{"id":"https://openalex.org/W2563654217","doi":"https://doi.org/10.1109/icnp.2016.7784419","title":"Fast shortest-path queries on large-scale graphs","display_name":"Fast shortest-path queries on large-scale graphs","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2563654217","doi":"https://doi.org/10.1109/icnp.2016.7784419","mag":"2563654217"},"language":"en","primary_location":{"id":"doi:10.1109/icnp.2016.7784419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2016.7784419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061456147","display_name":"Qiongwen Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiongwen Xu","raw_affiliation_strings":["Ministry of Education, Engineering Research Center of Cyber Security Auditing and Monitoring, China","School of Computer Science, Fudan University, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education, Engineering Research Center of Cyber Security Auditing and Monitoring, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science, Fudan University, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101734466","display_name":"Xu Zhang","orcid":"https://orcid.org/0000-0003-3490-2216"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Zhang","raw_affiliation_strings":["Ministry of Education, Engineering Research Center of Cyber Security Auditing and Monitoring, China","School of Computer Science, Fudan University, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education, Engineering Research Center of Cyber Security Auditing and Monitoring, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science, Fudan University, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003998216","display_name":"Jin Zhao","orcid":"https://orcid.org/0000-0002-9807-2648"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Zhao","raw_affiliation_strings":["Ministry of Education, Engineering Research Center of Cyber Security Auditing and Monitoring, China","School of Computer Science, Fudan University, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education, Engineering Research Center of Cyber Security Auditing and Monitoring, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science, Fudan University, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100328090","display_name":"Xin Wang","orcid":"https://orcid.org/0000-0003-2070-960X"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Wang","raw_affiliation_strings":["Ministry of Education, Engineering Research Center of Cyber Security Auditing and Monitoring, China","School of Computer Science, Fudan University, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education, Engineering Research Center of Cyber Security Auditing and Monitoring, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science, Fudan University, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082067982","display_name":"Tilman Wolf","orcid":"https://orcid.org/0000-0003-0449-0441"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tilman Wolf","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts Amherst, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts Amherst, USA","institution_ids":["https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5061456147"],"corresponding_institution_ids":["https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":0.5791,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.73590948,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"1","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7801573276519775},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.7103638648986816},{"id":"https://openalex.org/keywords/shortest-path-problem","display_name":"Shortest path problem","score":0.680732250213623},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.6196513175964355},{"id":"https://openalex.org/keywords/dijkstras-algorithm","display_name":"Dijkstra's algorithm","score":0.5773403644561768},{"id":"https://openalex.org/keywords/tree-decomposition","display_name":"Tree decomposition","score":0.5620042085647583},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.561343252658844},{"id":"https://openalex.org/keywords/traverse","display_name":"Traverse","score":0.5052466988563538},{"id":"https://openalex.org/keywords/tree-traversal","display_name":"Tree traversal","score":0.49240410327911377},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4413694143295288},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41759270429611206},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4086032807826996},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.29114872217178345},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.28754425048828125},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16239479184150696},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11431345343589783},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.08853206038475037}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7801573276519775},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.7103638648986816},{"id":"https://openalex.org/C22590252","wikidata":"https://www.wikidata.org/wiki/Q1058754","display_name":"Shortest path problem","level":3,"score":0.680732250213623},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.6196513175964355},{"id":"https://openalex.org/C173870130","wikidata":"https://www.wikidata.org/wiki/Q8548","display_name":"Dijkstra's algorithm","level":4,"score":0.5773403644561768},{"id":"https://openalex.org/C70501317","wikidata":"https://www.wikidata.org/wiki/Q462095","display_name":"Tree decomposition","level":5,"score":0.5620042085647583},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.561343252658844},{"id":"https://openalex.org/C176809094","wikidata":"https://www.wikidata.org/wiki/Q15401496","display_name":"Traverse","level":2,"score":0.5052466988563538},{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.49240410327911377},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4413694143295288},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41759270429611206},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4086032807826996},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.29114872217178345},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.28754425048828125},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16239479184150696},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11431345343589783},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.08853206038475037},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C203776342","wikidata":"https://www.wikidata.org/wiki/Q1378376","display_name":"Line graph","level":3,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C43517604","wikidata":"https://www.wikidata.org/wiki/Q7144893","display_name":"Pathwidth","level":4,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnp.2016.7784419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2016.7784419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W63579610","https://openalex.org/W788200807","https://openalex.org/W910816382","https://openalex.org/W1542253039","https://openalex.org/W1582742149","https://openalex.org/W1969573308","https://openalex.org/W1993449345","https://openalex.org/W1994924587","https://openalex.org/W2005945380","https://openalex.org/W2011999472","https://openalex.org/W2019003829","https://openalex.org/W2020880764","https://openalex.org/W2029448190","https://openalex.org/W2045446569","https://openalex.org/W2064790310","https://openalex.org/W2069354103","https://openalex.org/W2073415627","https://openalex.org/W2074616737","https://openalex.org/W2075710877","https://openalex.org/W2091208704","https://openalex.org/W2099083325","https://openalex.org/W2108614537","https://openalex.org/W2116039228","https://openalex.org/W2136957179","https://openalex.org/W2138660573","https://openalex.org/W2142517301","https://openalex.org/W2146583842","https://openalex.org/W2146591355","https://openalex.org/W2147118406","https://openalex.org/W2147391892","https://openalex.org/W2752061190","https://openalex.org/W3145128584","https://openalex.org/W4246219036"],"related_works":["https://openalex.org/W2366394613","https://openalex.org/W2152421698","https://openalex.org/W3209137076","https://openalex.org/W4223969905","https://openalex.org/W2374560440","https://openalex.org/W1490490684","https://openalex.org/W4221129498","https://openalex.org/W2887026015","https://openalex.org/W2361442013","https://openalex.org/W2373384475"],"abstract_inverted_index":{"Shortest-path":[0],"queries":[1,119],"on":[2],"weighted":[3],"graphs":[4],"are":[5,65],"an":[6,78],"essential":[7],"operation":[8],"in":[9,22,69,101,120],"computer":[10],"networks.":[11],"The":[12],"performance":[13],"of":[14,90,128,143,149,162],"such":[15],"algorithms":[16,48,64],"has":[17],"become":[18],"a":[19,33,98,102,165],"critical":[20],"challenge":[21],"emerging":[23],"software-defined":[24],"networks":[25],"(SDN),":[26],"since":[27],"SDN":[28,167],"controllers":[29,168],"need":[30],"to":[31],"perform":[32],"shortest-path":[34,46,80],"query":[35,47,54,59,81],"for":[36,145,159],"every":[37],"flow.":[38],"Unlike":[39],"classic":[40],"solutions":[41],"(e.g.,":[42],"Dijkstra's":[43],"algorithm),":[44],"high-performance":[45],"include":[49],"two":[50],"stages:":[51],"preprocessing":[52,70,108,151],"and":[53],"answering.":[55],"Despite":[56],"the":[57,87,124,146,150],"improved":[58],"answering":[60,160],"time,":[61],"existing":[62,111],"two-stage":[63],"still":[66],"extremely":[67],"time-consuming":[68],"large-scale":[71],"graphs.":[72],"In":[73,113],"this":[74],"paper,":[75],"we":[76],"propose":[77],"efficient":[79],"algorithm,":[82],"called":[83],"BBQ,":[84],"which":[85,105],"reduces":[86,107],"running":[88,147],"time":[89,109,148],"both":[91],"stages":[92],"via":[93],"tree":[94,126],"decomposition.":[95],"BBQ":[96,115,137,154,171],"constructs":[97],"distance":[99],"oracle":[100],"bottom-top-bottom":[103],"manner,":[104],"significantly":[106],"over":[110],"algorithms.":[112],"addition,":[114],"can":[116,172],"answer":[117],"batch":[118],"bulk":[121],"by":[122,141],"traversing":[123],"decomposed":[125],"instead":[127],"executing":[129],"separate":[130],"queries.":[131,163],"Our":[132],"experimental":[133],"results":[134],"show":[135],"that":[136,169],"outperforms":[138],"state-of-the-art":[139],"approaches":[140],"orders":[142],"magnitude":[144],"stage.":[152],"Meanwhile,":[153],"also":[155],"offers":[156],"remarkable":[157],"acceleration":[158],"batches":[161],"As":[164],"result,":[166],"use":[170],"sustain":[173],"1.1-27.9":[174],"times":[175],"higher":[176],"connection":[177],"request":[178],"rates.":[179]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
