<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cliques are Too Strict for Representing Communities: Finding Large k-plexes in Real Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alessio Conte</string-name>
          <email>conte@nii.ac.jp</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Donatella Firmani</string-name>
          <email>donatella.firmani@uniroma3.it</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Caterina Mordente</string-name>
          <email>c.mordente@be-tse.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maurizio Patrignani</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Riccardo Torlone</string-name>
          <email>torloneg@dia.uniroma3.it</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Be Think Solve Execute</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Institute of Informatics</institution>
          ,
          <country country="JP">Japan</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Roma Tre University</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <fpage>24</fpage>
      <lpage>27</lpage>
      <abstract>
        <p>k-plexes are a formal yet exible way of de ning communities in networks. They generalize the notion of cliques and are more appropriate in most real cases: while a node of a clique C is connected to all other nodes of C, a node of a k-plex may miss up to k connections. Unfortunately, computing all maximal k-plexes is a gruesome task and state-of-the-art algorithms can only process small-size networks. In this paper we propose a new approach for enumerating large k-plexes in networks that speeds up the search by several orders of magnitude, leveraging on e cient techniques for the computation of maximal cliques.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        In the vast majority of networks representing real-world scenarios the
distribution of edges is not uniform and it is often possible to clearly distinguish groups
of nodes that are highly connected. The automatic detection of these groups,
often called communities, helps to discover fundamental properties of large
networks in a variety of di erent domains. For this reason this problem has been
largely investigated [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. A clique is a set of nodes in a network with all possible
edges among them, and is a formal and strict way of de ning a community. So
strict, in fact, that cliques are generally thought to be too rigid to be used in
practice [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. A more appropriate notion in many practical cases is the k-plex :
a set of nodes such that each of them has edges with all the others, with the
possible exception of up to k missing neighbors (including itself). So, for
example, for k = 1, k-plexes are cliques, for k = 2, each node may miss one edge, etc.
Hence, k-plexes are a simple and intuitive generalization of cliques.
      </p>
      <p>
        The problem of nding k-plexes arises in social network analysis [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], but it
has wider applicability in several important areas employing graph-based data
mining [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Unfortunately, the detection of all maximal k-plexes is unpractical
being hindered by two main problems: (i) maximal k-plexes are even more
numerous than maximal cliques, even if most k-plexes are small and not signi cant;
(ii) the most e cient algorithms in the literature, such as [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], can only be used
on small-size graphs: our experiments shows that the largest networks we were
able to analyze with such algorithms have a few hundred nodes. In this paper
we propose a solution to the rst issue that is also a solution to the second one.
Namely, if we restrict the search to large k-plexes, which are the most meaningful
in practice, we can devise e cient algorithms to detect them.
      </p>
      <p>
        Indeed, computing all maximal k-plexes does not make sense when the
purpose is that of detecting communities. In this respect, it is useful to focus on the
relationship between s, the size of a k-plex, and k itself. Starting from k = 1,
which corresponds to cliques, if we increase the value of k, we obtain progressively
sparser communities that are clearly less interesting in practice. (For s k, a
k-plex can be composed of isolated nodes, and there exist many disconnected
k-plexes for s &lt; 2k.) In this framework, our strategy for nding large k-plexes
relies on two main observations. First, the complexity of the problem can be
reduced in the vast majority of cases on the basis of certain properties of large
k-plexes that can be e ciently checked and that allows us to lter out a large
portion of the network before starting their search. The second consideration
is that, di erently to what happens for k-plexes, the state-of-the-art techniques
to compute all maximal cliques are able to scale up to millions of nodes by
decomposing the network into small blocks [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Unfortunately, the decomposition
approach cannot be easily adapted to the detection of k-plexes. However, we
demonstrate that we can nd all k-plexes non-smaller than m by looking in
the neighborhood of cliques of a size that depends on k and m. The knowledge
of cliques in a network provides a hint for nding all the signi cant k-plexes.
Structure of this paper. Section 2 contains an informal overview of our
approach. Detailed description of our algorithms and their theoretical basis can be
found in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Main experimental results of [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] are reported in Section 3. Finally,
Sections 4 and 5 contain related work and our concluding remarks.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Overview</title>
      <p>
        Our approach is based on two main ideas: (i) before starting the search of
kplexes, we can lter out a relevant portion of the network in which necessary
conditions for the presence of large k-plexes do not hold, and (ii) in large
networks, cliques can drive the search of k-plexes. While the rst point provides an
e ective way to simplify the problem at hand, the second can lead to an e cient
strategy for nding k-plexes. Let us elaborate on these ideas starting with the
problem of nding all k-plexes of maximum size. Assume that we have computed
all the maximal cliques of a network and let ! be the size of the maximum clique.
Then, a maximum k-plex has size at least !, since cliques are also k-plexes. For
We recall that the problem of enumerating maximal k-plexes is NP-Hard.
example, suppose we are searching for k-plexes in the network in Fig. 1a, which
we will use as a running example in this section: we have that ! = 5, since the
maximum clique (the blue subgraph on the left hand side) involves ve nodes.
Filtering. At this point, we observe that two ltering criteria can be applied.
1. coreness. Our rst intuition follows from the very de nition of k-plex: all
the nodes of a k-plex of size m must have degree non-smaller than m k.
If we know that the size of a maximum k-plex is at least !, this means
that we can iteratively lter out any node that has degree lower than ! k.
This corresponds to computing the coreness of all the nodes of the network
(Lemma 2 of [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]), a process that can be executed in linear time [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. For
example, suppose we are searching for 2-plexes in the running example of
Fig. 1a for which ! = 5: we can lter out the three black nodes on the top
of the picture since they have coreness 2, which is less than ! k = 3. In
larger networks, this criterion allows us to cut up to 99% of the nodes.
2. cliqueness. The second intuition is that any node of a k-plex of size m must
be included in a clique of a size that depends on m. This is con rmed by
Corollary 5.5 of [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] stating that any node of a k-plex larger or equal to m is
included in a clique of size at least dm=ke. Then, if the size of the maximum
k-plex is at least !, we can cut out all nodes that do not belong to any clique
of size at least d!=ke. For example, if we are searching for 2-plexes in the
network depicted in Fig. 1a, we can lter out all nodes that do not belong
to cliques of size at least d5=2e = 3, that is, the pair of black nodes in the
bottom of the network. In large instances in our experiments this criterion,
can be tested e ciently and is able to cut up to 98% of the nodes.
      </p>
      <p>Even if some nodes can be ltered out both because their low cliqueness and
low coreness, the network in Fig. 1a shows that the two ltering criteria are
indeed independent. When both criteria are applied, the size of the network is
reduced of magnitude and standard k-plexes algorithms may become feasible.</p>
      <p>Once we have found the largest k-plexes, we may be interested into searching
smaller ones. We have noted in the introduction that an exhaustive search does
n
density
!</p>
      <p>type
not make much sense, since very small k-plexes are not signi cant, to the point
that they may be even disconnected or composed by a set of isolated nodes.
Hence, the second problem we tackle is to nd all maximal k-plexes in the
network of size bigger than a threshold m.</p>
      <p>
        Local search. As mentioned above, our idea is to start from cliques, which are
k-plexes but not necessarily maximal, and possibly enlarge them to nd maximal
k-plexes. Building on the cliqueness criterion, which ensures that each node of
a k-plex C of size s is included into a clique of size at least ds=ke, we start
from each of such cliques K. If we set m k2, we have that jKj ds=ke &gt; k,
which implies that any other node of C must be adjacent to at least one node
of K (in other words, K is a dominating set of C). Hence, we can search for
C restricting to a block including K and all its adjacent nodes. For example,
suppose you are searching for all maximal 2-plexes of size at least 5 in the network
in Fig. 1a. Consider any clique of size at least ds=ke = d5=2e = 3, for example
the clique K = fa; b; eg (yellow triangle in Fig. 1b). The nodes of any k-plex of
size at least 5 containing K are adjacent to K (surrounded nodes of Fig. 1b).
We further reduce the size of the block by proving that C can be obtained by
considering only nodes belonging to K and to other cliques of size at least ds=ke
intersecting with K (Lemma 5 of [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]). For example, the rightmost 2-plex of
size 6 of Fig. 1a is all contained into the clique fa; b; eg and three other cliques
of size 3 intersecting with K (surrounded nodes of Fig. 1c). This gives rise to
an e cient searching algorithm that decomposes the network into blocks each
composed of one clique as the core, and all intersecting cliques as the boundary.
Each block can be separately processed, possibly in a distributed environment.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Experiments</title>
      <p>
        In this section, we compare our and previous algorithms over di erent real-world
networks, and show the advantages and limitations of our approach. We use the
algorithm in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] for enumerating all the maximal cliques of the input graph
G, and the algorithm in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] for enumerating all the maximal k-plexes of the
targeted graph block. Our code is publicly available [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. We considered a mix of
1⋅107 k=2
1⋅106
inH 1⋅105
se 1⋅104
d
on 1⋅103
# 1⋅102
1⋅101
k=3
k=4
n
jzza rcgQ eogm tvaaoodg ePphh trsaPoh enwm itcahSm ldbp ttseapn
(a)
jzza rcgQ eogm tvaaoogd ePphh trsaPoh enwm itcahSm lbpd ttseapn
(b)
real-world networks with various sizes and characteristics. All our networks are
publicly available on the LASAGNE meta-repository [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], and come from di erent
human activities. The networks considered in our experiments, together with
their number of nodes (n), density, maximum clique size (!), and their type, are
listed in Table 1 We compare the execution of our methods for enumerating large
k-plexes, with the most recent method for enumerating all k-plexes of the input
graph [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. All our executions have a reasonable 6 hours timeout, after which they
are interrupted.
      </p>
      <p>Filtering. In Figure 2a, we show the number of nodes in the residual sub-graph
H, resulting from the application of coreness and cliqueness criteria. We
use di erent values of k and m = !, i.e, the maximum clique size. As frame
of comparison, we show the number of nodes in G (i.e., n). The gure shows
that, except for newm where ! = 3, the sub-graph H is order of magnitudes
smaller than G. Notably, for di erent networks (jazz, geom, hephPh, newm, and
dblp), H is left with only the nodes of the maximum k-plex. In such lucky cases
we can even skip the execution of the enumeration step. Since the sub-graph
produced by a given k is included in the sub-graph produces by k + 1, is not
surprising that higher values of k yield more nodes in H. (Remember that for
k = n we have G = H.) However, for most instances, the sub-graph is small
with respect to G (thus allowing for faster enumeration of k-plexes) for di erent
values of k. Finally, our criteria have little impact on the newm network, because
its maximum clique size is only 3. Figure 2b reports the number of nodes of
G residual after the coreness criterion, applied separately. For the considered
networks, most nodes are ltered out by coreness. Then, the structures that
are too connected to be ltered by coreness but too small to play a role in the
search for k-plexes non-smaller than !, are ltered out by cliqueness. Such an
additional cliqueness step has bigger impact in advogato and patents.
Maximum k-plexes. In Table 2, we show running times for di erent steps of
our algorithm max plexes(G; k) for nding the maximum k-plex, compared
to the time required for enumerating all k-plexes (column \full enum"), over
the same input graph. For this experiment, we set k = 2 and report in column
{ core: running time of coreness criterion, and computing a sub-graph G0;
{ clique: running time of cliqueness criterion over G0, and computing H;
{ enum: the execution time of the enumeration step over H.</p>
      <p>
        The time for computing our criteria has little impact on the overall running
time, which is dominated by the enumeration of 2-plexes of the residual
subgraph when necessary. As a consequence, in all the networks where H is left
with only the nodes of the maximum clique, which is in turn also the maximum
2-plex, the computation of our algorithm ends successfully after fractions of
seconds. For such networks, we write \no need" in the \enum" column. As frame
of comparison, full enumeration of 2-plexes (i.e., as in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]) requires hours even
on our smallest network (jazz), and times out on the other networks. Whenever
the enumeration step is necessary, its running time ranges from fractions of
seconds (most networks) to 2 h, proportionally to the size of H (see Figure 2a
for comparison). The only two instances that require more than 6 h are indeed
nemw and patents, that correspond to the top two largest ltered sub-graphs.
We observed that the results for higher values of k, namely k = 3 and k = 4,
are similar. This is because the sub-graph H produced with higher valued of k
contains only few more nodes than the sub-graph produced with k = 2.
Large k-plexes. In Table 3, we show the overall running time of our
algorithm large plexes(G; k; m) for nding all k-plexes non-smaller than m on
di erent networks in our dataset. For this experiment, we use di erent values
of k and set m = 0:8!k, where !k is the maximum k-plex size, as computed
by max plexes(G; k). The time required for enumerating all k-plexes (column
\full enum") of such networks is always larger than our timeout (6 hours). The
table also show the number of k-plexes returned (column \found"). All the
networks considered contain less than a dozen k-plex non-smaller than 0:8!k, which
are quickly found by our algorithm in most cases. Note that in this experiment
coreness and cliqueness are applied with m = 0:8!k, which is possibly
different from the threshold than in Figure 2a (i.e., when 0:8!k !).
In the eld of network analysis, dense substructures in graphs (aka dense
subgraphs) are associated with communities, or more in general sets of closely
related elements [
        <xref ref-type="bibr" rid="ref14 ref17">14, 17</xref>
        ]. The problem of nding these substructures has been
extensively studied for decades, and continues to be the object of cutting edge
research. The simplest and most rigorous de nition of dense subgraph is the
clique, i.e., a subgraph in which all nodes are pairwise connected. Many
algorithms for nding all maximal cliques have been developed, most of them being
inspired to the Bron-Kerbosh algorithm [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], such as [
        <xref ref-type="bibr" rid="ref13 ref18">13, 18</xref>
        ] or to the more
recent paradigm of reverse search [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], such as [
        <xref ref-type="bibr" rid="ref11 ref15 ref9">15, 9, 11</xref>
        ]. McClosky [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] performs
a thorough study to devise exact algorithms for nding the largest k-plex, and
heuristics for nding lower upper bounds on its size, exploiting co-k-plexes (i.e.,
k-plexes on the complement graph) and graph coloring techniques. The
usability of the algrorithms for nding the largest k-plex is however limited to small
networks, as the running time exceeds the hour for graphs with hundreds of
nodes. Cohen et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] give a generic framework for enumerating all maximal
subgraphs with respect to hereditary and connected hereditary graph properties,
i.e., properties that are closed with respect to induced subgraphs and connected
induced subgraphs, respectively. Berlowitz et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] apply the framework in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ],
together with insights on the k-plex problem, to produce e cient algorithms for
the enumeration of maximal k-plexes and maximal connected k-plexes, which
are respectively hereditary and connected hereditary. Other quasi clique
models include the one de ned by Zhai et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], that is a k-plex with additional
connectivity constraint, and more that can be found in this survey [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
5
      </p>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>We have proposed a novel approach to the enumeration of large k-plexes, a formal
and meaningful way to de ne interesting communities in real-world networks
that generalizes the notion of clique. In the future, we intend to further extend
the applicability of our approach and tackle the problem of computing large
k-plexes on real world networks with millions of nodes. Our future work also
includes experimenting with a variety of networks coming from di erent domains,
such as (but not limited to) biological networks, web graphs, and product
copurchasing networks.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1] http://patrignani.dia.uniroma3.
          <article-title>it/large-k-plexes</article-title>
          . [Online; accessed Feb-2017].
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>[2] http://lasagne-unifi.sourceforge.net. [Online; accessed Feb-2017].</mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Avis</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Fukuda</surname>
          </string-name>
          .
          <article-title>Reverse search for enumeration</article-title>
          .
          <source>Discrete Applied Mathematics</source>
          ,
          <volume>65</volume>
          (
          <issue>1-3</issue>
          ):
          <volume>21</volume>
          {
          <fpage>46</fpage>
          ,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>B.</given-names>
            <surname>Balasundaram</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Butenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and I. V.</given-names>
            <surname>Hicks</surname>
          </string-name>
          .
          <article-title>Clique relaxations in social network analysis: The maximum k-plex problem</article-title>
          .
          <source>Oper. Res.</source>
          ,
          <volume>59</volume>
          (
          <issue>1</issue>
          ):
          <volume>133</volume>
          {
          <fpage>142</fpage>
          ,
          <string-name>
            <surname>Jan</surname>
          </string-name>
          .
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Batagelj</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaversnik</surname>
          </string-name>
          .
          <article-title>An o(m) algorithm for cores decomposition of networks. CoRR, cs</article-title>
          .
          <source>DS/0310049</source>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Berlowitz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Cohen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Kimelfeld</surname>
          </string-name>
          .
          <article-title>E cient enumeration of maximal k-plexes</article-title>
          .
          <source>In SIGMOD, SIGMOD '15</source>
          , pages
          <fpage>431</fpage>
          {
          <fpage>444</fpage>
          . ACM,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C.</given-names>
            <surname>Bron</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Kerbosch</surname>
          </string-name>
          .
          <article-title>Finding all cliques of an undirected graph (algorithm 457)</article-title>
          .
          <source>Commun. ACM</source>
          ,
          <volume>16</volume>
          (
          <issue>9</issue>
          ):
          <volume>575</volume>
          {
          <fpage>576</fpage>
          ,
          <year>1973</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kimelfeld</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sagiv</surname>
          </string-name>
          .
          <article-title>Generating all maximal induced subgraphs for hereditary and connected-hereditary graph properties</article-title>
          .
          <source>Journal of Computer and System Sciences</source>
          ,
          <volume>74</volume>
          (
          <issue>7</issue>
          ):
          <volume>1147</volume>
          {
          <fpage>1159</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Comin</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Rizzi</surname>
          </string-name>
          .
          <article-title>An improved upper bound on maximal clique listing via rectangular fast matrix multiplication</article-title>
          .
          <source>CoRR, abs/1506.01082</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Conte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Firmani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Mordente</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Patrignani</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Torlone</surname>
          </string-name>
          .
          <article-title>Fast enumeration of large k-plexes</article-title>
          .
          <source>In KDD</source>
          , pages
          <volume>115</volume>
          {
          <fpage>124</fpage>
          . ACM,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Conte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Grossi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Marino</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Versari</surname>
          </string-name>
          .
          <article-title>Sublinear-space boundeddelay enumeration for massive network analytics: Maximal cliques</article-title>
          .
          <source>In ICALP</source>
          , pages
          <volume>148</volume>
          :1{
          <fpage>148</fpage>
          :
          <fpage>15</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Conte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. D.</given-names>
            <surname>Virgilio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Maccioni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Patrignani</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Torlone</surname>
          </string-name>
          .
          <article-title>Finding all maximal cliques in very large social networks</article-title>
          .
          <source>In EDBT</source>
          , pages
          <volume>173</volume>
          {
          <fpage>184</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D.</given-names>
            <surname>Eppstein</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Strash</surname>
          </string-name>
          .
          <article-title>Listing all maximal cliques in large sparse real-world graphs</article-title>
          .
          <source>In SEA</source>
          , pages
          <volume>364</volume>
          {
          <fpage>375</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Fortunato</surname>
          </string-name>
          .
          <article-title>Community detection in graphs</article-title>
          .
          <source>Physics reports</source>
          ,
          <volume>486</volume>
          (
          <issue>3</issue>
          ):
          <volume>75</volume>
          {
          <fpage>174</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>K.</given-names>
            <surname>Makino</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Uno</surname>
          </string-name>
          .
          <article-title>New algorithms for enumerating all maximal cliques</article-title>
          .
          <source>In SWAT</source>
          , pages
          <volume>260</volume>
          {
          <fpage>272</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>B.</given-names>
            <surname>McClosky</surname>
          </string-name>
          and
          <string-name>
            <given-names>I. V.</given-names>
            <surname>Hicks</surname>
          </string-name>
          .
          <article-title>Combinatorial algorithms for the maximum k-plex problem</article-title>
          .
          <source>J. Comb. Optim.</source>
          ,
          <volume>23</volume>
          (
          <issue>1</issue>
          ):
          <volume>29</volume>
          {
          <fpage>49</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Pattillo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Youssef</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Butenko</surname>
          </string-name>
          .
          <source>Clique Relaxation Models in Social Network Analysis</source>
          , pages
          <volume>143</volume>
          {
          <fpage>162</fpage>
          . Springer New York, New York, NY,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>E.</given-names>
            <surname>Tomita</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tanaka</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Takahashi</surname>
          </string-name>
          .
          <article-title>The worst-case time complexity for generating all maximal cliques and computational experiments</article-title>
          .
          <source>Theor. Comput. Sci.</source>
          ,
          <volume>363</volume>
          (
          <issue>1</issue>
          ):
          <volume>28</volume>
          {
          <fpage>42</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Haraguchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Okubo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Tomita</surname>
          </string-name>
          .
          <article-title>A fast and complete algorithm for enumerating pseudo-cliques in large graphs</article-title>
          .
          <source>International Journal of Data Science and Analytics</source>
          ,
          <volume>2</volume>
          (
          <issue>3</issue>
          -4):
          <volume>145</volume>
          {
          <fpage>158</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>