of f(k) (i.e., = ) isnegtive, f(k) chieves the mximum t its sole sttionry point k = dk γ (n ) +. As there exists only one sttionry point for qudrtic polynomil function f(k) nd k n, f(k) must get its minimum either t k= or t k= n. When k=, f()= γ (n ) n = n. While when k= n, ech vertex in V must be djcent to t lest one vertices in V, thus f( n ) n. From the bove result, we cn get tht k [, n ], f(k) n. According to the definition of edge connectivity, κ(q) n. Becuse we re more interested in mining tightly connected subgrphs, we do not expect tht the edge connectivity of subgrph is too smll in comprison with the minimum vertex degree. From Lemm., if γ 0.5 the vertices in the γ-qusi-clique re connected tightly nd reltively evenly. In this pper, γ-qusi-clique is sid to be coherent if γ 0.5, nd if not explicitly stted γ by defult hs vlue no smller thn 0.5. DEFINITION.3. (γ-isomorphism) A grph G ={V,E,L,F } is γ-isomorphic to nother grph G = {V,E,L,F } iff both of them re γ-qusi-cliques, G = G, nd there exists bijection f:v V such tht v V,F (v)= F (f(v)). According to the bove definition, we know tht the γ-isomorphism is quite different from the grph isomorphism in grph theory, which is defined s bijection f:v (G ) V (G ) from grph G to nother grph G, such tht (u, v) E(G ) iff (f(u),f(v)) E(G ). While the γ-isomorphism between two γ-qusi-cliques does not imply n exct bijection edge mpping. A multiset is defined s bg of vertex lbels in which the order is ignored, but multiplicity is explicitly significnt. Let M(G) indicte the multiset of G. From the γ-isomorphism definition, we cn derive the following lemm directly: two γ-qusi-cliques, G nd G, re γ-isomorphic to ech other iff M(G )=M(G ). For two γ-qusi-clique Q nd Q,ifM(Q) M(Q ), Q is clled subqusi-clique of Q, while Q is clled superqusi-clique of Q. We use Q Q or Q Q (i.e. Q Q but Q Q ) to denote the subqusi-clique or proper subqusi-clique reltionship.. Problem Definition A grph trnsction dtbse, D, consists of set of input grphs, nd the crdinlity of D is denoted by D. Figure shows n exmple of grph trnsction dtbse D, which consists of two input grphs, G nd G. u 5 d u u c Grph G u 4 b e u 6 u 3 b v 3 d v v 4 c v b v 6 Grph G Figure : An exmple of grph dtbse D For two grphs G nd G, let g be n induced subgrph of G, if M(g)=M(G ), we cll g n instnce of G in G. If there exists t lest one instnce of G in G, we sy tht grph G roughly supports G. Menwhile, if g is γ-isomorphic to nother γ-qusiclique Q, we cll g n embedding of Q in G. If there exists t lest one embedding of Q in G, G is sid to strictly support Q. The number of input grphs in grph dtbse D tht strictly (or roughly) support γ-qusi-clique Q (or grph G) is clled the bsolute strict-support (or bsolute rough-support) of Q (or G)in D, denoted by sup D s (Q) (or sup D r (G)), while the reltive strictsupport rsup D s (Q) (or reltive rough-support rsup D r (G)) is defined s rsup D s (Q)=sup D s (Q)/ D (nd rsup D r (G)=sup D r (G)/ D ). Given n bsolute support threshold min sup nd grph trnsction dtbse D, qusi-clique Q (or subgrph g) is clled frequent qusi-clique (or vice-frequent grph) if sup D s (Q) min sup (or sup D r (g) min sup). If there does not exist ny nother qusi-clique Q such tht Q Q nd sup D s (Q) sup D s (Q ), Q is clled closed qusi-clique in D. Here the definition of closed pttern is little different from the trditionl one, due to the bsence of the downwrd-closure property for qusi-clique ptterns, nd it is possible tht qusiclique s strict-support is greter thn tht of its subqusi-cliques. Also, in the cse tht Q Q nd sup D s (Q) sup D s (Q ), we sy Q cn subsume Q. b c v 5

3 In this pper, given D nd min sup, we study the problem of mining the complete set of γ-qusi-cliques in D tht re frequent, closed, nd lso coherent (i.e., γ 0.5). 3. Cocin: EFFICIENTLY MINING CLOSED COHERENT QUASI-CLIQUES In this section, we describe our comprehensive solution to frequent closed coherent qusi-clique mining, including n efficient cnonicl representtion of coherent qusi-clique, subgrph enumertion frmework, severl serch spce pruning techniques, nd qusi-clique closure checking scheme. We lso present the integrted lgorithm, Cocin. 3. Cnonicl Representtion of Subgrphs One of the key issues in grph mining is how to choose n efficient cnonicl form tht cn uniquely represent grph nd hs low computtionl complexity in order to fcilitte the grph isomorphism testing. Some previously proposed solutions to this problem re designed for generl grph nd my not be the most efficient representtion for qusi-clique. According to the Section., we cn see tht multiset preserves much informtion for qusi-clique. Given k-grph g, we cll ny sequence of ll elements in M(g) grph string. Assume there is totl order on the vertex lbels, we define the following totl order of ny two strings p nd q with size p nd q respectively. Let p i denote the i-th vertex lbel in string p, we define p<q if either of the following two conditions holds: () t (0<t min{ p, q }) such tht i [,t ], p i=q i nd p t<q t, () ( p < q ) nd i [, p ], p i=q i; otherwise p q. A string S = n is clled substring of nother string S b=b b b m, denoted by S S b (or S S b if m>n), if there exist n integers i <i < i n m such tht =b i, =b i,, n=b in. DEFINITION 3.. The cnonicl form of grph G is defined s the minimum string mong ll its strings nd denoted by CF(G). As we ignore the exct topology of qusi-clique, it is evident tht the bove definition is unique representtion of qusiclique. However, we note tht it does not hold for generl grph. After giving the definition of the cnonicl form of grph nd the substring reltionship, we cn derive the following two lemms to fcilitte γ-isomorphism checking nd subqusi-clique reltionship checking. LEMMA 3.. Two γ-qusi-cliques Q nd Q re γ-isomorphic to ech other iff CF(Q )=CF(Q ). LEMMA 3.. Given two γ-qusi-cliques Q nd Q, Q Q (or Q Q )iffcf(q ) CF(Q ) (or CF(Q ) CF(Q )). The bove two lemms cn be derived esily from the definition of γ-isomorphism nd subqusi-clique reltionship respectively, here we omit the proof. 3. Vice-Frequent Subgrph Enumertion According to the definition of vice-frequent grph, it is evident tht ny induced subgrph of vice-frequent grph must be lso vice-frequent. Thus, the downwrd-closure property cn be exploited for vice-frequent subgrph enumertion. Bsed on the definition of embedding nd instnce of subgrph, we cn see tht the embedding is specil type of the instnce, n embedding of qusi-clique q must be n instnce of q. Given γ-qusi-clique Q, ssup D s (Q) sup D r (Q) holds, if Q is frequent, Q must be vice-frequent. Consequently, we cn discover the complete set of frequent γ-qusi-cliques from the set of vicefrequent subgrphs. By conceptully orgnizing the vice-frequent subgrphs into lttice-like structure in the wy we used in [5], the problem of mining frequent qusi-cliques becomes how to trverse the lttice-like structure to enumerte vice-frequent subgrphs nd discover frequent γ-qusi-cliques. In our running exmple in Figure, ssume the totl order mong vertex lbels is b c d e, ll the vice-frequent subgrphs re orgnized into structure s shown in Figure. Note tht here we use cnonicl form:rough-support:strict-support to represent subgrph. In ddition, ll nodes with yellow color re vicefrequent subgrphs but not frequent qusi-cliques, nodes with blue color re non-closed frequent qusi-cliques, nd nodes with ornge color re closed qusi-cliques. Figure shows tht mong ll the vice-frequent subgrphs, only bd:: nd bcd:: re closed qusicliques. We lso dopt the DFS serch strtegy s we used in [5] to trverse the lttice-like structure. In this wy, we cn get rudimentry lgorithm to discover frequent closed γ-qusi-cliques. However, due to gret del of redundncy during the enumertion, this rudimentry lgorithm is too expensive nd costs too much spce nd runtime. :: b:: c:: d:: b:: c:: d:: bb::0 bc:: bd:: cd:: bb:: γ = 0.5 min_sup= bc:: bd:: cd:: bbc::0 bbd::0 bcd:: bbc::0 bbd::0 φ bbcd::0 bcd::0 bbcd::0 Figure : A lttice-like structure built from the vice-frequent subgrphs of our running exmple Structurl Redundncy Pruning. As shown in [5], much redundncy exists if we just simply use the DFS serch strtegy. In order to eliminte the structurl redundncy while mintining the completeness of the result set, we propose n efficient vicefrequent subgrph enumertion method. Given n m-grph G nd CF(G)= 0 m, we require G cn only be generted by growing the subgrph g with cnonicl form CF(g)= 0 m. In this wy, except the node φ, ech node in the lttice-like structure hs only one prent, nd this lttice-like structure would turn to tree structure. Let LAS(g) be the lst element in CF(g) (i.e., LAS(g)= m), obviously, in the enumertion tree structure ll descendnts of the node g would be in the form of CF(g) b 0b b k, where b 0 LAS(g) nd i [,k], b i b i. 3.3 Serch Spce Pruning In this subsection, we propose severl novel optimiztion techniques to prune futile serch subspces bsed on some nice properties of qusi-cliques Preliminries Before we elborte on the pruning techniques, let us first introduce the following two importnt lemms which form the foundtion of severl pruning techniques. Level 3 4 5

4 LEMMA 3.3. If m+u< γ (k + u) (where m, u, k 0, nd 0.5 γ ), then m< γ k nd i [0,u], m + i< γ (k + i). PROOF. First, we ssume m γ k, then m + u γ k + u γ k + γ u γ (k + u), which contrdicts with the fct m+u< γ (k + u). Thus, m< γ k holds. Second, let t=u i, then m+i=m+u t < γ (k + u) t γ (k + u) γ t γ ((k + u) t) = γ (k + i). LEMMA 3.4. (Mximl Dimeter) If grph Q is γ-qusiclique, then u, v V (Q), dis Q (u, v). PROOF. Let Q =n (n ). u, v V (Q), ifu nd v re djcent to ech other, then dis Q (u, v)=. While if u nd v re not djcent, then N Q (u) N Q (v) (n ). Furthermore, s Q is γ-qusi-clique, N Q (u) γ (n ) nd N Q (v) γ (n ) hold. Therefore, N Q (u) N Q (v) φ, otherwise N Q (u) N Q (v) = N Q (u) + N Q (v) γ (n ). Also, since γ 0.5, wehve γ (n ) (n ). Thus, N Q (u) N Q (v) (n ) holds, which contrdicts with the fct N Q (u) N Q (v) (n ). As result, there must exist t lest one vertex which is djcent to both u nd v, nd dis Q (u, v)= must hold. Therefore, from the bove nlysis, we cn get u, v V (Q), dis Q (u, v) Pruning Methods From Lemm 3.4, we cn derive the following lemm to help us prune some futile brnches. LEMMA 3.5. (Dimeter Pruning) Let G be grph nd S V (G),ifG(S) is γ-qusi-clique, then u,v S, dis G (u, v). PROOF. AsG(S) is subgrph of G, dis G(S) (u, v) dis G (u, v) holds. In ddition, ccording to Lemm 3.4, we hve dis G(S) (u, v). Therefore, dis G (u, v) must hold. Given grph G, let S V (G) nd v V (G) S, from Lemm 3.5 we know tht if G(S) nd v cn form bigger qusi-clique, u S, dis G (v, u) must hold. Accordingly, strightforwrd nd resonble ppliction of Lemm 3.5 is to discover the extensible vertices of subgrph which cn be used to form qusicliques lter. First, we clculte the extensible vertex set E(u) for ech vertex u in G(S), then conjoin ll E(u) s to obtin the globl extensible vertex set. Obviously, E(u) cn be divided into two subsets. One is denoted by D(u), which consists of the vertices tht re djcent to u, i.e., D(u) ={v dis G (u, v) =}; nother subset is denoted by I(u), where I(u) ={v u D(u), dis G (u,v)= nd v/ D(u)}. The set D(u) cn be obtined esily, nd I(u) cn be computed from D(u) in the wy of discovering vertices which re djcent to t lest one vertex in D(u). In this wy, we cn discover extensible vertex set for n instnce of subgrph G(S) nd cn prune some unpromising vertices. Combintion Pruning. We cn combine the structurl redundncy pruning with Dimeter Pruning to further shrink the the extensible vertex set. As stted in structurl redundncy pruning, only those vertices whose lbels re no smller thn LAS(g) cn be used to grow g, where g is the current prefix subgrph. Therefore, when clculting E(u) we cn remove the vertices whose lbels re smller thn LAS(g), nd the removl of some vertices in E(u) my mke some vertices left in E(u) violte the condition of n extensible vertex introduced in Lemm 3.4. For exmple, suppose v 0 I(u) nd there exists only one vertex v such tht v D(u) nd dis G (v 0,v )=, ifv / V (g) nd the lbel of v is smller thn LAS(g), then v will never pper in ll descendnts of g, thus the descendnt g of g which contins vertex v 0 cnnot be qusi-clique, s dis g (u, v 0)> must hold. Therefore, we cn remove the vertex v 0 from E(u) sfely. In order to eliminte these vertices efficiently, fter getting D(u), we remove the vertices in D(u) whose lbels re smller thn LAS(g) nd in the mentime do not belong to V (g). After we compute the finl set of extensible vertices, E(u), for ech vertex u in subgrph g, we cn then conjoin ll the E(u) s to get the globl extensible vertex set w.r.t. g. We cll n element in the globl extensible vertex set n extensible cndidte w.r.t. g, nd use Vcd(g) G to denote the set of extensible cndidtes w.r.t. g in G. In the following, we propose other three optimiztion techniques bsed on Lemm 3.3 which cn be used to prune the unpromising serch spce effectively. For v Vcd(g), G we define the internl set V g in (v)=n G (v) V (g) nd externl set Vex(v)=N g G (v) Vcd(g). G Let indeg g (v)= V g in (v) be the inner degree of v, nd exdeg g (v)= Vex g be the extern degree of v. Tke Figure for n exmple, ssume g=g ({v 5}), V G cd (g)={v3, v4 } (note v nd v6 hve been pruned by Combintion Pruning), indeg g (v 3)=0, exdeg g (v 3)=. LEMMA 3.6. (Vertex Connectivity Pruning) Suppose g is k-subgrph of G, if v Vcd(g) G such tht indeg(v) < γ k nd indeg g (v)+exdeg g (v)< γ (k + exdeg g (v)), there does not exist qusi-clique Q in G such tht V (Q) V (g) {v}. PROOF. Assume there exists qusi-clique Q such tht V (Q) V (g) {v}, nd let Q =l. Since Q is qusi-clique, V (Q) V (g) Vcd(g). G We define R=V (Q) Vex(v) g nd denote R by m, then l k m nd m Vex(v) =exdeg g g (v). Becuse indeg g (v) < γ k nd indeg g (v) +exdeg g (v)< γ (k + exdeg g (v)), ccording to the Lemm 3.3, we cn get tht i [0,exdeg g (v)], indeg g (v)+i< γ (k + i). Thus, deg Q (v)= indeg g (v)+m< γ (k + m) γ (l ), i.e. deg Q (v)< γ ( Q ). This contrdicts with the ssumption tht Q is qusi-clique. In the cse of indeg g (v)+exdeg g (v)< γ (k + exdeg g (v)), v is clled n invlid extensible cndidte, otherwise it is clled vlid extensible cndidte. Obviously, the invlid extensible cndidtes do not mke ny contribution to the genertion of bigger qusi-cliques. Therefore, fter getting the extensible cndidte set Vcd(g), G we could remove ll invlid extensible cndidtes from Vcd(g). G Due to the removl of these vertices, some originlly vlid extensible cndidtes my turn to be invlid, so we cn do this pruning itertively until no vertex cn be removed from Vcd(g). G We denote the remining set by Vvd(g). G Hence, if G(S) is qusiclique in G nd S V (g), S V (g) Vvd(g). G Accordingly,we only need to use the vertices in V vd(g) G to grow g, which cn further improve the lgorithm s efficiency. Assume g is subgrph of grph G, for vertex u V (g), let Vext(u)=N g G (u) Vvd(g), G nd the extensible degree be the crdinlity of Vext(u), g i.e., extdeg g (u)= Vext(u). g If there exists criticl vertex v in g such tht extdeg g (v) = 0, we cll v filed-vertex of g. LEMMA 3.7. (Criticl Connectivity Pruning) If there exists filed-vertex v in k-subgrph g of G, there will be no such n induced subgrph Q of G tht V (Q) V (g) nd Q is qusiclique. PROOF. We prove this by contrdiction. Let Q be such n induced subgrph of G nd Q = m. Obviously m > knd V (Q) V (g) Vvd(g). G Since v is criticl vertex in g, deg g (v) = γ (k ) nd γ (k ) < γ k. Furthermore, becuse deg Q (v) deg g (v) +extdeg g (v) nd extdeg g (v) =0, deg Q (v) < γ k γ (m ), which contrdicts with the ssumption. Thus, there must exist no such n induced subgrph.

5 Given k-subgrph g of grph G, if u V (g) such tht deg g (u) < γ (k ) nd deg g (u)+extdeg g (u) < γ (k +extdeg g (u)), we cll u n unpromising vertex in g. LEMMA 3.8. (Subgrph Connectivity Pruning) If k-subgrph g of G contins n unpromising vertex u, there will be no induced subgrph Q of G such tht V (Q) V (g) nd Q is qusi-clique. PROOF. Let Q be such n induced subgrph nd Q = l. Since Q is γ-qusi-clique, V (Q) V (g) Vvd(g) G holds. Let V = V (Q) Vext(u) g nd V = m, then l m+ V (g) =m+k. Becuse deg g (u) < γ (k ) nd deg g (u) +extdeg g (u) < γ (k +exdeg g (u)), from Lemm 3.3 we cn get tht i [0,exdeg g (u)],deg g (u) +i< γ (k +i). Thus, deg Q (u) =deg g (u)+ V = deg g (u)+m < γ (k +m) γ (l ), tht is, deg Q (u) < γ ( Q ). This contrdicts with the ssumption tht Q is γ-qusi-clique. According to Lemm 3.7 nd Lemm 3.8, if subgrph contins filed-vertex or n unpromising vertex, it does not mke ny contribution to the genertion of qusi-cliques. Thereby, fter getting the vlid extensible cndidte set V vd(g), G once we inspect the existence of filed-vertices or unpromising vertices in g, then there is no hope to grow instnce g to generte qusi-cliques, nd thus we cn stop growing g. 3.4 Closure Checking Scheme By integrting the pruning techniques proposed in this pper with the vice-frequent subgrph enumertion frmework, we cn discover the complete set of frequent qusi-cliques. How do we discover the closed qusi-cliques? A strightforwrd pproch is to store ll the frequent qusi-cliques tht we hve found, nd when inserting qusi-clique q to the result, we do super-clique-detecting which checks whether there lredy exists n element q such tht cn subsume the current q nd sub-clique-detecting which checks if there exists ny lredy mined qusi-clique q tht cn be subsumed by q. Obviously, this nïve pproch is very costly, we will introduce more efficient closure checking scheme. Given two subgrphs, G nd G, with cnonicl forms CF(G ) = n nd CF(G )=b b b m (where n<m) respectively, if CF(G ) CF(G ), there must exist n integers i <i << i n m such tht =b i, =b i,, n=b in.ifi n=n, the reltionship of CF(G ) nd CF(G ) in the enumertion tree cn be illustrted in Figure 3(), tht is, the node corresponding to CF(G ) is n ncestor of the node corresponding to CF(G ). Otherwise, let k = min{j i j j}, then CF(G ) nd CF(G ) hve the sme prefix k (if k=, the prefix is empty) nd k>b k (s k=b ik,i k>k, nd b k<b ik hold), thus CF(G )>CF (G ) holds, nd this reltionship in the enumertion tree is shown in Figure 3(b). n n b n + () Descendnt CF(G ) b nbn + bn + m b b k k k _ b k m k _ (b) Non-descendnt k _ k CF(G ) CF(G ) CF(G ) Figure 3: Two Cses of CF(G ) CF(G ) in Vice-Frequent Subgrph Enumertion Tree One strtegy to speed up the pttern closure checking is tht we postpone the closure checking for G until ll its descendnts hve n been processed. In this wy, G must be discovered before G for the first cse shown in Figure 3(), s the node CF(G ) is descendnt of CF(G ). In the second cse s shown in Figure 3(b), it is evident tht G is lso discovered before G ccording to the DFS trverse strtegy. In summry, if the current qusi-clique G cn be subsumed by nother frequent closed γ-qusi-clique G (i.e., CF(G ) CF(G ) nd sup D s (G ) sup D s (G )), the insertion of G into the result set will occur before the closure checking of G. Accordingly, when we check if frequent qusi-clique q is closed or not, there is no need to perform sub-clique-detecting, s there does not exist ny qusi-clique q in the result set such tht CF(q ) CF(q) nd sup D s (q ) sup D s (q). Although there is no need for sub-clique-detecting, we still hve to perform super-clique-detecting. As shown in Figure 3, there re two cses for super-clique-detecting. In the first cse, we need to check if there exists descendnt qusi-clique G of the current qusi-clique G tht cn subsume G in the enumertion tree. According to our strtegy described bove, we know G must be mined fter ll its descendnts, the super-clique-detecting in this cse becomes reltively simple. After the processing of ll descendnts of G, we let the recursive mining procedure return the mximum strict-support (denoted by r) of ll frequent qusi-clique nodes under the subtree rooted with CF(G ) (if there does not exist ny frequent qusi-clique, then it returns vlue zero). If sup D s (G ) r, we know G is non-closed nd will not insert G into the result set. However, if sup D s (G )>r, we still need to check if there exists ny non-descendnt super-clique of G tht cn subsume G (i.e., the second cse shown in Figure 3(b)). In order to ccelerte the non-descendnt super-clique-detecting process, we divide the elements in the result set into different groups ccording to their bsolute strict-support. In ech group, we first order them by the size of the qusi-cliques in descending order, nd mong the qusi-cliques with the sme size in the sme group, we then order them by their cnonicl form in descending order. This processing cn ccelerte the comprison steps. 3.5 The Algorithm In the following we describe the Cocin lgorithm by integrting vrious techniques discussed erlier. Let us first introduce the SUB- ALGORITHM :Vlid, which is clled by Cocin in order to compute the vlid extensible cndidtes for n instnce subgrph. For ech vertex u in current instnce g, we scn the grph G in which g resides to find the set D(u) (line 06), nd refine D(u) bsed on the combintion pruning technique (line 07). Then we generte the set I(u) from D(u), obtin the extensible cndidte set T of u (lines 08-0), nd conjoin ech discovered extensible cndidte set to get the globl extensible cndidtes rs (line ). Finlly, we pply the vertex connectivity pruning (line ), criticl connectivity pruning, nd subgrph connectivity pruning (lines 3-4) to rs to generte the finl set of vlid extensible cndidtes w.r.t. g. Before running Cocin s shown in ALGORITHM, we first compute the set of vice-frequent vertex lbels nd their corresponding instnces by scnning the originl dtbse, nd remove from the grph dtbse the vertices with non-vice-frequent vertex lbels. This procedure cn reduce the size of input grphs significntly, especilly when min sup is high. After this preprocessing, we use Cocin to mine the complete set of frequent closed coherent qusi-cliques. For the current prefix vice-frequent subgrph g, we first use procedure Vlid to get the set of vlid extensible cndidtes V vd for ech instnce of g (lines 7-8), from which we cn further clculte the vice frequent extensible lbels (line 9). For ech vice-frequent extensible lbel, we invoke Cocin to discover descendnts of g (lines -3). After ll recursive invo-

6 ctions hve returned, we cn use the closure checking scheme to determine whether or not to insert g to the finl result set ccording to the strict-support of g nd the returned vlues of the recursive invoctions (lines 4-5). SUBALGORITHM : Vlid(g) INPUT: () g: n instnce subgrph. OUTPUT: () rs: the set of vlid extensible cndidtes w.r.t. g. BEGIN 0. set rs = V (G)(G is the grph in which g resides); 0. For ech vertex u in V (g) 03. If rs is empty 04. brek; 05. set T = D = I = φ; 06. D = {v dis G (u, v) =}; 07. Refine D using combintionpruning; 08. I = {v t D, dis G (t, v) =nd v/ D}; 09. T = D I; 0. Remove ech element v T which stisfies L(v ) <LAS(g);. rs = rs T ;. Remove invlid extensible cndidtes from rs; 3. If there exists filed or n unpromising vertex in g 4. rs = φ; 5. return rs; END ALGORITHM : Cocin(D, CF(g),INS(g),min sup,γ) INPUT: () D: the input grph dtbse, () CF(g): the cnonicl form of g, (3) INS(g): the set of instnces of g in the dtbse D, (4) min sup: the minimum support threshold, (5) γ: the edge density coefficient. OUTPUT: () rs: the set of frequent closed γ-qusicliques, () mx: the mximum strict-support of ll descendnt qusi-cliques of g. BEGIN 6. glbsup=0, rv=0; 7. For ech instnce ins INS(g) 8. V vd(ins) =Vlid(ins); 9. Clculte vice-frequent vlid cndidte lbel set VEX(g) ccording to ech V vd(ins); 0. Sort the lbels in VEX(g) in certin order;. For ech lbel l VEX(g). rv = Cocin(D, CF(g) l, INS(g l),min sup, γ); 3. glbsup = mx{glbsup, rv}; 4. If (sup s(g) min sup) nd (sup s(g) >glbsup) 5. Insert CF(g) into RS if g psses the non-descendntsuper-clique-detecting; 6. return mx{sup s(g),glbsup}; END 4. EMPIRICAL RESULTS We conducted n extensive performnce study to evlute vrious spects of the lgorithm. We implemented the lgorithm in C++, nd ll experiments were performed on PC running FC 4 Linux nd with.8ghz AMD Sempron CPU nd GB memory. In the experiments, we used the US stock mrket series dtbse [], which ws converted to set of grphs bsed on the sme method of [5]. Due to limited spce, here we only report the results w.r.t. correltion coefficient of Efficiency Test. We implemented one bseline lgorithm, Rw, which excludes three pruning techniques, combintion pruning, criticl connectivity pruning, nd subgrph connectivity pruning. By compring the runtime efficiency between Cocin nd Rw, we cn get n ide bout the effectiveness of the pruning techniques proposed in this pper. Figure 4 shows the runtime comprison between Cocin nd Rw by fixing γ t.0 nd vrying min sup, nd fixing min sup t 40% nd vrying γ respectively. We see tht Cocin is lwys fster thn Rw. The high performnce of Cocin in comprison with Rw lso demonstrtes tht the pruning techniques proposed for Cocin re extremely effective Runtime(sec) Cocin Rw Reltive Strict-Support Threshold (%) ) γ = Runtime(sec) Cocin Rw Edge Density Coefficient b) min sup=40% Figure 4: Efficiency Comprison (stock mrket dt) Sclbility Test. Menwhile, comprehensive sclbility study ws conducted in terms of the bse size. The results show tht Cocin hs liner sclbility in runtime ginst the number of input grphs in dtbse. 5. CONCLUSION In this pper we proposed novel lgorithm, Cocin, to mine frequent closed coherent qusi-cliques from lrge dense grph dtbses. By focusing on vertex lbels, we first introduced simple cnonicl form to uniquely represent qusi-clique pttern. By exploring some nice properties of qusi-clique ptterns, we proposed severl effective serch spce pruning techniques, dimeter pruning, combintion pruning, vertex connectivity pruning, criticl connectivity pruning, nd subgrph connectivity pruning, which could be used to ccelerte the mining process. We lso introduced n efficient pttern closure checking scheme to speed up the discovery of closed qusi-cliques. An extensive performnce study with both rel nd synthetic dtbses hs demonstrted tht Cocin is very efficient nd sclble. 6. ACKNOWLEDGEMENT The uthors re grteful to Vldimir L. Boginski, Pnos M. Prdlos, nd Sergiy Butenko for providing us the US stock mrket dtbse. We thnk Jsmine Zhou nd Hiyn Hu for sending us the yest microrry dtbse nd Michihiro Kurmochi for sending us the KEGG dtbse. Thnks lso go to Beng Chin Ooi, Anthony K. H. Tung nd Xifeng Yn for their kind help. 7. REFERENCES [] R. Agrwl, R. Sriknt. Fst Algorithms for Mining Assocition Rules in Lrge Dtbses. VLDB 94. [] V. Boginski, S. Butenko, P.M. Prdlos. On structurl properties of the mrket grph. In A. Ngurney (editor), Innovtions in Finncil nd Economic Networks, Edwrd Elgr Publishers, Apr [3] H. Hu, X. Yn, Y. Hng, J. Hn, X. Zhou. Mining coherent dense subgrphs cross mssive biologicl network for functionl discovery. Bioinformtics, Vol., Suppl., 005. [4] J. Pei, D. Jing, A. Zhng. On mining cross-grph qusi-cliques. SIGKDD 05. [5] J. Wng, Z. Zeng, L. Zhou. CLAN:An Algorithm for Mining Closed Cliques From Lrge Dense Grph Dtbses. ICDE 06. [6] X. Yn, X. Zhou, J. Hn. Mining closed reltionl grphs with connectivity constrints. SIGKDD 05.

5.7 Improper Integrals

5.7 Improper Integrals 458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the

More information

Fast Frequent Free Tree Mining in Graph Databases

Fast Frequent Free Tree Mining in Graph Databases The Chinese University of Hong Kong Fst Frequent Free Tree Mining in Grph Dtses Peixing Zho Jeffrey Xu Yu The Chinese University of Hong Kong Decemer 18 th, 2006 ICDM Workshop MCD06 Synopsis Introduction

More information

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below. Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we

More information

The Regulated and Riemann Integrals

The Regulated and Riemann Integrals Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

Review of Calculus, cont d

Review of Calculus, cont d Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying Vitli covers 1 Definition. A Vitli cover of set E R is set V of closed intervls with positive length so tht, for every δ > 0 nd every x E, there is some I V with λ(i ) < δ nd x I. 2 Lemm (Vitli covering)

More information

Lecture 1. Functional series. Pointwise and uniform convergence.

Lecture 1. Functional series. Pointwise and uniform convergence. 1 Introduction. Lecture 1. Functionl series. Pointwise nd uniform convergence. In this course we study mongst other things Fourier series. The Fourier series for periodic function f(x) with period 2π is

More information

Math 1B, lecture 4: Error bounds for numerical methods

Math 1B, lecture 4: Error bounds for numerical methods Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the

More information

Theoretical foundations of Gaussian quadrature

Theoretical foundations of Gaussian quadrature Theoreticl foundtions of Gussin qudrture 1 Inner product vector spce Definition 1. A vector spce (or liner spce) is set V = {u, v, w,...} in which the following two opertions re defined: (A) Addition of

More information

New data structures to reduce data size and search time

New data structures to reduce data size and search time New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute

More information

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Finite Automt Theory nd Forml Lnguges TMV027/DIT321 LP4 2018 Lecture 10 An Bove April 23rd 2018 Recp: Regulr Lnguges We cn convert between FA nd RE; Hence both FA nd RE ccept/generte regulr lnguges; More

More information

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature CMDA 4604: Intermedite Topics in Mthemticl Modeling Lecture 19: Interpoltion nd Qudrture In this lecture we mke brief diversion into the res of interpoltion nd qudrture. Given function f C[, b], we sy

More information

Handout: Natural deduction for first order logic

Handout: Natural deduction for first order logic MATH 457 Introduction to Mthemticl Logic Spring 2016 Dr Json Rute Hndout: Nturl deduction for first order logic We will extend our nturl deduction rules for sententil logic to first order logic These notes

More information

1 Online Learning and Regret Minimization

1 Online Learning and Regret Minimization 2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in

More information

19 Optimal behavior: Game theory

19 Optimal behavior: Game theory Intro. to Artificil Intelligence: Dle Schuurmns, Relu Ptrscu 1 19 Optiml behvior: Gme theory Adversril stte dynmics hve to ccount for worst cse Compute policy π : S A tht mximizes minimum rewrd Let S (,

More information

Alignment of Long Sequences. BMI/CS Spring 2016 Anthony Gitter

Alignment of Long Sequences. BMI/CS Spring 2016 Anthony Gitter Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2016 Anthony Gitter gitter@biostt.wisc.edu Gols for Lecture Key concepts how lrge-scle lignment differs from the simple cse the

More information

20 MATHEMATICS POLYNOMIALS

20 MATHEMATICS POLYNOMIALS 0 MATHEMATICS POLYNOMIALS.1 Introduction In Clss IX, you hve studied polynomils in one vrible nd their degrees. Recll tht if p(x) is polynomil in x, the highest power of x in p(x) is clled the degree of

More information

A recursive construction of efficiently decodable list-disjunct matrices

A recursive construction of efficiently decodable list-disjunct matrices CSE 709: Compressed Sensing nd Group Testing. Prt I Lecturers: Hung Q. Ngo nd Atri Rudr SUNY t Bufflo, Fll 2011 Lst updte: October 13, 2011 A recursive construction of efficiently decodble list-disjunct

More information

ARITHMETIC OPERATIONS. The real numbers have the following properties: a b c ab ac

ARITHMETIC OPERATIONS. The real numbers have the following properties: a b c ab ac REVIEW OF ALGEBRA Here we review the bsic rules nd procedures of lgebr tht you need to know in order to be successful in clculus. ARITHMETIC OPERATIONS The rel numbers hve the following properties: b b

More information

Overview of Calculus I

Overview of Calculus I Overview of Clculus I Prof. Jim Swift Northern Arizon University There re three key concepts in clculus: The limit, the derivtive, nd the integrl. You need to understnd the definitions of these three things,

More information

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz

More information

N 0 completions on partial matrices

N 0 completions on partial matrices N 0 completions on prtil mtrices C. Jordán C. Mendes Arújo Jun R. Torregros Instituto de Mtemátic Multidisciplinr / Centro de Mtemátic Universidd Politécnic de Vlenci / Universidde do Minho Cmino de Ver

More information

1.3 Regular Expressions

1.3 Regular Expressions 56 1.3 Regulr xpressions These hve n importnt role in describing ptterns in serching for strings in mny pplictions (e.g. wk, grep, Perl,...) All regulr expressions of lphbet re 1.Ønd re regulr expressions,

More information

Frobenius numbers of generalized Fibonacci semigroups

Frobenius numbers of generalized Fibonacci semigroups Frobenius numbers of generlized Fiboncci semigroups Gretchen L. Mtthews 1 Deprtment of Mthemticl Sciences, Clemson University, Clemson, SC 29634-0975, USA gmtthe@clemson.edu Received:, Accepted:, Published:

More information

Bases for Vector Spaces

Bases for Vector Spaces Bses for Vector Spces 2-26-25 A set is independent if, roughly speking, there is no redundncy in the set: You cn t uild ny vector in the set s liner comintion of the others A set spns if you cn uild everything

More information

A New Grey-rough Set Model Based on Interval-Valued Grey Sets

A New Grey-rough Set Model Based on Interval-Valued Grey Sets Proceedings of the 009 IEEE Interntionl Conference on Systems Mn nd Cybernetics Sn ntonio TX US - October 009 New Grey-rough Set Model sed on Intervl-Vlued Grey Sets Wu Shunxing Deprtment of utomtion Ximen

More information

Graph Theory. Dr. Saad El-Zanati, Faculty Mentor Ryan Bunge Graduate Assistant Illinois State University REU. Graph Theory

Graph Theory. Dr. Saad El-Zanati, Faculty Mentor Ryan Bunge Graduate Assistant Illinois State University REU. Graph Theory Grph Theory Gibson, Ngel, Stnley, Zle Specil Types of Bckground Motivtion Grph Theory Dniel Gibson, Concordi University Jckelyn Ngel, Dominicn University Benjmin Stnley, New Mexico Stte University Allison

More information

Recitation 3: More Applications of the Derivative

Recitation 3: More Applications of the Derivative Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech

More information

Best Approximation. Chapter The General Case

Best Approximation. Chapter The General Case Chpter 4 Best Approximtion 4.1 The Generl Cse In the previous chpter, we hve seen how n interpolting polynomil cn be used s n pproximtion to given function. We now wnt to find the best pproximtion to given

More information

4.4 Areas, Integrals and Antiderivatives

4.4 Areas, Integrals and Antiderivatives . res, integrls nd ntiderivtives 333. Ares, Integrls nd Antiderivtives This section explores properties of functions defined s res nd exmines some connections mong res, integrls nd ntiderivtives. In order

More information

Module 9: Tries and String Matching

Module 9: Tries and String Matching Module 9: Tries nd String Mtching CS 240 - Dt Structures nd Dt Mngement Sjed Hque Veronik Irvine Tylor Smith Bsed on lecture notes by mny previous cs240 instructors Dvid R. Cheriton School of Computer

More information

Module 9: Tries and String Matching

Module 9: Tries and String Matching Module 9: Tries nd String Mtching CS 240 - Dt Structures nd Dt Mngement Sjed Hque Veronik Irvine Tylor Smith Bsed on lecture notes by mny previous cs240 instructors Dvid R. Cheriton School of Computer

More information

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by. NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with

More information

Math 4310 Solutions to homework 1 Due 9/1/16

Math 4310 Solutions to homework 1 Due 9/1/16 Mth 4310 Solutions to homework 1 Due 9/1/16 1. Use the Eucliden lgorithm to find the following gretest common divisors. () gcd(252, 180) = 36 (b) gcd(513, 187) = 1 (c) gcd(7684, 4148) = 68 252 = 180 1

More information

New Expansion and Infinite Series

New Expansion and Infinite Series Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University

More information

P 3 (x) = f(0) + f (0)x + f (0) 2. x 2 + f (0) . In the problem set, you are asked to show, in general, the n th order term is a n = f (n) (0)

P 3 (x) = f(0) + f (0)x + f (0) 2. x 2 + f (0) . In the problem set, you are asked to show, in general, the n th order term is a n = f (n) (0) 1 Tylor polynomils In Section 3.5, we discussed how to pproximte function f(x) round point in terms of its first derivtive f (x) evluted t, tht is using the liner pproximtion f() + f ()(x ). We clled this

More information

Parse trees, ambiguity, and Chomsky normal form

Parse trees, ambiguity, and Chomsky normal form Prse trees, miguity, nd Chomsky norml form In this lecture we will discuss few importnt notions connected with contextfree grmmrs, including prse trees, miguity, nd specil form for context-free grmmrs

More information

Decomposition of terms in Lucas sequences

Decomposition of terms in Lucas sequences Journl of Logic & Anlysis 1:4 009 1 3 ISSN 1759-9008 1 Decomposition of terms in Lucs sequences ABDELMADJID BOUDAOUD Let P, Q be non-zero integers such tht D = P 4Q is different from zero. The sequences

More information

Binding Numbers for all Fractional (a, b, k)-critical Graphs

Binding Numbers for all Fractional (a, b, k)-critical Graphs Filomt 28:4 (2014), 709 713 DOI 10.2298/FIL1404709Z Published by Fculty of Sciences nd Mthemtics, University of Niš, Serbi Avilble t: http://www.pmf.ni.c.rs/filomt Binding Numbers for ll Frctionl (, b,

More information

MAA 4212 Improper Integrals

MAA 4212 Improper Integrals Notes by Dvid Groisser, Copyright c 1995; revised 2002, 2009, 2014 MAA 4212 Improper Integrls The Riemnn integrl, while perfectly well-defined, is too restrictive for mny purposes; there re functions which

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.5.: Properties of Context Free Grmmrs (14) Anton Setzer (Bsed on book drft by J. V. Tucker nd K. Stephenson)

More information

7.2 The Definite Integral

7.2 The Definite Integral 7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where

More information

(e) if x = y + z and a divides any two of the integers x, y, or z, then a divides the remaining integer

(e) if x = y + z and a divides any two of the integers x, y, or z, then a divides the remaining integer Divisibility In this note we introduce the notion of divisibility for two integers nd b then we discuss the division lgorithm. First we give forml definition nd note some properties of the division opertion.

More information

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite

More information

Spanning tree congestion of some product graphs

Spanning tree congestion of some product graphs Spnning tree congestion of some product grphs Hiu-Fi Lw Mthemticl Institute Oxford University 4-9 St Giles Oxford, OX1 3LB, United Kingdom e-mil: lwh@mths.ox.c.uk nd Mikhil I. Ostrovskii Deprtment of Mthemtics

More information

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004 Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when

More information

5. (±±) Λ = fw j w is string of even lengthg [ 00 = f11,00g 7. (11 [ 00)± Λ = fw j w egins with either 11 or 00g 8. (0 [ ffl)1 Λ = 01 Λ [ 1 Λ 9.

5. (±±) Λ = fw j w is string of even lengthg [ 00 = f11,00g 7. (11 [ 00)± Λ = fw j w egins with either 11 or 00g 8. (0 [ ffl)1 Λ = 01 Λ [ 1 Λ 9. Regulr Expressions, Pumping Lemm, Right Liner Grmmrs Ling 106 Mrch 25, 2002 1 Regulr Expressions A regulr expression descries or genertes lnguge: it is kind of shorthnd for listing the memers of lnguge.

More information

1 APL13: Suffix Arrays: more space reduction

1 APL13: Suffix Arrays: more space reduction 1 APL13: Suffix Arrys: more spce reduction In Section??, we sw tht when lphbet size is included in the time nd spce bounds, the suffix tree for string of length m either requires Θ(m Σ ) spce or the minimum

More information

Numerical Analysis: Trapezoidal and Simpson s Rule

Numerical Analysis: Trapezoidal and Simpson s Rule nd Simpson s Mthemticl question we re interested in numericlly nswering How to we evlute I = f (x) dx? Clculus tells us tht if F(x) is the ntiderivtive of function f (x) on the intervl [, b], then I =

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information

Convert the NFA into DFA

Convert the NFA into DFA Convert the NF into F For ech NF we cn find F ccepting the sme lnguge. The numer of sttes of the F could e exponentil in the numer of sttes of the NF, ut in prctice this worst cse occurs rrely. lgorithm:

More information

SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 2014

SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 2014 SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 014 Mrk Scheme: Ech prt of Question 1 is worth four mrks which re wrded solely for the correct nswer.

More information

Improper Integrals, and Differential Equations

Improper Integrals, and Differential Equations Improper Integrls, nd Differentil Equtions October 22, 204 5.3 Improper Integrls Previously, we discussed how integrls correspond to res. More specificlly, we sid tht for function f(x), the region creted

More information

The First Fundamental Theorem of Calculus. If f(x) is continuous on [a, b] and F (x) is any antiderivative. f(x) dx = F (b) F (a).

The First Fundamental Theorem of Calculus. If f(x) is continuous on [a, b] and F (x) is any antiderivative. f(x) dx = F (b) F (a). The Fundmentl Theorems of Clculus Mth 4, Section 0, Spring 009 We now know enough bout definite integrls to give precise formultions of the Fundmentl Theorems of Clculus. We will lso look t some bsic emples

More information

Driving Cycle Construction of City Road for Hybrid Bus Based on Markov Process Deng Pan1, a, Fengchun Sun1,b*, Hongwen He1, c, Jiankun Peng1, d

Driving Cycle Construction of City Road for Hybrid Bus Based on Markov Process Deng Pan1, a, Fengchun Sun1,b*, Hongwen He1, c, Jiankun Peng1, d Interntionl Industril Informtics nd Computer Engineering Conference (IIICEC 15) Driving Cycle Construction of City Rod for Hybrid Bus Bsed on Mrkov Process Deng Pn1,, Fengchun Sun1,b*, Hongwen He1, c,

More information

arxiv: v2 [cs.db] 1 Oct 2017

arxiv: v2 [cs.db] 1 Oct 2017 Efficient Grph Edit Distnce Cputtion nd Verifiction vi Anchor-wre Lower Bound Estimtion rxiv:1709.06810v2 [cs.db] 1 Oct 2017 Lijun Chng The University of Sydney Lijun.Chng@sydney.edu.u Abstrct Lu Qin University

More information

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 UNIFORM CONVERGENCE Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 Suppose f n : Ω R or f n : Ω C is sequence of rel or complex functions, nd f n f s n in some sense. Furthermore,

More information

For convenience, we rewrite m2 s m2 = m m m ; where m is repeted m times. Since xyz = m m m nd jxyj»m, we hve tht the string y is substring of the fir

For convenience, we rewrite m2 s m2 = m m m ; where m is repeted m times. Since xyz = m m m nd jxyj»m, we hve tht the string y is substring of the fir CSCI 2400 Models of Computtion, Section 3 Solutions to Homework 4 Problem 1. ll the solutions below refer to the Pumping Lemm of Theorem 4.8, pge 119. () L = f n b l k : k n + lg Let's ssume for contrdiction

More information

Math& 152 Section Integration by Parts

Math& 152 Section Integration by Parts Mth& 5 Section 7. - Integrtion by Prts Integrtion by prts is rule tht trnsforms the integrl of the product of two functions into other (idelly simpler) integrls. Recll from Clculus I tht given two differentible

More information

CS 188: Artificial Intelligence Spring 2007

CS 188: Artificial Intelligence Spring 2007 CS 188: Artificil Intelligence Spring 2007 Lecture 3: Queue-Bsed Serch 1/23/2007 Srini Nrynn UC Berkeley Mny slides over the course dpted from Dn Klein, Sturt Russell or Andrew Moore Announcements Assignment

More information

Definition of Continuity: The function f(x) is continuous at x = a if f(a) exists and lim

Definition of Continuity: The function f(x) is continuous at x = a if f(a) exists and lim Mth 9 Course Summry/Study Guide Fll, 2005 [1] Limits Definition of Limit: We sy tht L is the limit of f(x) s x pproches if f(x) gets closer nd closer to L s x gets closer nd closer to. We write lim f(x)

More information

Lecture 3 ( ) (translated and slightly adapted from lecture notes by Martin Klazar)

Lecture 3 ( ) (translated and slightly adapted from lecture notes by Martin Klazar) Lecture 3 (5.3.2018) (trnslted nd slightly dpted from lecture notes by Mrtin Klzr) Riemnn integrl Now we define precisely the concept of the re, in prticulr, the re of figure U(, b, f) under the grph of

More information

Where did dynamic programming come from?

Where did dynamic programming come from? Where did dynmic progrmming come from? String lgorithms Dvid Kuchk cs302 Spring 2012 Richrd ellmn On the irth of Dynmic Progrmming Sturt Dreyfus http://www.eng.tu.c.il/~mi/cd/ or50/1526-5463-2002-50-01-0048.pdf

More information

We will see what is meant by standard form very shortly

We will see what is meant by standard form very shortly THEOREM: For fesible liner progrm in its stndrd form, the optimum vlue of the objective over its nonempty fesible region is () either unbounded or (b) is chievble t lest t one extreme point of the fesible

More information

Coalgebra, Lecture 15: Equations for Deterministic Automata

Coalgebra, Lecture 15: Equations for Deterministic Automata Colger, Lecture 15: Equtions for Deterministic Automt Julin Slmnc (nd Jurrin Rot) Decemer 19, 2016 In this lecture, we will study the concept of equtions for deterministic utomt. The notes re self contined

More information

Calculus I-II Review Sheet

Calculus I-II Review Sheet Clculus I-II Review Sheet 1 Definitions 1.1 Functions A function is f is incresing on n intervl if x y implies f(x) f(y), nd decresing if x y implies f(x) f(y). It is clled monotonic if it is either incresing

More information

MATH 144: Business Calculus Final Review

MATH 144: Business Calculus Final Review MATH 144: Business Clculus Finl Review 1 Skills 1. Clculte severl limits. 2. Find verticl nd horizontl symptotes for given rtionl function. 3. Clculte derivtive by definition. 4. Clculte severl derivtives

More information

Improper Integrals. Type I Improper Integrals How do we evaluate an integral such as

Improper Integrals. Type I Improper Integrals How do we evaluate an integral such as Improper Integrls Two different types of integrls cn qulify s improper. The first type of improper integrl (which we will refer to s Type I) involves evluting n integrl over n infinite region. In the grph

More information

How to simulate Turing machines by invertible one-dimensional cellular automata

How to simulate Turing machines by invertible one-dimensional cellular automata How to simulte Turing mchines by invertible one-dimensionl cellulr utomt Jen-Christophe Dubcq Déprtement de Mthémtiques et d Informtique, École Normle Supérieure de Lyon, 46, llée d Itlie, 69364 Lyon Cedex

More information

Calculus of Variations: The Direct Approach

Calculus of Variations: The Direct Approach Clculus of Vritions: The Direct Approch Lecture by Andrejs Treibergs, Notes by Bryn Wilson June 7, 2010 The originl lecture slides re vilble online t: http://www.mth.uth.edu/~treiberg/directmethodslides.pdf

More information

1.4 Nonregular Languages

1.4 Nonregular Languages 74 1.4 Nonregulr Lnguges The number of forml lnguges over ny lphbet (= decision/recognition problems) is uncountble On the other hnd, the number of regulr expressions (= strings) is countble Hence, ll

More information

The Wave Equation I. MA 436 Kurt Bryan

The Wave Equation I. MA 436 Kurt Bryan 1 Introduction The Wve Eqution I MA 436 Kurt Bryn Consider string stretching long the x xis, of indeterminte (or even infinite!) length. We wnt to derive n eqution which models the motion of the string

More information

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral Improper Integrls Every time tht we hve evluted definite integrl such s f(x) dx, we hve mde two implicit ssumptions bout the integrl:. The intervl [, b] is finite, nd. f(x) is continuous on [, b]. If one

More information

Math 61CM - Solutions to homework 9

Math 61CM - Solutions to homework 9 Mth 61CM - Solutions to homework 9 Cédric De Groote November 30 th, 2018 Problem 1: Recll tht the left limit of function f t point c is defined s follows: lim f(x) = l x c if for ny > 0 there exists δ

More information

13: Diffusion in 2 Energy Groups

13: Diffusion in 2 Energy Groups 3: Diffusion in Energy Groups B. Rouben McMster University Course EP 4D3/6D3 Nucler Rector Anlysis (Rector Physics) 5 Sept.-Dec. 5 September Contents We study the diffusion eqution in two energy groups

More information

The Algebra (al-jabr) of Matrices

The Algebra (al-jabr) of Matrices Section : Mtri lgebr nd Clculus Wshkewicz College of Engineering he lgebr (l-jbr) of Mtrices lgebr s brnch of mthemtics is much broder thn elementry lgebr ll of us studied in our high school dys. In sense

More information

Unit #9 : Definite Integral Properties; Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties; Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties; Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Review of basic calculus

Review of basic calculus Review of bsic clculus This brief review reclls some of the most importnt concepts, definitions, nd theorems from bsic clculus. It is not intended to tech bsic clculus from scrtch. If ny of the items below

More information

Jim Lambers MAT 169 Fall Semester Lecture 4 Notes

Jim Lambers MAT 169 Fall Semester Lecture 4 Notes Jim Lmbers MAT 169 Fll Semester 2009-10 Lecture 4 Notes These notes correspond to Section 8.2 in the text. Series Wht is Series? An infinte series, usully referred to simply s series, is n sum of ll of

More information

Discrete Least-squares Approximations

Discrete Least-squares Approximations Discrete Lest-squres Approximtions Given set of dt points (x, y ), (x, y ),, (x m, y m ), norml nd useful prctice in mny pplictions in sttistics, engineering nd other pplied sciences is to construct curve

More information

MORE FUNCTION GRAPHING; OPTIMIZATION. (Last edited October 28, 2013 at 11:09pm.)

MORE FUNCTION GRAPHING; OPTIMIZATION. (Last edited October 28, 2013 at 11:09pm.) MORE FUNCTION GRAPHING; OPTIMIZATION FRI, OCT 25, 203 (Lst edited October 28, 203 t :09pm.) Exercise. Let n be n rbitrry positive integer. Give n exmple of function with exctly n verticl symptotes. Give

More information

Zero-Sum Magic Graphs and Their Null Sets

Zero-Sum Magic Graphs and Their Null Sets Zero-Sum Mgic Grphs nd Their Null Sets Ebrhim Slehi Deprtment of Mthemticl Sciences University of Nevd Ls Vegs Ls Vegs, NV 89154-4020. ebrhim.slehi@unlv.edu Abstrct For ny h N, grph G = (V, E) is sid to

More information

Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation

Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation Strong Bisimultion Overview Actions Lbeled trnsition system Trnsition semntics Simultion Bisimultion References Robin Milner, Communiction nd Concurrency Robin Milner, Communicting nd Mobil Systems 32

More information

Math 131. Numerical Integration Larson Section 4.6

Math 131. Numerical Integration Larson Section 4.6 Mth. Numericl Integrtion Lrson Section. This section looks t couple of methods for pproimting definite integrls numericlly. The gol is to get good pproimtion of the definite integrl in problems where n

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: How to identify the leding coefficients nd degrees of polynomils How to dd nd subtrct polynomils How to multiply polynomils

More information

Higher Checklist (Unit 3) Higher Checklist (Unit 3) Vectors

Higher Checklist (Unit 3) Higher Checklist (Unit 3) Vectors Vectors Skill Achieved? Know tht sclr is quntity tht hs only size (no direction) Identify rel-life exmples of sclrs such s, temperture, mss, distnce, time, speed, energy nd electric chrge Know tht vector

More information

3.4 Numerical integration

3.4 Numerical integration 3.4. Numericl integrtion 63 3.4 Numericl integrtion In mny economic pplictions it is necessry to compute the definite integrl of relvlued function f with respect to "weight" function w over n intervl [,

More information

Vyacheslav Telnin. Search for New Numbers.

Vyacheslav Telnin. Search for New Numbers. Vycheslv Telnin Serch for New Numbers. 1 CHAPTER I 2 I.1 Introduction. In 1984, in the first issue for tht yer of the Science nd Life mgzine, I red the rticle "Non-Stndrd Anlysis" by V. Uspensky, in which

More information

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system.

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system. Section 24 Nonsingulr Liner Systems Here we study squre liner systems nd properties of their coefficient mtrices s they relte to the solution set of the liner system Let A be n n Then we know from previous

More information

Math 426: Probability Final Exam Practice

Math 426: Probability Final Exam Practice Mth 46: Probbility Finl Exm Prctice. Computtionl problems 4. Let T k (n) denote the number of prtitions of the set {,..., n} into k nonempty subsets, where k n. Argue tht T k (n) kt k (n ) + T k (n ) by

More information

Integral points on the rational curve

Integral points on the rational curve Integrl points on the rtionl curve y x bx c x ;, b, c integers. Konstntine Zeltor Mthemtics University of Wisconsin - Mrinette 750 W. Byshore Street Mrinette, WI 5443-453 Also: Konstntine Zeltor P.O. Box

More information

Automata and Languages

Automata and Languages Automt nd Lnguges Prof. Mohmed Hmd Softwre Engineering Lb. The University of Aizu Jpn Grmmr Regulr Grmmr Context-free Grmmr Context-sensitive Grmmr Regulr Lnguges Context Free Lnguges Context Sensitive

More information

Chapter 0. What is the Lebesgue integral about?

Chapter 0. What is the Lebesgue integral about? Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous

More information

Chapter 3 Polynomials

Chapter 3 Polynomials Dr M DRAIEF As described in the introduction of Chpter 1, pplictions of solving liner equtions rise in number of different settings In prticulr, we will in this chpter focus on the problem of modelling

More information

. Double-angle formulas. Your answer should involve trig functions of θ, and not of 2θ. sin 2 (θ) =

. Double-angle formulas. Your answer should involve trig functions of θ, and not of 2θ. sin 2 (θ) = Review of some needed Trig. Identities for Integrtion. Your nswers should be n ngle in RADIANS. rccos( 1 ) = π rccos( - 1 ) = 2π 2 3 2 3 rcsin( 1 ) = π rcsin( - 1 ) = -π 2 6 2 6 Cn you do similr problems?

More information

arxiv: v1 [math.ra] 1 Nov 2014

arxiv: v1 [math.ra] 1 Nov 2014 CLASSIFICATION OF COMPLEX CYCLIC LEIBNIZ ALGEBRAS DANIEL SCOFIELD AND S MCKAY SULLIVAN rxiv:14110170v1 [mthra] 1 Nov 2014 Abstrct Since Leibniz lgebrs were introduced by Lody s generliztion of Lie lgebrs,

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 2013 Outline 1 Riemnn Sums 2 Riemnn Integrls 3 Properties

More information

We partition C into n small arcs by forming a partition of [a, b] by picking s i as follows: a = s 0 < s 1 < < s n = b.

We partition C into n small arcs by forming a partition of [a, b] by picking s i as follows: a = s 0 < s 1 < < s n = b. Mth 255 - Vector lculus II Notes 4.2 Pth nd Line Integrls We begin with discussion of pth integrls (the book clls them sclr line integrls). We will do this for function of two vribles, but these ides cn

More information