An efficient algorithm for answering graph reachability queries

被引:59
作者
Chen, Yangjun [1 ]
Chen, Yibin [1 ]
机构
[1] Univ Winnipeg, Depl Appl Comp Sci, 515 Portage Ave, Winnipeg, MB R3B 2E9, Canada
来源
2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3 | 2008年
关键词
TRANSITIVE CLOSURE; TIME;
D O I
10.1109/ICDE.2008.4497498
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given a directed graph G, to check whether a node v is reachable from another node u through a path is often required. In a database system, such an operation is called a recursion computation or reachability checking and not efficiently supported. The reason for this is that the space to store the whole transitive closure of G is prohibitively high. In this paper, we address this issue and propose an O(n(2) + bn root b) time algorithm to decompose a directed acyclic graph (DAG) into a minimized set of disjoint chains to facilitate reachability checking, where n is the number of the nodes and b is the DAG's width, defined to be the size of a largest node subset U of the DAG such that for every pair of nodes u, v epsilon U, there does not exist a path from u to v or from v to u. Using this algorithm, we are able to label a graph in O(be) time and store all the labels in O(bn) space with O(logb) reachability checking time, where e is the number of the edges of the DAG The method can also be extended to handle cyclic directed graphs. Experiments have been performed, showing that our method is promising.
引用
收藏
页码:893 / +
页数:2
相关论文
共 31 条
[1]   COMPUTING A MAXIMUM CARDINALITY MATCHING IN A BIPARTITE GRAPH IN TIME O(N1.5-SQUARE-ROOT-M/LOG N) [J].
ALT, H ;
BLUM, N ;
MEHLHORN, K ;
PAUL, M .
INFORMATION PROCESSING LETTERS, 1991, 37 (04) :237-240
[2]  
Asratian A. S., 1998, Bipartite Graphs and Their Applications
[3]   CLUSTERING A DAG FOR CAD DATABASES [J].
BANERJEE, J ;
KIM, W ;
KIM, SJ ;
GARZA, JF .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1988, 14 (11) :1684-1699
[4]   TESTING FOR CONSECUTIVE ONES PROPERTY, INTERVAL GRAPHS, AND GRAPH PLANARITY USING PQ-TREE ALGORITHMS [J].
BOOTH, KS ;
LUEKER, GS .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1976, 13 (03) :335-379
[5]  
CAREY M, 1990, P 16 VLDB C BRISB AU, P662
[6]  
CHEN Y, 2003, P CAISE 2003 FOR 15, P5
[7]   On the graph traversal and linear binary-chain programs [J].
Chen, YJ .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (03) :573-596
[8]  
CHENG J, 2006, P EDBT MUN GERM MAY
[9]   Reachability and distance queries via 2-hop labels [J].
Cohen, E ;
Halperin, E ;
Kaplan, H ;
Zwick, U .
SIAM JOURNAL ON COMPUTING, 2003, 32 (05) :1338-1355
[10]   TYPE-EXTENSION TYPE TESTS CAN BE PERFORMED IN CONSTANT TIME [J].
COHEN, NH .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1991, 13 (04) :626-629