<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Role for Chordless Cycles in the Representation and Retrieval of Information</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>John L. Pfaltz Dept. of Computer Science</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Virginia</institution>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper explains how very large network structures can be reduced, or consolidated, to an assemblage of chordless cycles (cyclic structures without cross connecting links), that is called a trace, for storage and later retreival. After developing a basic mathematical framework, it illustrates the reduction process using a most general (with directed and undirected links) network. A major theme of the paper is that this approach appears to model actual biological memory, as well as o ering an attractive digital solution.</p>
      </abstract>
      <kwd-group>
        <kwd>Closure</kwd>
        <kwd>biological memory</kwd>
        <kwd>reduction</kwd>
        <kwd>consolidation</kwd>
        <kwd>recall</kwd>
        <kwd>trace</kwd>
        <kwd>subgraph matching</kwd>
        <kwd>directed graphs</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. INTRODUCTION</title>
      <p>
        A central tenet of database theory is that it is the
relationships between various entities that constitute real
information. It is the foundation of the relational model [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
But, in those situations where there are millions of entities
and the relationships are relatively sparse, the familiar array
style representation of data simply won't work. We turn to
graph, or network, type representations. In other situations,
such as social network analysis, the data is naturally graph
structured. In any case, we are concerned with the retreival
of speci c \chunks" of the stored information.
      </p>
      <p>We will contend that retrieval of information from a
storage medium is not a single, uni ed operation; that there are
at least two distinct phases. First the desired information
must be identi ed and located within the storage medium.
We call this \information access" and address it in Section
3. Then it must be read out or, in the case of biological
memory, reconstituted. This latter step we call \recall" and
discuss it in Section 4.</p>
      <p>However, this paper is less concerned with actual retrieval
than discovering graph structures which facilitate this
process. In Section 2.3 we introduce the concept of \chordless
2017, Copyright is with the authors. Published in the Workshop
Proceedings of the EDBT/ICDT 2017 Joint Conference (March 21, 2017, Venice,
Italy) on CEUR-WS.org (ISSN 1613-0073). Distribution of this paper is
permitted under the terms of the Creative Commons license CC-by-nc-nd
4.0
cycles" which we believe play a prominent role in the
representation of biological information, and which we believe
can be exploited in computer applications as well. In Section
2.1 we sketch the mathematical foundations for this notion,
which is based on concepts of \closure". In Section 2.2 we
present computer code that will reduce any network to its
constituent chordless cycles. Then in Section 2.3 we can
describe the desirable properties of representing information
by these cycles and indicate their role in biological memory.</p>
      <p>Our goal in this paper is to use some relatively abstract
graph-theoretic concepts to e ectively model, and bring
together, both biological and computer applications.
2.</p>
    </sec>
    <sec id="sec-2">
      <title>REPRESENTATION AND STORAGE OF</title>
    </sec>
    <sec id="sec-3">
      <title>INFORMATION</title>
      <p>Our basic understanding of the world, whether visual,
oral, or tactile, is neural in nature. The representation of
data in regular arrays is, to a large extent, an artifact of
computer architecture and the ease of algebraic
manipulation. So we begin with the assumption that all \information"
is a graph structure of some form.</p>
      <p>
        To our knowledge, there has been no agreement as to what
neural con gurations correspond to any speci c empirical
sensations or mental concepts; but there have been many
studies documenting that all perception and cognition
correlate with neural activity, even detailing its occurrence with
speci c locations within the brain [
        <xref ref-type="bibr" rid="ref11 ref15 ref16 ref18 ref21 ref39 ref40">11, 16, 15, 18, 21, 39,
40</xref>
        ]. However, we are fairly con dent that whatever neural
networks do correspond to speci c sensations, concepts or
knowledge, they are very large | probably in the millions
of elements, or possibly even billions, as discussed in [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ].
We are talking about a very large data space!
      </p>
      <p>The most general mathematical model of neural activity
appears to be a directed graph. So the fundamental
assumption of this paper is that, at its most basic level, information
retrieval involves locating and obtaining rich directed graph
structures based on simpler representations which serve as
query keys. We are not retrieving array-type information to
display on a spread sheet.</p>
      <p>For this paper we assume that the network structure is
the \information", independent of any edge or node labels.
2.1</p>
    </sec>
    <sec id="sec-4">
      <title>Information as Relationships</title>
      <p>
        Information and knowledge are essentially relational.
Elements, or neurons, are related to other elements. To our
knowledge, neurons are not \labeled". In contrast, most
subgraph matching algorithms assume their nodes, or elements,
are labeled [
        <xref ref-type="bibr" rid="ref24 ref43 ref8">8, 24, 43</xref>
        ]. These labels can be used to prune
in plain graph search procedures [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], or the basis for
hashbased join algorithms [
        <xref ref-type="bibr" rid="ref41 ref42">41, 42</xref>
        ]. Because we assume unlabeled
and unweighted edges, this paper can be regarded as an
exercise in pure graph theory. However, we believe it provides
insights into both biological and computer retrieval.
      </p>
      <p>There seem to be many di erent kinds of relationships;
however, we abstract them all by a single relational
symbol, . By y: we mean the set of all elements related to
y. For set valued operators, such as , we use a su x
notation. It helps remind us that they are not scalar valued
functions. If we represent information as a network N , y:
would denote the neighbors of y in N . So one can read y:
simply as y's neighbors. (For mathematical convenience we
assume is re exive, so y 2 y: .) Visually, represents the
edges of the graph, or relational network. (We use the terms
node and element and graph and network interchangeably.)
It is unknown whether information networks are directed
or undirected. To assume a measure of generality we will
assume they are mixed, with some links being directed and
some undirected. While Figure 1 is far too small to be a real
information network, we will use it to illustrate concepts of
this paper. Arrow heads denote directed edges; if there are
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z</p>
      <p>A</p>
      <p>D
B</p>
      <p>C</p>
      <p>E
F
none the link is bi-directional, or symmetric.</p>
      <p>
        An important principle for interpreting information
networks is the concept of \closure". Closure is well de ned in
mathematics [
        <xref ref-type="bibr" rid="ref22 ref26 ref6">6, 26, 22</xref>
        ]. There are many di erent kinds of
closure operators; the most intuitive is the convex hull of
geometric gures [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. We will use the fundamental relational
operator, , to de ne a closure operator, '. Speci cally,
y:' = fzjz:
y: g
(1)
that is, z is an element of y closure, y:', if all elements
related to z are also related to y. (' can be extended to
arbitrary sets, Y , by Y:' = [y2Y fy:'g.) The concept of
neighborhood closure underlies the entire development of
this paper. In the network of Figure 1, c:' = fabcg, p:' =
fopg and g:' = fbglg. It is worth convincing yourself why
this is so. For a more detailed development see [
        <xref ref-type="bibr" rid="ref34 ref37 ref38">34, 37,
38</xref>
        ], where it is shown that computing closure, ', is a local
operation.
2.2
      </p>
    </sec>
    <sec id="sec-5">
      <title>Consolidation</title>
      <p>As de ned by (1), an element z in y closure, y:', is
relationally connected to no more elements than y itself.
Consequently, those elements within a network which are
contained in the closure of other elements contribute very little
to the information content conveyed by the network. They
can be combined with little loss of information. We say that
y has subsumed z, or equivalently that z belongs to y. By
y: we mean all nodes, z that belong to y, that is have been
combined. Readily y 2 y: . The pseudo code for a process
we call \reduction", and denote by !, is shown below in
Figure 2. The outer loop terminates when every element y is
}
}</p>
      <p>
        }
while there exist subsumable nodes
{
for_each y in N
{
get {y}.nbhd
for_each z in {y}.nbhd - {y}
{
if ({z}.nbhd contained_in {y}.nbhd
{ // z is subsumed by y
combine z with y
add z to {y}.beta
}
itself a closed set. A network with this property is said to
be irreducible. A C++ version of this code has been applied
to a variety of social networks [
        <xref ref-type="bibr" rid="ref33 ref34">33, 34</xref>
        ]. The actual code is
\set based" where constructs such as y:nbhd and y:beta are
implemented as bit strings. Thus operations are e ectively
O(1). There is no apriori constraint on set size, but we have
not executed operations with sets of cardinality &gt; 50; 000.
It can be rigorously demonstrated that the reduction of a
network, N , which we denote by T = N :! is unique (upto
isomorphism). ! is a well-de ned function over the space of
all networks. We call T the trace of the network N .
      </p>
      <p>Figure 3 illustrates the trace T of the network N of Figure
1. Emboldened solid links, or edges, connect the nodes that
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z</p>
      <p>A
D
B</p>
      <p>C</p>
      <p>E
F
remain in T after the reduction process; thiner dashed lines
connect the nodes that have been combined with others..
Dashed lines enclose the 7 non-trivial -sets; for example
c: = fa; b; cg and z: = fv; y; z; D; Cg.</p>
      <p>Observe that a new link (f; c) was created to preserve
path connectivity through b. We also see that ' and are
distinct operators since although c:' = c: , g:' g: .</p>
      <p>Of the original 32 nodes, only 17 remain after reduction
which represents a considerable storage compaction.</p>
      <p>
        The reduction process, !, has a number of desirable
computational properties. Because the closure operator, ', is
local (it need only interrogate adjacent elements), it can be
executed as a parallel process. (The code of Figure 2 that
we have actually used is sequential1 , but it is evident how
to convert the outer loop.) This is particularly important
for biological information storage and retrieval. The
parallel application of a similar closure based process within the
visual pathway is described in [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ].
      </p>
      <p>We have devoted considerable space to a description of !
because, in addition to preparing information for storage,
we believe it plays a prominent role in retrieval as described
in the next sections.</p>
      <p>
        In the literature devoted to human \memory", there has
been considerable research suggesting that there is a process
that converts short-term memory into long-term memory. It
is usually called \consolidation" [
        <xref ref-type="bibr" rid="ref1 ref25 ref28 ref4 ref9">1, 4, 9, 25, 28</xref>
        ]. It appears
to be quite similar to the reduction process described above,
whence the subsection heading is \consolidation".
2.3
      </p>
    </sec>
    <sec id="sec-6">
      <title>Chordless Cycles</title>
      <p>A chordless cycle is most easily visualized as a string of
pearls with no cross connections. More precisely, a
chordless cycle is a sequence &lt; y1; y2; : : : ; yn; y1 &gt; of elements
yi; 1 i n of length n 4 where there exist no links
(chords) of the form (yi; yk) k 6= i 1, i; k 6= 1; n.2 It is
better to just think of them as paths with no single edge
cross connections. In Figure 3, the sequence, or path, &lt;
c; g; m; i; d; c &gt; is a chordless cycle of length 5 The sequence
&lt; n; q; p; u; z; A; B; x; t; n &gt; is a chordless cycle of length 9.</p>
      <p>
        If the relation between elements is symmetric, it can be
proven [
        <xref ref-type="bibr" rid="ref34 ref35">34, 35</xref>
        ] that if N is irreducible (i:e:, every node is
a closed set) then every node y is either (1) isolated, (2)
an element of a chordless cycle of length 4, or (3) an
element on a path between two such chordless cycles. Thus
the trace (consolidation or reduction) of a symmetric
relational network is a collection of interlinked chordless cycles.
In Granovetter's analysis of social networks [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], these are
the \weak ties".
      </p>
      <p>
        When is symmetric, ! readily preserves path
connectivity within T . It also preserves the distance between elements
as measured by shortest paths [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ], together with the center
of N as determined by distance which will be found in T ,
as will those centers as de ned by \betweenness" [
        <xref ref-type="bibr" rid="ref13 ref14 ref5">5, 13, 14</xref>
        ].
      </p>
      <p>Symmetry of the relation is a powerful property. But,
to better model real relationships we have relaxed this
constraint throughout to allow directed (non-symmetric)
connections. Under these conditions the preceding
characterization of irreducible networks is no longer valid. For instance,
the node f in Figure 3 is not an element of a chordless cycle.</p>
      <p>
        In the case of non-symmetric networks we must ensure
path connectivity through subsumed nodes. Let y subsume
z, i:e: z: y: . For all x such that z 2 x: we ensure
that y 2 x: . This is always true when is symmetric, but
required the creation of the edge (f; c) in Figure 3. In this
case, we can show [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ] that if N is irreducible then for all
y, if there exists z 2 y: ; z 6= y, there must exist a path
1It can be shown that worst case sequential behavior is
O(n2), but actual performance is much better with a
maximum of 6 iterations to reduce 1,000 node real networks.
2A graph with no chordless cycles is said to be chordal.
There is an extensive literature on chordal graphs, e:g: [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]
through z terminating in a chordless cycle of length 4.
Even when the relation is non-symmetric, chordless cycles
dominate the reduced representation.
      </p>
      <p>Are chordless cycles really fundamental in the
representation of biological information?</p>
      <p>
        We can provide no de nitive answer to that question. We
can point out that protein polymer molecules composed of
chordless cycles exist in every cell of our bodies [
        <xref ref-type="bibr" rid="ref45">45</xref>
        ]. One
example is a 154 node phenylalaninic-glycine-repeat (nuclear
pore protein), N , which is shown in Figure 4. This is not at
all like the dense network of Figure 1. Nevertheless, one can
easily see the chordless loops, with various linear tendrils
attached to them. When these are removed by !, there
were 107 remaining elements involved in the chordless cycle
structure.
      </p>
      <p>
        If we count [
        <xref ref-type="bibr" rid="ref10 ref23">10, 23</xref>
        ] the numbers of chordless cycles of
length n in the reduction of Figure 4, we obtain the
distribution of Figure 5. The average cycle length is 44.9 in this
network; the modal length is 48; and the 4 longest
chordless cycles have length 65. It is clear that the combinatorial
possibilities based on cycle lengths alone would permit the
representation of a considerable amount of information.
      </p>
      <p>These are only indications that chordless cycle structures
might be an important component of relational information
1
1
2
2
7
7
8
8
3
3
4
4
5</p>
      <p>6
5
6
representation. The following sections will show how they
can be involved with the retrieval process.</p>
    </sec>
    <sec id="sec-7">
      <title>3. INFORMATION ACCESS</title>
      <p>
        Information cannot be retrieved unless it is rst
identied and located within storage. Pointers and URLs identify
storage locations. But, lacking these, one must search based
on the \content" of the desired information. An early, and
still common, mechanism is to attach key words or hash
tags to the information, which are then used to create an
easily searchable index [
        <xref ref-type="bibr" rid="ref17 ref3 ref30 ref31">3, 17, 30, 31</xref>
        ], in the case of hashed
storage, to directly control the storage location [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] or to
perform hash-joins in relational databases [
        <xref ref-type="bibr" rid="ref42">42</xref>
        ].
      </p>
      <p>As access speeds have increased so dramatically, both of
the preceding access techniques have often been superceded
by simple linear search and comparison.</p>
      <p>But, this still presumes that the \content identi cation" is
based on speci c terms, or tokens. If important information
is based on relationships, as we have asserted in Section 1,
then such token based search is rather limited.</p>
      <p>Suppose we wish to retrieve within a relational network.
We may assume that the search key, K, is itself relational.
It might look like Figure 6, but very much larger!
Imagine \sliding" an unlabeled 600 irreducible subgraph
around over an irreducible million node network to nd a
match, if one exists.</p>
      <p>A method that we are beginning to explore involves the
network providing information about its own irreducible
structure. To do this we label each edge with the length of the
\shortest" chordless cycle of which it is a member. This is
not an arti cial data label, but an element of the network
representation itself. Thus, in the irreducible network of
Figure 3, the edge (q; p) would be labeled with a 7 because it is
a member of the chordless 7-cycle &lt; q; p; k; g; c; d; i; m; q &gt;.
This same edge is a member of longer cycles such as the
9-cycle, &lt; q; p; u; z; A; B; x; t; n; q &gt;, but we only label with
respect to the shortest.</p>
      <p>The edge (m; q) would be labeled with a 4, as would the
edge (m; p). Each edge in the reduced search key, K:!, of
Figure 7 must be labeled with a 4.</p>
      <p>Each edge label of the search key must be exactly equal
to the corresponding edge label in the larger network. So,
based solely on the edge labeling, the only possible matches
for this reduced key of Figure 7 in the reduced network of
Figure 3 are the 4-cycles &lt; g; m; p; k; g &gt;, &lt; n; q; m; i; n &gt;
and &lt; w; A; B; x; w &gt;.</p>
      <p>Edge labeling with respect to shortest chordless cycle length
eliminates fruitless search expansion, but it can't indicate
likely places to begin the comparison. The central retrieval
problem is identifying likely nodes within the larger network
to initiate the search comparison.</p>
      <p>We believe that the solution lies with the imbedded
\triangles". Even though they are not chordless cycles of length
4 of which an irreducible network is comprised, they do
exist, provided each edge is a member of a distinct
chordless cycle of length 4. In the reduced network of Figure 3
there is one embedded triangle, that is &lt; q; p; m; q &gt;, with
associated cycle labels &lt; 7; 4; 4 &gt;. There is no embedded
triangle in the reduced search key of Figure 7. This is
unusual; but it is because the search key is \too small". Our
observation is that most reduced networks of 20 nodes, or
more, have at least one embedded triangle. The network of
Figure 4 has ve, with associated cycle lengths of &lt; 8; 6; 4 &gt;,
&lt; 12; 5; 5 &gt;, &lt; 12; 7; 4 &gt;, &lt; 14; 10; 7 &gt; and &lt; 16; 8; 6 &gt;. If
the reduced search key contains any embedded triangle, it
must match one of these.</p>
      <p>In our JMC approach to information access, we 1)
associate with each edge (functional relationship) in the
length of the shortest chordless cycle to which it belongs;
and 2) create an external index of shortest length triples
corresponding to embedded triangles. Assuming the search
key is su cently well speci ed to include an embedded
triangle, we rst search this index of triples to identify one, or
more, plausible search regions within the multi-million node
reduced network constituting the data store.</p>
      <p>
        This access mechanism is now being implemented, so its
actual e cency is still unknown. We believe it has
considerable promise. More uncertain is whether the edge labeling
and triangle index can be maintained in real time as the
network changes dynamically [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ]. Our hope is that if the
network changes are continuous [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ], then there exist e
ective update procedures.
      </p>
      <p>The approach described in this section seems quite
appropriate to biological recall as well. We see \Mary" in the
market. This is a visual experience involving many
relationships. A rapid, almost instantaneous, search through our</p>
      <p>Reduction of K by ! yields its trace K:!, as shown in
Figure 7. It is a simple cycle on the nodes &lt; 4; 3; 6; 7; 4 &gt;.</p>
      <p>Comparing Figure 7 with the trace of Figure 3, we see the
obvious subgraph matching: 3 $ m, 4 $ g, 6 $ p and
7 $ k. In this small example there is only one possible
matching chordless cycle. In the kinds of large networks we
envision this is not so simple!</p>
      <p>
        Imagine a 1,000 node seach key which reduces to a key
trace K:!, of say, 600 nodes. To nd a matched subgraph
in a reduced network of several million nodes is a
combinatorialy impossible task. All subgraph matching algorithms,
known to the author, assume some form of node and/or
edge labeling to initiate the search location and to control
the expanding search [
        <xref ref-type="bibr" rid="ref24 ref43 ref8">8, 24, 43</xref>
        ]. Various forms of
auxilliary indices provide direct access to graph elements
matching those labels. However, while the retrieval of
information from a graph structured data store implicitly assumes
a labeled graph, we have focused in this paper on the
relationships embodied in the network itself. There are no data
labels.
memory yields a much larger relational information
structure, including her name, her age and the names of her 3
children. This is often called semantic memory in the
literature [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
    </sec>
    <sec id="sec-8">
      <title>RETRIEVAL OF RELATIONAL INFOR</title>
    </sec>
    <sec id="sec-9">
      <title>MATION</title>
      <p>We suppose that a reduced trace, T = N :!, or a portion
of it, has been identi ed as in the preceding section. During
the reduction process, !, used to consolidate the network
information we need not store only the resulting trace. We can
also represent various steps in the reduction process. Our
own code, for example, records y: for each retained node y.
Thus, if the trace of Figure 3 was accessed given the key of
Figure 7 then we would know that c: = fa; b; cg. Moreover,
we know the order in which a and b were subsumed by c.</p>
      <p>From this, a very close approximation of the original
network of Figure 1 can be recreated. But, there will still be
some loss of information. For instance, the connection
between f and b would be lost. More complete information
could be stored with each subsuming node, though at some
increased storage expense. Alternatively, the complete
information network, N , could be stored, with the trace network,
T , separately stored as an easily searchable index.</p>
      <p>It is our belief that with information structures of this
size, retrieval of close approximations, i:e: the trace itself,
will be su cient for most applications.
4.1</p>
    </sec>
    <sec id="sec-10">
      <title>Biological Recall</title>
      <p>
        Biological recall is likely to be somewhat di erent from
a largely deterministic computer recall. There is some
evidence that biological organisms only store an abbreviated
trace and that the memory, as we experience it, is somehow
\recreated" [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. This helps explain why human memories
can be distorted in speci c detail, yet correct in their overall
structure.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ], the author describes a semi-random expansion
process, ", that lls in subsumed nodes to create a richer
network N 0. In many respects, " is an inverse operator to !.
Given a trace, T , T :! 1 de nes the collection of all networks
fN g such that N :! = T . " constructs a single network,
N 0, within this collection. Thus, given an initial network,
N , " will \retrieve" N 0 which may, or may not, be
(isomorphic to) N . However, we are assured that N 0:! = T = N :!,
or N :!:":! = N :! = T .
      </p>
      <p>
        Such a semi-random \retrieval" process may be completely
inappropriate in computer applications, but it seems to model
biological recall rather well. Our memories often are
confused with respect to detail, even when they they are
generally correct. It also supports the notion of \re-consolidation"
which asserts than long-term memories are repeatedly
rewritten, unless deliberately distorted in our (semi)conscious
mind [
        <xref ref-type="bibr" rid="ref28 ref29 ref44">28, 29, 44</xref>
        ].
      </p>
    </sec>
    <sec id="sec-11">
      <title>5. SUMMARY</title>
      <p>The representation of complex networks by a trace
comprised of chordless cycles has a rm, well de ned basis. We
know that there exists an e ective procedure ! to reduce a
network N to its trace T by local and easily parallelizable
code, such as might be found in the visual pathway. It is also
known that such chordless cycle assemblages exist as protein
polymers in all the cells of the body, including synapses.</p>
      <p>Clearly, there are signi cant advantages, in terms of many
fewer nodes and links, to representing network data in this
fashion. Readily, real information stores, whether computer
generated or biological, may have di erentiated (i:e: labeled)
nodes and links. Nevertheless, this rst treatment of the
problem as a purely abstract, graph theoretic issue has value.
It provides a theoretical basis for more applied work.</p>
      <p>We have suggested that subsets of the stored
information can be identi ed and retreived by similarly reducing the
search key. Then, in Section 3, using graph-theoretic
properties arising from the fact that irreducible networks consisting
of chordless cycles, we have sketched an access method that
might support retrieval based solely on relational structure.
In biological organisms, this or an associative memory
approach may be used.</p>
      <p>The next to last paragraph of Section 4.1 mentions a
reconstruction process " which functions as a kind of inverse
operator to !. This may be the most important
observation of the paper. We are just beginning to explore it. If
there is a way, given a trace T , to reconstruct a network
N 0 which closely approximates the original network N , this
could have profound implications for both computed and
biological applications.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Sir</given-names>
            <surname>Fredrick Bartlett. Remembering</surname>
          </string-name>
          :
          <article-title>A Study in Experimental and Social Psychology</article-title>
          . Cmbridge Univ. Press, Cambridge, UK,
          <year>1932</year>
          . Paperback version,
          <year>1967</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Jon</surname>
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Bentley</surname>
          </string-name>
          .
          <article-title>Approximation Algorithms for Convex Hulls</article-title>
          .
          <source>Comm. ACM</source>
          ,
          <volume>25</volume>
          (
          <issue>1</issue>
          ), Jan.
          <year>1982</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Christian</given-names>
            <surname>Bo</surname>
          </string-name>
          <article-title>hm. A Cost Model to Query Processing in High Dimensional Spaces</article-title>
          .
          <source>ACM Trans. on Database Sys</source>
          .,
          <volume>25</volume>
          (
          <issue>2</issue>
          ):
          <volume>129</volume>
          {
          <fpage>178</fpage>
          ,
          <year>June 2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Clive</surname>
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Braham</surname>
            and
            <given-names>Eloucine</given-names>
          </string-name>
          <string-name>
            <surname>Messaoudi</surname>
          </string-name>
          .
          <article-title>BDNF function in adult synaptic plasticity; The synaptic consolidation hypothesis</article-title>
          .
          <source>Progress in Neurobiology</source>
          ,
          <volume>76</volume>
          (
          <issue>2</issue>
          ):
          <volume>99</volume>
          {
          <fpage>125</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Ulrik</given-names>
            <surname>Brandes</surname>
          </string-name>
          .
          <article-title>A Faster Algorithm for Betweeness Centrality</article-title>
          .
          <source>J.Mathematical Sociology</source>
          ,
          <volume>25</volume>
          (
          <issue>2</issue>
          ):
          <volume>163</volume>
          {
          <fpage>177</fpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.</given-names>
            <surname>Burosch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Demetrovics</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.O.H.</given-names>
            <surname>Katona</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.J.</given-names>
            <surname>Kleitman</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Sapozhenko</surname>
          </string-name>
          .
          <source>On the Number of Databases and Closure Operations. Theoret. Comput. Sci.</source>
          ,
          <volume>78</volume>
          (
          <issue>2</issue>
          ):
          <volume>377</volume>
          {
          <fpage>381</fpage>
          ,
          <string-name>
            <surname>Jan</surname>
          </string-name>
          .
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>E. F.</given-names>
            <surname>Codd</surname>
          </string-name>
          .
          <article-title>A Relational Model for Large Shared Data Banks</article-title>
          .
          <source>Comm. ACM</source>
          ,
          <volume>13</volume>
          (
          <issue>6</issue>
          ):
          <volume>377</volume>
          {
          <fpage>387</fpage>
          ,
          <year>June 1970</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>L. P.</given-names>
            <surname>Cordella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Foggia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Sansone</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Vento</surname>
          </string-name>
          .
          <article-title>A (sub)graph isomorphism algorithm for matching large graphs</article-title>
          .
          <source>IEEE Trans. Pattern Analysis and Machine Intell</source>
          .,
          <volume>26</volume>
          (
          <issue>10</issue>
          ):
          <volume>1367</volume>
          {
          <fpage>1372</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Robert</surname>
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Crowder</surname>
          </string-name>
          .
          <article-title>Principles of Learning and Memory</article-title>
          . Psychology Press, New York,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Elisa^ngela Silva</surname>
            <given-names>Dias</given-names>
          </string-name>
          , Diane Castonguay, Humberto Longo, and
          <string-name>
            <surname>Walid</surname>
            <given-names>A. R.</given-names>
          </string-name>
          <string-name>
            <surname>Jradi</surname>
          </string-name>
          .
          <article-title>E cient enumeration of chordless cycles</article-title>
          .
          <source>arXiv:1309.1051v4, 24 Nov</source>
          .
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Yadin</given-names>
            <surname>Dudai</surname>
          </string-name>
          .
          <source>The Neurobiology of Memory: Concepts</source>
          , Findings, Trends. Oxford University Press, Oxford,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Enbody</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. C.</given-names>
            <surname>Du</surname>
          </string-name>
          .
          <article-title>Dynamic hashing schemes</article-title>
          .
          <source>COMPSUR</source>
          ,
          <volume>20</volume>
          (
          <issue>2</issue>
          ):
          <volume>85</volume>
          {
          <fpage>113</fpage>
          ,
          <year>June 1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Linton</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Freeman</surname>
          </string-name>
          .
          <source>A Set of Measures of Centrality Based on Betweenness. Sociometry</source>
          ,
          <volume>40</volume>
          (
          <issue>1</issue>
          ):
          <volume>35</volume>
          {
          <fpage>41</fpage>
          ,
          <year>1977</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Linton</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Freeman</surname>
          </string-name>
          .
          <article-title>Centrality in Social Networks, Conceptual Clari cation</article-title>
          .
          <source>Social Networks</source>
          ,
          <volume>1</volume>
          :
          <fpage>215</fpage>
          {
          <fpage>239</fpage>
          ,
          <year>1978</year>
          /79.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J.D.E.</given-names>
            <surname>Gabrieli</surname>
          </string-name>
          .
          <source>Cognitive Neuroscience of Human Memory. Annual Review of Psychology</source>
          ,
          <volume>49</volume>
          :
          <fpage>87</fpage>
          {
          <fpage>115</fpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>John</surname>
            <given-names>D.E.</given-names>
          </string-name>
          <string-name>
            <surname>Gabrieli</surname>
          </string-name>
          , John E. Desmond, Jonathan B.
          <string-name>
            <surname>Demb</surname>
            ,
            <given-names>Anthony D.</given-names>
          </string-name>
          <string-name>
            <surname>Wagner</surname>
          </string-name>
          ,
          <string-name>
            <surname>Maria</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Stone</surname>
            ,
            <given-names>Chandan J.</given-names>
          </string-name>
          <string-name>
            <surname>Vaidya</surname>
          </string-name>
          , and
          <string-name>
            <surname>Gary</surname>
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Glover</surname>
          </string-name>
          .
          <article-title>Functional Magnetic Resonance Imaging of Semantic Memory Processes in the Frontal Lobes</article-title>
          .
          <source>Psychological Science</source>
          ,
          <volume>7</volume>
          (
          <issue>5</issue>
          ):
          <volume>278</volume>
          {
          <fpage>283</fpage>
          ,
          <string-name>
            <surname>Seot</surname>
          </string-name>
          ,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Volker</given-names>
            <surname>Gaede</surname>
          </string-name>
          and
          <article-title>Oliver Gunther. Multidimensional Access Methods</article-title>
          .
          <source>Computer Surveys</source>
          ,
          <volume>30</volume>
          (
          <issue>2</issue>
          ):
          <volume>170</volume>
          {
          <fpage>231</fpage>
          ,
          <year>June 1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Michael</surname>
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Gazzaniga</surname>
          </string-name>
          , Richard B. Ivry,
          <string-name>
            <surname>George R. Mangun</surname>
          </string-name>
          , and
          <string-name>
            <surname>Megan</surname>
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Steven</surname>
          </string-name>
          .
          <article-title>Cognitive Neuroscience, The Biology of the Mind</article-title>
          . W.W. Norton, New York,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Mark</surname>
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Granovetter</surname>
          </string-name>
          .
          <source>The Strength of Weak Ties. Amer. J. of Sociology</source>
          ,
          <volume>78</volume>
          (
          <issue>6</issue>
          ):
          <volume>1360</volume>
          {
          <fpage>1380</fpage>
          ,
          <year>1973</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Machael</surname>
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Hasselmo</surname>
          </string-name>
          .
          <article-title>How we remember: brain mechanisms of episodic memory</article-title>
          . MIT Press, Cambridge, MA,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Michael</surname>
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Hasselmo</surname>
          </string-name>
          . Encoding:
          <article-title>Models linking neural mechanisms to behavior</article-title>
          . In H.L.
          <string-name>
            <surname>Roediger</surname>
            <given-names>III</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dudai</surname>
          </string-name>
          , and S.M. Fitzpatrick, editors,
          <source>Science of Memory: Concepts</source>
          , pages
          <volume>123</volume>
          {
          <fpage>127</fpage>
          .
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Yannis</surname>
            <given-names>Ioannidis</given-names>
          </string-name>
          , Raghu Ramakrishan, and
          <string-name>
            <given-names>Linda</given-names>
            <surname>Winger</surname>
          </string-name>
          .
          <article-title>Transitive closure algorithms based on graph traversal</article-title>
          .
          <source>ACM Trans. on Database Sys</source>
          .,
          <volume>18</volume>
          (
          <issue>3</issue>
          ):
          <volume>512</volume>
          {
          <fpage>576</fpage>
          ,
          <string-name>
            <surname>Sept</surname>
          </string-name>
          .
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Walid</surname>
            <given-names>A. R.</given-names>
          </string-name>
          <string-name>
            <surname>Jradi</surname>
            , Elis^angela
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Dias</surname>
          </string-name>
          , Diane Castonguay, Humberto Longo, and
          <article-title>Hugo A. D. do Nascimento. A GPU-based parallel algorithm for enumerating all chordless cycles in graphs</article-title>
          .
          <source>arXiv:submit</source>
          ,
          <volume>1288731</volume>
          :1{
          <fpage>15</fpage>
          ,
          <year>June 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>Michihiro</given-names>
            <surname>Kuramochi</surname>
          </string-name>
          and
          <string-name>
            <given-names>George</given-names>
            <surname>Karypis</surname>
          </string-name>
          .
          <article-title>Frequent Subgraph Discovery</article-title>
          .
          <source>In Proc.IEEE Conf. on Data Mining, ICDM</source>
          <year>2001</year>
          , pages
          <fpage>313</fpage>
          {
          <fpage>320</fpage>
          , San Jose, CA,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Joseph</surname>
            <given-names>E. LeDoux.</given-names>
          </string-name>
          <article-title>Consolidation: Challenging the traditional view</article-title>
          . In H.L.
          <string-name>
            <surname>Roediger</surname>
            <given-names>III</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dudai</surname>
          </string-name>
          , and S.M. Fitzpatrick, editors,
          <source>Science of Memory: Concepts</source>
          , pages
          <volume>171</volume>
          {
          <fpage>175</fpage>
          .
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Norman</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Martin</surname>
            and
            <given-names>Stephen</given-names>
          </string-name>
          <string-name>
            <surname>Pollard</surname>
          </string-name>
          .
          <source>Closure Spaces and Logic</source>
          . Kluwer Academic, Boston,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Terry</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>McKee. How Chordal Graphs Work</surname>
          </string-name>
          .
          <source>Bulletin of the ICA</source>
          ,
          <volume>9</volume>
          :
          <fpage>27</fpage>
          {
          <fpage>39</fpage>
          ,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>Lynn</given-names>
            <surname>Nadel</surname>
          </string-name>
          .
          <article-title>Consolidation: The demise of the xed trace</article-title>
          . In H.L.
          <string-name>
            <surname>Roediger</surname>
            <given-names>III</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dudai</surname>
          </string-name>
          , and S.M. Fitzpatrick, editors,
          <source>Science of Memory: Concepts</source>
          , pages
          <volume>177</volume>
          {
          <fpage>181</fpage>
          .
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>Karim</given-names>
            <surname>Nader</surname>
          </string-name>
          and
          <string-name>
            <given-names>Oliver</given-names>
            <surname>Hardt</surname>
          </string-name>
          .
          <article-title>Asingle standard for memory: the case for reconsolidation</article-title>
          .
          <source>Nature Reviews Neuroscience</source>
          ,
          <volume>10</volume>
          :
          <fpage>224</fpage>
          {
          <fpage>234</fpage>
          ,
          <year>2009</year>
          . doi:
          <volume>10</volume>
          .1038/nrn2590.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>Ratko</given-names>
            <surname>Orlandic and John L. Pfaltz</surname>
          </string-name>
          . Compact 0
          <article-title>-complete trees: A new method for searching large les</article-title>
          .
          <source>Technical Report IPC TR-88-001</source>
          ,
          <article-title>Institute for Parallel Computation</article-title>
          , Univ. of Virginia, Jan.
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>Ratko</given-names>
            <surname>Orlandic</surname>
          </string-name>
          and
          <string-name>
            <given-names>Byunggu</given-names>
            <surname>Yu</surname>
          </string-name>
          .
          <article-title>A Retrieval Technique for High-Dimensional Data and Partially Speci ed Queries</article-title>
          .
          <source>IEEE Trans. on Data and Knowledge Engineering</source>
          ,
          <volume>42</volume>
          (
          <issue>1</issue>
          ):1{
          <fpage>21</fpage>
          ,
          <string-name>
            <surname>Jan</surname>
          </string-name>
          .
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>John</given-names>
            <surname>Pfaltz</surname>
          </string-name>
          and
          <string-name>
            <given-names>Josef</given-names>
            <surname>Slapal</surname>
          </string-name>
          .
          <article-title>Transformations of discrete closure systems</article-title>
          .
          <source>Acta Math. Hungar.</source>
          ,
          <volume>138</volume>
          (
          <issue>4</issue>
          ):
          <volume>386</volume>
          {
          <fpage>405</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <surname>John</surname>
            <given-names>L. Pfaltz.</given-names>
          </string-name>
          <article-title>Finding the Mule in the Network</article-title>
          . In Reda Alhajj and Bob Werner, editors,
          <source>Intern. Conf on Advances in Social Network Analysis and Mining, ASONAM</source>
          <year>2012</year>
          , pages
          <fpage>667</fpage>
          {
          <fpage>672</fpage>
          , Istanbul, Turkey,
          <year>August 2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <surname>John</surname>
            <given-names>L. Pfaltz. Mathematical</given-names>
          </string-name>
          <article-title>Continuity in Dynamic Social Networks</article-title>
          .
          <source>Social Network Analysis and Mining (SNAM)</source>
          ,
          <volume>3</volume>
          (
          <issue>4</issue>
          ):
          <volume>863</volume>
          {
          <fpage>872</fpage>
          ,
          <string-name>
            <surname>Dec</surname>
          </string-name>
          .
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>John</surname>
            <given-names>L. Pfaltz.</given-names>
          </string-name>
          <article-title>The Irreducible Spine(s) of Discrete Networks</article-title>
          .
          <source>In Xuemin Li</source>
          ,
          <string-name>
            <given-names>Yannis</given-names>
            <surname>Manolopoulos</surname>
          </string-name>
          , Divesh Srivastava, and Guangyan Huang, editors,
          <source>Web Information Systems Engineering - WISE</source>
          <year>2013</year>
          , volume LNCS #
          <volume>6984</volume>
          ,
          <string-name>
            <surname>Part</surname>
            <given-names>2</given-names>
          </string-name>
          , pages
          <fpage>104</fpage>
          {117), Nanjing,
          <string-name>
            <surname>PRC</surname>
          </string-name>
          , Oct.
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <surname>John</surname>
            <given-names>L. Pfaltz.</given-names>
          </string-name>
          <article-title>The Role of Continuous Processes in Cognitive Development</article-title>
          .
          <source>Mathematics for Applications</source>
          ,
          <volume>4</volume>
          (
          <issue>4</issue>
          ):
          <volume>129</volume>
          {
          <fpage>152</fpage>
          ,
          <year>2015</year>
          . DOI:
          <volume>10</volume>
          .13164/ma.
          <year>2015</year>
          .
          <volume>11</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <surname>John</surname>
            <given-names>L. Pfaltz.</given-names>
          </string-name>
          <article-title>Using Closed Sets to Model Cognitive Behavior</article-title>
          . In Tapabrata Ray, Ruhul Sarker, and Xiaodong Li, editors,
          <source>Proc. Australian Conf. on Arti cial Life and Computational Intelligence (ACALCI</source>
          <year>2016</year>
          ),
          <source>volume LNCS 9592</source>
          , pages
          <fpage>13</fpage>
          {
          <fpage>26</fpage>
          ,
          <string-name>
            <surname>Canberra</surname>
            ,
            <given-names>ACT</given-names>
          </string-name>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <surname>John</surname>
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Pfaltz</surname>
          </string-name>
          .
          <source>Two Network Transformations. Mathematics for Applications</source>
          ,
          <volume>6</volume>
          (
          <issue>1</issue>
          ):(to appear),
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <surname>Dale</surname>
            <given-names>Purves</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>George J.</given-names>
            <surname>Augustine</surname>
          </string-name>
          , David Fitzpatrick, and et al. Neuroscience. Sinauer Assoc., Sunderland, MA,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <surname>Edmund</surname>
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Rolls</surname>
            and
            <given-names>Alessandro</given-names>
          </string-name>
          <string-name>
            <surname>Treves</surname>
          </string-name>
          .
          <source>Neural Networks and Brain Function</source>
          . Oxford Univ. Press, Oxford,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <surname>Donovan</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Schneider</surname>
            and
            <given-names>David J. DeWitt.</given-names>
          </string-name>
          <article-title>A performance evaluation of four parallel join algorithms in a shared-nothing multiprocessor environment</article-title>
          .
          <source>In Proc. 1990 ACM SIGMOD Conf.</source>
          , pages
          <volume>110</volume>
          {
          <fpage>121</fpage>
          ,
          <string-name>
            <surname>Atlantic</surname>
            <given-names>City</given-names>
          </string-name>
          , NJ, May
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>Dennis</given-names>
            <surname>Shasha</surname>
          </string-name>
          and
          <string-name>
            <surname>Tsong-Li Wang</surname>
          </string-name>
          .
          <article-title>Optimizing equijoin queries in distributed databases where relations are hash partitioned</article-title>
          .
          <source>ACM Trans. on Database Sys</source>
          .,
          <volume>16</volume>
          (
          <issue>2</issue>
          ):
          <volume>279</volume>
          {
          <fpage>308</fpage>
          ,
          <year>June 1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <surname>Zhao</surname>
            <given-names>Sun</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hongzhi</surname>
            <given-names>Wang</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haixun</surname>
            <given-names>Wang</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bin Shao</surname>
            , and
            <given-names>Jianzhong</given-names>
          </string-name>
          <string-name>
            <surname>Li</surname>
          </string-name>
          .
          <article-title>E cient Subgraph Matching on Billion Node Graphs</article-title>
          .
          <source>Proceedings of the VLDB Endowment</source>
          ,
          <volume>5</volume>
          (
          <issue>9</issue>
          ):
          <volume>788</volume>
          {
          <fpage>799</fpage>
          ,
          <year>2012</year>
          . Originally presented at VLDB Conf., Istanbul, Turkey,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <surname>Natalie</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Tronson</surname>
          </string-name>
          and
          <string-name>
            <surname>Jane R. Taylor</surname>
          </string-name>
          .
          <article-title>Molecular mechanisms of memory reconsolidation</article-title>
          .
          <source>Nature Review Neuroscience</source>
          ,
          <volume>8</volume>
          (
          <issue>4</issue>
          ):
          <volume>262</volume>
          {
          <fpage>275</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>Karstan</given-names>
            <surname>Weis</surname>
          </string-name>
          .
          <source>The Nuclear Pore Complex: Oily Spaghetti or Gummy Bear? Cell</source>
          ,
          <volume>130</volume>
          :
          <fpage>405</fpage>
          {
          <fpage>407</fpage>
          ,
          <string-name>
            <surname>August</surname>
            <given-names>10</given-names>
          </string-name>
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>