{"http:\/\/dx.doi.org\/10.14288\/1.0051964":{"http:\/\/vivoweb.org\/ontology\/core#departmentOrSchool":[{"value":"Science, Faculty of","type":"literal","lang":"en"},{"value":"Computer Science, Department of","type":"literal","lang":"en"}],"http:\/\/www.europeana.eu\/schemas\/edm\/dataProvider":[{"value":"DSpace","type":"literal","lang":"en"}],"https:\/\/open.library.ubc.ca\/terms#degreeCampus":[{"value":"UBCV","type":"literal","lang":"en"}],"http:\/\/purl.org\/dc\/terms\/creator":[{"value":"Lee, Hongrae","type":"literal","lang":"en"}],"http:\/\/purl.org\/dc\/terms\/issued":[{"value":"2010-09-22T22:06:10Z","type":"literal","lang":"en"},{"value":"2010","type":"literal","lang":"en"}],"http:\/\/vivoweb.org\/ontology\/core#relatedDegree":[{"value":"Doctor of Philosophy - PhD","type":"literal","lang":"en"}],"https:\/\/open.library.ubc.ca\/terms#degreeGrantor":[{"value":"University of British Columbia","type":"literal","lang":"en"}],"http:\/\/purl.org\/dc\/terms\/description":[{"value":"This dissertation studies selectivity estimation of approximate predicates on text. Intuitively, we aim to count the number of strings that are similar to a given query string. This type of problem is crucial in handling text in RDBMSs in an error-tolerant way. \n\nA common difficulty in handling textual data is that they may contain typographical errors, or use similar but different textual representations for the same real-world entity. To handle such data in databases, approximate text processing has gained extensive interest and commercial databases have begun to incorporate such functionalities. One of the key components in successful integration of approximate text processing in RDBMSs is the selectivity estimation module, which is central in optimizing queries involving such predicates. However, these developments are relatively new and ad-hoc approaches, e.g., using a constant, have been employed.\n\nThis dissertation studies reliable selectivity estimation techniques for approximate predicates on text. Among many possible predicates, we focus on two types of predicates which are fundamental building blocks of SQL queries: selections and joins. We study two different semantics for each type of operator. We propose a set of related summary structures and algorithms to estimate selectivity of selection and join operators with approximate matching. A common challenge is that there can be a huge number of variants to consider. The proposed data structures enable efficient counting by considering a group of similar variants together rather than each and every one separately. A lattice-based framework is proposed to consider overlapping counts among the groups. \n\nWe performed extensive evaluation of proposed techniques using real-world and synthetic data sets. Our techniques support popular similarity measures including edit distance, Jaccard similarity and cosine similarity and show how to extend the techniques to other measures. Proposed solutions are compared with state-of-the-arts and baseline methods. Experimental results show that the proposed techniques are able to deliver accurate estimates with small space overhead.","type":"literal","lang":"en"}],"http:\/\/www.europeana.eu\/schemas\/edm\/aggregatedCHO":[{"value":"https:\/\/circle.library.ubc.ca\/rest\/handle\/2429\/28645?expand=metadata","type":"literal","lang":"en"}],"http:\/\/www.w3.org\/2009\/08\/skos-reference\/skos.html#note":[{"value":"Selectivity Estimation of Approximate Predicates on Text by Hongrae Lee M.Sc., Seoul National University, 2004 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY in The Faculty of Graduate Studies (Computer Science) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) September 2010 c\u00a9 Hongrae Lee 2010 Abstract This dissertation studies selectivity estimation of approximate predicates on text. Intuitively, we aim to count the number of strings that are similar to a given query string. This type of problem is crucial in handling text in RDBMSs in an error-tolerant way. A common difficulty in handling textual data is that they may contain typographical er- rors, or use similar but different textual representations for the same real-world entity. To handle such data in databases, approximate text processing has gained extensive interest and commercial databases have begun to incorporate such functionalities. One of the key compo- nents in successful integration of approximate text processing in RDBMSs is the selectivity estimation module, which is central in optimizing queries involving such predicates. However, these developments are relatively new and ad-hoc approaches, e.g., using a constant, have been employed. This dissertation studies reliable selectivity estimation techniques for approximate pred- icates on text. Among many possible predicates, we focus on two types of predicates which are fundamental building blocks of SQL queries: selections and joins. We study two different semantics for each type of operator. We propose a set of related summary structures and algorithms to estimate selectivity of selection and join operators with approximate matching. A common challenge is that there can be a huge number of variants to consider. The proposed data structures enable efficient counting by considering a group of similar variants together rather than each and every one separately. A lattice-based framework is proposed to consider overlapping counts among the groups. We performed extensive evaluation of proposed techniques using real-world and synthetic data sets. Our techniques support popular similarity measures including edit distance, Jaccard similarity and cosine similarity and show how to extend the techniques to other measures. Proposed solutions are compared with state-of-the-arts and baseline methods. Experimental results show that the proposed techniques are able to deliver accurate estimates with small space overhead. ii Preface Most of this dissertation is the result of collaboration with my supervisor Raymond T. Ng at the University of British Columbia, Canada and Kyuseok Shim at Seoul National University, Korea. Published work with them is integrated into this dissertation in a relatively self- contained way. Each publication constitutes a main technical chapter. The basic framework and solutions for string matching semantics in Chapter 3 are described in a VLDB 2007 paper [89]. Techniques for substring matching semantics in Chapter 4 are described in a EDBT 2009 paper [90]. Algorithms for set similarity join in Chapter 5 are described in a VLDB 2009 paper [92]. As the first author of all the papers, I was in charge of all aspects of research including formulating research problems, literature review, developing algorithms, and conducting\/analyzing experiments with their guidance. iii Table of Contents Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Dedication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Approximate Text Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Selectivity Estimation for Query Optimization . . . . . . . . . . . . . . . . . . 2 1.3 Other Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.1 Query Optimization in Text-related Tasks . . . . . . . . . . . . . . . . 4 1.3.2 Query Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.4 Dissertation Goals and Challenges . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.4.1 String Similarity Models and Measures . . . . . . . . . . . . . . . . . . 7 1.4.2 Selection Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.4.3 Join Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.5 Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.1 Selection Selectivity Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.1.1 Exact Selectivity Estimation . . . . . . . . . . . . . . . . . . . . . . . . 14 2.1.2 Approximate Selectivity Estimation . . . . . . . . . . . . . . . . . . . . 17 2.1.3 Join Size Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.2 Signatures and Hashing Techniques for Similarity Matching . . . . . . . . . . . 19 2.2.1 Min-Hashing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2.2.2 Locality Sensitive Hashing . . . . . . . . . . . . . . . . . . . . . . . . . 20 2.3 Approximate String Matching . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 2.3.1 Web Data Integration and Text Databases . . . . . . . . . . . . . . . . 22 2.3.2 Data Cleaning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 iv Table of Contents 2.3.3 Other Areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 2.4 Similarity Joins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 2.4.1 Inverted Index-Based Solutions . . . . . . . . . . . . . . . . . . . . . . 25 2.4.2 Signature-Based Solutions . . . . . . . . . . . . . . . . . . . . . . . . . 26 2.4.3 RDBMS-Based Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . 26 3 String Selectivity Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 3.2 Extended Q-grams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 3.2.1 Extending Q-grams with Wildcards . . . . . . . . . . . . . . . . . . . . 29 3.2.2 Replacement Semi-lattice . . . . . . . . . . . . . . . . . . . . . . . . . . 30 3.2.3 An Example Replacement Formula . . . . . . . . . . . . . . . . . . . . 31 3.2.4 The General Replacement Formula . . . . . . . . . . . . . . . . . . . . 32 3.2.5 The General Deletion Formula . . . . . . . . . . . . . . . . . . . . . . . 34 3.2.6 The Formula for One Insertion . . . . . . . . . . . . . . . . . . . . . . . 35 3.3 Basic Algorithm for Size Estimation . . . . . . . . . . . . . . . . . . . . . . . . 35 3.3.1 Procedure BasicEQ and Generating Nodes of the String Hierarchy . . . 35 3.3.2 Node Partitioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 3.3.3 An Example and a Formula for Two Insertions . . . . . . . . . . . . . . 38 3.3.4 Procedure PartitionEstimate . . . . . . . . . . . . . . . . . . . . . . . . 39 3.3.5 Procedure ComputeCoefficient . . . . . . . . . . . . . . . . . . . . . . . 41 3.3.6 Procedure EstimateFreq . . . . . . . . . . . . . . . . . . . . . . . . . . 41 3.4 Optimized Algorithm OptEQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 3.4.1 Approximating Coefficients with a Replacement Semi-lattice . . . . . . 42 3.4.2 Fast Intersection Tests by Grouping . . . . . . . . . . . . . . . . . . . . 44 3.5 Empirical Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 3.5.1 Implementation Highlights . . . . . . . . . . . . . . . . . . . . . . . . . 46 3.5.2 Experimental Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 3.5.3 Actresses Last Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 3.5.4 DBLP Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 3.5.5 DBLP Titles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 3.5.6 Space vs Accuracy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 3.5.7 Summary of Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . 51 3.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 4 Substring Selectivity Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . 53 4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 4.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 4.2.1 Extended Q-grams with Wildcards . . . . . . . . . . . . . . . . . . . . 55 4.2.2 Min-Hashing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 4.2.3 Set Hashing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 4.3 Estimation without Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 4.3.1 MOF: The MOst Frequent Minimal Base String Method . . . . . . . . 58 4.3.2 Algorithms not Based on Extended Q-grams . . . . . . . . . . . . . . . 60 v Table of Contents 4.4 Estimation with Set Hashing Signatures . . . . . . . . . . . . . . . . . . . . . . 61 4.4.1 LBS: Lower Bound Estimation . . . . . . . . . . . . . . . . . . . . . . . 61 4.4.2 Improving LBS with Extra Minima . . . . . . . . . . . . . . . . . . . . 64 4.5 Extensions to Other Similarity Measures . . . . . . . . . . . . . . . . . . . . . 66 4.5.1 SQL LIKE Clauses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 4.5.2 Jaccard Coefficient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 4.6 Empirical Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 4.6.1 Experimental Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 4.6.2 Short Query Set: Estimation Accuracy vs Space Overhead vs Query Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 4.6.3 Query Sets on DBLP Titles . . . . . . . . . . . . . . . . . . . . . . . . 71 4.6.4 Other Similarity Measures . . . . . . . . . . . . . . . . . . . . . . . . . 73 4.6.5 Impact of Parameters: kmin, PT . . . . . . . . . . . . . . . . . . . . . . 73 4.6.6 Impact of Data Set Size . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 4.6.7 Recipe: Balancing Space vs. Accuracy . . . . . . . . . . . . . . . . . . 74 4.6.8 Summary of Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . 74 4.7 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 5 Set Similarity Join Size Estimation . . . . . . . . . . . . . . . . . . . . . . . . 76 5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 5.2 Signature Pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 5.2.1 Min-Hash Signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 5.2.2 The FSP Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 5.3 Lattice Counting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 5.3.1 Computing The Union Cardinality . . . . . . . . . . . . . . . . . . . . . 80 5.3.2 The Union Formula Exploiting Lattice . . . . . . . . . . . . . . . . . . 81 5.3.3 Level Sum Computation . . . . . . . . . . . . . . . . . . . . . . . . . . 84 5.4 Power-Law Based Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 5.4.1 Level Sum with Power-Law Distribution . . . . . . . . . . . . . . . . . 85 5.4.2 Approximate Lattice Counting . . . . . . . . . . . . . . . . . . . . . . . 87 5.4.3 Estimation With Limited Pattern Distribution . . . . . . . . . . . . . . 88 5.5 Correction of The Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 5.5.1 Systematic Overestimation By Min-Hash . . . . . . . . . . . . . . . . . 89 5.5.2 Error Correction By State Transition Model . . . . . . . . . . . . . . . 89 5.6 Experimental Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 5.6.1 Experimental Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 5.6.2 DBLP Data Set: Accuracy and Efficiency . . . . . . . . . . . . . . . . . 94 5.6.3 Effectiveness of Lattice Counting and Error Correction . . . . . . . . . 94 5.6.4 Scalability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 5.6.5 Synthetic Data Set: Accuracy, Efficiency and Scalability . . . . . . . . 96 5.6.6 On Power-law Hypotheses . . . . . . . . . . . . . . . . . . . . . . . . . 97 5.6.7 Summary of Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . 97 5.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 vi Table of Contents 6 Vector Similarity Join Size Estimation . . . . . . . . . . . . . . . . . . . . . . 99 6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 6.2 Baseline Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 6.2.1 Random Sampling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 6.2.2 Adaptation of Lattice Counting . . . . . . . . . . . . . . . . . . . . . . 101 6.3 LSH Index for the VSJ Problem . . . . . . . . . . . . . . . . . . . . . . . . . . 101 6.3.1 Preliminary: LSH Indexing . . . . . . . . . . . . . . . . . . . . . . . . . 101 6.3.2 Estimation with Uniformity Assumption . . . . . . . . . . . . . . . . . 102 6.3.3 LSH-S: Removing Uniformity Assumption . . . . . . . . . . . . . . . . 104 6.4 Stratified Sampling using LSH . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 6.4.1 LSH-SS: Stratified Sampling . . . . . . . . . . . . . . . . . . . . . . . . 106 6.4.2 Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 6.5 Additional Discussions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 6.5.1 The Optimal-k for The VSJ Problem . . . . . . . . . . . . . . . . . . . 112 6.5.2 Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 6.6 Experimental Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 6.6.1 Set Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 6.6.2 DBLP: Accuracy, Variance and Efficiency . . . . . . . . . . . . . . . . . 116 6.6.3 NYT: Accuracy, Variance and Efficiency . . . . . . . . . . . . . . . . . 118 6.6.4 PUBMED: Accuracy, Variance, Efficiency . . . . . . . . . . . . . . . . . 118 6.6.5 Impact of Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 6.6.6 Summary of Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . 121 6.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 7.1 Key Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 7.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 7.2.1 Supporting Diverse Similarity Measures . . . . . . . . . . . . . . . . . . 124 7.2.2 Adaptation for Query Processing . . . . . . . . . . . . . . . . . . . . . 125 7.2.3 Integration with Full-Fledged RDBMSs . . . . . . . . . . . . . . . . . . 125 7.2.4 Incremental Maintenance of Summary Structures . . . . . . . . . . . . 126 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 vii List of Tables 2.1 Selectivity Estimation Techniques on Text . . . . . . . . . . . . . . . . . . . . . 15 6.1 An Example Probabilities in DBLP . . . . . . . . . . . . . . . . . . . . . . . . . 106 6.2 Summary of Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 6.3 Relative Error on DBLP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 viii List of Figures 1.1 The optimizer generated plan (a) for the example query runs 3 times slower than an alternative plan (b) on the DBLP database. The estimated selectivity of the approximate text predicate (output of node 1 in plan (a)) was 1,722 whereas the true selectivity was 57,602. This poor selectivity estimation caused the selection of a sub-optimal plan such as plan (a) rather than plan (b). . . . 3 1.2 An Example of Using Answer Cardinality to Help Formulating Queries . . . . . 6 1.3 Overview of Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.1 String Semi-lattice for Ans(\u201cabcd\u201d, 2R) . . . . . . . . . . . . . . . . . . . . . . 30 3.2 Number of Resulting Intersections for Ans(\u201cabcd\u201d, 2R) . . . . . . . . . . . . . . 32 3.3 Various Representative String Hierarchies . . . . . . . . . . . . . . . . . . . . . 34 3.4 A Skeleton for Estimating Frequency . . . . . . . . . . . . . . . . . . . . . . . . 36 3.5 A Skeleton for Procedure BasicEQ . . . . . . . . . . . . . . . . . . . . . . . . . 37 3.6 Examples of Local Semi-lattice . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 3.7 A Skeleton of Procedure PartitionEstimate . . . . . . . . . . . . . . . . . . . . 39 3.8 A Skeleton of Procedure ComputeCoefficient . . . . . . . . . . . . . . . . . . . 40 3.9 String Hierarchy of Ans(\u201cabc\u201d, 1I1R) . . . . . . . . . . . . . . . . . . . . . . . . 42 3.10 Completion of a Replacement Semi-lattice of Ans(\u201caabc\u201d, 2R) . . . . . . . . . . 42 3.11 Approximating Coefficients for \u201caabc\u201d . . . . . . . . . . . . . . . . . . . . . . . 44 3.12 A Skeleton of Procedure OptEQ . . . . . . . . . . . . . . . . . . . . . . . . . . 45 3.13 Actress Last Name, \u03c4 = [1, 3] . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 3.14 DBLP Authors, \u03c4 = 1, 2, 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 3.15 Error Distribution: OptEQ(MM, 9, 5, 2) vs SEPIA . . . . . . . . . . . . . . . 49 3.16 DBLP Titles, \u03c4 in [1, 3] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 4.1 Set Resemblance Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 4.2 An Illustration of LBS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 4.3 LBS Using the First and Second Minima . . . . . . . . . . . . . . . . . . . . . . 65 4.4 Estimation of Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 4.5 Short Query Set on DBLP Authors . . . . . . . . . . . . . . . . . . . . . . . . . 68 4.6 Short Query Set on DBLP Titles . . . . . . . . . . . . . . . . . . . . . . . . . . 70 4.7 Error Distributions on DBLP Authors . . . . . . . . . . . . . . . . . . . . . . . 70 4.8 Long Query Sets on DBLP Titles . . . . . . . . . . . . . . . . . . . . . . . . . . 72 4.9 Other Similarity Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 4.10 Impact of kmin and PT on IMDB Keywords . . . . . . . . . . . . . . . . . . . . 72 4.11 Impact of Data Set Size on Error . . . . . . . . . . . . . . . . . . . . . . . . . . 74 ix List of Figures 5.1 An Example DB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 5.2 An Example of Signature Patterns (freq \u2265 2) . . . . . . . . . . . . . . . . . . . . . 79 5.3 Overlapping Relationship . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 5.4 Example Pattern Lattice Structures . . . . . . . . . . . . . . . . . . . . . . . . 82 5.5 Signature Pattern Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 5.6 Relaxed Lattice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 5.7 # pair-similarity Plot of 2 Subsets of the DBLP Data Set . . . . . . . . . . . . 89 5.8 SSJoin Size Distribution in the DBLP data . . . . . . . . . . . . . . . . . . . . . . . . 90 5.9 SSJoin size: True vs. MinHash . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 5.10 An Example of Imbalance in Transitions . . . . . . . . . . . . . . . . . . . . . . 90 5.11 Accuracy on the DBLP Data Set . . . . . . . . . . . . . . . . . . . . . . . . . . 94 5.12 Performance on the DBLP Data Set . . . . . . . . . . . . . . . . . . . . . . . . 95 5.13 Effectiveness of Lattice Counting and the Error Correction . . . . . . . . . . . 95 5.14 Scalability Using the DBLP Data Set . . . . . . . . . . . . . . . . . . . . . . . . 96 5.15 Accuracy on the Synthetic Data Set . . . . . . . . . . . . . . . . . . . . . . . . 96 6.1 Probability Density Functions of (non-) Collision in the LSH Scheme . . . . . . 103 6.2 Accuracy\/Variance on DBLP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 6.3 Accuracy\/Variance on NYT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 6.4 Impact of k on DBLP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 6.5 Accuracy\/Variance on PUBMED . . . . . . . . . . . . . . . . . . . . . . . . . . 119 6.6 Relative Error Varying \u03b4 (the Answer Size Threshold) in SampleL . . . . . . . 121 6.7 The Number of \u03c4 with J\u0302\/J \u2265 10 (overest.) or J\/J\u0302 \u2265 10 (underest.) Varying \u03b4. The total number of \u03c4 is 10: {0.1, 0.2, ..., 1.0} . . . . . . . . . . . . . . . . . . 121 6.8 Relative Error Varying the Sample Size m . . . . . . . . . . . . . . . . . . . . . 122 6.9 The Number of \u03c4 with J\u0302\/J \u2265 10 (overestimation) or J\/J\u0302 \u2265 10 (underestima- tion) Varying the sample size m. The total number of \u03c4 is 10: {0.1, 0.2, ..., 1.0} 122 x Acknowledgments Looking back, I realize my life and academic pursuit has been blessed with many people. I would like to express my sincere thanks here. My supervisor Raymond Ng has enormously influenced me in every aspect throughout my years at UBC. I simply cannot think of a better adviser than him. He showed deep insights whenever I was at a loss and encouraged me whenever I felt down. I am also shaped by his confidence, determination, his managerial and interpersonal skills. He has been my role model and I hope to continue his examples. I am also greatly indebted to Kyuseok Shim at Seoul National University. I was lucky to meet him in a class during my Masters and it was then when I started developing my interests in research. Let alone lessons I learned while working with him in many years, it was he that introduced Raymond and Surajit. Most of my research has been done with Raymond and Professor Shim and they always have impressed me with their insights, technical depth and knowledge. I would like to express my gratitude to them. My appreciation also goes to Professor Hyoung-Joo Kim at Seoul National University, who was my Master\u2019s supervisor, for his support and advises. I would like to thank faculty members at the DMM lab at UBC: Laks V.S. Lakshmanan and Rachel Pottinger. My research skills have been greatly influenced through close interaction with them by personal meetings, classes, and group seminars. They have been there for me whenever I was seeking advise and never turned down my unsolicited visits and requests. Another two people who have had deep influence on my research style, passion, skills and career are Surajit Chaudhuri and Vivek Narasayya at Microsoft Research. During the two summers in the DMX group at Microsoft Research, I was greatly inspired by their knowledge, sharpness, communication skills and personalities. I truly enjoyed my life at Microsoft Re- search and interactions with the DMX group members. I thank them for all the opportunities they offered. I thank other graduate students in the DMM lab at UBC for their friendship, feedback on my work and advises on various matters: Byung-Won On, Xiadong Zhou, Michael Lawrence, April Webster, Andrew Carbonetto, Shaofeng Bu, Amit Goyal, Mohammad Tajer, Min Xi, Xu Jian, and Jie Zhao. My graduate life also has been enriched by friendship of other fellow graduate students at UBC or SNU: Ewout van den Berg, Sang Hoon Yeo, Argun Arpaslan, Steve Chang, Billy, Jaehyok Chong, and Jongik Kim. Last, but most importantly, I am greatly indebted to my family. My PhD has been a rather long journey since I decided to pursue an academic career, but my wife, Jungmi, has always been there for me. My parents and brothers have been very understanding and supportive all the years. I also would like to thank my mother in law for her belief and supports as well. I was able to follow my passion since I knew I have home and loving family. Nothing would have been possible without their love, support and sacrifice. They are behind all I do. xi To my loving wife Jungmi, brothers, and parents xii Chapter 1 Introduction This dissertation studies the problem of selectivity estimation of approximate predicates on text. Intuitively, approximate text query processing is to find records that are similar to the query string. An example query is \u201cfind papers written by \u2018Przymusinski\u2019 in a citation database allowing errors\u201d Such similarity queries are of practical importance since textual data may not be clean; they often have errors such as typographical errors. Moreover, users may experience difficulties in correctly spelling the query. In this dissertation, we focus on selectivity estimation of similarity queries. Selectivity estimation is different from query processing in that it focuses on the question of how many: query processing retrieves actual records satisfying given predicates and selectivity estimation estimates the number of records satisfying the predicates. An example query is \u201chow many names are similar to \u2018Przymusinski\u2019 in the author name column of a citation database allowing errors?\u201d As will be shown shortly, these types of questions are central in query optimization of such queries in a relational database management system (RDBMS). We begin this chapter by surveying recent developments in approximate text processing, especially in RDBMSs. Then we consider the selectivity estimation of approximate text processing and see its main motivation, which is query optimization in RDBMSs. However, its application is not limited to query optimization in RDBMSs and we examine other applications. We largely consider two categories of approximate predicates on text: selection operators and join operators. They are the \u201ctwo workhorse operators\u201d in RDBMSs. We give overviews of the sub-problems that we study, and then present challenges, goals and summary. 1.1 Approximate Text Processing Text is ubiquitous and textual data are found in virtually every database. Examples of textual data include names, addresses, product descriptions, profiles, comments and reviews. They generally have distinctive features that require special handling in databases. Some of the important characteristics of textual data that are relevant to this dissertation are listed as follows: \u2022 Typographical errors: Text often has typographical errors (typos). The major source of this type of error is user input. Even professionally edited text often has typos. With the advance of personal publishing mechanisms such as blogging, twitting or text messaging, more and more textual data are generated by end-users in a relatively short time and in large quantities. More errors are expected in these environments. Accord- ingly, there exist a large number of business products to handle this type of errors. For 1 1.2. Selectivity Estimation for Query Optimization instance, there are many specialized software products that clean textual data such as Trillium [137]. Typosquatting1 or web sites like \u2018Typo Bay\u2019 2 are also examples. \u2022 Diverse textual representations: In many cases, similar spellings exist for the same real- world entity. For instance, both \u2018center\u2019 and \u2018centre\u2019 are used and \u2018Abbey\u2019, \u2018Abby\u2019, and \u2018Abbie\u2019 are variants of similar names. It is hard to expect everyone to use the same standard in real-world and different textual representations are inherent even without typos. The implication of above challenges is that exact matching for text often fails to deliver intended information. To address this problem, approximate text query processing techniques have been proposed in the literature, e.g., [53, 85, 114, 115]. It is also called fuzzy or similarity matching, or proximity search. Intuitively, it retrieves records that have similar text and allows errors or different textual representations. The problem, in its most general form, is \u201cto find a text where a given pattern occurs, allowing a limited number of errors in the match\u201d [114]. Examples of approximate text matching are recovering the original signals after their transmission over noisy channels, finding DNA subsequences after possible mutations, and text searching where there are typing or spelling errors. Each application has different similarity (or error) models and different characteristics of text. In this dissertation, we focus on the last example of text such as addresses, names or titles which are generally found in string columns in RDBMSs. See [86] for a survey on similarity measures and algorithms in this domain and [114] for approximate string matching techniques in a broader range of domains. 1.2 Selectivity Estimation for Query Optimization With the widespread use of the Internet, more and more textual data are generated and stored with unprecedented rate. Accordingly, commercial RDBMSs have begun to incorpo- rate approximate query processing in their core parts. For instance, Microsoft SQL Server Integration Services supports approximate text matching with \u2018Fuzzy Lookup\u2019 and \u2018Fuzzy Grouping\u2019 operators. Oracle Text supports new index types and several operators like \u2018CON- TAINS\u2019. IBM DB2 Text Search also has related index types and operators for approximate text matching. To successfully incorporate approximate text processing, database systems need many components. First, an index structure that enables efficient look-up is needed. Depending on the data type, RDBMSs build indexes like B+ tree, R-tree, or inverted index. Commercial database systems have developed specialized index structures for approximate text process- ing purposes. For example, Oracle Text has several index types including CONTEXT or CTXCAT depending on the type of queries. Second, operators or algorithms that can utilize the index and process data integrated with other operators are needed. The previously men- tioned \u2018CONTAINS\u2019 operator is an example for approximate text processing in Oracle [117] 1The controversial practice of registering misspelled variant of popular url 2These sites help users reformulate queries so that they include popular typos of product names. This enables users to find hidden items that otherwise would not normally appear in the search result due to their typos. 2 1.2. Selectivity Estimation for Query Optimization (a) The optimizer generated plan (b) An alternative plan Figure 1.1: The optimizer generated plan (a) for the example query runs 3 times slower than an alternative plan (b) on the DBLP database. The estimated selectivity of the approximate text predicate (output of node 1 in plan (a)) was 1,722 whereas the true selectivity was 57,602. This poor selectivity estimation caused the selection of a sub-optimal plan such as plan (a) rather than plan (b). or IBM DB2 [68]. Another crucial component, which is the most relevant to this disserta- tion, is the selectivity estimation module. Roughly speaking, selectivity of a predicate is the number of records satisfying the predicate3. Selectivity estimation is essential in generating optimized query execution plans. A query optimizer has to make numerous choices during query optimization, many of which crucially depend on selectivity. It makes differences in many optimizing decisions including access path selection, join ordering or join algorithm. Despite the importance, for approximate text query processing, ad-hoc solutions have been employed in RDBMSs. An example of such ad-hoc solution is to a use constant selectivity for any query. This ad-hoc approach is not ideal and has the risk of producing arbitrarily bad sub-optimal plans. The following real-world example illustrates this point. Consider a citation database with the following schema: paper(pid,title,year,venue) and pauthor(pid, name). Suppose that a user wants to find a paper by \u2018Indyk\u2019 published in 2008 but she is not sure about the spelling, or the database may not be clean. That is, the query is \u201cfind papers in 2008 which has an author similar to \u2018Indyk\u2019 allowing errors\u201d. To decide whether two names are similar or not, we need a similarity measure and a similarity threshold. The following query showcases an actual SQL query in a commercial RDBMS that implements approximate text matching. SELECT title, name FROM paper, pauthor WHERE paper.pid = pauthor.pid AND CONTAINS(name, fuzzy(Indyk, 60, 100, W)) > 0 AND year=2008 The approximate text matching is specified by \u2018CONTAINS\u2019 and \u2018fuzzy\u2019 keywords. The matching is based on edit-distance and the similarity threshold is 60.4 The query also has additional parameters to fine tune the query. 3The selectivity of a predicate is often defined as the fraction of records that satisfy the predicate. We will use the term as the number of records since it does not make much difference in our context. We also use \u2018cardinality\u2019 or \u2018size\u2019 interchangeably. 4The maximum similarity value is 80 in this database. 3 1.3. Other Applications Figure 1.1 shows plans for the example query with the DBLP data set [93] loaded into the above schema. Figure 1.1(a) is the optimizer generated plan for the query. However, plan (a) is not the optimal plan for the query and took 10 seconds to run while plan (b) ran in 3 seconds on the DBLP database. After detailed analysis, the main reason for this sub-optimal plan choice was poor selectivity estimation of the approximate text predicate. There were 57,602 tuples satisfying the CONTAINS predicate in the database. However, the optimizer estimated selectivity of the predicate, which was the number of output tuples for node 1 in plan (a), was 1,722. Recall that using an index, we can efficiently identify and retrieve tuples satisfying some predicates with small overhead for index look-up. Thus, high selectivity, where there are only a small number of tuples satisfying the predicate, enables a much faster look- up than scanning and checking the whole data. However, at low selectivity, the overhead of index look-up becomes dominant and scan-based methods generally outperform index-based methods [124]. In the example, since the estimated selectivity was high, the optimizer chose a nested loop utilizing indexes, which turns out to be less efficient than a hash join with scans. We can observe that just like other operators, operators for approximate text matching are integrated into the optimizing process and can affect the choice of optimal plans. As poor selectivity estimation can lead to arbitrarily bad sub-optimal plans, it is crucial to have accurate and efficient selectivity estimation techniques to successfully support approximate text matching in RDBMSs. This is the main motivation of this dissertation. A possible alternative of processing approximate text query would be to clean the text first and load it into databases, which includes correcting typos or transforming data into standard representations. Then standard exact matching may work well. However, this may not be always possible or desirable depending on the tasks. First, cleaning all the data can be expensive and it may not be a feasible option. Second, even if it is possible, users may want to keep the original data. For instance, consider a user profile with textual data including hobbies or favorite movies. Users may not like it if the system automatically modifies their profiles without their consent. Moreover, it is hard to guarantee 100% correctness in data cleaning; users may want to conserve dirty data and perform approximate matching as necessary. 1.3 Other Applications We illustrate two applications other than query optimization in RDBMSs where selectivity estimation of approximate text matching plays an important role. 1.3.1 Query Optimization in Text-related Tasks Different algorithms often show different efficiency behaviors depending on the selectivity, skewness or distribution of data rather than an one-size-fits-all algorithm that outperforms others in all cases. Selectivity can guide the choice of algorithms in many of such cases. Execution plans for text-centric tasks such as Information Extraction or Focused Resource Discovery can show different efficiency pattern depending on the selectivity. They follow two general paradigms: either we can scan, or crawl, the text database or we can exploit search engine indexes and retrieve documents of interest via carefully crafted queries constructed 4 1.3. Other Applications in task-specific ways [73]. The choice between crawl- and query-based execution plans can have a substantial impact on both execution time and output completeness (e.g., in terms of recall). The query selectivity can be used as an important piece of information in deciding which execution plan to use [73]. For instance, when there are only a small number of results for a task, query-based execution plan can be sufficiently effective. When the result size is large, however, crawl-based strategy can outperform the query-based strategy with higher recall. Recent studies have noted that approximate text matching is important in those tasks as well [21, 97, 143]. Given a set of keywords, the goal of keyword search in RDBMSs, e.g., [4, 66, 122, 131, 151], is to find tuples connected by join relationship such that each keyword is found at least one tuple5. There are also two general paradigms: either we can map the keyword query to a set of SQL queries and execute them, or we can merge tuples at a separate middleware module using RDBMSs only for retrieving raw column data. It is observed that when there are only a small number of answers the SQL-mapping approach can outperform the middleware based approach [66]. A hybrid approach is proposed in the work and selectivity is again used as a basis for the algorithm choice. Join selectivity can affect the choice of algorithms in similarity joins or data cleaning as well. There have been many studies on similarity joins and they can be roughly categorized into two types: signature-based algorithms, e.g., [8], and inverted index based algorithms, e.g., [13, 130]. Signature based algorithms generally have two phases: (1) quickly identify candi- date pairs using signatures and (2) verify candidate pairs by actually performing similarity computation. When the join size is small, signature based methods can be more efficient than other algorithms [8]. However, if the join size is large, naturally there are more candidate pairs and the pair-wise verification phase may become a bottleneck. In all the above applications, selectivity of approximate text predicate plays an important role in the choice of execution algorithm. The proposed study can be valuable in the context. 1.3.2 Query Formulation The selectivity (or cardinality) of an answer is important for users in many applications. When a user wants to manually browse through results, she would not want to either go through millions records or see empty results. For example, a user in a housing website would want to see an appropriate, not overwhelming, number of options. Formulating queries such that they can generate an appropriate number of results can be highly non-trivial, especially when there are more than one predicates [84]. It is very easy to generate too many answers or few answers, which is known as many\/few answer problem [20, 84, 99]. To address this issue, techniques for specifying cardinality constraints have been proposed in the literature [20, 84]. Note that this is an orthogonal issue to top-k processing. Mishar and Koudas proposed a query design framework that explicitly takes into account user preferences about the desired answer size, and subsequently modifies the query with user feedback to meet this target [109]. In approximate queries, formulation of a good query can be trickier due to the similarity threshold. Similarity threshold is just a number, often between 0 and 1, and it generally does 5This definition corresponds to the AND semantics. There exist other semantics as well. 5 1.4. Dissertation Goals and Challenges Figure 1.2: An Example of Using Answer Cardinality to Help Formulating Queries not give any clear intuition on how to set the similarity threshold. Whether to set a similarity threshold value to 0.4 or 0.6, for example, is not clear until the user actually executes the query and examines the results. In fact, most similarity queries rely on users\u2019 experience or trial and error for setting an appropriate similarity threshold. Moreover, as will be shown in Section 6.6, a small change in similarity threshold can make orders of magnitude differences in the result size. Ad-hoc query formulation of a similarity query may have negative impact on the system and it is desirable that users can formulate similarity queries with better idea on the similarity threshold. Estimating selectivity of approximate text queries can also help users formulating simi- larity queries. Figure 1.2 gives an example of using answer cardinality to help formulating queries. Similarly, a system can display the estimated cardinality of similarity queries as a user tries various similarity thresholds. The user can set the similarity threshold when the estimated cardinality is close to the desired answer size and execute the query. 1.4 Dissertation Goals and Challenges The goal of this dissertation is to develop reliable selectivity estimation techniques for approx- imate predicates on text. Desirable properties of such estimation techniques are as follows. First, the estimation has to be reasonably accurate. Poor selectivity estimation can lead to suboptimal plans with performance loss. Second, the estimation has to be efficient. When estimation is for query optimization, it has to be much more efficient than the actual query processing. Otherwise, the overhead for selectivity estimation is not justified. Third, smaller space overhead is desirable. Among several approximate predicates, we focus on two types of operators: selections and joins. They are the two workhorse operators in RDBMSs. For selection operators, we first study string predicates and then substring predicates. For join operators, we first study set similarity joins and then vector similarity joins. Similarity measures are at the core of approximate matching applications; similarity mea- sures largely decide how to process strings and they affect the efficiency of an algorithm. Different similarity measures are used depending on the matching purposes. For instance, Jaro\/Winkler distance is known to work best for person names [146]. Thus, we first briefly 6 1.4. Dissertation Goals and Challenges review similarity measures and string models. We then introduce each problem, its challenges and overviews of the solutions. 1.4.1 String Similarity Models and Measures Similarity measures on string can be roughly categorized into three groups: edit based, token based and hybrid methods [86]. We overview representative string similarity models and mea- sures. See [86] or [40] for more complete introduction on similarity measures and algorithms. Edit distance, Soundex, Jaro\/Winkler distances are examples of edit based measures. They model similarity matching of two strings by transforming one string into another one with edit operations. Edit distance (or Levenshtein distance) is a representative edit based measure. It defines three edit operations on characters: insertion, deletion or replacement (substitution) of a single character. Edit distance between two strings is the minimum number of edit operations to transform one string into the other one. For instance, the edit distance between \u2018Silvia\u2019 and \u2018Sylvi\u2019 is two because we can transform the former to the latter by one replacement (\u2018i\u2019 to \u2018y\u2019) and one deletion (\u2018a\u2019). There exist numerous variations from this basic definition. For instance, each operation may have different weights for different characters. This model is prevalent for strings like DNA sequences. In some extensions, different operations such as \u2018gap\u2019 or \u2018swap\u2019 are considered. In this dissertation, we focus on the basic edit distance (Levenshtein distance) as a base similarity measure since it is a basis for other variations and does not need domain specific knowledge. TF-IDF cosine similarity, Jaccard coefficient, and probabilistic models [45] can be cate- gorized as token-based methods. In this model, rather than directly modeling modifications or edits, a string is first decomposed into a set or vector of tokens, which are generally words or n-grams. An n-gram is simply a string of length n. For example, if we build 3-gram from \u2018Microsoft\u2019, we have \u2018Mic\u2019, \u2018icr\u2019, \u2018cro\u2019, \u2018ros\u2019, \u2018oso\u2019, \u2018sof\u2019, and \u2018oft\u2019. This tokenization enables non-exact matching. We can approximately match \u2018Microsoft\u2019 and \u2018Macrosoft\u2019 because they still share many of their 3-grams: \u2018cro\u2019,..., \u2018oft\u2019. Then (dis)similarity is measured with the distance between the two sets or vectors. For instance, a web document can be first tokenized into words and then represented by a vector where each dimension corresponds to a word with its TF-IDF value. Then we measure, for example, cosine similarity between their TF-IDF vectors. For vector representation, widely used (dis)similarity measures include cosine similar- ity, Euclidean distance, Manhattan distance and Hamming distance. For set representation, Jaccard similarity, dice similarity, and overlap count are representative ones. We support Jac- card similarity measure and show how to support other measures for set representation. We also support cosine similarity and \u2113p distance for vector representation. More sophisticated measures, mostly developed in IR community, include BM25 [126], language modeling [120], Hidden Markov Models [108]. A hybrid model combines the two models, e.g., [6, 25]. It generates tokens, but considers transforming between tokens so that finer modeling is possible. FMS [25] is one example of a hybrid model. Suppose two strings are tokenized as follows: {\u2018Beoing\u2019, \u2018Corporation\u2019}, {\u2018Boeing\u2019, \u2018Company\u2019}. FMS matches two token pairs \u2018Beoing\u2019 and \u2018Boeing\u2019, and \u2018Corpora- tion\u2019 and \u2018Company\u2019, and considers edit distance between the pairs. 7 1.4. Dissertation Goals and Challenges Figure 1.3: Overview of Contributions 1.4.2 Selection Problems In selection problems, a predicate, which is a query string and a similarity threshold for a given similarity measure, selects a set of records in the database. Our goal is to estimate how many records the predicate selects. That is, we estimate the number of strings in the database that satisfy the given similarity threshold; \u201chow many strings are similar to the query string in the database?\u201d As mentioned previously, there are many types of strings, and we focus on plain text that it not too long, say up to a few hundred characters. Such strings are found in typical text columns including names, addresses or titles. We do not consider non-plain-text strings such as signals or DNA sequences. Based on how a predicate selects or matches strings in the database, we consider two different matching semantics: string and substring. We first define the STR problem with string matching semantics, and then define the SUBSTR problem with substring matching semantics. The String Problem When a string in the database is compared with the query string as a whole, we call the problem of estimating selectivity of approximate text matching the STR problem. It is defined as follows: Definition 1 (The STR Problem). Given a query string sq and a bag of strings DB, estimate the number of strings s \u2208 DB satisfying ed(sq, s) \u2264 \u03c4 , where ed is edit distance between two strings and \u03c4 is the edit distance threshold. For example, if DB = {\u2018Silvia\u2019, \u2018Sylvi\u2019, \u2018Sofia\u2019}, q = \u2018Sylvia\u2019 and \u03c4 = 1, then the answer is 2 because \u2018Silvia\u2019 and \u2018Sylvi\u2019 can be transformed into \u2018Sylvia\u2019 with 1 edit operation but \u2018Sofia\u2019 needs 3 edit operations. 8 1.4. Dissertation Goals and Challenges The main challenge comes from the fact that there can be a huge number of possible variants of the query string with edit operations. Let us denote the cardinality of a string str in DB by freq(str) or |str| exploiting set cardinality notation. For example, |\u2018rdbms\u2019| is the number of strings \u2018rdbms\u2019 that appear in DB. We can estimate the selectivity of a single variant using (exact) substring selectivity estimation algorithms, e.g., [26, 77, 87], with a small summary structure. A naive approach using substring selectivity estimation techniques for the string problem would be to enumerate all possible variants and sum up their selectivities. For simplicity, suppose that q = \u2018rdbms\u2019 and we only allow one replacement. Then, assuming English alphabet \u2018a\u2019 to \u2018z\u2019, the desired answer is |\u2018abms\u2019|+ |\u2018bbms\u2019|+ |\u2018cbms\u2019|+ \u00b7 \u00b7 \u00b7+ |\u2018rdbmz\u2019|, which is the number of string in DB that can be converted to \u2018rdbms\u2019 with at most one replacement. However, this approach is not scalable at all. When q = \u2018rdbms\u2019 and \u03c4 = 3, there are more than 4 million strings that are within edit distance of 3 from q. In our experiments, it took more than 20 seconds to enumerate all variants, estimate each selectivity and sum them up, which is clearly too much for query optimization purposes. To solve the problem, we introduce the wildcard \u2018?\u2019 that represents any single character. For instance, |\u2018rdbm?\u2019| is the number of strings that start with \u2018rdbm\u2019 and end with a single following character. We extend summary structures for exact substring selectivity estimation with wildcards and propose a new data structure called the EQ-gram table. This introduction of wildcard enables more efficient counting of strings. When q = \u2018rdbms\u2019 and we only allow one replacement, all possible variants are considered in |\u2018?dbms\u2019|, |\u2018r?bms\u2019|, |\u2018rd?ms\u2019|, |\u2018rdb?s\u2019| and |\u2018rdbm?\u2019|. However, the difficulty is that there are overlaps among the counts. For example, \u2018rdbms\u2019 is counted in all 5 possible forms. We first develop a novel replace-only formula that considers this overlap among counts when only replacement is allowed. We then propose the OptEQ algorithm that handles general edit operations. This contribution is shown in at the second row of Figure 1.3 marked STR, and our solutions for the STR problem are in Chapter 3. The Substring Problem In the substring problem, a string is the database is considered as a match if it contains a (sub)string that is similar to the query; it does not have to match with the query string as a whole. That is, our goal is to estimate the number of strings DB that contain a substring that is similar to the query string. This is useful when strings in DB are generally longer than expected query strings and specifying only part of the data string is desirable. For instance, in a paper title, users are more likely to issue queries using important keywords rather the full title. The substring problem, SUBSTR, is formulated as follows: Definition 2 (The SUBSTR Problem). Given a query substring sq and a bag of strings DB, estimate the number of strings s \u2208 DB satisfying ed(sq, b) \u2264 \u03c4 , where b is a substring of s and \u03c4 is the edit distance threshold. For example, ifDB={\u2018Information Integration\u2019, \u2018Informatino Retrieval\u2019, \u2018Web Data Integration\u2019 }, q = \u2018Information\u2019 and \u03c4 = 2, then the answer is 2 because each \u2018Information Integration\u2019 9 1.4. Dissertation Goals and Challenges and \u2018Informatino Retrieval\u2019 contains a substring that can be converted to \u2018Information\u2019 within 2 edit operations but \u2018Web Data Integration\u2019 does not. The substring problem is a generalization of the string problem. It has additional chal- lenges on top of those of the STR problem; a string has many substrings, each of which may have many variants that can potentially match the given query string. Moreover, the substrings can overlap or be correlated which also needs special attention. Based on information stored in an EQ-gram table, which is proposed for the string prob- lem, we propose two estimation algorithms: MOF and LBS. MOF is a light-weight solution based on the idea that although many variants are possible for a given query string and a similarity threshold, there are typical variants. In the DBLP data set, most of names that are similar to \u2018Sylvia\u2019 within the edit distance of 1 are one of \u2018Silvia\u2019, \u2018Sylvi\u2019, or \u2018Sylva\u2019. It is less likely that we have strings like \u2018SZlvia\u2019 or \u2018 Syyvia\u2019. Using the wildcard \u2018?\u2019, more than 70 % of the similar strings match the form \u2018S?lvi\u2019. Thus, MOF estimates that this is the most probable variant and scales up its estimated selectivity appropriately. A shortcoming of MOF is that its estimation relies only on a single selectivity without considering other variants. LBS overcomes this drawback by extending EQ-gram tables with Min-Hash signatures [17, 34] and considering overlaps with the Set-Hashing technique [30]. These relationships are shown at the third row in Figure 1.3 marked SUBSTR, and our solutions for the SUBSTR problem are in Chapter 4. 1.4.3 Join Problems In join problems, we are given two collections of records, and we are to estimate the number of pairs, one from each collection, that satisfy the given predicate. When the two collections are the same, it is called a self-join. Given a similarity measure and a minimum similarity threshold, a similarity join finds all the pairs of objects in the database whose similarity under the measure is greater than or equal to the minimum threshold. Similarity joins have a wide range of applications including query refinement for web search [127], near duplicate document detection and elimination [17]. They also play a crucial role in data cleaning process which detects and removes errors and inconsistencies in data [8, 130]. Accordingly, the similarity join problem has recently received much attention [8, 13, 27, 60, 61, 130]. Our goal in this dissertation is to estimate the similarity join size. Objects in similarity joins are often represented by sets or vectors. For instance, a text may be considered as a vector in a vector space for the cosine similarity measure. Depending on the representation, we distinguish the following two problems: the set similarity join size estimation problem and the vector similarity join size estimation problem. For the set representation, we focus on Jaccard similarity measure, and for the vector representation, we focus on cosine similarity measure. The Set Similarity Join Size Problem In the set similarity join size (SSJ) problem, an object is represented by a set. For instance, a large scale customer database may have many redundant entries which may lead to duplicate mails being sent to customers. To find candidates of duplicates, addresses are converted into 10 1.4. Dissertation Goals and Challenges sets of words or n-grams and then a set similarity join algorithm can be used. A variety of (dis)similarity measures have been used in the literature such as Jaccard similarity and overlap threshold [13, 27, 130]. The Jaccard similarity for two sets r, s, JS(r, s) is defined as |r \u2229 s|\/|r \u222a s|. It is one of the most widely accepted measures because it can support many other similarity functions [17, 27, 130]. Thus, we focus on the Jaccard similarity for our similarity measure. Definition 3 (The SSJ Problem). Given a collection of sets R and a threshold \u03c4 on Jaccard similarity JS, estimate the number of pairs SSJ(\u03c4) = |{(r, s) : JS(r, s) \u2265 \u03c4 , r, s \u2208 R and r 6= s, }|. For example, if DB={{1, 2, 3, 4}, {1, 2, 3, 5}, {2, 3, 5, 6}, {4, 6}} , and \u03c4 = 0.5, then the join size is 2 because there are two pairs with JS \u2265 0.5: {1, 2, 3, 4}, {1, 2, 3, 5} and {1, 2, 3, 5}, {2, 3, 5, 6} among ( 4 2 ) possible pairs. Several facts are worth mentioning in the problem formulation. First it corresponds to a self-join case. Although the join between two collections of sets is more general, many applications of set similarity join (SSJoin) are actually self-joins: query refinement [127], duplicate document or entity detection [17, 64], or coalition detection of click fraudsters [107]. Naturally, a majority of the SSJoin techniques proposed are evaluated on self-joins [8, 13, 27, 130]. Second, self-pairs (r, r) are excluded in counting the number of similar pairs so that the answers are not masked by the big count, |R|. Since JS(r, r) = 1 for any r, (r, r) is trivially included in the answer size for any \u03c4 . The number of pairs satisfying a minimum threshold of interest is usually much smaller than the total number of self-pairs (i.e., |R|). Thus including the count will make it hard to fairly evaluate the proposed technique. In addition, we do not distinguish between the two different orderings of a pair (i.e., (r, s) = (s, r)). It is, however, trivial to adapt the proposed technique to consider the self-pairs or the ordering of pairs in the answer if necessary. Regarding the universe of set elements, we consider integral domains such as integers or n-grams, which is natural for similarity measures for sets. One of the key challenges in similarity join size estimation is that the join size can change dramatically depending on the input similarity threshold. While the join size can be close to n2 at low thresholds where n is the database size, it can be extremely small at high thresholds. For instance, in the DBLP data set, while the selectivity of similarity join at \u03c4 = 0.1 is larger than 30 %, the join selectivity is only about 0.00001 % at \u03c4 = 0.9. While many sampling algorithms have been proposed for the (equi-)join size estimation, their guarantees fail in such a high selectivity range, e.g., [49, 58, 96]. Intuitively, it is not practical to apply random sampling in such a high selectivity. This is problematic since similarity thresholds between 0.5 and 0.9 are typically used [13]. The proposed solution analyzes Min-Hash signatures of the sets, which are succinct rep- resentations of them. We observe that there are close relationships between the number of frequent patterns in the signatures and the similarity join size. We rely on the recently ob- served Power-Law relationship between the number of frequent patterns and their support counts [32] for efficient estimation of the number of frequent patterns. We also show that there is a side effect in using the Min-Hash scheme for counting purposes; there is a distribution shift when data is skewed. We propose a method to correct this error. These contributions 11 1.4. Dissertation Goals and Challenges are shown at the fourth row in Figure 1.3 marked SSJ, and our solutions for the SSJ problem are in Chapter 5. The Vector Similarity Join Size Problem In the vector similarity join size (VSJ) problem, an object is represented by a vector. For instance, a document can be represented by a vector of words in the document, or an image can be represented by a vector from its color histogram. Definition 4 (The VSJ Problem). Given a collection of real-valued vectors V = {v1, ..., vn} and a threshold \u03c4 on a similarity measure sim, estimate the number of pairs V SJ(\u03c4) = |{(u, v) : u, v \u2208 V, sim(u, v) \u2265 \u03c4, u 6= v}|. Note that our formulation of similarity joins with vectors is more general and can handle more practical applications. For instance, while in the SSJ problem a document is simply a set of words in the document, in the VSJ problem a document can be modeled with a vector of words with TF-IDF weights. It can also deal with multiset semantics with occurrences. In fact, most of the studies on similarity joins first formulate the problem with sets and then extend it with TF-IDF weights, which is indeed a vector similarity join. A straightforward extension of SSJ techniques for the VSJ problem it to embed a vector into a set space. We convert a vector into a set by treating a dimension as an element and repeating the element as many times as the dimension value, using standard rounding techniques if values are not integral [8]. In practice, however, this embedding can have adverse effects on performance, accuracy or required resources [8]. Intuitively, a set is a special case of a binary vector and is not more difficult to handle than the vector. For instance, Bayardo et al. [13] define the vector similarity join problem and add special optimizations that are possible when vectors are binary vectors (sets). We propose sampling based techniques that exploit the Locality Sensitive Hashing (LSH) scheme, which has been successfully applied in similarity searches across many domains. LSH builds hash tables such that similar objects are more likely to be in the same buckets. Our key idea is that although sampling a pair satisfying a high threshold is very difficult, it is relatively easy to sample the pair using the LSH scheme because it groups similar objects together. We show that the proposed algorithm LSH-SS gives good estimates at both high and low thresholds with a sample size of \u2126(n) pairs of vectors (i.e. \u2126( \u221a n) tuples from each join relation in an equi-join) with probabilistic guarantees. Our key idea is to consider two different partitions of pairs of vectors that are induced by an LSH index: the pairs of vectors that are in the same buckets and those that are not. The opportunity is that it is relatively easy to sample the pair that are in the same buckets in the LSH index even at high thresholds. We apply sampling algorithms separately for the two partitions such that we can provide provably reliable estimates at both high and low thresholds. This approach is in principle analogous to the classic approach [28, 41, 49] of distinguishing high frequency values from low frequency values to meet the challenge of skewed data. The proposed solution only needs minimal addition to the existing LSH index and can be easily applied. It is readily applicable to many similarity search applications. For the similarity measure sim, we focus on cosine similarity [10], but in principle we can support any measure for which a corresponding LSH 12 1.5. Outline scheme is developed. These contributions are shown at the fifth row in Figure 1.3 marked VSJ, and our solutions for the VSJ problem are in Chapter 6. 1.5 Outline There are four main technical components in this dissertation. Two are on the selection operators and the other two are on the join operators as described in the previous section. Each component comprises one chapter. The rest of this dissertation is organized as follows. In Chapter 2, we review related work. In Chapter 3, we present our solution for the STR problem. It also serves as a basis for following chapters. The EQ-gram table proposed in this chapter is also used in the substring problem, and the replace-only formula is adapted for set similarity join size estimation. In Chapter 4, we study the SUBSTR problem and propose two solutions: MOF and LBS. MOF which is a light-weight solution is based on EQ-gram tables, and LBS augments EQ-gram tables with Min-Hashing signatures. The following two chapters are on join problems. In Chapter 5, we study the SSJ problem. The proposed solution LC performs frequent pattern analysis on Min-Hash signatures of sets. In Chap- ter 6, we look at a generalized problem, the VSJ problem. The proposed technique performs stratified sampling using the LSH scheme. In Chapter 7, we conclude and present future work. In summary, this dissertation proposes a set of related summary structures and algorithms to estimate selectivity of selection and join operators with approximate matching. The main contributions of this dissertation are as follows: \u2022 We extended summary structures for exact text matching to support approximate matching and show how we can apply recent developments for approximate match- ing for the selectivity estimation purposes. We introduce the wildcard and Min-Hashing techniques to q-gram tables. A common challenge in the selectivity estimation of ap- proximate matching is that there can be a huge number of variants to consider. The proposed data structures enable efficient counting by considering a group of similar vari- ants together rather than each and every variant. A lattice-based framework is proposed to handle overlapping counts among the groups. \u2022 Based on the framework, we present estimation algorithms for approximate selection and join operators. The proposed solutions show trade-offs between space and accuracy. We also conduct extensive experiments using real-world and synthetic data sets comparing them with state-of-the-art techniques and baseline methods. \u2022 We present random sampling based algorithms for the vector similarity join size problem. The proposed algorithm is based on the idea of distinguishing high frequency values from low frequency values to meet the challenge of skewed data. It utilizes the LSH index, which is a recently developed technique for similarity search. 13 Chapter 2 Related Work This chapter consists of three main components: (1) selectivity estimation techniques, (2) signature and hashing techniques and (3) query processing algorithms including joins. We first review selectivity estimation techniques. There are many structure and algorithms for selectivity estimation depending on the data type, e.g., histograms or wavelets. Our focus is on techniques for strings. We categorize them into two groups: exact matching and approximate matching. Table 2.1 summarizes studies on selectivity estimation. Bold faced entities depict how a record is defined at each study. Notice that depending on similarity model (see Section 1.4.1), records are defined as strings, sets or vectors. Next, we study various signatures or hashing techniques for similarity matching. These techniques are building blocks for many similarity related algorithms and are used throughout this dissertation as well. We then turn our attention to query processing and introduce approximate string processing techniques. The existence of many approximate string processing algorithms motivates the selectivity estimation study for query optimization. As joins often pose additional challenges, we separately overview literature on similarity joins in Section 2.4. 2.1 Selection Selectivity Estimation The problem of estimating selectivity of a string predicate is to estimate the number of records in the database that satisfy the given predicate. With the popularity of textual data, there have been many studies on estimating selectivity of string predicates. They are categorized into two groups: (1) exact matching and (2) approximate matching. 2.1.1 Exact Selectivity Estimation The substring selectivity estimation problem is to estimate the number of tuples in a database that contain the query as a substring. Note that in exact matching semantics we do not consider errors or possible variants. The problem was studied in the context of SQL queries with the LIKE predicate (e.g., name like \u2018%jones%\u2019). Initial studies considered only one substring predicate, but they are extended to multiple substring predicates in later work. Single Substring Predicate Krishnan et al. formulate the substring selectivity estimation problem [87]. The proposed method called KVI is based on a variant of suffix trees called count-suffix trees whose node is augmented with the count of occurrences of the associated substring. As the full suffix tree can be quite big, the pruned suffix tree (PST) is used, where nodes with count below a 14 2.1. Selection Selectivity Estimation Selection Join Substring Equi-Join Exact KVI [87, 142] Adaptive Sampling [95, 96] Matching MO [75\u201377] Tuple\/Index\/Cross [58, 59] CRT [26] Bifocal Sampling [49] String SEPIA [79] Set VSol, HSol [105] LC [90], [Ch. 5] OptEQ [89], [Ch. 3] Approximate Set Vector Matching Hashed Samples [61] LSH-SS [Ch. 6] Substring MOF, LBS [92], [Ch. 4] Table 2.1: Selectivity Estimation Techniques on Text threshold are pruned away. Given a query string, KVI tries to find the string in the PST. If the query is not present in the PST, the selectivity has to be estimated. The KVI estimation parses the query string into substrings that are found in the PST. Assuming independence among the parsed substring, it multiplies each selectivity. For instance, assume that \u2018jones\u2019 is the query string and it is not found in the PST but \u2018jon\u2019 and \u2018es\u2019 are in the PST. Then Pr(\u2018jones\u2019) is estimated as Pr(\u2018jon\u2019) \u00b7 Pr(\u2018es\u2019) = (Cjon\/N) \u00b7 (Ces\/N), where N is the total number of tuples in the database and C\u03b1 is the count of the node corresponding to \u03b1 in the PST. Jagadish et al. improve KVI with an algorithm called MO. The MO estimation removes the independence assumption of KVI based on the Markov assumption [77]. MO parses a string into maximally overlapping substrings, and multiplies conditional selectivities of parsed substrings given the overlaps. In the case of the previous example, assume that \u2018jon\u2019, \u2018one\u2019, \u2018nes\u2019 , and \u2018es\u2019 are in the PST along with all single alphabets. Then MO will make use of the overlapping strings in the PST (i.e., \u2018jon\u2019, \u2018one\u2019, and \u2018nes\u2019) whereas KVI will parse it as \u2018jon\u2019 and \u2018es\u2019 without exploiting all the information (e.g., \u2018one\u2019) in the PST. MO estimates the selectivity as follows: Pr(\u2018jones\u2019) = Pr(\u2018jon\u2019) \u00b7 Pr(\u2018e\u2019|\u2018jon\u2019) \u00b7 Pr(\u2018s\u2019|\u2018jone\u2019) \u2248 Pr(\u2018jon\u2019) \u00b7Pr(\u2018e\u2019|\u2018on\u2019) \u00b7Pr(\u2018s\u2019|\u2018ne\u2019) = (Cjon\/N) \u00b7 (Cone\/Con) \u00b7 (Cnes\/Cne). Note that MO makes use of the overlapping of \u2018on\u2019 in \u2018jon\u2019 and \u2018one\u2019 , and \u2018ne\u2019 in \u2018one\u2019 and \u2018nes\u2019. The KVI estimation will ignore the overlapping strings like \u2018on\u2019 or \u2018ne\u2019 and simply compute P (\u2018jones\u2019) as P (\u2018jon\u2019) \u00b7 P (\u2018es\u2019) as above. Although the original algorithm is suggested on PST, it is applicable to other summary structures that can give the frequency of a substring in the database. Chaudhuri et al. observe that MO often under-estimates and introduce the CRT algo- rithm [26]. It is based on the Short Identifying Substring (SIS) assumption, which states that \u201ca query usually has a \u2018short\u2019 substring s such that if a value contains s, then the at- tribute value almost always contains s as well.\u201d Given a string, the CRT algorithm estimates the frequency of identifying substrings of each length, and combines the frequencies using a 15 2.1. Selection Selectivity Estimation regression tree. In Chapter 3.3, we propose a simpler solution called MO+ for the underestimation problem of MO. The CRT algorithm requires many invocations of substring selectivity estimation algorithms for the selectivity estimation of a string. Because we need to consider many variants, not just a single string, the additional runtime overhead of CRT is not desirable for the selectivity estimation of approximate string predicates. MO+ addresses the same underestimation issue, but requires much fewer invocations of substring selectivity estimation algorithms as its subroutines. Multiple Substring Predicates Wang et el. generalize KVI and propose WVI estimation algorithm for two correlated columns [142]. The algorithms described above (KVI, MO, CRT) assume that strings are from a single column in a table. In Wang\u2019s problem formulation, the query is conjunction of two substring predicates, one from each column, e.g., color like %green% and shape like %circle%. The idea is to build two suffix trees, one for each column, and represent the correlation between two columns by weighted edges between the two trees. The trees are pruned to reduce the size. The WVI estimation is very similar to KVI with an independence assumption. For example, if the query is (\u2018jon\u2019, \u2018172\u2019) and \u2018jo\u2019,\u2018n\u2019,\u201817\u2019,\u20182\u2019 are in the suffix trees, Pr(\u2018jon\u2019, \u2018172\u2019) \u2248 Pr(\u2018jo\u2019,\u201817\u2019) \u00b7 Pr(\u2018n\u2019, \u201817\u2019) \u00b7 Pr(\u2018jo\u2019,\u20182\u2019) \u00b7 Pr(\u2018n\u2019,\u20182\u2019). Their work can be extended to k-columns. In general, there are k PSTs and a multi-dimensional table. Jagadish et al. approach the same problem of multi-dimensional substring selectivity estimation and propose a k-D count-suffix tree [76]. The data structure is a generalization of a count suffix tree, where each node has k-dimensional strings as its label. The propose an extension of the MO estimation algorithm [77] in a k-D count-suffix tree. Chen et al. propose a technique called Set Hashing for selectivity estimation of boolean predicates on substrings [30]. They consider multiple substrings with boolean predicates in 1-D column, e.g., color like %green% or color like %yellow%. The proposed technique stores Min-Hash signatures for nodes in a suffix tree. A basic method to calculate union and intersection size with signatures is presented, and then is extended to handle negations. When the query does not contain negations, Set Hashing transforms the original query into a conjunctive normal form (CNF) and estimates the size. With negations, it transforms the original query into a disjunctive normal form (DNF), removes negations using the set Inclusion-Exclusion principle, and estimates its size. In the PST case, it parses each string using MO and decomposes original probability into several probabilities. The proposed algo- rithm is exponential under negations or PST. Chen et al. extend the technique to the multi-dimensional conjunctive case [31]. The problem with the previous approaches [76, 142] is that they approximate selectivity by ex- plicitly storing frequently co-occurring combinations of substrings incurring exponential space increase with the number of dimensions. They side-step this space dimensionality explosion by set hashing signatures. The estimation details are very similar to those in [30]. These algorithms only consider exact matching and do not deal with selectivity estimation with edit distance or other similarity measures. However, the proposed data structures are 16 2.1. Selection Selectivity Estimation extended for approximate matching and algorithms are used as subroutines in our work. These studies deal with selectivity estimation of LIKE clauses, but do not consider clauses with \u2018 \u2019, which matches any single character. In Chapter 4, we show how to estimate LIKE predicates with the presence of both constructs. 2.1.2 Approximate Selectivity Estimation As will be introduced in the following section, approximate string processing algorithms have recently received much focus in diverse fields. Naturally, efforts have been put toward devel- oping good selectivity estimation algorithms allowing similarity matches. Jin and Li formulate the problem of estimating string selectivity with edit distance [79]. Their technique, called SEPIA, clusters similar strings, selects a pivot string for each cluster, and captures the edit distance distribution with histograms. Given a query, SEPIA visits each cluster and estimates the number of strings in the cluster that are within the edit distance threshold using histograms. The drawback is that runtime computation of edit distance between the query string and the pivot string of each cluster can hamper its scalability. Mazeika et al. propose a technique called VSol [105]. The VSol estimation employs an inverted index like data structure for q-grams. As the inverted list for a q-gram, i.e., the IDs of all strings that contain the q-gram, can be quite lengthy, Min-Hash [17, 34] signatures are stored instead to succinctly and approximately store the IDs. Our proposed algorithm, LBS, in Chapter 4 employs a similar approach. Similar ideas are often found in algorithms using Min-Hashing, e.g., [35]. The estimation idea is that a satisfying string must share at least a certain number of q-grams given an edit distance threshold \u03c4 . They consider all combinations of possible q-grams that an answer string may contain. To save space, clustering is considered, and inclusion of positional information of q-grams is suggested to increase the accuracy. However, the positional information requires an amount of space that is higher by one or two orders of magnitude. These studies are the most closely related body of work to the algorithms presented in Chapter 3 and Chapter 4. Chapter 4 addresses the STR problem as in [79, 105]. We compare the proposed solution with the prior art, SEPIA [79], in Chapter 3. Also note that these studies are on full string matching. So if we want to search through an address column, users have to input a whole address as the query. A more natural extension of related work in this context is approximate substring selectivity estimation problem which is addressed in Chapter 4. The substring problem poses additional challenges due to overlapping and correlation among substrings. Details are given in Chapter 4. 2.1.3 Join Size Estimation Join size estimation has been one of core problems in selectivity estimation and known to be very difficult [71]. A majority of works in join size estimation considered equi-join where we join pairs of tuples that have the same value on the join column. It is studied in diverse contexts: query optimization in RDBMSs, e.g., [57, 59, 71, 95, 96, 133], stream data , e.g., [5, 22], spatial data [43], distributed data [119] or approximate query answering [1]. We briefly review studies that are more relevant to query optimization in RDBMSs. 17 2.1. Selection Selectivity Estimation A simplistic approach is to use histograms with containment assumption [18, 133]. With the assumption, values on the join column are assumed to be uniformly distributed in each bucket of a histogram. It is very efficient since it only requires simple computations scanning buckets in the histograms. However, it is not expected to be accurate due to its assumptions within buckets. Random sampling has been a major tool for join size estimation. Some examples include adaptive sampling [96], sequential sampling [59], cross\/index\/tuple sampling [58], bifocal sam- pling [49], tug-of-war [5] and more recently, end-biased sampling [41]. However, most of them have focused on equi-joins and do not directly deal with similarity joins. Some of them can be adapted to similarity joins, but their guarantees do not hold due to differences in sampling cost models or they require impractical sample sizes. Equi-join size estimation techniques mostly do not offer clear benefits over the simple random sampling when applied to the similarity join size estimation problem. We note two challenges in the similarity join size estimation problems compared to the equi-join size es- timation. In the equi-join of |R \u22b2\u22b3 S|, we can focus on frequency distribution on the join column of each relation R and S. For instance, if we know a value v appears nr(v) times in R and ns(v) times in S, the contribution of v in the join size is simply nr(v) \u00b7 ns(v), i.e., multiplication of two frequencies. We do not need to compare all the nr(v) \u00b7 ns(v) pairs. In similarity joins, however, we need to actually compare the pairs to measure the similar- ity. This difficulty invalidates use of popular auxiliary structures such as indexes [28, 58] or (end-biased) histograms [28]. Furthermore, the similarity join size at high thresholds can be much smaller than the join size assumed in equi-joins. For instance, in the DBLP data set (n = 800K), the join size of \u2126(n log n) assumed in bifocal sampling is more than 15 million pairs and corresponds to the cosine similarity value of only about 0.4. In the most cases, users will be interested in much smaller join sizes and thus higher thresholds. However, we adapt those classic studies and use them as subroutines in Chapter 6 for the VSJ problem in Section 1.4.2. We outline two techniques that are closely related with the proposed techniques in the following. Adaptive sampling is proposed by Lipton et al. [96]. Their problem formulation is very general and can handle similarity joins as well. Its main idea is to terminate sampling process when the query size (the accumulated answer size from the sample so far) reaches a threshold not when the number of samples reaches a threshold. A shortcoming is that when the data is highly skewed, adaptive sampling only gives an upper bound. The bound in similarity joins is a very loose bound at high similarity thresholds as will be shown in Chapter 6.4. Its implication is that adaptive sampling cannot handle high thresholds. While it does not produce reliable estimates in skewed data, we observe that its adaptive nature can still be useful for the VSJ problem. Adaptive sampling is used as a subroutine in our technique in Section 6.4. Bifocal sampling is proposed by Ganguly et al. to cope with the skewed data problem6 [49]. It classifies tuples in the join relations into two groups; dense tuples that are frequent and sparse tuples that are not. They apply distinct estimation procedures that focus on various 6When a join value is very sparse (infrequent) in one relation, but frequent in the other relation, it is not easy to sample pairs with such join values but their contribution to the join size may be significant. 18 2.2. Signatures and Hashing Techniques for Similarity Matching combinations of joining tuples: dense-dense, dense-sparse, and sparse-dense. However, bifo- cal sampling cannot guarantee good estimates at high thresholds when applied to the VSJ problem. A join size of \u2126(n log n) is assumed in [49], but even a similarity threshold of 0.5 (e.g., in Jaccard or cosine similarity) can give a join size smaller than the assumed join size; Bifocal sampling does not overcome the difficulty of sampling at high thresholds in the VSJ problem. Our proposed techniques in Chapter 6 are analogous to their approach in that we apply different sampling procedures to handle high thresholds and low thresholds separately. 2.2 Signatures and Hashing Techniques for Similarity Matching Intuitively, a signature is a succinct representation of an object. Signatures are often used in similarity search applications when directly comparing objects is expensive, e.g., comparing two images or web documents. An object in a similarity search application is often rep- resented by a vector. In low-dimensional applications, there exist efficient solutions using space-partitioning methods or data-partitioning indexes such as grid-files, R-trees, Rf-trees or KD-trees [124, 135]. When the dimensionality is large, say greater than 10, they provide little improvement over a brute-force algorithm with a linear scan [70, 144]. However, when a small decrease in recall is acceptable, similarity hashing techniques can offer very efficient solutions. Similarity hashing is basically a hashing scheme that preserves some similarity measure. That is, the probability of two objects\u2019 having the same hash value is proportional to (or highly correlated with) their similarity. Similarity hashing is often used as a way to construct a sig- nature by concatenating multiple hash values. The dimensionality of a signature is in general much smaller than that of its original object. Popular signature schemes include Mod-p shingles [65, 132], shingles [17], Min-Hashing [16, 17, 34], prefix signature [8], k-signature scheme [21] and simhash [23] (They are not mutually exclusive). Signature-based algorithms often do not yield to an exact solution; objects that satisfy the given predicate might be missing from answers. However, this approximate nature is fine for estimation purposes and their efficiency makes them good tools for selectivity estimation. We examine two signature schemes based on similarity hashing that we make use of: Min- Hashing and Locality Sensitive Hashing (LSH). See [104] for a brief survey on various signature schemes and [135] for more details on hash-based text retrieval. Min-Hashing supports Jaccard similarity and LSH is developed for several (dis)similarity measures. We briefly review related work on Min-Hashing and LSH, and defer technical details to Section 4.2 and Section 6.3.1 respectively. 2.2.1 Min-Hashing Min-Hashing is a similarity hashing scheme that preserves Jaccard similarity among objects. As defined in Section 1.4.3, Jaccard similarity (or resemblance) between two sets A and B, JS(A,B) is |A\u2229B|\/|A\u222aB|. Min-Hashing has been widely used in many similarity-related applications for its simplicity and effectiveness. 19 2.2. Signatures and Hashing Techniques for Similarity Matching Hashing Technique Cohen studies how to estimate the size of the reachable set for a node and the transitive closure (sum of such sizes) in a graph [34]. Given a graph and a node in the graph, the algorithm assigns a key (\u2208 \u211c+) drawn from some distribution (exponential or uniform) to each node. We keep the minimum key value among the keys of the reachable nodes from the node, and repeat this procedure. It is shown that the distribution of the minimum key is only dependent on the reachable set size and we can estimate the reachable set size of a node from the kept minimum keys. She proposes two estimators; (1) averaging based estimator which uses average of the minimums, (2) selection based estimator which uses only some of the minimums. Two asymptotic bounds, confidence and accuracy levels, are shown as well as the bias and variance of the estimator. Estimating the resemblance between reachability sets is mentioned as one of applications. The Min-hashing technique relies on min-wise permutations (see [17, 34] for details). Di- verse characteristics on min-wise independent permutations are dealt by Broder et al. [16]. The main focus is to analyze minimum sizes and the quality of approximation of various hash families including practical linear hashing families. Together with Cohen\u2019s work, this paper provides theoretical backgrounds for the Min-Hashing technique. Applications of Min-Hash Signatures The application of Min-Hash signature is found in diverse areas including string selectivity estimation with edit distance [105], association rule mining [35], approximate string join [25], near duplicate document detection [17], selectivity estimation of boolean query [30] and audio finger printing [11]. The approximate substring selectivity estimation techniques in Chapter 4 relies on Min- Hash signatures. Technical details and its application are given in the chapter. Our proposed solution for the SSJ problem in Chapter 5 is also based on Min-Hash signature representation of a database. 2.2.2 Locality Sensitive Hashing Locality Sensitive Hashing (LSH) is a special family of hash functions where close objects have higher collision probability. To build an LSH index, all the objects in the database are hashed into LSH hash tables7 by scanning the database. For the nearest neighbor search of a given query, we examine objects in the bucket where the query is hashed. The nearest object from the union of objects in the same bucket of all the hash tables is returned as the answer. Those buckets have objects that are more likely to be close to the query from the property of LSH. Several LSH schemes are developed for various (dis)similarity measures [7]. In fact, Min-Hashing is an LSH scheme that supports Jaccard similarity. 7To increase the probability of finding similar objects in a bucket, usually many hash tables are employed. 20 2.3. Approximate String Matching Hashing Technique LSH is developed by Indyk and Motwani as an approximate solution for the Nearest Neighbor Search (NNS) problem [70]. It gives different collision probability to two objects based on their distance. If two objects are close, they are more likely to be in the same bucket. It achieves worst-case O(dn1\/\u01eb)-time over an n-point database. This bound is enhanced to O(dn1\/(1+\u01eb)) and the algorithm is generalized and analyzed to the case of external memory in [52]. LSH Forest by Bawa et al. [12] improves upon LSH by (a) eliminating the different data- dependent parameters for which LSH must be constantly hand-tuned, and (b) improving on LSH\u2019s performance guarantee for skewed data distributions while retaining the same storage and query overhead. The LSH Forest constructs a (logical) prefix tree on the all hash values, with each leaf corresponding to a point. Panigrapy addresses the drawback of LSH that it needs a large number of hash tables in order to achieve good search quality [118]. The entropy-based LSH scheme is proposed to increase the utility of a hash table. At query time, the scheme generates random neighbor points and probes their buckets. Lv et al. further improve the entropy-based LSH [98]. As entropy-based LSH, it overcomes the drawback by probing multiple buckets that are likely to contain query results in a hash table. The key idea is to use a carefully derived probing sequence to check multiple buckets that are likely to contain the nearest neighbors of a query point. Shinde et al. propose an improved LSH scheme in Euclidean space using a Ternary Content Addressable Memory (TCAM), which needs near linear space and has O(1) query time [134]. TCAM is widely used in networking applications such as address lookups and access control lists and can query for a bit vector with wildcard \u2018*\u2019 representing either 0 or 1. They leverage TCAMs to design a variant of LSH, called Ternary Locality Sensitive Hashing (TLSH) wherein we hash database entries represented by vectors in the Euclidean space into {0, 1, *}. Their scheme enables much faster query times. Applications LSH is widely used in many applications for its efficient construction and query processing. Example include applications on text-retrieval [135], near-duplicate detection [104], image [81], and audio [98]. Algorithms that use Min-Hash signatures in the previous sections are in fact relying on LSH. Cohen et al. use double layers of LSH to identify association rules with extremely low support [35]. A Min-Hash signature is built for each transaction and is hashed into an LSH index. LSH searching algorithms are used to find rules with high confidence. 2.3 Approximate String Matching Navarro provides a good survey on this large topic and classifies application areas into three major groups: (1) computational biology, (2) signal processing, and (3) text retrieval [114]. Strings in each area often have unique characteristics, so different string models and similarity measures have been used depending on the area. In this chapter, we focus on the text retrieval application. Even in the text retrieval area, studies have been performed under different names 21 2.3. Approximate String Matching in diverse fields: information retrieval [10, 113], pattern matching [38], data cleaning [25], record linkage (see [55] for a survey), and databases [53, 78, 94]. We introduce studies that are more closely related to this dissertation regarding text joins, data cleaning and query processing in databases. 2.3.1 Web Data Integration and Text Databases Approximate string matching is central in data integration and detecting duplicated web documents. In the web environment, as the amount of data to be processed makes the exact processing impossible, many studies resort to hashing or signature techniques for efficient filtering that are introduced in the previous section. Broder et al. study the problem of detecting \u201croughly the same\u201d or \u201croughly contained\u201d web documents [17]. The basic idea is to reduce these issues to set intersection problems that can be easily evaluated by a process of random sampling that can be done independently for each document. A succinct representation of document called shingle is proposed, which is basically a Min-Hash signature [34] of a document. Jin et al. propose a methodology that utilizes known multidimensional indexing structures for the problem of approximate multi-attribute retrieval [78]. Their method enables indexing of a collection of string and\/or numeric attributes to facilitate approximate retrieval using edit distance for string-valued attributes and numeric distance for numeric attributes. The proposed MAT tree is an R-tree like index structure for mixed type of string and numeric attributes to estimate combined selectivity of edit distance and numeric range predicates. Jiong et al. study approximate substring search on large string databases [149]. They proposed a B-tree like index structure with regular expression label at a node. Given a query and weighted edit distance threshold, the index structure returns the set of substrings in the database whose similarity is above the given threshold. Many algorithms are developed using fixed-length grams. Li et al. study the problem of how to choose high-quality grams of variable lengths from a collection of strings to support queries on a collection [94]. Specifically, they address how to select high-quality grams from the collection, how to generate variable-length grams for a string based on the preselected grams, and what is the relationship between the similarity of the gram sets of two strings and their edit distance. There are several studies that focus on sets. Helmer and Moerkotte study the set con- tainment join problem and propose a new signature based hash join [63]. Ramasamy et al. improve its efficiency by partitioning data. They propose the Partitioning Set Join Algorithm (PSJ), which uses a replicating multi-level partitioning scheme on a combination of set ele- ments and signatures [125]. A major limitation of PSJ is that it quickly becomes ineffective as set cardinalities grow. Melink and Garcia-Molina generalize and extend the PSJ algorithm and propose two partitioning algorithms, called the Adaptive Pick-and-Sweep Join (APSJ) and the Adaptive Divide-and-Conquer Join (ADCJ) [106]. Mamoulis makes improvements over PSJ by building an inverted file for the \u201ccontainer\u201d relation and using it to process the join [101]. These studies are different from the techniques in Section 2.4 in that they focus on equality or containment predicates, not similarity predicates. Gionis et al. study indexing techniques for set-valued attributes based on similarity [51]. 22 2.3. Approximate String Matching The proposed technique is based on embedding of the set collections into a space of vectors of fixed dimensionality using Min-Hashing. An additional embedding into the Hamming space with no distortion is used and the resulting Hamming space is indexed by introducing hash based schemes optimized for similarity querying. Mamoulis et al. propose a method that represents set data as signatures and organizes them into a hierarchical index, called SG-tree, which is suitable for similarity search and other related query types [102]. Unlike the study by Gionis et al [51], they find the exact answers to queries. Terrovitis et al. address superset, subset, and equality queries on sets and propose the HTI index, which superimposes a trie- tree on top of an inverted file that indexes a relation with set-valued data [136]. Agrawal et al. study the indexing problem for the asymmetric Jaccard containment similarity function that is an error-tolerant variation of set containment [2]. They propose a parameterized index structure that explicitly stores inverted lists for token-sets that are minimal-infrequent: the frequency is less than a given parameter (infrequent) whereas the frequency of any subset is larger than this parameter (frequent). 2.3.2 Data Cleaning Data cleaning, also called data cleansing or scrubbing, deals with detecting and removing errors and inconsistencies from data in order to improve the quality of data [123]. The practical importance of data cleaning is well reflected in the commercial marketplace in the form of the large number of companies providing data cleaning tools and services [128]. However, it is only recently that this topic has caught attention of research community since it was primarily viewed as a labor-intensive task. We selectively introduce recent movements toward automated data cleaning tasks. See [123] for a broader survey. Sarawagi and Bhamidipaty present a learning-based deduplication system that uses a method of interactively discovering challenging training pairs using active learning [129]. The key insight is to simultaneously build several redundant functions and exploit the disagreement amongst them to discover new kinds of inconsistencies amongst duplicates in the data set, which is similar to active learning methods [36, 47]. Chaudhuri et al. propose a new string similarity function called FMS in [25]. The problem is, given a query tuple and a threshold, to find at most k most similar tuples from the reference table that are similar to the query tuple under FMS similarity and the threshold. FMS is a generalized edit distance which combines IDF and the edit distance measure. FMS considers token level edit operations instead of character level ones and assigns different weights to each token according to its importance captured by IDF. A relational table index is used for efficiently identifying candidate tuples. It stores selected q-grams of each column using Min-Hashing for the efficiency and score approximation. They also provide heuristics that can enhance the performance. A number of studies have been proposed to exploit additional information beyond tex- tual affinity and to exploit object-relationships or additional group information. Dong et al. exploit the associations between references to provide evidence for reconciliation deci- sions [39]. Kalashnikov et al. exploit inter-object relationships to improve the disambiguation quality [80]. Malin concentrates on ambiguity and investigates unsupervised methods which simultaneously learn (1) the number of entities represented by a particular name and (2) the 23 2.4. Similarity Joins set of observations correspond to the same entity [100]. On et al. consider matching of highly similar groups of records and proposed a group linkage measure based on bipartite graph matching [116]. Chaudhuri et al. show how aggregate constraints (as opposed to pairwise constraints) that often arise when integrating multiple sources of data can be leveraged to enhance the quality of deduplication [29]. One direction of efforts is to reduce (or eliminate) manual tasks throughout the data clean- ing process. They are beginning to be integral parts of database engines. For instance, FMS measure and related index features are integral parts of MS SQL Server [24]. To successfully coalesce these techniques with databases, it is vital to have a good selectivity estimator. The proposed works in Chapter 3 and Chapter 4 have contributions in this vein and algorithms in Chapter 5 and Chapter 6 are on similarity joins. They can also guide the choice of algorithms as explained in Section 1.3.1. 2.3.3 Other Areas Bioinformatics Many studies focus on approximate string matching in the computational biology commu- nity [56]. However, we believe that the string matching studies in bioinformatics are different in at least two key aspects. First, for efficient selectivity estimation, our techniques in Chapter 3 and Chapter 4 rely on the SIS assumption for database applications. It is doubtful whether the SIS assumption holds in a typical bioinformatics application. Second, for database ap- plications, the alphabet size is typically much larger than 4 in DNA sequences. The larger alphabet size presents a harder problem to deal with, particularly in terms of efficiency. Record Linkage There have been intensive studies in the record linkage community (see [55, 146] for survey) to handle similar difficulties as in data cleaning [140, 145]. Even just for medical records, more than 100 papers have studied matching since the 1950s under the name \u201crecord linkage\u201d [110]. However, they are mostly very domain specific and designed for particular applications. We briefly mention one of the general approaches: blocking technique [55, 82, 110]. It first clusters data and then considers matching of pairs within each cluster. The main purpose of blocking is to reduce the number of comparisons of record pairs by grouping records that have potential of matching. Blocking techniques assume the existence of a good blocking attribute that contain a large number of attributes values that are fairly uniformly distributed and have a very low probability of error. Errors in the blocking attribute can lead to missing true answers. Note that all these studies focus on finding matches (query processing) and do not consider selectivity estimation problems. 2.4 Similarity Joins Intuitively, a similarity join is to find pairs of objects that are similar. Depending on objects of interest, similarity joins have been discussed in largely two contexts: spatial data and 24 2.4. Similarity Joins textual data. In the former case, objects are generally geographical entities, and in the latter case, objects are texts. Although their problem formulations can be very similar, they often assume very different types of data and thus rely on different indexes. For instance, while R-trees or kd-trees (cf., for example, [124]) are primary index structures for spatial query processing, inverted indexes or tries are dominant for text-related processing. There are recent efforts that combine spatial and textual predicates with exact matching [44] or approximate matching [150], but they target selection predicates. See [74] for a detailed survey on spatial join techniques. Near duplicate detection is very closely related to similarity joins, which aim to iden- tify pairs of objects that differ in a very small portion. The problem is studied for objects of various types including web documents [104], files in a file system [103], emails [83], im- ages [81] or domain-specific documents with different goals such as web mirrors, clustering, data extraction, plagiarism, and spam [104]. In this section, we focus on similarity joins that rely on a set (or vector) representation of objects without domain-specific knowledge and target primarily textual data. The set similarity join (SSJoin) is defined as follows: given two collections of sets and a similarity threshold, find all pairs of sets, one from each collection, whose similarity is greater than or equal to the threshold. The basic approach is to decompose a string into a set of grams or words. Then, the text join problem is solved by joining the sets. Chaudhuri et al. identify SSJoin as a key operator for various data cleaning operations [27]. Techniques developed for SSJoin can be roughly categorized into three groups: (1) inverted index-based solutions, (2) signature-based solutions, or (3) RDBMS-based solutions. 2.4.1 Inverted Index-Based Solutions The inverted index from the IR community is a common data structure for SSJoin. For each set element, an inverted index stores the list of record (or object) ids that contain the element. A general approach is, for each set, to find similar sets by merging the id lists of elements in the set exploiting pruning heuristics. Sarawagi and Kirpal formulate the SSJoin problem with overlap match, Jaccard coeffi- cient, weighted match and cosine similarity [130]. They use the inverted index and propose heuristics for efficient merging of inverted lists. Several ideas for efficiently merging the lists are proposed. The first idea is to use the similarity threshold to avoid merging long inverted lists. In a self join case, they integrate index creation and probing processes. In addition to reducing data passes, a key advantage is that each probe step is performed on the partial list rather than the full list. Other heuristics, like pre-sorting data and clustering related records, are also suggested. Bayardo et al. study similarity joins on a collection of vectors [13]. The studied problem is basically a weighted self-join. They develop several heuristics to improve inverted list merging efficiency. A key idea is to exploit the threshold during indexing. Rather than simply exploiting the threshold to reduce candidate pairs, they exploit the threshold to reduce the amount of information indexed in the first place. The proposed algorithms also make use of a specific sort order and the threshold during matching. Xiao et al. propose an algorithm called PPJoin for SSJoin that combines positional fil- 25 2.4. Similarity Joins tering with the prefix filtering-based algorithms [148]. PPJoin exploits the ordering of tokens in a record and leads to upper bound estimates of similarity scores. Xiao et al. observe that mismatching q-grams can provide information on the similarity of strings, and propose the ED-join algorithm for similarity joins of strings with edit distance threshold [147]. Traditional filtering methods are often based on the count of matching q-grams. They derive two new edit distance lower bounds by analyzing the locations and contents of mismatching q-grams. Hadjieleftheriou el al. concentrate on set similarity selection queries [60] and introduce simple variants of traditional TF-IDF and BM25 weighted measures [10] that exhibit certain very desirable semantic properties. An improved NRA [42], a DFS style algorithm, and a hy- brid algorithm that exploit those semantic properties to prune the search space are proposed. They are not SSJoin algorithms but can be adapted to SSJoin easily. 2.4.2 Signature-Based Solutions As described in Section 2.2, signatures are commonly used in similarity-related applications. Similarity join algorithms using signatures generally comprise two phases: (1) identify candi- date pairs by some filters, and then (2) verify the pairs by measuring actual similarity. Many near duplicate detection techniques are also based on signatures [65, 81, 83, 104] PartEnum is a signature-based SSJoin algorithm proposed by Arasu et al. [8]. It first scans the database building a signature for each set, and then performs joins on the signatures producing candidate pairs. Candidate pairs are verified by comparing actual sets. The key point is how to build the signature. PartEnum is based on two idea; (1) it partitions the dimensions so that matching pairs should match on at least one partition and (2) it enumerates various combinations of partitions to make the signature more selective. Hamming distance, Jaccard similarity, weighted join are considered. Cohen et al. present a method to find association rules when the confidence is very high but the support is extremely low [35]. As briefly introduced in the previous section, their scheme is basically an approximate SSJoin algorithm. It first generates a compact representation of itemsets using Min-Hash signature [34], and then finds highly similar signatures by LSH [70]. 2.4.3 RDBMS-Based Solutions Several algorithms on similarity joins are designed for RDBMSs. The solutions are imple- mented using standard SQL or relational operators although they are based on similar filtering heuristics. Gravano et al. develop a technique for building approximate string join capabilities on top of commercial databases by exploiting facilities already available in them [53]. Given an edit distance threshold, they employ cheep filters such as the number of matching q- grams, count filter and position filter. They are realized as SQL statements. This study is extended in [54] for text joins in an RDBMS for web data integration. A sampling-based join approximation strategy is proposed and cosine similarity metric from the information retrieval field is adapted. Their techniques work on a standard, unmodified RDBMS. Chaudhuri et al. propose a new primitive operator called SSJoin operator which can be used as a foundation to implement similarity joins according to a variety of popular string 26 2.4. Similarity Joins similarity functions [27]. A primitive operator which supports the overlapping condition 8 is defined and operators with other similarity measures are implemented by composing the basis operator with other relational operators. Their proposed techniques are implemented using a combination of standard relations operators such as group by, order by, and joins. As identified in [27], similarity joins are at the core of many recent efforts for data cleaning or text join for RDBMSs. Again, the proposed techniques in Chapter 5 and Chapter 6 are valuable in implementing similarity joins in RDBMSs. They can also be used for choosing appropriate algorithms depending on the selectivity. 8A similarity measure that counts the number of overlapping elements in two sets. 27 Chapter 3 String Selectivity Estimation In the following two chapters, we study selectivity estimation of similarity selection queries. We consider two different matching semantics. In this chapter, we consider the \u2018string match- ing\u2019 semantics defined in Section 1.4.2. Intuitively, we aim to estimate the number of strings in the database that are similar to the query string. The framework presented in this chapter serves as a basis for later chapters. The proposed summary structure, the EQ-gram table is used for the SUBSTR problem in Chapter 4 as well. The concept of wildcard is extended and the replace-only formula is adapted for the join size estimation problem in Chapter 5. The proposed techniques in this chapter are based on our VLDB 2007 paper [89]. 3.1 Introduction In this chapter, we study the STR problem in Definition 1. In the STR problem, a query string sq and a similarity threshold \u03c4 select strings in the database that are similar to sq and the goal is to estimate the number of selected strings. The matching semantics is \u2018string matching.\u2019 That is, when we compare two strings, entire strings are compared. For similarity measure, we use edit distance, which is one of the most widely accepted measures in text retrieval [10, 79]. The edit distance between two strings s1 and s2, denoted as ed(s1, s2), is the minimum number of edit operations of single characters that are needed to transform s1 to s2. For instance, when the query string sq =Michael and \u03c4 = 1, sq matches \u2018Michal\u2019 but does not match \u2018Michal Tompton\u2019. Thus, this semantics is suitable for strings that are not too long. Chaudhuri et al. proposed the Short Identifying Substring (SIS) assumption stating that: \u201ca query string s usually has a \u2018short\u2019 substring s\u2032 such that if an attribute value contains s\u2032, then the attribute value almost always contains s as well\u201d in [26]. Thus, for estimating the frequency of s, it is desirable to estimate instead the frequency of s\u2032. They show that the SIS assumption appears to hold for long strings in many real life data sets. Specifically, if one defines s\u2032 to be a short identifying substring when its selectivity is within 5% of the selectivity of s, then there exist s\u2032 with length \u2264 7 for over 90% of strings s of longer lengths. Thus, in this chapter, we focus our attention on queries sq with length shorter than 40. Given such queries sq, we restrict our attention to low edit distance, more specifically \u03c4 = 1, 2 or 3. For instance, if sq = \u201csheffey\u201d, the following seemingly unrelated strings are within an edit distance of 3: \u2018hefte\u2019, \u2018yeffet\u2019, \u2018elfey\u2019, etc. Thus, a fast solution for \u03c4 \u2264 3 can be valuable for many database applications. As a preview, we make the following contributions. \u2022 We propose in Section 3.2 the concept of extended q-grams, which can contain the wildcard symbol ?, representing any single character from the alphabet. Based on the 28 3.2. Extended Q-grams concepts of replacement semi-lattice, string hierarchy and a combinatorial analysis, we develop in Section 3.2 the formulas for determining the selectivity when only replace- ments or deletions are allowed. The replacement formula is particularly valuable as it forms the basis for later optimizations. \u2022 We propose in Section 3.3 an algorithm called BasicEQ for selectivity estimation when all edit operations are allowed. We then develop in Section 3.4 novel techniques to scale up BasicEQ and present the algorithm OptEQ. The first technique is done by approximating with a completion of the appropriate replacement semi-lattice. The second one is done by avoiding unnecessary operations by grouping semi-lattices. \u2022 We show a comprehensive set of experiments in Section 3.5. We compare OptEQ with SEPIA using three benchmarks of varying difficulty levels. Even with less memory, our selectivity estimations are more accurate when \u03c4 \u2264 3. 3.2 Extended Q-grams 3.2.1 Extending Q-grams with Wildcards Let \u03a3 be a finite alphabet with size denoted as |\u03a3|. The bag DB consists of strings drawn from \u03a3\u22c6. To mark the beginning and the end of a string, we use the symbols \u2018#\u2019 and \u2018$\u2019, which are assumed not to be in \u03a3. For a string s, we prefix s with \u2018#\u2019 and suffix with \u2018$\u2019. For example, \u201cbeau\u201d is transformed into \u201c#beau$\u201d before processing. Throughout this chapter, we use double quotes for strings, but do not use any quotation marks for substrings. Whenever there is no confusion, we omit \u2018#\u2019 and \u2018$\u2019 for clarity. Any string of length q(> 0) in \u03a3 \u222a {\u2018#\u2032, \u2018$\u2032} is called a q-gram. An N-gram table over DB consists of the frequencies of all q-grams for 1 \u2264 q \u2264 N [26]. If an entry s in the table contains both # and $, the entry gives the frequency of the strings in DB that are exactly s. Otherwise, the entry gives the frequency of the strings that contain s as a substring. For edit distance, edit operations considered are deletion (D), insertion (I) and replace- ment (R). Given a query string sq, we use Ans(sq, iDjImR) to denote the set of strings s\u2032 such that sq can be converted to s \u2032 with at most i(\u2265 0) D(eletion) operations, j(\u2265 0) I(nsertion) operations and m(\u2265 0) R(eplacement) operations applied in any order. For exam- ple, Ans(\u201cabcd\u201d, 2D1R) denotes the set of strings that can be converted from \u201cabcd\u201d with at most two deletions and one replacement applied in any order. The notation 2D0I1R is simplified to just 2D1R. We also use the notation Ans(sq, k) to denote the set of strings s \u2032 such that sq can be converted to s \u2032 with at most k operations when deletion, insertion and replacement are allowed, i.e., Ans(sq, k) = \u22c3 i+j+m=k and i,j,m\u22650 Ans(s, iDjImR). For instance, Ans(\u201cabcd\u201d, 1R) consists of the strings of one of the following forms: \u201c?bcd\u201d, \u201ca?cd\u201d, \u201cab?d\u201d or \u201cabc?\u201d, where the wildcard symbol ? denotes a single character from \u03a3. To estimate the frequency for string matching with edit distance, we extend q-grams with the wildcard symbol. Any string of length q > 0 in \u03a3 \u222a { \u2018#\u2019, \u2018$\u2019, \u2018?\u2019} is called an extended 29 3.2. Extended Q-grams ab?? a?c? a??d ?bc? ?b?d ??cd abc? ab?d a?cd ?bcd abcd level 1 level 2 level 0 Figure 3.1: String Semi-lattice for Ans(\u201cabcd\u201d, 2R) q-gram. We generalize an N-gram table by keeping extended q-grams, and call it an extended N-gram table. For instance, a 3-gram table for the string \u201cbeau\u201d contains 1-gram (i.e., for b, e, a, u individually), 2-grams (i.e., #b, be, ea, au, u$), and 3-grams (i.e., #be, bea, eau, au$). In an extended 3-gram table, the additional 2-grams are ?b, ?e, ?a, ?u, b?, e?, a?, u?, ??, #? and ?$. The additional 3-grams include (non-exhaustively) ?ea, #?e, etc. The entry ?ea gives the frequency of strings that include a substring of length 3 ending in ea. The entry #?e gives the frequency of strings that begin with the form ?e. 3.2.2 Replacement Semi-lattice We introduce below a replacement semi-lattice and show how this structure can be used to derive a formula for estimating frequencies when only replacements are allowed. We assume all characters are distinct. We will also show how this formula can be exploited by the optimized algorithm OptEQ in Section 5. Consider the set Ans(\u201cabcd\u201d, 2R), which consists of strings of one of the following forms: \u201cab??\u201d, \u201ca?c?\u201d, \u201c?bc?\u201d, \u201ca??d\u201d, \u201c?b?d\u201d and \u201c??cd\u201d. Hereafter, we refer to these as the base strings of Ans(\u201cabcd\u201d, 2R). Formally, a base string for a query string sq and the edit distance threshold k is any string b such that ed(b, sq) = k and insertion\/replacement modelled by \u2018?\u2019. Intuitively, base strings represent possible forms of strings satisfying the query. Let S1 consist of strings of the form \u201cab??\u201d, and S2 of the form \u201ca?c?\u201d, and so on, then Ans(\u201cabcd\u201d, 2R) = S1 \u222a . . . \u222a S6. Thus, the cardinality of Ans(\u201cabcd\u201d, 2R) can be computed using the Inclusion-Exclusion principle: |S1 \u222a S2 \u222a . . . \u222a Sn| = \u03a3|Si| \u2212 \u03a3|Si \u2229 Sj |+ \u03a3|Si \u2229 Sj \u2229 Sk| \u2212 . . .+ (\u22121)n\u22121|S1 \u2229 S2 \u2229 . . . \u2229 Sn| The problem is that this formula requires a number of terms which is exponential with respect to n. Fortunately, as shown below, the structure of character replacements helps to collapse the formula significantly. The structure of character replacements is captured in a replacement semi-lattice. Fig- ure 3.1 shows the semi-lattice for Ans(\u201cabcd\u201d, 2R). A node in the lattice represents a base string or any string that is a result of intersection among base strings. The intersection is defined as follows; (i) the intersection of ? and? gives ?; (ii) the intersection of ? and a character c gives c; and (iii) the intersection of two characters c1, c2 is c1 if c1 = c2, and empty 30 3.2. Extended Q-grams if c1 6= c2. For example, intersection between \u201cab??\u201d and \u201ca?c?\u201d gives \u201cabc?\u201d. The union operation is defined similarly. We define the level of a node to be the number of wildcard sym- bols in the node. Each of the aforementioned sets S1, . . . , S6 is represented as a level-2 node. An edge in the semi-lattice represents an inclusion relationship between nodes in adjacent levels. For example, there in an edge between the level-2 node \u201cab??\u201d and the level-1 node \u201cabc?\u201d and it indicates that the set S7 consisting of strings of the form \u201cabc?\u201d is a subset of S1 corresponding to \u201cab??\u201d. Note that it is also a subset of S2 and S4. Six nodes at the top row (i.e., level-2 nodes here) in the lattice are base strings, and they give rise to four level-1 nodes, which correspond to Ans(\u201cabcd\u2032\u2032, 1R). In turn, they are parents of the single level-0 node \u201cabcd\u201d, which is the bottom element of the semi-lattice. As shown later, we exploit the property of a semi-lattice that the intersection between any two nodes results in a node at a lower level, decreasing the occurrence of wildcards by at least one. 3.2.3 An Example Replacement Formula Continuing the example of Ans(\u201cabcd\u201d, 2R), there are 6 level-2 nodes, thus there are ( 6 2 ) = 15 ways of choosing two nodes for intersections between two nodes. We call these 2-intersections. An \u2113-intersection is any intersection of \u2113 base strings. Among the fifteen 2-intersections, twelve correspond to level-1 nodes (e.g., \u201cab??\u201d \u2229 \u201ca?c?\u201d = \u201cabc?\u201d), but three correspond to the level-0 node of \u201cabcd\u201d (e.g., \u201cab??\u201d \u2229 \u201c??cd\u201d = \u201cabcd\u201d). Let us continue with the 3-intersections of the six level-2 nodes. Some of the 3-intersections correspond to level-1 nodes. For example, the 3-intersection of \u201cab??\u201d, \u201ca?c?\u201d and \u201c?bc?\u201d gives \u201cabc?\u201d. Among the ( 6 3 ) = 20 3-intersections, four result in level-1 nodes, with the remaining sixteen resulting in the level-0 node. The table shown in Figure 3.2 also summarizes the numbers for 4-, 5- and 6-intersections. In the table, the row for level-1 indicates that twelve 2-intersections and four 3-intersections of base wild strings result in a level-1 node. One important observation is that given the highly regular structure of the semi-lattice, each level-1 node appears as results in exactly the same number of times. That is, among the twelve 2-intersections over four level-1 nodes, each level-1 node is the result of a 2-intersection three (= 12\/4) times. Similarly, among the four 3-intersections over four level-1 nodes, each level-1 node is the result of a 3-intersection once. We can now calculate the size of Ans(\u201cabcd\u201d, 2R). Given a string s, we abuse notation by using |s| to denote the size of the set {t|t \u2208 DB and t is a string obtained by replacing all wildcards, if any, in s with characters in \u03a3}. By using the Inclusion-Exclusion principle and the numbers given in Figure 3.2 to simplify the calculation, we have: |\u201cab??\u201d \u222a \u201ca?c?\u201d \u222a \u201ca??d\u201d \u222a \u201c?bc?\u201d \u222a \u201c?b?d\u201d \u222a \u201c??cd\u201d| = |\u201cab??\u201d|+ |\u201ca?c?\u201d|+ . . .+ |\u201c??cd\u201d| +(\u22123 + 1)(|\u201cabc?\u201d|+ |\u201cab?d\u201d|+ |\u201ca?cd\u201d|+ |\u201c?bcd\u201d|) +(\u22123 + 16\u2212 15 + 6\u2212 1)|\u201cabcd\u201d| = F2 + (\u22123 + 1)F1 + (\u22123 + 16\u2212 15 + 6\u2212 1)F0 where Fi denotes the sum of the frequencies of all the level-i nodes. Thus, with the analysis on the replacement semi-lattice, the formula is significantly simplified. 31 3.2. Extended Q-grams 2-inter. 3-inter. 4-inter. 5-inter. 6-inter. # at level-1 12 4 0 0 0 # at level-0 3 16 15 6 1 Total 15= ( 6 2 ) 20= ( 6 3 ) 15= ( 6 4 ) 6 1 Figure 3.2: Number of Resulting Intersections for Ans(\u201cabcd\u201d, 2R) 3.2.4 The General Replacement Formula Below we generalize this analysis to give the cardinality of Ans(sq, kR), where the length of sq is \u2113. There are ( \u2113 k ) base strings, i.e., the number of strings with exactly k characters replaced by ? in sq. Let B\u2113,k,r denote the number of r-intersections (2 \u2264 r \u2264 ( \u2113 k ) ) among the ( \u2113 k ) base strings. It is easy to see that: B\u2113,k,r = ((\u2113 k ) r ) (3.1) Among these r-intersections, let D\u2113,k,r denote the number of those that give sq, i.e., there is no wildcard contained in the r-intersection. For our example of Ans(\u201cabcd\u201d, 2R), we have \u2113 = 4 and k = 2. Thus, there are B4,2,2 = 15 2-intersections, B4,2,3 = 20 3-intersections and so on (cf: the last row in Figure 3.2). Then D4,2,2, D4,2,3 and so on correspond to the second last row of the table. Let us take a closer look into D4,2,2 which is the number of 2-intersections giving sq. Since performing intersections of base strings always decreases the number of wildcards in the result string, the intersections for B4,2,2 can only contain strings with zero or one wildcard position. Thus, D4,2,2 is equal to subtracting from the total number of 2-intersections, which is given by B4,2,2, the number of 2-intersections with 1 wildcard position in the intersection. Let s1 and s2 be the two non-identical base strings forming such a 2-intersection. Let the wildcard positions of s1 be p1,1 and p1,2 and those of s2 be p2,1 and p2,2. The two base strings must agree on exactly one wildcard position. Thus, without loss of generality, we can assume that p1,1 = p2,1 and p1,2 6= p2,2. There are ( 4 1 ) combinations for choosing the common wildcard position p1,1. For the remaining positions, there must be 1 wildcard for s1 and 1 wildcard for s2 in different positions since p1,2 6= p2,2. This is exactly as if we were counting the number of 2-intersections between s\u20321 and s \u2032 2 which were strings of length 3 with 1 wildcard character in different positions in each. This is B3,1,2, which automatically guarantees that p1,2 6= p2,2 because the base strings always have different wildcard positions (i.e. p1,2 6= p2,2). Thus, in sum, D4,2,2 = B4,2,2 \u2212 ( 4 1 ) \u2217 B3,1,2. By using Eqn. (3.1) for the B terms, D4,2,2 = 15 \u2212 4 \u2217 3 = 3 (cf: the 2-intersection column in Figure 3.2). By a similar analysis, D4,2,3 is given by B4,2,3 \u2212 ( 4 1 ) \u2217 B3,1,3, which gives D4,2,3 = 20 \u2212 4 \u2217 1 = 16 (cf: the 3-intersection column). We have the following proposition for the general case. Proposition 1. The general equation of D\u2113,k,r is: D\u2113,k,r = i 1 reduces the number of wildcards and there are k wildcards at each base string. That is, the set of r-intersections with k or more wildcards at its result is empty. Thus, A = \u2211k\u22121m=1(\u22121)m\u22121 \u00b7 Sm. Note that Ai1 \u2229 \u00b7 \u00b7 \u00b7 \u2229 Aim is the set of r-intersections that have wildcards at least at positions i1, \u00b7 \u00b7 \u00b7 , \u0131m. |Ai1 \u2229 \u00b7 \u00b7 \u00b7 \u2229 Aim | is the number of ways to arrange the remaining k \u2212m wildcards to \u2113 \u2212m positions. Since we are considering r-intersections, we have the following: |Ai1 \u2229 \u00b7 \u00b7 \u00b7 \u2229Aim | = ((\u2113\u2212m k\u2212m ) r ) . Since there are ( \u2113 m ) ways of choosing i1, \u00b7 \u00b7 \u00b7 , im such that i \u2264 i1 < \u00b7 \u00b7 \u00b7 < im \u2264 \u2113, using Equation (3.1) in the above equation gives Sm = ( \u2113 m ) \u00b7B\u2113\u2212m,k\u2212m,r, A = k\u22121\u2211 m=1 (\u22121)m\u22121 \u00b7 ( \u2113 m ) \u00b7B\u2113\u2212m,k\u2212m,r. The number of r-intersections is Bl,k,r, and there can be 0 to k \u2212 1 wildcards. Thus, the number of r-intersections without any wildcards at their result is Bl,k,r \u2212A = ( \u2113 0 ) \u00b7 (\u22121)0 \u00b7Bl,k,r + k\u22121\u2211 m=1 (\u22121)m \u00b7 ( \u2113 m ) \u00b7B\u2113\u2212m,k\u2212m,r = i 1 can be complex. Figure 3.3(c) shows the string hierarchy for Ans(\u201cabcd\u201d, 2I). The structure of the hierarchy is less uniform than that of a replacement semi-lattice. This motivates the machinery to be presented next. Specifically, we tackle the general case where: Ans(sq, k) = \u22c3 i+j+m=k and i,j,m\u22650 Ans(s, iDjImR). We develop the basic algorithm BasicEQ to estimate the size of Ans(sq, k). 3.3 Basic Algorithm for Size Estimation 3.3.1 Procedure BasicEQ and Generating Nodes of the String Hierarchy To estimate the size of Ans(sq, k), the strategy is to partition Ans(sq, k) by the length of the strings in Ans(sq, k). Specifically, if the length of sq is l, then the strings in Ans(sq, k) vary in length from (l \u2212 k) to (l + k). Thus, Ans(sq, k) can be partitioned \u2013 according to the length of strings \u2013 into (2k+1) non-overlapping subsets. The size of each of these (2k+1) partitions is then estimated. Figure 3.4 shows a skeleton of this algorithm. To illustrate, consider Ans(\u201cabcde\u201d, 2). This answer set can be partitioned into five non- overlapping subsets consisting of strings of length from 3 to 7. Answer strings of length 3 are all contained in Ans(\u201cabcde\u201d, 2D). This being a pure case, it can be handled directly by the formula given in Section 3.2.5. Similarly, answers of length 7 are all contained in Ans(\u201cabcde\u201d, 2I). This is also a pure case and a formula for determining its size will be given later in this section. Line (7) of Figure 3.4 deals with all the general cases when the formulas in the previous section cannot be used directly. For instance, for Ans(\u201cabcde\u201d, 2), answer strings of length 35 3.3. Basic Algorithm for Size Estimation Input: query sq of length l, edit distance threshold k Output: estimated frequency c 1: c = 0 2: for len = l \u2212 k to l + k do 3: find all combinations (i, j,m) for Ans(sq, iDjImR) such that i+ j +m = k and l \u2212 i+ j = len 4: if Ans(sq, iDjImR) is one of the special cases then 5: get c\u2032 from the corresponding algorithm 6: else 7: c\u2032 = BasicEQ(sq, k, len) 8: end if 9: c = c+ c\u2032 10: end for 11: return c Figure 3.4: A Skeleton for Estimating Frequency 5 are contained in Ans(\u201cabcde\u201d, 2R) \u222a Ans(\u201cabcde\u201d, 1D1I). While we have a formula for Ans(\u201cabcde\u201d, 2R), we do not have a formula for Ans(\u201cabcde\u201d, 1D1I). Even if we had both formulas, estimating the sizes of the two sets separately and adding the two estimates would give a large error because the two answer sets overlap significantly. Thus, we have to resort to a combined treatment of the two sets, i.e., operating from a single combined string hierarchy. The set of base strings is first computed based on either two replacements, or one deletion and one insertion. During the computation, all redundant base strings are removed. For example, Ans(\u201cabcde\u201d, 2R) produces a base string \u201cabc??\u201d while Ans(\u201cabcde\u201d, 1D1I) generates a base string \u201cabcd?\u201d. However, \u201cbc??\u201d contains all strings represented by \u201cabcd?\u201d. Thus, we delete \u201cabcd?\u201d in the base strings for the combined string hierarchy. From then on, the procedure BasicEQ generates the string hierarchy and compute the estimate. Procedure BasicEQ: A skeleton of Procedure BasicEQ is presented in Figure 3.5. Given a query sq and edit distance threshold k, it gives a frequency estimate of all the answer strings of a specific length len. Line (2) of the procedure generates all the base strings for len. The set baseNodes is the set of base strings that remain after removing redundant base strings as above. Then the bulk of the computation is to generate the nodes of the string hierarchy. A naive approach is to perform this generation by considering all r-intersections (2 \u2264 r \u2264 |baseNodes|) of the base strings in baseNodes. Obviously, due to the exponential nature, this is impractical. Instead, the procedure generates the r-intersections in a level-wise fashion. The algorithmic structure follows the well-known Apriori algorithm in [3]. The procedure first generates 2-intersections, such as u \u2229 v, v \u2229 w and u \u2229 w and so on. An r-intersection is non-empty only if all of its (r \u2212 1)-intersections among base strings appearing in the r- intersection are non-empty. This explains why it is sufficient to consider only new nodes in line (6). However, the apriori strategy alone is not sufficient, and the following optimization is 36 3.3. Basic Algorithm for Size Estimation Input: query sq of length l, edit distance threshold k length len of answer strings Output: estimated frequency c 1: find all combinations (i, j,m) for Ans(sq, iDjImR) such that i+ j +m = k and l \u2212 i+ j = len 2: generate the set baseNodes of non-redundant base strings for the combinations above 3: initialize newNodes as baseNodes, totalNodes as \u03c6, c as 0 4: repeat 5: tmpNodes = \u03c6 6: for all u \u2208 newNodes and b \u2208 baseNodes do 7: if u \u2229 b 6= \u2205 then 8: tmpNodes = tmpNodes \u222a {u \u2229 b} 9: end if 10: end for 11: newNodes = tmpNodes\u2212 totalNodes 12: c = c+ PartitionEstimate(newNodes) 13: totalNodes = totalNodes \u222a newNodes 14: until newNodes does not contain any u with a wildcard 15: return c Figure 3.5: A Skeleton for Procedure BasicEQ critical. In order for a new intersection (u \u2229 b) to be non-empty, u must contain at least one wildcard. If there is no wildcard in u, an additional intersection to it is either itself or the empty string. As each iteration of the repeat-until loop of the procedure decreases the number of wildcards by at least one and the edit distance threshold k is not large, the procedure halts with a small number of iterations. 3.3.2 Node Partitioning Line (12) of BasicEQ attempts to estimate the frequency of every newly generated node in the hierarchy. Recall from the previous section that the frequency contribution of a node q in the hierarchy is a combination of Cq \u2217 |q|, where coefficient Cq denotes the number of times q appears in all the intersections of base strings, and |q| denotes the frequency of string q occurring in the database DB. For instance, recall from the example Ans(\u201cabcd\u201d, 2R) in Section 3.2.3 that if q is the node \u201cabcd\u201d, Cq is (-3+16-15+6-1) = 3. The same example also illustrates that many nodes q have the same coefficient Cq. For the example Ans(\u201cabcd\u201d, 2R), all the nodes in the same level of the semi-lattice have exactly the same coefficient (e.g., the coefficient for F1 is -3+1 = -2). The same principle applies to a general string hierarchy. The goal of PartitionEstimate is to group the nodes of the hierarchy into partitions, so that every node q in a partition has the same coefficient Cq. In that case, it is sufficient to compute the coefficient of all the nodes in the partition only once. Below we give a sufficient condition for partitioning. Given a string hierarchy H and a node q in H, the local semi-lattice of q is defined to be the 37 3.3. Basic Algorithm for Size Estimation ab?bcd ababcd a?abcd ??abcda??bcdab??cd aa?bcd ?abbcd a?bbcd aab?cd aabbcd a??bcd ?a?bcd ?ab?cd a?b?cd aa?bcd?aabcd a?abcd aaabcd ??abcd a??bcd ?a?bcd (c)(b)(a) Figure 3.6: Examples of Local Semi-lattice sub-hierarchy of H that includes only nodes that are ancestors of q and q itself. By definition, q is the bottom element, or the root, of the semi-lattice. For instance, if H is the semi-lattice shown in Figure 3.1, q1 is the node \u201cabcd\u201d and q2 is \u201cabc?\u201d, then the local semi-lattice of q1 is the entire semi-lattice H, and the local semi-lattice of q2 is the sub-hierarchy with \u201cabc?\u201d as the bottom node and the 3 parents being \u201cab??\u201d, \u201ca?c?\u201d and \u201c?bc?\u201d. We have the following proposition stating that local semi-lattices can form the basis of node partitioning. Proposition 3. For nodes q1, q2 in string hierarchy H, if the local semi-lattices rooted at q1, q2 are isomorphic, then Cq1 = Cq2. Proof Sketch: When computing Cq1 using Equation (3.2), for any intersection that gives q1, there is a corresponding intersection that gives g2 because of the isomorphism. The same arguments hold for Cq2 . Thus, Cq1 = Cq2 . The above proposition can be proved by induction on the depth of the nodes in the semi- lattices. The converse of the proposition is not true, namely Cq1 = Cq2 does not imply isomorphic local semi-lattices. 3.3.3 An Example and a Formula for Two Insertions Let us consider the example of Ans(\u201cabcd\u201d, 2I). Recall that Figure 3.3(c) shows the string hierarchy. As examples of local semi-lattices, Figure 3.6 shows the local semi-lattices of \u201cababcd\u201d, \u201caaabcd\u201d and \u201caabbcd\u201d. To illustrate how BasicEQ operates, recall that every 2-intersection node is generated in its first iteration. Thus, all the level-0 and level-1 nodes in Figure 3.6(a) are produced in the first iteration (e.g., \u201cababcd\u201d=\u201caa??cd\u201d \u2229 \u201c??abcd\u201d). How- ever, \u201caaabcd\u201d in Figure 3.6(b) is generated in the second iteration because no 2-intersection can generate that node. To illustrate node partitioning, all the level-0 nodes of the hierarchy shown in Figure 3.3(c) can be grouped into the three partitions as shown in Figure 3.6. The first partition, shown in Figure 3.6(a), consists of the nodes with a local semi-lattice isomorphic to that of \u201cababcd\u201d. (Below we refer to this partition as P0,1.) Every node in this partition appears once in 2- intersections and once in 3-intersections of base strings with alternating sign, giving rise to the coefficient of -1+1=0. For example, among all possible 2-intersections of base strings in Figure 3.3(c), only \u201cab??cd\u201d \u2229 \u201c??abcd\u201d results in \u201cababcd\u201d. The second partition illustrated in Figure 3.6(b) consists of the nodes with a local semi- lattice isomorphic to that of \u201caaabcd\u201d. (Below we refer to this partition as P0,2.) Every node 38 3.3. Basic Algorithm for Size Estimation Input: newNodes, a set of newly formed nodes Output: estimated frequency c 1: for all node q \u2208 newNodes do 2: form the set Parq of all the parents of q 3: form the multiset PIDq of the partition id of parents in Parq 4: form the set Bq of all the base strings which are ancestors of q 5: end for 6: given newNodes = {q1, . . . , qt} for some t > 0 put qi, qj(1 \u2264 i, j \u2264 t) in one partition if the multisets PIDqi and PIDqj are identical and |Bqi | = |Bqj | 7: update the global partition table and c = 0 8: for all partition P formed in the previous step do 9: CP = ComputeCoefficient(P ) 10: c = c+ CP \u2217 \u2211 q\u2208P EstimateFreq(q) 11: end for 12: return c Figure 3.7: A Skeleton of Procedure PartitionEstimate q in this partition does not appear in its local semi-lattice as a 2-intersection, but appears once as a 3-intersection, giving a coefficient Cq of 1. Finally, the third partition presented in Figure 3.6(c) consists of nodes with a local semi- lattice isomorphic to that of \u201caabbcd\u201d (Below we refer to this partition as P0,3.). With a similar argument, the coefficient for each node in this partition becomes \u22122 + 4\u2212 1 = 1. It is not hard to verify that |Ans(\u201cabcd\u201d, 2I)| is given by F2\u2212F1+0\u2217F0,1+1\u2217F0,2+1\u2217F0,3 = F2\u2212F1+F0,2+F0,3, where Fi give the sum of frequencies of all the nodes in level-i for i = 1, 2, and F0,1, F0,2, F0,3 denote the sums of the frequencies in partitions P0,1, P0,2 and P0,3. This result in fact generalizes to arbitrary length sq as the following: Proposition 4. The cardinality of Ans(sq, 2I) is given by F2 \u2212 F1 + F0,2 + F0,3. Proof Sketch: With two insertions, the length of nodes is |sq| + 2. The coefficient of all level-2 nodes is 1. Note that all level-1 nodes have one wildcard and one character that is repeated twice, which implies that the coefficient of all level-1 nodes is -1. Nodes at level 0 can have either a single character that is repeated three times or two characters that are repeated twice. In the former case, the local lattice is isomorphic to Figure 3.3(b). In the latter case, the local lattice is isomorphic to either Figure 3.3(a) or (c) depending on the relative order of the two characters. Considering the coefficients of all levels, we have the above formula for Ans(sq, 2I). 3.3.4 Procedure PartitionEstimate In order to form partitions to use Proposition 3, an isomorphic test on the structure of the local semi-lattices is required. A brute-force approach is computationally expensive. Fortunately, in our framework, this test can be integrated into the level-wise computation of BasicEQ. As 39 3.3. Basic Algorithm for Size Estimation Input: a partition P Output: estimated frequency CP 1: take any node q in partition P and set compBase consisting of all the base strings which are ancestors of q 2: initialize rInter = {{b}|b \u2208 compBase}; r = 2; CP = 0 3: while rInter 6= \u03c6 and r \u2264 |compBase| do 4: tmpInter = \u03c6, C \u2032P = 0 5: for all base \u2208 compBase and inter \u2208 rInter and base 6\u2208 inter do 6: tmpInter = tmpInter \u222a {inter \u222a {base}} 7: if (base \u22c2 intersect(inter)) = q then 8: C \u2032P = C \u2032 P + 1 9: end if 10: end for 11: CP = CP + (\u22121)r+1C \u2032P 12: rInter = tmpInter; r = r + 1 13: end while 14: return CP Figure 3.8: A Skeleton of Procedure ComputeCoefficient newly created nodes are computed in each iteration of BasicEQ, all these nodes are passed to PartitionEstimate, of which a skeleton is presented in Figure 3.7. Each node generated by BasicEQ is assigned a partition id. For bookkeeping purposes, there is a partition table which maps a node to its partition id. There is a second table that maps a partition id to the set of nodes contained in the partition. In our experimentation, there are typically fewer than 40 partitions; thus, lookups can be done very quickly. When PartitionEstimate starts, all the base strings are in one partition because each local semi-lattice consists of just itself. Then inductively, to check whether the local semi-lattices of two nodes q1 q2 have the same structure, it checks whether the partition ids of these two multisets of parents and the number of base strings that are ancestors are identical. These are necessary but not sufficient conditions for isomorphism of two lattices. In Section 6, the empirical results will show that the two conditions are rather effective heuristics. It is possible that both a node and its parents are generated, put into newNodes, and fed as input in the same invocation of PartitionEstimate. However, as ancestors cannot be generated later than their descendants, level-wise processing in the first for-loop in Figure 3.7 insures that the PID of parents are available when it processes a node. This detail is omitted in Figure 3.7. Once the partitions are formed, then PartitionEstimate invokes ComputeCoefficient in line (9) to compute the coefficient Cp for each newly formed partition P , a procedure to be detailed in the next subsection. Once CP is computed, line (10) multiplies this coefficient to the frequency of each node in the partition P . While every node in a partition P has the same coefficient CP , each may have its own frequency of occurrence in the database DB. Estimating these frequencies will be discussed at the end of this section. 40 3.3. Basic Algorithm for Size Estimation 3.3.5 Procedure ComputeCoefficient Given a partition P of nodes computed by PartitionEstimate, the procedure ComputeCoeffi- cient shown in Figure 3.8 computes the coefficient CP , the number of times a node q \u2208 P ap- pears in all the r-intersections of the base strings. Essentially, it starts with the set compBase of base strings that are ancestors of q in the hierarchy. Then the algorithm iterates to find r-intersections, starting from r = 2. The set rInter consists of all non-empty r-intersections. In other words, a set inter in rInter represents a particular non-empty r-intersection. The for-loop starting in line (5) constructs (r+1)-intersections by testing one base string base at a time from compBase. To perform the intersection step in line (7), intersect(inter) computes the intersection of all elements in inter. However, we can store the intersection in previous step and just return it here. If this new intersection is equivalent to q itself, the coefficient Cq is incremented. Let us illustrate how ComputeCoefficient works. Assume that a partition P with a node of \u201cababcd\u201d in Figure 3.6(a) and q is selected as \u201cababcd\u201d at the beginning of the execution. Then, we get compBase = {\u201cab??cd\u201d, \u201ca??bcd\u201d, \u201c??abcd\u201d}. At the first iteration of the while- loop in line (3), tmpIter becomes { {\u201cab??cd\u201d, \u201ca??bcd\u201d}, {\u201cab??cd\u201d, \u201c??abcd\u201d}, {\u201ca??bcd\u201d, \u201c??abcd\u201d\u2019}} after exiting the for-loop. Furthermore, the if-statement in line (7) finds that only \u201cab??cd\u201d\u2019 \u2229 \u201c??abcd\u201d results in q. Thus, C \u2032P becomes 1 and CP is -1. Since we set rIter to tmpIter and rIter is not empty, we perform the next iteration of the while-loop. Now, there is only one intersection {\u201cab??cd\u201d, \u201ca??bcd\u201d, \u201c??abcd\u201d} that is the only element in tmpIter and the result of the intersection is q. Thus, C \u2032P becomes 1 which is added to CP by line (11) and CP becomes zero. The value of CP does not be changed later on and finally CP becomes zero. One reason why this algorithm is slow is that we need to maintain every intersection gen- erated even though the current r-intersection does not result in q. To alleviate this problem, we develop an approximation method later that avoids the maintenance of all r-intersections generated. 3.3.6 Procedure EstimateFreq For the material presented so far, the discussion is mainly based on strings (e.g., nodes in string hierarchy). It is only in line (10) of PartitionEstimate that requires the use of the N-gram table. The task is that for a given string q, the frequency that this string appears in the database DB is returned. For an extended string q, if the extended N -gram table kept by the system contains an entry for q (e.g., when |q| \u2264 N), then the frequency |q| is immediately returned. Otherwise, |q| needs to be estimated using estimation algorithm as MO [77]. The experimental evaluation section will compare the accuracy when EstimateFreq implements MO, as well as other variants below. \u2022 If s is obtained from t by replacing at least one character in t with ?, then by definition |s| \u2265 |t| (e.g., |\u201cabc?\u201d| \u2265 |\u201cabcd\u201d|). However, MO estimation may violate this condition, i.e., MO(s) may be smaller than MO(t). In that case, the MO estimate of s is reset to the maximum MO estimate of all such t\u2019s. We call this the MAX estimate. 41 3.4. Optimized Algorithm OptEQ ?a?c ?ab? ?abc a??c ab?c a?b???bc ?b?c a?bc abc? a?c??bc?ab?? aabc abbc abcc Figure 3.9: String Hierarchy of Ans(\u201cabc\u201d, 1I1R) ?a?c ?ab? ??bc a??c a?b? aa?? ?abc aabc a?bc aa?c aab? Figure 3.10: Completion of a Replacement Semi-lattice of Ans(\u201caabc\u201d, 2R) \u2022 Among all the substrings q\u2032 of q that are kept in the N -gram table, let q\u2032min be the substring with the smallest frequency. By definition, |q| \u2264 |q\u2032min|. In other words, this is an over-estimate of q. It has been well documented that the MO-estimate of q is often an underestimate, particularly when q is long [26]. Thus, one estimate is to take the geometric mean of |q\u2032min| and the MO-estimate of q. We call this MO+ estimate. \u2022 We can combine the MAX estimate and the MO+ estimate to give another estimate referred to as MM. That is, it gives the geometric mean of |q\u2032min| and the MAX estimate of q. Section 6 will compare empirically the effectiveness of these instances of EstimateFreq. 3.4 Optimized Algorithm OptEQ BasicEQ is efficient whenever the general formulas presented in Section 3 can be applied. For other situations, BasicEQ is sufficient for small problems. However, it is clear that it does not scale up with respect to query length l and \u03c4 when the formulas cannot be used. The complexity of BasicEQ is exponential with respect to l. In this section, we propose the optimized algorithm OptEQ which extends BasicEQ with two enhancements. We show experimentally in the next section how OptEQ can handle long queries efficiently. 3.4.1 Approximating Coefficients with a Replacement Semi-lattice When the set compBase is large (e.g., query sq is long or k is large), computing the exact value of Cq as in ComputeCoefficient is prohibitive. We next present a strategy to approximate Cq by avoiding the generation of all r-intersections. 42 3.4. Optimized Algorithm OptEQ Let us revisit the example of Ans(\u201cabcde\u201d, 2). As the computation iterates over the length of the answer strings, one iteration deals with the strings of length five contained in Ans(\u201cabcde\u201d, 1D1I)\u222a Ans(\u201cabcde\u201d, 2R). The next iteration deals with those of length six in Ans(\u201cabcde\u201d, 1I1R). The string hierarchies in both cases are rather complex and thus the approximation strategy is applied. For ease of presentation, we use Ans(\u201cabc\u201d, 1I1R) as an example to illustrate the strategy. To generate all the base strings, we can first consider the position of one insertion, followed by one replacement. Specifically, we can group the base strings into four and the 4 groups are as follows: \u2022 (inserting into first position) \u201c??bc\u201d, \u201c?a?c\u201d and \u201c?ab?\u201d \u2022 (inserting into second position) \u201c??bc\u201d, \u201ca??c\u201d and \u201ca?b?\u201d \u2022 (inserting into third position) \u201c?b?c\u201d, \u201ca??c\u201d and \u201cab??\u201d \u2022 (inserting into fourth position) \u201c?bc?\u201d, \u201ca?c?\u201d and \u201cab??\u201d Note that the strings in DB belonging to \u201c?abc\u201d in the first group above is also included in other base strings. Thus, \u201c?abc\u201d is pruned in the first group. Similarly, \u201ca?bc\u201d, \u201cab?c\u201d and \u201cabc?\u201d are removed from their group\u2019s base strings. With the base strings of Ans(\u201cabc\u201d, 1I1R), we can build the string hierarchy presented in Figure 3.9. In the string hierarchy, the three base strings in the first group are organized in a sub-semi-lattice rooted at \u201c?abc\u201d. Similarly, the three base strings in the second group form a sub-semi-lattice rooted at \u201ca?bc\u201d. Note that \u201c??bc\u201d is shared between two groups and thus these two groups correspond to a general situation when two semi-lattices overlap on some base strings. To compute the size of Ans(\u201cabc\u201d, 1I1R), eventually the coefficient of every node in the string hierarchy in Figure 3.9 is needed. Assume that we want to compute the coefficient of \u201caabc\u201d in Figure 3.9. Instead of applying ComputeCoefficient directly on \u201caabc\u201d, the approximation strategy completes the semi-lattice of \u201caabc\u201d with two replacements. This completed replacement semi-lattice is shown in Figure 3.10 where the two sub-semi-lattices rooted at \u201c?abc\u201d and \u201ca?bc\u201d are shown in solid lines, while the other parts, which do not appear in the string hierarchy of Figure 3.9 and thus are not required for Ans(\u201cabc\u201d, 1I1R), are shown in dotted lines. The beauty of the replacement semi-lattice rooted at \u201caabc\u201d is that Eqn. (3.3) immediately gives a formula for Caabc, if the entire replacement semi-lattice appears (i.e. are involved) in the sub-semi-lattice rooted at \u201caabc\u201d in Figure 3.9. Specifically, recall from the discussion in Section 3.2.3 that the root of the semi-lattice is the level-0 node. Thus, the relevant coefficient is the one for F0, which is: Croot = \u2211(\u2113k) r=2(\u22121)r+1D\u2113,k,r. When parts of the replacement semi-lattice are not involved, the approximation strategy assumes that the number of r-intersections leading to a root node is proportional to the number of its base strings that are involved. This assumption arises from the highly uniform structure of a replacement semi-lattice. Thus, each term in the summation is scaled relative to the 43 3.4. Optimized Algorithm OptEQ 2-inter. 3-inter. 4-inter. 5-inter. 6-inter. Cr for bottom node -3 16 -15 6 -1 estimated Cr ( 5 2 ) \/ ( 6 2 )\u2217 (53)\/(63)\u2217 (54)\/(64)\u2217 (55)\/(65)\u2217 (56) = 0 for \u201caabc\u201d \u22123 = \u22122 16 = 8 \u221215 = \u22125 6 = 1 exact Cr for \u201caabc\u201d -2 8 -5 1 0 Figure 3.11: Approximating Coefficients for \u201caabc\u201d number of the base strings involved. Specifically, let B the size of compBase, which is the set of base strings that are involved. Then, Croot is estimated by: C \u2032root = (\u2113k)\u2211 r=2 (\u22121)r+1D\u2113,k,r \u2217 ( |B| r ) ((\u2113k) r ) (3.4) That is, in a completed replacement semi-lattice, there are ( \u2113 k ) base strings. But as there are only B base strings in the completed replacement semi-lattice that are involved, every term is scaled proportionally. Let us return to the example of \u201caabc\u201d. Recall from Figure 3.10 that there are five base strings being involved for the query of Ans(\u201cabc\u201d, 1I1R), as supposed to six (i.e., \u201caa??\u201d being the only base string not involved) in the completed replacement semi-lattice. Thus, in this example, |B| = 5 and (\u2113k) = (42) = 6. The table shown in Figure 3.11 applies the approximation strategy to Caabc. The second row of the table is identical (modulo the sign) to the third row of the table in Figure 3.2, as it gives the coefficients Cr for the root node. The third row applies the proportionality factor to each term. The last row of the table shows the true coefficients, which turn out to be identical to the approximated ones! In general this is not always true. For example, the division in Eqn. (3.4) does not always give an integer value. 3.4.2 Fast Intersection Tests by Grouping Another way to optimize BasicEQ is to optimize the for-loop in line (6) of Figure 3.5. Specifi- cally, for every possible pair of a base string b \u2208 baseNode and u \u2208 newNodes, we perform the intersection. However, as seen in the previous example shown in Figure 3.10, base strings may naturally group into a collection of semi-lattices. In the case of approximating by completion of a replacement semi-lattice, the individual semi-lattices are all parts of a larger, completed semi-lattice. In a more general setting, this condition may not hold for all the semi-lattices. Nevertheless, some of the semi-lattices may overlap. Below we explore further the notion of grouping and show how group-wise operations can be exploited. Note that a replacement operation does not cause any character shifting in the result, while an insertion or a deletion does. Thus, we organize all the base strings for a query of the 44 3.4. Optimized Algorithm OptEQ Input: query sq of length \u2113, edit distance threshold k length len of answer strings Output: estimated frequency c 1: Identical to procedure BasicEQ except using grouping in line 6 and invoking ComputeCoefficient(q) by PartitionEstimate: 2: if q is the root of a replacement semi-lattice then 3: apply the formula in Eqn. (3.3) 4: else if compBase of q exceeds a certain size then 5: apply the approximation strategy based on Eqn. (3.4) 6: else if ComputeCoefficient is to be applied then 7: use grouping to speed up and computation of coefficients as discussed in Section 5.2 8: end if Figure 3.12: A Skeleton of Procedure OptEQ form Ans(sq, jIjD1R) by considering the position of insertion and deletions only. To illustrate the power of grouping, let us consider the example of Ans(\u201cabcd\u201d, 1D1I1R), as part of a query with the edit distance k = 3. We group all the base strings forAns(\u201cabcd\u201d, 1D1I1R) by first considering the deletion and insertion. The following array shows all the possible com- binations for one deletion and one insertion in any order. G = \uf8eb \uf8ec\uf8ec\uf8ed \u201c?abc\u201d \u201ca?bc\u201d \u201cab?c\u201d \u201cabc?\u201d \u201c?abd\u201d \u201ca?bd\u201d \u201cab?d\u201d \u201cabd?\u201d \u201c?acd\u201d \u201ca?cd\u201d \u201cac?d\u201d \u201cacd?\u201d \u201c?bcd\u201d \u201cb?cd\u201d \u201cbc?d\u201d \u201cbcd?\u201d \uf8f6 \uf8f7\uf8f7\uf8f8 We can view the first row as deleting the character d and inserting a character at various positions. Similarly, we can view the first column as inserting a character at the first position and deleting a character at various positions. Then the replacement can be applied to each of the 16 elements of matrix G. For instance, applying one replacement to \u201c?abc\u201d gives \u201c??bc\u201d, \u201c?a?c\u201d and \u201c?ab?\u201d. Note that these three strings form a replacement semi-lattice rooted at \u201c?abc\u201d. Indeed, the same phenomenon applies to every element of G. In other words, the base strings of Ans(\u201cabcd\u201d, 1D1I1R) are split into sixteen groups, or more specifically, semi-lattices with the roots being the elements of G. The first benefit of grouping in this manner can be exemplified by noting that G(1, 1) = \u201c?abc\u201d and G(4, 1) = \u201c?bcd\u201d generate empty intersection. More importantly, any one of the base strings within the group of \u201c?abc\u201d (namely, \u201c??bc\u201d, \u201c?a?c\u201d and \u201c?ab?\u201d) and any one of the base strings within the group of \u201c?bcd\u201d (namely, \u201c??cd\u201d, \u201c?b?d?\u201d and \u201c?bc?\u201d) always produce an empty intersection. This is because regardless of which pair, there is at least one position where there are no wildcards and the characters do not match. This motivates the following proposition. Proposition 5. Let g1, g2 be two elements in matrix G. Let grpDist(g1, g2) be defined as the number of non-matching positions between g1, g2. Let s1 be any node within the r1-replacement 45 3.5. Empirical Evaluation semi-lattice rooted at g1, where r1 is defined by the query. Similarly, let s2 be any node within the r2-replacement semi-lattice rooted at g2. Then grpDist(g1, g2) > r1+r2 implies s1\u2229s2 = \u03c6. For the running example of Ans(\u201cabcd\u201d, 1D1I1R), if g1, g2 are \u201c?abc\u201d and \u201c?bcd\u201d respec- tively, then r1 = r2 = 1 because of the 1R specification in the query. However, the group distance grpDist(g1, g2) = 3 because there are 3 non-matching positions. The proposition then allows us to immediately conclude that for any pair of s1 from the 1-replacement semi- lattice rooted at g1 and s2 from the 1-replacement semi-lattice rooted at g2, their intersection must be empty. Thus, grouping and group distance defined via the roots of two groups provide a fast negative test for groups of base strings. This speeds up line (6) of BasicEQ. Another benefit of grouping is that each replacement semi-lattice allows the coefficient to be computed directly by the formula given in Eqn. (3.3), thus avoiding the use of ComputeCoefficient. Specifically, the coefficient of the root of a group is precisely Croot =\u2211(\u2113k) r=2(\u22121)r+1D\u2113,k,r and the coefficient of an intermediate level-i node in the group is Cq =\u2211(\u2113k) r=2(\u22121)r+1D\u2113\u2212i,k\u2212i,r, which is the coefficient of Fi in Eqn. (3.3). However, we have to be careful in defining \u2113 and k before the above formulas can be used. In the \u201c?abc\u201d group for our example, every node in the replacement semi-lattice has a wildcard at (at least) the first position. This position should not be considered in the replacement semi-lattice. Effective string length is defined as the length of the root after excluding any wildcard in the root which is shared in the group. Similarly, effective number of wildcards is the number of wildcards excluding the wildcards common to all within the group. In applying the formulas above, \u2113 and k are set to the effective string length and effective number of wildcards. For example, in Figure 3.9, the sub-semi-lattice rooted at \u201c?abc\u201d has 3 base strings. Its effective string length is 3 instead of 4 and its effective number wildcards is 1 instead of 2. Thus, we compute the coefficient of \u201c?abc\u201d using Eqn. (3.3) by setting \u2113 = 3 and k = 1 Procedure OptEQ is an optimized version of BasicEQ that incorporates approximation and grouping into the size estimation. The skeleton shown in Figure 3.12 highlights the key differences. OptEQ is scalable to deal with size estimation of queries like Ans(\u201cabcd\u201d, 1D1I1R) and more complex combinations. In general, as query sq becomes longer, the G matrix shown earlier becomes larger. However, there are more and more groups with large group distance and fast negative tests provide scalability. Similarly, for the general situation of Ans(sq, iDjImR), if (i+j) is large, again the Gmatrix becomes larger. Yet, like before, grouping helps significantly. On the other hand, if m is large (while k remains constant), the replacement semi-lattice becomes dominant. In that case, OptEQ either applies Eqn. (3.3) if possible, or Eqn. (3.4) if approximation is needed. 3.5 Empirical Evaluation 3.5.1 Implementation Highlights The proposed algorithms BasicEQ and OptEQ were developed using Java 1.5. These al- gorithms were applied to different settings of N -gram tables parameterized by the triplet (NB, NE , PT ): 46 3.5. Empirical Evaluation 0 10 20 30 40 50 60 OptEQ (MM,6,6,5) OptEQ (MAX,6,6,5) OptEQ (MM,5,5,0) OptEQ (MAX,5,5,0) OptEQ (MO+,5,5,0) OptEQ (MO,5,5,0) SEPIA R el at iv e E rr or (% ) Figure 3.13: Actress Last Name, \u03c4 = [1, 3] \u2022 all q-grams without wildcards for |q| \u2264 NB are kept; \u2022 all q-grams with wildcards for |q| \u2264 NE are kept; but \u2022 all the entries kept must have a count > the prune threshold PT . OptEQ(method,NB,NE , PT ) denotes the variants when the method used for EstimateFreq was one of: MO, MO+, MAX and MM, and using the NB-gram table and the extended NE-gram table with prune threshold PT . For instance, OptEQ(MM,9,6,1) gives the version of OptEQ using MM for frequency estimation on the 9-gram table and the extended 6-gram table, where only entries of count \u2265 2 are kept. Below we will evaluate the trade-offs among NB, NE and PT , with respect to accuracy and memory size. In our implementation, the (extended) q-gram tables are optimized in size in two ways. First, in hash buckets of tables, the string corresponding to a q-gram entry is hashed again and stored as a byte key not as a full string key. Thus, there may be collisions introduced by hashing, representing a trade-off between accuracy and size. The results reported below include the errors arisen due to collisions. Second, for each entry, the count is initially re- stricted to a short integer. When the count exceeds the range of a short integer, the count is maintained separately in an overflow table. The discussion so far on the computation of coefficients shows how they can be computed - for once. In our implementation, these coefficients are pre-computed and stored in a coefficient table. This is possible because the coefficients depend only on the length and the \u03c4 value of the query. In \u201cquery time\u201d, once the actual frequencies of the required nodes are determined, the selectivity can be estimated very efficiently using the pre-computed coefficients. Note that this table remains unchanged from one data set to another. 3.5.2 Experimental Setup We conducted a series of experiments using several data sets. The results shown here are based on three benchmarks. \u2022 (Short strings) The Actresses last name data set consists 392,132 last names of actresses downloaded from www.imdb.com. The maximum and average length are 16 and 6.3. 47 3.5. Empirical Evaluation 0 10 20 30 40 50 60 70 80 \u2206=3\u2206=2\u2206=1 R el at iv e Er ro r ( %) SEPIA OptEQ(MM,9,5,2) OptEQ(MM,12,5,2) Figure 3.14: DBLP Authors, \u03c4 = 1, 2, 3 \u2022 (Medium-length strings) The DBLP authors data set consists of 699,198 authors\u2019 full names from DBLP [93]. The maximum and average length are 43 and 14.3. \u2022 (Long strings) The DBLP titles data set consists of 53,365 titles collected from DBLP. The maximum and average length are 40 and 29.6. Longer titles are excluded. For longer strings, a substring query which will be discussed in Chapter 4 may fit better. SEPIA was downloaded from the FLAMINGO project homepage [138] and was written in C++. We tuned SEPIA to maximize its performance. The results reported here are based on applying the error correction step included in the software, and on using 2,000 clusters, a sampling ratio of 5% and the CLOSE RAND method to populate the PPD table. Accuracy is measured by average relative error, defined as |est\u2212true|\/true, where est and true are the estimated and true frequencies respectively. To avoid very low frequency queries from skewing the average relative error figure, we exclude queries whose true frequencies are below 3. We also exclude best and worst 3 queries from the analysis. The experiments were run on an Intel P4 3GHz desktop PC with 1 GB memory and 40GB disk space running GNU\/Linux with kernel 2.6. For the memory size figures cited below, the figure for SEPIA is based on the file size written on disk which includes the PPD table and the frequency table. For OptEQ, the size figure is based on multiplying the number of entries in the q-gram and extended q-gram tables with the number of bytes per entry. 3.5.3 Actresses Last Names Figure 3.13 compares the average relative error between SEPIA and variants of OptEQ for the Actresses data set. A total of 300 queries are randomly selected, of which 272 have true frequencies exceeding 3. The average relative error is obtained based on the 272 queries. The edit distance threshold \u03c4 is selected among 1, 2 and 3 with equal likelihood. The first column shows that the average relative error for SEPIA is around 40%. The next four columns show the version of OptEQ when the different frequency estimation methods are used, NB = NE = 5, and PT = 0. Compared with MO and MO+, MAX and MM were consistently superior. In the experiments to follow, we only show the results of MM. When OptEQ(MAX, 6, 6, 5) or OptEQ(MM, 6, 6, 5) are used, the last two columns show that the average relative errors are reduced in half from 40% to about 20%. This shows 48 3.5. Empirical Evaluation 0 20 40 60 80 100 120 140 More1007550250-25-50-75-100 N um be r o f q ue rie s Relative Error (%) \u2206 1 2 3 (a) OptEQ(MM,9,5,2) 0 20 40 60 80 100 120 140 More1007550250-25-50-75-100 N um be r o f q ue rie s Relative Error (%) \u2206 1 2 3 (b) SEPIA Figure 3.15: Error Distribution: OptEQ(MM, 9, 5, 2) vs SEPIA the effectiveness of increasing NB and NE in reducing relative error. The reason for setting the prune threshold of PT to 5 is to keep the memory utilization of OptEQ to be more or less the same as that used by SEPIA (3.3MB vs 3.6MB). Thus, using less memory, OptEQ(MM, 6, 6, 5) reduced the average relative error by half. In terms of running time, the \u201cbuild\u201d time to construct the extended N-gram tables took about 5 minutes. The average query processing time for OptEQ was about 13 msec using the pre-computed coefficient table (or 1.2 seconds if OptEQ were to compute every coefficient on-the-fly). The build time of SEPIA to construct the clusters and the histograms took around 60 minutes. The query processing time for SEPIA was about 8 msec. We do not include the results for BasicEQ because the execution time was very slow when the query exceeded a length of 10. For instance, for a query of length 11, BasicEQ took 74 seconds. If we only keep simple q-grams, not extended q-grams, the viable approach would be to enumerate all possible strings within the threshold and sum up their frequencies. We do not present detailed results, but the performance was unacceptable. For example, even for the simple query sq = \u201cblank\u201d, there are more than 4 million possible strings within edit distance threshold of 3. It took more than 20 seconds just to estimate the frequency of each string and sum them up. It took only 7 msec for OptEQ to process the same query which is three orders of magnitude faster. This clearly shows the utility of the proposed extended q-grams. 3.5.4 DBLP Authors This set of experiments used queries of an average length more than double than those used in the Actresses data set. Out of the 900 randomly selected queries, 674 have true frequencies exceeding 3, and are more or less equally distributed among \u03c4 = 1, 2, 3. Fig- ure 3.14 gives the average relative errors, with \u03c4 separated into 1, 2 and 3 respectively. SEPIA consistently hovers around 70% in relative error. The average relative error given by OptEQ(MM, 12, 5, 2) increases from around 15% for \u03c4 = 1 to about 30% for \u03c4 = 3. The memory used by OptEQ(MM, 12, 5, 2) and SEPIA were 13.7MB and 14MB respectively. Again, with similar or less memory, OptEQ delivered significantly more accurate estimations. Furthermore, we reduce the memory consumption by using OptEQ(MM, 9, 5, 2), which occu- 49 3.5. Empirical Evaluation 0 5 10 15 20 25 30 OptEQ (MM,15,5,1) OptEQ (MM,12,5,1) SEPIA Re lat ive E rro r (% ) Figure 3.16: DBLP Titles, \u03c4 in [1, 3] pies only 9.2MB. Yet the average relative error is still significantly lower than that of SEPIA. Note that we increased NB not NE from the Actresses data set. NE= 5 or 6 generally give good accuracy with reasonable space. However, increasing NE beyond 6 is not recommended as it incurs combinatorial increase in the space. NB offers a tunable alternative, and we used higher NB for the authors data set as strings are generally longer. While a single value of average relative error could be misleading, Figure 3.15 shows the distribution of errors with respect to \u03c4 . The x-axis divides the error range into ranges of 25% width, e.g., ranges [-100%,-75%), [-75%,-50%), etc. The y-axis shows the numbers of queries within the error ranges. For \u03c4 = 1, 2, 3, OptEQ(MM, 9, 5, 2) gives a more balanced distribution. In contrast, SEPIA suffers from rather serious under-estimation problem here. 3.5.5 DBLP Titles Compared with the other two data sets, the DBLP titles data set contains the longest strings. Out of the 600 randomly generated queries, only 31 have true frequencies exceeding 3. Among them 16, 8 and 7 have \u03c4 = 1, 2, 3 respectively. In particular, for \u03c4 = 3, 5 out of 7 queries have a length 15 or higher. To reduce the processing time for OptEQ, we employed sampling and limited the maximum number of groups and base strings in each group to 15 and 10 respectively for any query of length \u2265 10 and \u03c4 = 3. Figure 3.16 gives the average relative errors. The average relative error of SEPIA is about 27%, while occupying 13MB of memory. In contrast, OptEQ(MM, 12, 5, 1), occupying a space of 4.3MB, gives an average relative error of about 20%. If more space is allowed, OptEQ(MM, 15, 5, 1) with a space of 5.4MB, gives an average relative error of 12%. The average query time is 76 msec. Although our main focus lies in low edit distance thresholds(i.e. \u03c4 = 1, 2, 3), we briefly present results on higher thresholds, \u03c4= 4 and 5. To handle higher thresholds, sampling approach is essential. We randomly sample 10 base strings for each string hierarchy. We exclude too short sampled queries (length \u2264 5) as they are meaningless in the increased thresholds. The average relative error given by OptEQ(MM, 12, 5, 5) is around 60%. The error is increased significantly as all the base strings are not considered due to sampling. However, it is still better than the average relative error of SEPIA which was 150%. It occupied 1.5MB and the running time was 10 msec. SEPIA occupied 10MB and it took 30 msec to estimate. The maximum edit distance threshold we support is limited by the maximum number of wildcard in a q-gram, which in turn is bounded by NE . Based on the discussion in section 3.5.4 50 3.6. Conclusions regarding NE , we do not recommend OptEQ for the thresholds of 6 or higher. 3.5.6 Space vs Accuracy The three parametersNB, NE and PT provide a very tunable setting. As shown in Figure 3.16, an increase in NB leads to increase in space consumed but a decrease in relative error. The same can be said for NE as shown in Figure 3.13. However, incrementing NE by 1 requires a lot more space than incrementing NB by 1. In our experimentation, we found that there is a significant reduction in error when NE is raised from 4 to 5, whereas the reduction in error becomes much smaller when NE exceeds 7. When a large NE is used, one way to keep memory consumption in check is to apply a larger prune threshold PT . In general, an increase in PT leads to a reduction in space but an increase in relative error. Consider OptEQ(MM, 15, 5, 1) in Figure 3.16. The following table shows the impact of PT on accuracy and size. avg. rel. error size (MB) OptEQ(MM, 15, 5, 0) 11.8% 19.4 OptEQ(MM, 15, 5, 1) 12.0% 5.4 OptEQ(MM, 15, 5, 4) 14.7% 1.9 As compared with SEPIA which uses 13MB of memory and gives an average relative error of 27%, the last two variants shown in the above table are better alternatives. 3.5.7 Summary of Experiments We evaluated the proposed algorithm, OptEQ, using three real-world data sets: IMDB ac- tresses\u2019 last names, DBLP author names, and DBLP paper titles. The performance improve- ment of OptEQ over BasicEQ clearly showed that optimization techniques in Section 3.4 are very effective. In all the three data sets, OptEQ consistently showed relative errors less than 40% and did not exibit over- or underestimation tendency. As an example, using only about 17% of the original data size, OptEQ\u2019s relative error was only about 15% in the DBLP Ti- tles data set. We compared OptEQ with the prior art, SEPIA, and the experimental results showed that OptEQ delivered more accurate estimation with less space overhead. 3.6 Conclusions In this chapter, we develop the algorithm OptEQ for estimating selectivity of approximate string matching with edit distance. The proposed solution aims for low edit distance like 1,2 or 3. The low edit distance may not cover every single database applications, but we believe that a good solution for selectivity estimation for \u03c4 = 1, 2, 3 already has a lot to offer to many database applications, given the SIS observation. We propose extended q-grams with wildcard to efficient count variants of strings. We show that possible variants of a query string with an edit distance threshold can be modeled with a lattice and extended q-grams. We develop techniques for efficient counting of the variants. The proposed techniques serve as bases for Chapter 4 and Chapter 5. The main algorithm, 51 3.6. Conclusions OptEQ, further exploits several observations in the lattice for efficiency. For all the three benchmarks, OptEQ delivers more accurate selectivity estimations than SEPIA. OptEQ is capable of exploiting available disk space to give higher precision. In ongoing work, we explore further the relationship between disk space utilization and estimation accuracy given by OptEQ. We also plan to extend the current framework to deal with higher edit distance threshold. While this extension may not be too essential for database applications, the extension is essential for applications such as DNA sequence matching. 52 Chapter 4 Substring Selectivity Estimation In this chapter, we consider selectivity estimation of selection queries with \u2018substring matching\u2019 semantics in Section 1.4.2, which is the second problem on selection operators. Intuitively, we aim to estimate the number of strings in the database that contains a similar substring to the query string. Suppose that a user wants paper abstracts that mention \u2018Przymusinski\u2019 in a publication database. With approximate substring matching, she can find abstracts like \u2018The stable model semantics for disjunctive logic programs . . . proposed by Przymusinski . . . \u201d even if she does not recall the exact spelling of the name. It is substring matching because a database string can contain the query string. We propose two solutions based on the EQ-gram table presented in the previous chapter. We first propose a simple solution using an EQ-gram table. We then extend it with Min-Hash signatures for more accurate estimation. The proposed techniques in this chapter are based on our EDBT 2009 paper [90]. 4.1 Introduction In this chapter, we study the SUBSTR problem in Definition 2. In the SUBSTR problem, a query string, sq, and a similarity threshold, \u03c4 , select strings in the database that contain similar substrings to sq; the goal is to estimate the number of selected strings. As in the previous chapter, we first consider edit distance to measure similarity. We then extend the solution to other similarity measures in later sections. The matching semantics in the SUBSTR problem is \u2018substring matching.\u2019 That is, when we compare sq and a string s in the database, sq can match a substring in s and does not need to match entire string s. In the STR problem, when the query string sq =Michael and \u03c4 = 1, sq matches \u2018Michal\u2019 but does not match \u2018Michal Tompton\u2019. However, in the SUBSTR problem, sq matches \u2018Michal Tompton\u2019 as well since it contains \u2018Michal\u2019 that is similar to sq within 1 edit distance. See the following example. Example 1. Consider a DB = {\u2018kullback\u2019, \u2018bach\u2019, \u2018eisenbach\u2019, \u2018bacchus\u2019, \u2018baeza-yates\u2019}. Sup- pose the query sq \u2261\u2018bach\u2019 and \u03c4 = 1. For substring selectivity, all 5 elements in DB except \u2018baeza-yates\u2019 satisfy the edit distance threshold, i.e., |Ans(\u2018\u2018bach\u2019, 1)| = 4. For full string selectivity, the corresponding answer Ansf (\u2018bach\u2019, 1) is {\u2018bach\u2019}. The class of applications for substring selectivity estimation is broader than the class of applications for string selectivity estimation (e.g., \u201cname like %pr%sinski%\u201d). Note that substring matching is also a generalization of string matching. A standard technique for handling string matching with substring matching is to incorporate two special characters that are not in the alphabet to mark the start and end of a string, e.g., \u2018#\u2019 for start and \u2018$\u2032 53 4.1. Introduction for end. For instance, the string \u2018walnut croissant\u2019 is transformed into \u2018#walnut croissant$\u2019 and stored. When we want to perform string matching we only need to augment the start and end of a query with \u2018#\u2019 and \u2018$\u2019, then those strings that match the query as a whole are considered as a match. Several techniques [79, 89] were proposed to handle string selectivity estimation with edit distance. Direct application of those techniques to the substring problem is not an option since it will almost always under-estimate the true selectivity, which may change the ordering of predicates producing a bad query execution plan. Furthermore, it is not trivial to adapt those techniques to give estimation of substring selectivity with edit distance. For the substring selectivity estimation problem, the biggest challenge is the estimation of intersection sizes among correlated substrings. Previous studies on string selectivity estimation do not need to consider this complication. To illustrate, let us return to |Ansf (\u2018bach\u2019, 1)|. Estimation methods for string selectivity partition strings into groups (e.g., clusters [79], extended q-gram entries [89]). For |Ansf (\u2018bach\u2019, 1)|, these groups include \u2018back\u2019, \u2018bacc\u2019, etc. Note that a string cannot simultaneously be the string \u2018back\u2019 and the string \u2018bacc\u2019. This non-overlapping condition greatly simplifies counting for string selectivity estimation. For substring matching, however, a string contain substrings like \u2018kull\u2019, \u2018back\u2019 and many more substrings simultaneously, which are not necessarily similar (e.g., \u2018Solomon Kullback\u2019). In other words, the substring condition gives rise to too many possible cases to consider imposing a major challenge. To the best of our knowledge, this is the first study developing algorithms for approximate substring selectivity estimation. As a preview, we make the following contributions. \u2022 The first algorithm we propose is called MOF, which is based on the MOst Frequent minimal base substring. Substring frequencies are estimated from extended q-grams. \u2022 Recall that a key challenge for substring selectivity estimation is to estimate the overlaps among groups of substrings. MOF sidesteps this challenge by basing its estimation on a single substring. It is expected that the estimation may be improved by basing the estimation on multiple substrings. We propose in Section 4.4 an estimation algorithm called LBS, which uses signatures generated by set hashing techniques. However, stan- dard set hashing is not sufficient. We extend set hashing in two ways. The first one is the approximation of signatures for set intersections. The second one is the use of multiple minimum values to improve accuracy. Depending on the amount of available space, LBS can be tuned to use larger signatures for improved estimation quality. \u2022 The proposed algorithms can be extended to string similarity measures other than the edit distance. We show in Section 4.5 how to extend the algorithms to deal with SQL LIKE operator and Jaccard similarity. \u2022 We show in Section 4.6 a comprehensive set of experiments. We compare MOF and LBS with two baseline methods. One is based on random sampling and the other one is a generalization of SEPIA designed for strings [79]. We explore the trade-offs between estimation accuracy, size of the intermediate data structure, and the CPU time taken for the estimation. Our results show that for fast runtime and low intermediate 54 4.2. Preliminaries size, MOF is an attractive light-weight algorithm. However, if more space is available for the signatures, so that the overlaps can be more accurately estimated, LBS is the recommended choice. 4.2 Preliminaries 4.2.1 Extended Q-grams with Wildcards We use the extended q-gram table which is presented in Section 3.2. We define additional notations for this chapter. For edit distance, edit operations considered are deletion (D), insertion (I) and replacement (R). A query Q is a pair Q \u2261 (sq, \u03c4), where sq is the query string and \u03c4 is the edit distance threshold. For any substring b such that ed(b, sq) \u2264 \u03c4 and insertion\/replacement modeled by \u2018?\u2019 (e.g., \u2018nua\u2019, \u2018nub\u2019, etc. are modeled by \u2018nu?\u2019), b is called a base substring of Q. Base substrings represent possible forms of substrings satisfying the query. Then the set of tuple ids in DB that have a substring which can be converted to sq with at most \u03c4 edit operations is: Ans(sq, \u03c4) = \u22c3 b Gb, (4.1) for all base substrings b, and Gb denotes the set of tuple ids of string s in DB containing b as a substring. 9 For example, Ans(\u2018sylvie\u2019, 1) contains strings like \u2018sylvia carbonetto\u2019, or \u2018sylvester\u2019, but not \u2018cecilia van den berg\u2019. To compute |Ans(sq, \u03c4)|, the size of the answer set, all possible base substrings b are enumerated. Specifically, when the length of sq is l, the base substrings vary in length from (l \u2212 \u03c4) to (l + \u03c4). For each possible length, we consider all iDjIkR combinations, where iDjIkR denotes i deletion, j insertion and k replacement operations, with i+ j + k = \u03c4 and i, j, k \u2265 0. For example, the base substrings of Q \u2261 (van, 1) can be partitioned into 3 groups of length of 2, 3 and 4. Each group is from 1D, 1R, or 1I edit operation respectively. The group of 1I consists of ?van, v?an, va?n and van?. The group of 1R consists of va?, v?n, and ?an. The desired answer |Ans(van, 1)| is |Gva \u222aGan \u222aGvn \u222a . . . \u222aG?van \u222a . . . |. The above description considers all possible base strings and combinations for illustration purposes. In practice, particularly for larger edit distance thresholds \u03c4 and long query sub- strings, a sampling strategy can be applied. However, Equation (1) still requires the accurate estimation of the overlaps among the group Gb\u2019s. 4.2.2 Min-Hashing In this section, we introduce Min-Hashing [17, 34] which is a basis of the Set Hashing technique in the following section and will be used in Chapter 5 as well. Intuitively, Min-Hashing enables 9Because DB is a bag of strings, DB may contain duplicates of the same string s. We assume that each of those duplicates has its own distinct tuple id. This treatment is consistent with the studies in [26, 79, 89]. 55 4.2. Preliminaries succinct representation of sets preserving Jaccard similarity between two sets. Recall from Chapter 1 that Jaccard similarity between two sets is defined as the following: JS(A,B) = |A \u2229B| |A \u222aB| . (4.2) It is also called as resemblance. We use \u03b3 to denote the set resemblance JS(A,B), where sets are clear from the context. Min-wise independent permutation is a well-known Monte-Carlo technique that estimates set resemblance. Based on a probabilistic analysis, Cohen proposed unbiased estimators to estimate the size of a set by repeatedly assigning random ranks to the universe and keeping the minimum values from the ranks of a set [34]. Each assignment of random ranks to the universe is a random permutation. The minimum values from the permuted ranks of a set kept for each permutation is called the signature vector and can also be used to estimate the set resemblance [17, 34]. Figure 4.1(a) gives an example of two sets A = {t1, t3, t5} and B = {t4, t5}. The entire universe of tuple ids is U = {1, . . . , 5} . To make the example clearer, we use t1, . . . , t5 to denote tuple id 1, . . . , 5. Figure 4.1(b) shows four random permutations \u03c01, . . . , \u03c04. For each of these permutations, Figure 4.1(c) shows the permuted ranks of the elements of A and B. For instance, for set A, \u03c01 maps t1, t3, t5 to 1, 3, 4 respectively. The minimum value of the mapped three values for A is 1. Thus, under \u03c01, the signature value of A is 1. Similarly, the signature values of other permutations are computed. Finally, by doing an equality matching on each dimension of the two signatures in Figure 4.1(d), the set resemblance is estimated to be 1 out of 4. The true resemblance turns out to be exactly |{t5}||{t1,t3,t4,t5}| = 1 4 . Let us give the formal definitions below. Consider a set of random permutations \u03a0 = {\u03c01, . . . , \u03c0L} on a universe U \u2261 {1, . . . ,M} and a set A \u2282 U . Let min(\u03c0i(A)) denote min({\u03c0i(x)|x \u2208 A}). \u03a0 is called min-wise independent if for any subset A \u2282 U and any x \u2208 A, when \u03c0i is chosen at random in \u03a0, we have Pr(min(\u03c0i(A)) = \u03c0i(x)) = 1 |A| [16]. Then with respect to two sets A and B, if \u03a0 is min-wise independent, Pr(min(\u03c0i(A)) = min(\u03c0i(B))) = \u03b3 where \u03b3 is the resemblance defined in equation (2). In practice, since min-wise independent permutations are expensive to encode, hash func- tions that approximately preserve the min-wise independent property are used [16, 35]. We call such hash functions Min-Hash functions. To estimate \u03b3 (denoted as \u03b3\u0302), we use multiple Min-Hash functions and a Min-Hash signature is a vector of multiple Min-Hash values. The Min-Hash signature of set A is constructed as: sigA = [min(\u03c01(A)), . . . ,min(\u03c0L(A))] and similarly for sigB. The i th entry of vector sigA is denoted as sigA[i], i.e., min(\u03c0i(A)). By matching the signatures sigA and sigB per permutation, \u03b3 can be approximated as: \u03b3\u0302 = |{i | sigA[i] = sigB[i]}| L (4.3) The equations above generalize to set resemblance among multiple sets. Min-Hashing has widely been used in similarity related applications [17, 30, 34, 37, 91] since it enables a succinct representation of a set and preserves resemblance. In practice, L does not need to be big for \u03b3\u0302 to be a good estimate of \u03b3. In testing similarity among web 56 4.2. Preliminaries A t1 t2 t3 t4t5 B U 1 2 1 4 3 1 1 1 2 2 2 2 3 4 53 3 3 4 4 4 5 5 5 t1 t2 t3 t4 t5 (a ) S et A and B (b) P erm utat ions (c ) S ignature generat ion of s et A and B (d) R es em blanc e c om putat ion 1 2 4 3 1 1 2 2 4 5 3 4 { t4 t5 } 2 4 1 1 S et B s igBS et A 1 2 1 4 3 1 1 2 2 3 4 53 4 5 5 { t1 t3 t5 } 1 1 2 1 s igA s igA s igB 1 1 1 4 2 2 1 1 1 2 3 4 1 m atc h, = 1 4 Figure 4.1: Set Resemblance Example documents [17], 100 samples were considered to be good enough. Chen et al. used 50 for L to process boolean predicates [30]. 4.2.3 Set Hashing Chen et al. generalized the above idea to estimate the size of boolean queries on sets including intersection, union and negation [30]. The size of the union of m sets |A1 \u222a . . . \u222a Am| can be estimated as follows. Let A = A1 \u222a . . . \u222a Am and B = Aj for any Aj \u2208 {A1, . . . , Am}. By Equation (4.2), \u03b3 = |A\u2229Aj | |A\u222aAj | . But as A \u2229Aj = Aj and A \u222aAj = A, we get: |A| = |A1 \u222a \u00b7 \u00b7 \u00b7 \u222aAm| = |Aj | \u03b3 . (4.4) Aj in Equation (4.4) can be any Aj \u2208 {A1, . . . , Am}, but the one whose size is the biggest generally gives the best performance [30]. To estimate \u03b3, the signature of union, sigA, can be constructed with the individual signatures as follows: sigA[i] = min(sigA1 [i], \u00b7 \u00b7 \u00b7 , sigAm [i]) (4.5) Let us return to the example in Figure 4.1. Based on Figure 4.1(d) and Equation (4.5), the constructed signature sigA\u222aB is [1,1,1,1]. Now applying Equation (4.3) to estimate the resemblance between A\u222aB and A gives \u03b3\u0302 = 3\/4 ([1,1,1,1] vs. [1,1,2,1]). Finally, by Equation (4.4), the size of |A\u222aB| = |A|\u03b3\u0302 = 33\/4 = 4. This turns out to be exact, as A\u222aB = {t1, t3, t4, t5}. As will be shown later, applying the above set hashing equations is not sufficient for our task. We extend the above scheme in two key ways in Section 4. 57 4.3. Estimation without Signatures 4.3 Estimation without Signatures 4.3.1 MOF: The MOst Frequent Minimal Base String Method The first method we propose, called MOF, is based on extended q-grams. Recall from Equa- tion (4.1) and the corresponding discussion that Ans(Q) = \u22c3 bGb for all the base substrings b of Q. However, it is obvious that given two base substrings b1 and b2, it is Gb2 \u2286 Gb1 if b1 is a substring of b2 (e.g., b1 = va, b2 = va? in the earlier example). We define a base substring bi as minimal if there is not any other base substring bj with i 6= j that is substring of bi. Thus, Equation (4.1) can be simplified to: |Ans(sq, \u03c4)| = | \u222ab\u2208MB(sq ,\u03c4) Gb| (4.6) where MB(sq, \u03c4) is the set of all the minimal base substrings of sq within \u03c4 edit operations. We simply use MB when sq and \u03c4 are implied in the context. Example 2. Let us consider the example of Q \u2261 (boat, 2). Possible base substring length varies from 2 to 6, which correspond to the situations with 2 deletions and 2 insertions re- spectively. The following table enumerates all the possibilities for illustration purposes. Starting from the base substrings of length 2, we eliminate base substrings that contain another base substring. For instance, \u2018bo\u2019 is a substring of \u2018bo?\u2019, \u2018boa?\u2019, \u2018bo?a\u2019, and etc. After removing redundant base substrings, the set of remaining minimal base substrings is MB = {\u2018bo\u2019, \u2018ba\u2019, \u2018bt\u2019, \u2018oa\u2019, \u2018ot\u2019, \u2018at\u2019, \u2018b?a\u2019, \u2018b?t\u2019, \u2018b?a\u2019, \u2018o?t\u2019, \u2018b??t\u2019}. Thus, |Ans(boat, 2)| = |Gbo \u222aGba \u222aGbt \u222aGoa \u222aGot \u222aGat \u222aGb?a \u222aGb?t \u222aGb?a \u222aGo?t \u222aGb??t|. 2D bo ba bt oa ot at 1D1R bo? b?a ?oa (from boa) bo? b?t ?ot (from bot) bt? b?a ?ta (from bta) oa? o?t ?at (from oat) 1D1I boa? bo?a b?oa ?boa (from boa) bot? bo?t b?ot ?bot (from bot) bat? ba?t b?at ?bat (from bat) oat? oa?t o?at ?oat (from oat) 2R bo?? b?a? b??t ?oa? ?o?t ??at 1I1R boa?? bo?t? b?at? ?oat? (from boat?) boa?? bo??t b?a?t ?oa?t (from boa?t) \u00b7 \u00b7 \u00b7 bo?a? ?bo?t ?b?at ??oat (from ?boat) 2I boat?? boat?? boat?? boat?? (from boat??) \u00b7 \u00b7 \u00b7 ??boat ??boat ??boat ??boat (from ??boat) Algorithm 1 shows an outline to find all the minimal base substrings. The first for loop from line (2) to (8) generates all possible base substrings. In the most general case when \u2113 and \u03c4 are large, the loop may be computationally expensive. However, as motivated by the Short Identifying Substring (SIS) assumption in [26], \u03c4 \u2264 3 can find many database applications. 58 4.3. Estimation without Signatures For \u03c4 \u2264 3, the following table enumerates all the combinations with deletions, insertions and replacements (\u2113 being the length of the query substring). For example, for \u03c4 = 3, there are only two possibilities to obtain a substring of length (\u2113 \u2212 1), namely either by 2D1I or by 1D2R. Thus, even for \u03c4 = 3, there are only 10 combinations to be considered with a complexity of O(\u21133). \u2113-3 \u2113-2 \u2113-1 \u2113 \u2113+1 \u2113+2 \u2113+3 \u03c4 = 1 1D 1R 1I \u03c4 = 2 2D 1D1R 2R, 1D1I 1I1R 2I \u03c4 = 3 3D 2D1R 2D1I, 3R, 1D2I, 2I1R 3I 1D2R 1D1I1R 1I2R The for loops in the lines (9) to (14) find all the minimal base substrings. The loop exploits the simple fact that a string cannot be a substring of something shorter. Finally, the set MB of all the minimal base substrings is returned. For situations when \u2113 and \u03c4 are larger, it is too expensive to fully implement line (6), and a sampling strategy is applied. The effectiveness of the sampling is evaluated in Section 5. With the set MB computed, the MOF (\u201cMOst Frequent\u201d) estimation algorithm uses the following heuristic based on the most frequent minimal base substring bmax among all the base substrings in MB(Q): MOF (Q) = |Gbmax | \u03c1 (4.7) The parameter \u03c1 is called coverage. This simple heuristic is based on a generalization of the SIS assumption stating that: \u201ca query string s usually has a \u2018short\u2019 substring s\u2019 such that if an attribute value contains s\u2019, then the attribute value almost always contains s as well\u201d [26]. Our generalization states that a query substring s usually has an identifying minimal base substring s\u2032. 10 The requirement of almost always in the SIS assumption is more realistically relaxed to a fraction \u03c1 in our case; that is, a fraction \u03c1 of the strings in the Ans(sq, \u03c4) also contain the most frequent minimal base substring. As an example, |Ans(\u2018sylvia\u2019, 1)| is 538 in the DBLP author names data set in Section 4.6, and typical variations of the query \u2018sylvia\u2019 are \u2018silvia\u2019 and \u2018sylvia\u2019 occurring 202 and 100 times respectively. So the base string \u2018s?lvia\u2019 alone explains more than half of the answer set size. The validity of our assumption is extensively evaluated in Section 4.6 by MOF. In MOF, as shown in Equation (4.7), a single default value \u03c1 is used for simplicity. This default value can be obtained by sampling on the data set, which can be easily piggybacked when the extended N-gram table is being constructed. For a base substring b, if the extended N-gram table kept by the system contains an entry for b (e.g., when |b| \u2264 N), then the frequency |Gb| is immediately returned. Otherwise, |Gb| needs to be estimated using a substring selectivity estimation algorithm like MO [77]. 10Apart from the SIS generalization, the key difference between MOF and the CRT framework in [26] is that the former deals with edit distance. 59 4.3. Estimation without Signatures Algorithm 1 MinimalBaseSubstrings Input: query string sq, edit distance threshold \u03c4 Output: the set MB of minimal base substrings 1: C = \u03c6,MB = \u03c6 2: for all \u2113 from (length(sq)\u2212 \u03c4) to (length(sq) + \u03c4) { 3: Find all (i, j, k) s.t. i+ j + k = \u03c4 and length(sq)\u2212 i+ j = \u2113 4: for all c = (i, j, k) found in the above step { 5: C = C \u222a {c} 6: Bc = the set of all base substrings with iDjIkR operations 7: } \/\/ for all 8: } \/\/ for all 9: for all c = (i, j, k) \u2208 C, c\u2032 = (i\u2032, j\u2032, k\u2032) \u2208 C s.t. j\u2032 \u2212 i\u2032 > j \u2212 i{ 10: for all b \u2208 Bc and b\u2032 \u2208 Bc\u2032 { 11: if b is a substring of b\u2032 { 12: Bc\u2032 = Bc\u2032 \u2212 {b\u2032} } 13: } \/\/ for all 14: } \/\/ for all 15: for all c \u2208 C 16: MB =MB \u222aBc 17: return MB 4.3.2 Algorithms not Based on Extended Q-grams S-SEPIA: a Method based on Clustering We adapt SEPIA [79], which is proposed for the STR problem, to the SUBSTR problem by building clusters of substrings instead of strings. However, if we were to build clusters based on all the substrings contained in the database, it would be infeasible for large databases. Thus, we apply random sampling on substrings. Algorithm 2 shows a skeleton of S-SEPIA which is a simple adaptation of SEPIA to substrings. In the construction of clusters, the loop in lines (2) to (4) randomly extracts c \u2217 \u2113 substrings for each string where \u2113 is the length of the string. Line (4) runs the normal SEPIA construction procedure to build the clusters and the corresponding histograms. Another complication in adapting SEPIA to the substring problem arises from the count- ing semantics. As discussed in [77], there is the difference between presence counting and occurrence counting. If the tuple string is \u2018Vancouver Van Rental\u2019 and the query substring is \u2018Van\u2019, presence counting gives a value 1 to show that the substring is present in the tuple, whereas occurrence counting gives a value of 2 to indicate that the substring occurs twice in the tuple. For substring selectivity estimation, the intended semantics is presence counting, whereas the construction procedure of S-SEPIA essentially conducts occurrence counting. To address this issue, we adapt the error-correction phase in SEPIA as follows. In lines (6) and (7), queries are randomly sampled to build a table giving a correction factor be- tween presence and occurrence counting, according to query length, threshold, and frequency range. Then, during estimation time, line (2) of the Estimate procedure adjusts the estimated frequency based on this table. 60 4.4. Estimation with Set Hashing Signatures Algorithm 2 S-SEPIA Procedure Construct Input: DB Output: Clusters C, Global histogram PPD, Error correction module ECM 1: SDB = \u03c6 2: for all tuple t \u2208 DB { 3: Generate (c \u2217 length(t)) substrings from t; add to SDB 4: } \/\/ for all 5: Run SEPIA with SDB to construct C and PPD 6: Sample substring queries Q 7: Produce the error correction info ECM from Q using freqest from SDB and freqtrue from DB Procedure Estimate Input: Query string sq, Edit distance threshold \u03c4 Output: |Ans(sq, \u03c4)| 1: Estimate freqest with sq and \u03c4 using C and PPD 2: Calculate freqcorrected with sq, \u03c4 and freqest using ECM 3: return freqcorrected RS: a Method with No Space Overhead Note that MOF requires space overhead in the form of the extended N-gram table. S-SEPIA also incurs space overhead in the form of the histograms and other auxiliary information associated with the clusters. The algorithm called RS, which stands for \u201cRandom Sampling\u201d, represents another extreme. It relies on random sampling from DB at query time. As such, it does not create any intermediate \u201ccompile-time\u201d data structure and incurs no space overhead. Specifically, given a query substring sq, all it does is to randomly sample a fixed number of strings s from DB and checks the percentage of them such that ed(sq, b) \u2264 \u03c4 , where b is a substring of s. It is conceivable that RS may incur significant query time computation, particularly for larger edit distance threshold \u03c4 and length l. In the experimental results section later, we examine the trade-offs between query time computation, space overhead and estimation accuracy. 4.4 Estimation with Set Hashing Signatures 4.4.1 LBS: Lower Bound Estimation While MOF estimation is simple and efficient, a key weakness is that the estimation is based on a single minimal base substring which is the most frequent. In general, the estimation may be more accurate if many, if not all of, the minimal base substrings are used. However, if multiple minimal base substrings are used, we need to estimate the size of the union | \u222ab\u2208MB Gb| in 61 4.4. Estimation with Set Hashing Signatures sigA sigB 1 2 3 4 5 sigA sigA sigB 1 2 3 4 5 sigA H a sh v a lu e 1 3 (a) LB S es t im at ion of the 1 st and 3 rd s ignature v alues by 1 and 3 (b) LB S es t im at ion of the s ignature of A s igA s igB 1 1 1 4 2 2 1 1 1 2 3 4 2 4 2 1 By LBS Figure 4.2: An Illustration of LBS Equation (4.6). This can be done by applying Equation (4.4) to obtain LBS(Q) = | \u22c3 b\u2208MB(Q) Gb| \u2248 |Gbmax | \u03b3 (4.8) where bmax is the most frequent minimal base string in MB(Q). Note that |Gbmax | is exactly the one used in the numerator of the MOF estimation in Equation (4.7). The only difference is that in MOF, \u03c1 is a single default coverage computed by sampling for each data set. In contrast, the resemblance \u03b3 in the above equation is calculated by taking into account all the minimal base strings, making it more specific to the query. It is also possible that the resemblance \u03b3 is estimated to be zero for some extreme cases, in which case a default resemblance, like \u03c1, is used instead since we cannot divide by zero in Equation (4.8). To compute LBS(Q) with Equation (4.8), we need the values of |Gbmax | and \u03b3. As mentioned earlier, the former can be estimated using MO if it is not kept in the extended N-gram table. However, the difficulty here is to compute the approximation of \u03b3 by Equation (4.3) which requires the signatures to be compared for matching, i.e., we need sigb(\u2261 sigGb) for all b \u2208 MB to compute the approximation of \u03b3. But there may be base substrings that are too long to be kept in the N-gram table. For instance, suppose that a base substring b \u2261 \u2018database\u2019 and an extended N-gram table with N = 5 is maintained. Although Set Hashing technique [79] is able to estimate the size of intersection or union of strings when the query strings are not kept in the summary structure (PST or N-gram table), it is exponential in the number of strings whose frequency needs to be estimated. It is computationally manageable when the number of terms is expected to be small as in the boolean query problem, but the complexity will be unacceptable in the approximate substring problem where the number of possible forms of substring could be quite large. Our solution is to rely on the substrings of b stored as extended q-grams in the N-gram table. Specifically, by letting b1, . . . , bw be all the substrings of b of length N stored in 62 4.4. Estimation with Set Hashing Signatures the N-gram table with w = \u2113 \u2212 N + 1, we can approximate the signature sigb based on the individual signatures sigb1 , . . . , sigbw . For instance, we calculate the signature sigdatabase based on sigdatab, sigataba, sigtabas and sigabase. To illustrate our approach, let us consider an example with w = 2. Suppose that we have b \u2261 \u2018data\u2019, b1 \u2261 \u2018dat\u2019 and b2 \u2261 \u2018ata\u2019, and the tuples containing \u2018dat\u2019 are exactly {t1, t3, t5} as captured by set A in Figure 4.1. Similarly, suppose that the tuples containing \u2018ata\u2019 are exactly {t4, t5} as modeled by set B in Figure 4.1. We assume that the 4 random permutations \u03c01, \u03c02, \u03c03, \u03c04 in Figure 4.1 are still used. Now for the signatures, the permuted values of set A = {t1, t3, t5} under permutation \u03c01 are 1, 3, 4 as shown in Figure 4.1, which is presented as circles in the left diagram of Figure 4.2(a). However, because a signature only retains the minimum value for each permutation, only the value 1 is retained (shown as a solid circle, as opposed to the unfilled circles). The situation is similar for set B, as shown by the solid circle in the second column of the left diagram in Figure 4.2(a). Let us consider how sigA\u2229B can be estimated for \u03c01 using sigA and sigB only. Since each signature keeps the minimum value for each permutation, i.e. 1 for sigA and 2 for sigB, it is not possible to figure out the exact minimum value for the permutation of the intersection A\u2229B using sigA and sigB only. Instead, we try to infer, as tightly as possible, a lower bound of the minimum value for the permutation of the intersection. The value 1 is not possible for sigA\u2229B because if this were the case, the value for sigB should be 1 as well, instead of 2. On the other hand, 2 is still a possible value for sigA\u2229B because all we know from sigA is that the minimum value is 1. Thus, given just the two solid circles in the left diagram in Figure 4.2(a), the best inferred signature of sigA\u2229B we can get under permutation \u03c01 is 2. Actually, A \u2229B has only t5 which is mapped to 4. This is shown by the two unfilled circles in Figure 4.2(a), under the permutation \u03c01. It is easy to see that the inferred value 2 is a lower bound of the actual value. The right diagram in Figure 4.2(a) shows the signatures for permutation \u03c03 in Figure 4.1. A similar reasoning determines that the value 2 is the inferred signature value of sigA\u2229B under permutation \u03c03. This turns out to be the correct signature value because of the matched unfilled circle in the second column of the right diagram. Figure 4.2(b) shows the inferred sigA\u2229B, [2, 4, 2, 1], for all the four permutations that are computed by selecting the maximum value of the corresponding sigA and sigB values for each permutation. The true signature sigA\u2229B(= sig{5}) is actually [4, 5, 2, 1], as shown in Figure 4.1. As we mentioned previously, the inferred values are always lower bounds to the true values. This observation can be generalized to compute the intersection of w signatures for any permutation i, 1 \u2264 i \u2264 L: \u02c6sigb1\u2229...\u2229bw [i] = max(sigb1 [i], \u00b7 \u00b7 \u00b7 , sigbw [i]) (4.9) To verify, suppose that there is a sigbi [k] for 1 \u2264 k \u2264 L such that sigbi [k] < sigbj [k]. Then the value sigbi [k] cannot be the true signature value of sigb1\u2229...\u2229bw [k]. Otherwise, the signature value sigbj [k] must be the same as sigbi [k]. By this argument, Equation (4.9) forms a lower bound estimation for sigb1\u2229...\u2229bw . Algorithm 3 sketches the outline of the LBS (\u201cLower Bound eStimation\u201d) estimation algorithm. It first computes all the minimal base substrings. For each such substring, if it is 63 4.4. Estimation with Set Hashing Signatures Algorithm 3 LBS Estimation Input: query sq, edit distance threshold \u03c4 , maximum extended q-gram length N , default resemblance \u03c1 Output: |Ans(sq, \u03c4)| 1: MB =MinimalBaseSubstrings(sq, \u03c4) (Algo. 1) 2: freqmax = 0, sigmax = null, sigunion = null 3: for all b \u2208MB { 4: if length(b) > N { 5: Decompose b into a set of substrings sb,i of length N 6: Compute sigb by applying Equation (4.9) with sigsb,i 7: Calculate freqb (i.e. |Gb|) using MO 8: } 9: if freqb > freqmax { 10: freqmax = freqb, sigmax = sigb 11: } 12: sigunion = Union of sigunion and sigb as in Eqn. (4.5) 13: } \/\/ for all 14: Compute \u03b3\u0302 with sigmax and sigunion as in Eqn. (4.3) 15: if \u03b3\u0302 = 0 { \u03b3\u0302 = \u03c1 } 16: return (freqmax\/\u03b3\u0302) as in Equation (4.8) too long to have kept in the extended N-gram table, lines (4) to (8) estimate its frequency and signature. All these signatures are combined together in line (12) for the eventual computation of the resemblance \u03b3\u0302 in line (14). Finally, in line (16), the estimate is returned. 4.4.2 Improving LBS with Extra Minima Recall from Equation (4.9) that the estimated signature value is a lower bound to the true sig- nature value. One possibility to improve the lower bound is to keep extra minimum permuted values such as the second minimum, the third minimum, etc. Certainly, each additional mini- mum value kept increases the size of the signature linearly. Below we describe the mechanics. So far we have used the notation sigA to denote the signature of set A under L permuta- tions. To introduce additional minimum values kept in the signature, we use sigA,1, sigA,2, . . . to denote the first minimum, the second minimum and so on in the signatures. (In other words, sigA used previously is now equivalent to sigA,1.) Figure 4.3 gives an illustration of how to compute the signature with keeping the second minimum value for an intersection of two sets, i.e., sigA\u2229B,1 and sigA\u2229B,2 from sigA,1, sigA,2, sigB,1 and sigB,2. This is a continuation of the situation shown in Figure 4.2. What is different in Figure 4.3 is that there are now two solid circles for each set, corresponding to the first and second minima. Recall from Figure 4.2(a) that with only the first minimum kept, \u02c6sigA\u2229B,1[1] = max(sigA,1[1], sigB,1[1]) = 2. But with two minima kept, as shown in Figure 4.3, it is clear that no element in A\u2229B can have a hash value of 2 since sigA,1[1] < 2 < sigA,2[1]. If there had been an x \u2208 A such that \u03c01(x) = 2, then we would have chosen 2 as sigA,2[1] not 3. Similarly, because sigB,1[1] < 3 < sigB,2[1], no element in A\u2229B can have a hash value of 3. Thus, we can infer sigA\u2229B,1[1] = 4, which turns out to be the correct value in this example. As there is no additional minimum values kept in 64 4.4. Estimation with Set Hashing Signatures (b ) LB S es t im at ion w ith tw o m inim a By LBS 1 2 3 4 s igB (2 ,4 ) (4,5) (1,2) (1 ,3 ) s igA (1 ,3 ) (1,3) (2,4) (1 ,2 ) (4 ,4 ) (4,4) (2,4) (1 ,3 ) (1 st,2 n d ) sigA sigB 1 2 3 4 5 sigA sigB 1 2 3 4 5 sigA H a sh v a lu e 1 3 (a) LB S es t im at ion of the 1 st and 3 rd s ignature v alues by 1 and 3 sigAsigA Figure 4.3: LBS Using the First and Second Minima sigA[1] and sigB[1], we cannot infer any better lower bound of the second minimum value of sigA\u2229B[1] and thus the second minimum value for A\u2229B is set to \u02c6sigA\u2229B,2[1] = \u02c6sigA\u2229B,1[1] = 4. This is summarized in Figure 4.3(b) under the column for the permutation \u03c01, i.e., (1,3) and (2,4) lead to (4,4). The right diagram in Figure 4.3(a) shows the case for permutation \u03c03. Figure 4.3(b) also shows the results for permutations \u03c02 and \u03c04. The table in Figure 4.4 enumerates all the possible combinations with the first and second minima kept. To save space, we do not present the general formula which can handle the case when kmin \u2265 2 minima are kept. Hereafter, we use kmin to denote the number of minima kept in the signature. In the next section, we will evaluate the effectiveness of LBS with kmin varying from 1 to 3. Condition Estimation sigA,1[i] sigA,2[i] sigA\u2229B,1[i] sigA\u2229B,2[i] = sigB,1[i]= sigB,2[i] sigA,1[i] sigA,2[i] 6= sigB,1[i]= sigB,2[i] sigA,2[i] sigA,2[i] = sigB,1[i] 6= sigB,2[i] sigA,1[i] max(sigA,2[i], sigB,2[i]) \u2265 sigB,2[i] sigA,1[i] sigA,2[i] \u2264 sigB,1[i] sigB,1[i] sigB,2[i] Otherwise max(sigA,2[i],max(sigA,2[i], sigB,2[i]) sigB,2[i]) Figure 4.4: Estimation of Signatures While the discussion so far is based on the intersection of two sets A and B, the compu- tation can be modeled as a binary operator. When more than two sets are intersected, this 65 4.5. Extensions to Other Similarity Measures binary operator can be applied successively. Note that the LBS estimation algorithm shown earlier does not change, except for line (6). This line is now generalized to compute the first and second minima of the signature. However, only the first minimum values are used to estimate frequency and resemblance in subsequent lines. For our example, if we focus our attention on \u02c6sigA\u2229B,1 for all the four permutations, the signature becomes [4,4,2,1], which is a closer match to the true signature of [4,5,2,1] than [2,4,2,1] in Figure 4.2(b) with only the first minimum. This shows that extra minima may help to better approximate signatures for intersections. 4.5 Extensions to Other Similarity Measures In this section, we discuss extensions to other similarity measures. We showcase two exten- sions: the LIKE clause and Jaccard similarity. 4.5.1 SQL LIKE Clauses We will consider two major constructs of LIKE: \u2018%\u2019 and \u2018 \u2019. \u2018%\u2019 character matches any substring and \u2018 \u2019 character matches any single character. Suppose a LIKE pattern %s1%...%sm%. For example, the predicate \u201cname like %sil- via%carbonetto%\u201d selects all the names that contain silvia followed by carbonetto with any number of characters in between. Assume for now that each si (1 \u2264 i \u2264 m) is a plain substring without any special character like \u2018 \u2019. Any string that satisfies the LIKE condition must have all of si\u2019s, 1 \u2264 i \u2264 m as its sub- string. Recall that Gb denotes the set of tuple ids in the DB that have b as a substring. Then the size of the set of tuple ids in DB that match the LIKE condition slike \u2261 %s1%...%sm% can be estimated as: | \u02c6Ans(slike)| = | \u22c2 1\u2264i\u2264m Gsi |. (4.10) This is an upper bound of the true selectivity but a tighter bound than min|Gsi | proposed in [26]. Note that LBS utilizes signature and it can handle intersection as well as union. We make use of the next formula for intersection size estimation [79]. |Gs1 \u2229 \u00b7 \u00b7 \u00b7 \u2229Gsm | = \u03b3m \u00b7 |Gs1 \u222a \u00b7 \u00b7 \u00b7 \u222aGsm | \u2248 \u03b3\u0302m \u00b7 \u02c6|G|, (4.11) where \u03b3m is the resemblance of Gs1 , . . . , Gsm which can be calculated by Equation (4.3) extended to m sets. \u02c6|G| is the estimated union size and it is actually the estimation of LBS, Equation (4.8). Thus our estimation of Equation (4.10) is the output of LBS multiplied by \u03b3\u0302m. We only highlight key modifications due to space restriction. 1. It generates base substrings for each si setting \u03c4 = 0 in line (2) to (8) of Algorithm 1. (i.e., each si becomes one base substring.) 2. It returns the value in line (16) of Algorithm 3 multiplied by \u03b3m. 66 4.5. Extensions to Other Similarity Measures If si contains \u2018 \u2019, which matches any single character, we only need to substitute \u2018 \u2019 with our wildcard \u2018?\u2019 when generating base substrings. One interesting observation is that \u03b3m can be quite small in Equation (4.11). To estimate \u03b3m in the style of Equation (4.3), we would need a larger L, the number of random permuta- tions in set hashing, for small \u03b3m. Note that small L is enough in Equation (4.4). \u03b3 = |Aj | |A| is generally not small since |Aj |, the frequency of the most frequent base substring, is not a small fraction of |A| from the generalized SIS assumption. However, in Equation (4.11), we cannot make the same assumption on the relative size of |Gs1\u2229\u00b7 \u00b7 \u00b7\u2229Gsm | and |Gs1\u222a\u00b7 \u00b7 \u00b7\u222aGsm |. For ex- ample, in the query %silvia%carbonetto%, freq(silvia) may turn out to be very high whereas freq(carbonetto) can be relatively low. If freq(silvia) = 10, 000 and freq(carbonetto) = 10, \u03b3 = |Gsilvia\u2229Gcarbonetto||Gsilvia\u222aGcarbonetto| \u2264 |Gcarbonetto| |Gsilvia| = 1010,000 and L should be at least 1,000 to express the small \u03b3. Let fmin = min|Gsi | and fmax = max|Gsi |. Whenever \u02c6|G|\/fmin > L or \u03b3\u0302m = 0, we know that our estimation is likely to be inaccurate. Thus, before multiplying the output of LBS and \u03b3\u0302m we check for the two conditions. If one of them is true, then \u03b3\u0302m is set to fmin\/fmax. Experimental results on LIKE predicates in Section 6 reflect this heuristic. 4.5.2 Jaccard Coefficient The Jaccard similarity [140] between two strings a and b is defined as: JS(a, b) = JS(A,B) = |A \u2229B| |A \u222aB| , where A and B are sets of q-grams of a and b respectively. For instance, when q = 3, JS(\u2018tyrannosaurus\u2019, \u2018allosaurus\u2019) = JS({ tyr, yra, ran, ann, nno, nos, osa, sau, aur, uru, rus }, { all, llo, osa, sau, aur, uru, rus }) = 513 . Our extension starts from the intuition that if two sets are similar, their sizes cannot be too different. If JS(a, b) = \u03b3, then \u03b3 \u00b7 |A| \u2264 |B| \u2264 1\/\u03b3 \u00b7 |A| [8]. Substituting |A| = length(a)\u2212 q + 1 and |B| = length(b)\u2212 q + 1 into the above inequality gives us \u2308\u03b3 \u00b7 (length(a)\u2212 q + 1)\u2309 \u2264 length(b)\u2212 q + 1 \u2264 \u230a1\/\u03b3 \u00b7 (length(a)\u2212 q + 1)\u230b Using this property, given a query string sq and a Jaccard similarity threshold \u03b3, we can derive conditions on the length of strings that satisfy the similarity condition. We use this minimum and maximum string length in line (2) of Algorithm 1 and generate base substrings in the same way. However, not all the base substrings generated such have JS \u2265 \u03b3, so we filter base substrings treating the wildcard as a separate character. Before line (12) of Algorithm 3, we check every base substring b and see if JS(sq, b) \u2265 \u03b3. If it is smaller than \u03b3, we discard the base substring. So when we compute the union size, we only consider those base substrings that are guaranteed to have JS \u2265 \u03b3. 67 4.6. Empirical Evaluation 0 10 20 30 40 50 60 70 80 90 RS(0.1%)RS(0.5%)S-SEPIA MOF(4) LBS(4,1) MOF(5) LBS(5,1) MOF(6) LBS(5,2) LBS(6,1) R el at iv e Er ro r ( %) 0.1 1 10 100 RS(0.1%)RS(0.5%)S-SEPIA MOF(4) LBS(4,1) MOF(5) LBS(5,1) MOF(6) LBS(5,2) LBS(6,1) Sp ac e O ve rh ea d (M B) 1 10 100 1000 RS(0.1%)RS(0.5%)S-SEPIA MOF(4) LBS(4,1) MOF(5) LBS(5,1) MOF(6) LBS(5,2)LBS(6,1) CP U Ti m e (m se c) (a) Average Relative Error (b) Space Overhead (c) CPU Query Time Figure 4.5: Short Query Set on DBLP Authors 4.6 Empirical Evaluation 4.6.1 Experimental Setup Data sets: We perform a series of experiments using three benchmarks: DBLP author names and titles and IMDB movie Keywords data. There are 699,199 full names in the DBLP authors data set. The average and maximum length are 14.1 and 38 respectively. There are 305,364 titles in the DBLP titles data set. The average and maximum length are 58.6 and 100 respectively. Finally, there are 100,000 keywords in the IMDB Keywords data set, with the average and maximum length being 10.3 and 62. For each data set, we generate random queries Q \u2261 (sq, \u03c4). These queries are divided into two overlapping query sets: \u2022 The short query set consists of query string sq which is a substring of a random word of length 5 to 12 in any tuple. When the word length is 7 or less, we use the whole word. There are 200 queries in this set. The edit distance threshold \u03c4 is set to 25% of the query string length (i.e., \u03c4 \u2264 3). As motivated by the Short Identifying Substring (SIS) assumption in [26], \u03c4 \u2264 3 can find many database applications. The average selectivity is 1.03% for the Keyword data set and 0.55% for the DBLP authors data set. \u2022 The long query set consists of query string sq which is a random word of length 10 to 20 in any tuple. The long set is the most meaningful for the DBLP titles data set. There are 100 queries in this set. The edit distance threshold \u03c4 is again set to 25% of the query string length (i.e., 3 \u2264 \u03c4 \u2264 5). The average selectivity is 3.17%. \u2022 The negative query set consists of queries whose true frequency is 0. We randomly choose a word in a tuple and replace up to 3 random positions with random characters. Out of 200 chosen queries, 52 have true frequency of 0. Notice that there might be tuples that match the newly formed query by chance. This type of query is important especially given the issue of unclean data [87]. If a query optimizer can accurately identify true negative predicates or the estimated frequency is fairly accurate (i.e., the estimation is close to zero), the predicate will remain the most selective condition for query processing. Evaluation metric: To evaluate the accuracy of an estimation method we rely on three different metrics. The first metric we employ is relative error which is defined as |fest \u2212 68 4.6. Empirical Evaluation ftrue|\/ftrue, where ftrue is the true frequency of the query and fest is the estimated frequency. To prevent the accuracy from being distorted by queries with small true frequencies, we exclude queries whose true frequency is less than or equal to 10. For such small queries, the second metric, absolute error |fest \u2212 ftrue| is employed. It is also used to report errors of negative queries to avoid division by 0. The third metric we apply is the relative error distribution. We show the distribution by providing a histogram of the relative errors, i.e., [-100%,-75%), [-75%,-50%), etc. Estimation methods implemented: MOF is parameterized by the extended N-gram table, where N was varied from 4 to 6. As discussed in Section 3.1, the default coverage \u03c1 was acquired by sampling. The following table shows the average value and the standard deviation of \u03c1 using the DBLP Authors data set. The table shows that the average \u03c1 is rather stable with respect to the sample size. Sample Size 10 20 50 100 Average \u03c1 0.6453 0.6445 0.6523 0.6475 Standard deviation 0.081 0.071 0.034 0.000 Like MOF, LBS is parameterized by N . It is also parameterized by kmin, which controls the number of minimum values for a signature. It was varied from 1 to 3. Thus, the results of LBS are denoted by LBS(N ,kmin). Strictly speaking, MOF and LBS are tunable by two other parameters PT and L, where PT determines the minimum frequency for a q-gram to be kept in the N-gram table and L controls the number of permutations used, i.e., from \u03c01 to \u03c0L. For results reported here, we set PT = 20 and L = 10, unless specified. Finally, in LBS, the default value \u03c1 is used when the estimated resemblance by signature is \u2264 0.2 and 10 most frequent base substrings are used in line (12) of Algorithm 3. We implemented our set hashing based techniques in Java 1.5, and a hash space of 215 was used. S-SEPIA was implemented in C++ by modifying the SEPIA code downloaded from [138]. We used 2,000 clusters and the CLOSED RAND [79] method to populate the histograms. To limit the building time to around 48 hours, we restricted the maximum number of sampled substrings per tuple to be 10, and set the sampling ratio according to the data sets. The space consumption was measured by the size of the data structure written on disk. Finally, RS was also implemented in Java 1.5. Because RS requires sampling from the database DB, the I\/O cost may vary depending on the buffering policy. To simplify query time comparisons, we only considered the CPU cost of RS. In other words, we under-estimated the true cost of running RS in practice; it was sufficient for the eventual conclusions. All experiments were conducted on P4 3GHz machines with 2 GB memory running GNU\/Linux with kernel 2.6. 4.6.2 Short Query Set: Estimation Accuracy vs Space Overhead vs Query Time We begin with the short query set, i.e. \u03c4 \u2264 3, for the DBLP author data set. Figure 4.5 shows the average relative error, and the corresponding space overhead and query time in milliseconds. The latter two graphs are drawn in log scale. 69 4.6. Empirical Evaluation 0 10 20 30 40 50 60 70 80 90 RS(0.1%)RS(0.5%)S-SEPIA MOF(4) LBS(4,1) MOF(5) LBS(5,1) MOF(6) LBS(5,2) LBS(6,1) R el at iv e Er ro r ( %) 0.1 1 10 100 1000 RS(0.1%)RS(0.5%)S-SEPIA MOF(4) LBS(4,1) MOF(5) LBS(5,1) MOF(6) LBS(5,2)LBS(6,1) Sp ac e O ve rh ea d (M B) 1 10 100 1000 RS(0.1%)RS(0.5%)S-SEPIA MOF(4) LBS(4,1) MOF(5) LBS(5,1) MOF(6) LBS(5,2)LBS(6,1) CP U Ti m e (m se c) (a) Average Relative Error (b) Space Overhead (c) CPU Query-Time Figure 4.6: Short Query Set on DBLP Titles 0 10 20 30 40 50 60 70 -100 -75 -50 -25 0 25 50 75 100 More N um be r o f E st im at io ns Relative Error Buckets (%) 0 10 20 30 40 50 60 70 -100 -75 -50 -25 0 25 50 75 100 More N um be r o f E st im at io ns Relative Error Buckets (%) (a) S-SEPIA (d) LBS(5,2) Figure 4.7: Error Distributions on DBLP Authors MOF vs S-SEPIA: Let us first focus on the comparison between MOF and S-SEPIA. S- SEPIA uses a sampling ratio of 0.25%. For DBLP authors, S-SEPIA gives an average relative error of 64% and uses close to 100 MB of memory, whereas MOF(4) gives a better average error of 53% but using only 0.5 MB! As N increases, MOF(5) and MOF(6) give significantly better relative average error. Yet the amount of space used as shown in Figure 4.5(b) is still significantly smaller than that used by S-SEPIA. Recall that S-SEPIA uses the parameter c to control the number c \u2217 \u2113 substrings of s to be used for clustering. The results reported in the figures so far are based on c = 1. We suppress the detailed results here, but point out that increasing c beyond 1 does not give clear empirical performance benefit. In terms of runtime, it takes around 30 and 120 minutes to build the extended 5-gram and 6-gram tables. But the building time for S-SEPIA is around 35 hours. For query estimation, as shown in Figure 4.5(c), the processing time of MOF is around 10 milliseconds. S-SEPIA\u2019s runtime is around 30 milliseconds. In sum, MOF outperforms S-SEPIA in providing higher average estimation accuracy, lower building time and less space overhead. MOF vs RS: For method RS, the estimation accuracy and CPU time required are directly proportional to the amount of sampling done. We show in Figure 4.5 two settings of RS: with 0.1% or 0.5% of the whole database sampled. For estimation accuracy, RS(0.5%) gives an average relative error comparable to MOF(5) and MOF(6). However, all the MOF variants are almost two orders of magnitude faster. In practice, RS may take even longer if I\/O cost is incurred. The faster version RS(0.1%) gives significantly higher average relative error. Thus, with a very modest space overhead, MOF dominates RS in providing either superior query time performance or higher estimation accuracy. A variant of RS is to keep a sampled database around for query time. The hope is that the 70 4.6. Empirical Evaluation space overhead would significantly reduce query time. Unfortunately, the sampled database only reduces the time for sampling, not the time to check the edit distance threshold for all the substrings. The latter by far dominates the former. MOF vs LBS: Next let us compare MOF with LBS on the trade-off between accuracy and space overhead. (The query time of the two algorithms are almost identical.) The ordering in terms of descending average relative error is: MOF(4) > LBS(4,1) > MOF(6) \u2248 MOF(5) > LBS(5,1) > LBS(5,2) > LBS(6,1). The corresponding space overhead ordering is almost the reverse. This exactly shows how LBS and MOF can leverage extra space to give lower error. Specifically, the difference in size between the pair MOF(N) and LBS(N ,1) is due to the use of signatures by LBS. To formally test whether the differences observed are statistically significant, we use the standard 2-tail Student\u2019s t-test to compute a p-value, i.e., the probability of a chance observation. The difference of LBS over MOF is well below 0.01 and is confirmed to be statistically significant. Moreover, even though there does not appear to be a big difference in average relative error between LBS(5,1) and LBS(5,2), the latter\u2019s superiority is statistically significant with a p-value below 0.01. Relative Error Distributions: As an explanation to the average relative error results shown in Figure 4.5, Figure 4.7 shows the error distributions for DBLP authors. For space reason, only the distribution of S-SEPIA and LBS(5,2) is shown. The downfall of S-SEPIA can be summarized by the high number of queries that are in the [-100%,-50%] range (i.e., under- estimation) and those in the [100%,\u221e) bucket (i.e., over-estimation). In contrast, LBS(5,2), perform significantly better in those situations. Small and Negative Query Sets: The table below summarizes the average absolute errors on the small and negative query sets. There are 4 and 8 queries whose true frequencies are less than or equal to 20 or 50 respectively. ftrue \u2264 20 ftrue \u2264 50 Negative RS(0.1%) 15 22 0 RS(0.5%) 15 44 0 S-SEPIA 26 45 16 LBS(4,1) 13 13 3 LBS(5,1) 13 13 1 MOF(6) 10 17 0 LBS(5,2) 12 15 1 LBS(6,1) 13 13 0 For the small query sets, MOF and LBS are superior to RS and S-SEPIA. For the negative query set, we can observe clear benefit from increasing N . When N = 6, both MOF and LBS exactly estimate the frequency of negative queries as zero. For other settings of LBS, even if the estimated frequencies are not exactly zero (e.g., 1 or 3), the frequencies are sufficiently accurate that it is likely that the predicate will be chosen as the most selective condition. In contrast, for S-SEPIA, because the estimated frequency is inaccurate (e.g., 16), there is a higher chance that incorrectly, another predicate will be selected as the most selective condition, resulting in a more expensive query plan. 4.6.3 Query Sets on DBLP Titles Figure 4.6 shows the average relative error, the space overhead and CPU query time in log scale for the short query set on the DBLP titles data set. In the context of the earlier 71 4.6. Empirical Evaluation 0 10 20 30 40 50 60 70 80 90 RS(0.1%) RS(0.5%) MOF(4) LBS(4,1) MOF(5) LBS(5,1) MOF(6) LBS(5,2) LBS(6,1) R el at iv e Er ro r ( %) (a) Average Relative Error Figure 4.8: Long Query Sets on DBLP Titles 0 20 40 60 80 100 120 140 160 RS(0.1%) RS(0.5%) LBS(4,1) LBS(5,1) LBS(5,2) LBS(6,1) R el at iv e Er ro r ( %) 0 50 100 150 200 RS(0.1%)RS(0.5%)S-SEPIA MOF(4) LBS(4,1) MOF(5) LBS(5,1) MOF(6) LBS(5,2) LBS(6,1) R el at iv e Er ro r ( %) Jsim = 0.6 Jsim = 0.7 Jsim = 0.8 Jsim = 0.9 (a) SQL LIKE (b) Jaccard Similarity Figure 4.9: Other Similarity Measures 20 25 30 35 40 45 50 55 321 R e la tiv e E rr o r (% ) kmin N = 4 N = 5 0.1 1 10 321 S pa ce O ve rh ea d (M B) kmin N = 4 N = 5 (a) Relative Error by kmin (b) Space Overhead by kmin 0 10 20 30 40 50 0 2 4 6 8 10 12 14 16 18 20 R e la tiv e E rr o r (% ) PT (Prune Threshold) 0.1 1 10 100 0 2 4 6 8 10 12 14 16 18 20 S pa ce O ve rh ea d (M B) PT (Prune Threshold) (c) Relative Error by PT (d) Space Overhead by PT Figure 4.10: Impact of kmin and PT on IMDB Keywords discussion on Figure 4.5, the key highlights for the DBLP title data set are as follow. First, RS(0.5%) gives better average relative error in Figure 4.6(a) than in Figure 4.5(a). However, the conclusion remains the same in that MOF and LBS are almost two orders of magnitude faster. Second, S-SEPIA is still dominated by MOF and LBS in both estimation accuracy and space overhead. Finally MOF(5) is dominated by MOF(6), LBS(5,1), LBS(5,2) and LBS(6,1) The results reported so far are based on the short query set with \u03c4 \u2264 3. Figure 4.8 shows the average relative error on the long query set on DBLP Titles with 3 \u2264 \u03c4 \u2264 5. The results on S-SEPIA are not included as it takes too long to build even with a very low sampling ratio. In long queries with higher edit thresholds, it is not practical for MOF and LBS to enumerate all possible base substrings. One way to cap the computational cost is to generate only up to a specific number of base substrings. In other words, we set a limit for |Bc| in line (6) of Algorithm 1 by sampling. We randomly generate up to 200 base substrings, and the results 72 4.6. Empirical Evaluation are shown in Figure 4.8. In terms of the average relative error comparisons amongst RS, MOF and LBS, all the previous observations on the short query sets remain valid here. As for runtime, for MOF and LBS, the query time increases from an average 20 milliseconds for the short query set to an average 120 milliseconds for the long query set. The RS method scales up poorly with respect to \u03c4 as its query time is well over 2000 milliseconds. In sum, both MOF and LBS are capable of handling long queries and larger \u03c4 thresholds. The space overhead graph is not included here. With a larger \u03c4 , additional q-grams are needed to handle the larger number of wildcards (e.g., q-grams with 4 or 5 wildcards for our long query set). Compared with the space overhead shown in Figure 4.6(b), the additional space required turns out to be rather minimal (i.e., between 0.1MB to 0.5MB). 4.6.4 Other Similarity Measures For the LIKE predicate, we consider two types of conditions, %s% and %s1%s2% as is typical in TPC-H benchmark. We randomly select one or two words of length between 5 and 12 and introduced 0 to 2 \u2018 \u2019 in each word. Figure 4.9(a) gives the average relative errors on LIKE predicate. MOF and S-SEPIA are not present because MOF does not have signature which is necessary for Equation (4.11) and S-SEPIA does not support LIKE predicate. We observe that LBS outperforms RS by a large margin. Even with 0.5% of sampling ration, RS\u2019s average relative error is greater than 100% while LBS(5,1) is 56%. The effect of inceasing N is also clear. In LBS(6,1), the average relative error is as low as 35%. For Jaccard similarity, we randomly select a word for similarity threshold Jsim of 0.6, 0.7, 0.8 and 0.9. Figure 4.9(b) plots the average relative error on Jaccard similarity. As in edit distance or LIKE cases, LBS consistently outperforms S-SEPIA, MOF and RS. 4.6.5 Impact of Parameters: kmin, PT In Figure 4.5(a), there is the comparison between LBS(5,1) and LBS(5,2) using the DBLP Authors data set. This suggests that as kmin, the number of minima kept, increases from 1 to 2, there is a reduction in average relative error by using additional space. Figure 4.10(a) and (b) analyze the impact of kmin in greater details. Specifically, the IMDB Keywords data set is used with N = 4 or 5, and PT = 10, kmin is varied from 1 to 3. When an extended 4-gram table is used (i.e., N = 4), keeping the second minimum reduces the error by 14% relative to the first minimum; keeping the second and the third minima reduces the average relative error by 20%. However, this reduction is less in the 5-gram case. In general, when N is small, having kmin = 2 helps. According to Figure 4.10(b), it is important to note that the additional space needed by incrementing kmin is less than the extra space required by incrementing N . For instance, the space consumption of LBS(4,2) is less than the space consumption of LBS(5,1). Figure 4.10(c) and (d) show the impact of changing the pruning threshold PT based on the keywords data set and LBS(5,1). In Figure 4.10(d), we note a sharp drop in the space overhead, especially in the low prune threshold. This is not so surprising considering that many real world text data follow Zipf\u2019s law. The dropping ratio is bigger at higher N . 73 4.6. Empirical Evaluation 0 10 20 30 40 50 60 70 80 90 Title50 Title100 Title300 R el at iv e Er ro r ( %) Data set (Titles) LBS (4,1) LBS (5,1) LBS (6,1) Figure 4.11: Impact of Data Set Size on Error Figure 4.10(c) shows that LBS experiences only small increase in error by increasing the prune threshold. This is because the true frequency is most likely affected by a small number of base substrings whose frequency is relatively high. 4.6.6 Impact of Data Set Size Figure 4.11 compares the average relative errors of N-gram tables for LBS(4,1), LBS(5,1), and LBS(6,1) varying the data set size. The Title300 data set is the full Titles data set used throughout the experiments and we randomly select 50,000 and 100,000 titles for the Title50 and Title100 data set respectively. We can observe that average relative error does not change much as the data set increases in size. 4.6.7 Recipe: Balancing Space vs. Accuracy MOF and LBS provide a very tunable setting depending on the space available and CPU time expectations. The table below offers a \u201crecipe\u201d for choosing the method and the parameters. Available Space Suggested Method very low (< 5%) MOF(4) low (< 30%) MOF(5) medium (< 70%) LBS(5,1) abundant (< 120%) LBS(5,2) non-issue (< 400%) LBS(6,1) When we have very limited amount of space, say 1% \u223c 5% of the original data size, MOF(4) is the recommended choice. If CPU time is not a serious concern, MOF(5) is a good choice. If accuracy is a primary concern, the LBS estimation algorithm is recommended, par- ticularly LBS(5,1) and LBS(5,2). Keeping signatures help to reduce relative error. Increasing kmin involves less space than increasing N . Finally, if space is not an issue, then LBS(6,1), and even LBS(7,1), is recommended. 4.6.8 Summary of Experiments We evaluated the proposed solutions, MOF and LBS, using three real-world data sets: IMDB keywords, DBLP author names, and DBLP paper titles. When the space budget is tight, say 74 4.7. Conclusions less than 10% of the data size, MOF can deliver good estimation. If more space is allowed, LBS can further improve estimation accuracy. They are compared with S-SEPIA, which is an adaptation of SEPIA [79] to the SUBSTR problem, and random sampling (RS). S-SEPIA\u2019s space overhead was much larger than the space for MOF or LBS. With enough sample size, RS was as accurate as LBS, but its was very CPU intensive. 4.7 Conclusions In this chapter, we develop algorithms for estimating selectivity of approximate substring matching with edit distance. Two algorithms based on the extended N-gram table, MOF and LBS, show accurate and fast estimation. MOF provides simple yet accurate estimation, and LBS improves MOF by capturing more complex correlation among strings by adapting from set hashing signatures. We extend the proposed algorithms to SQL LIKE predicate and Jaccard similarity. As ongoing work, we explore further utilization of the stored signature information in LBS. 75 Chapter 5 Set Similarity Join Size Estimation In the following two chapters, we study similarity join size estimation problems. In the selection problems in Chapters 3 and 4, we estimate the number of records that a given predicate selects. In the join problems in Chapters 5 and 6, we estimate the number of pairs of records that satisfy a given join predicate. Join size estimation has been one of major challenges in query optimization in RDBMSs [71]. Most of studies on this problem have focused on equi-join size estimation. Some of them can be extended to similarity joins, but we cannot leverage many tools that were possible in the equi-join problem, e.g., histograms. In this chapter, we study the SSJ problem in Section 1.4.3 where a database is a collection of sets. The proposed technique is described in our VLDB 2009 paper [92]. 5.1 Introduction Given a similarity measure and a minimum similarity threshold, a similarity join finds all pairs of records whose similarity under the measure is greater than or equal to the minimum threshold. Since a set can generalize many data types, the Set Similarity Join (SSJoin) is a common abstraction of a similarity join problem. For instance, a large scale customer database may have many redundant entries which may lead to duplicate mails being sent to customers. To find candidates of duplicates, addresses are converted into sets of words or n-grams and then an SSJoin algorithm can be used. SSJoin has a wide range of applications including query refinement for web search [127], near duplicate document detection and elimination [17]. It also plays a crucial role in data cleaning process which detects and removes errors and inconsistencies in data [8, 130]. Accordingly, the SSJoin problem has recently received much attention [8, 13, 27, 60, 61, 130]. It is noted that SSJoin is often used as a part of a larger query [8]. In this scenario, a user may want to retrieve all similar pairs possibly conditioned by other predicates or constraints. Thus, it is not a one-time operation and is performed repeatedly with different predicates by users. To handle these general similarity queries, Chaudhuri et al. identified the SSJoin operation as a primitive operator for performing similarity joins [27]. The SSJoin operation can also be important in inconsistent databases. Fuxman et al. [48] proposed a system to answer SQL queries over inconsistent databases where the data cleaning operation is performed on-the-fly. To successfully incorporate the SSJoin operation in relation database systems, it is imper- ative that we have a reliable technique for the SSJoin size estimation. The query optimizer needs an accurate estimation of the size of each SSJoin operation to produce an optimized query plan. However, to the best of our knowledge, this problem has not been studied previ- ously in the literature. This motivates us to study the SSJoin size estimation problem. 76 5.1. Introduction In this chapter, we study the SSJ problem in Definition 3. Several facts are worth men- tioning in Definition 3. First, it corresponds to a self-join case. Although the join between two collections of sets is more general, many applications of SSJoin are actually self-joins: query refinement [127], duplicate document or entity detection [17, 64], or coalition detection of click fraudsters [107]. Naturally, a majority of the SSJoin techniques proposed are evaluated on self-joins [8, 13, 27, 130]. Second, self-pairs (r, r) are excluded in counting the number of similar pairs so that the answers are not masked by the big count, |R|. In addition, we do not distinguish between the two different orderings of a pair (i.e., (r, s) = (s, r)). It is, however, trivial to adapt the proposed technique to consider the self-pairs or the ordering of pairs in the answer if necessary. Random sampling is a natural technique for the selectivity (or size) estimation problems since it does not suffer from the attribute value independence assumption and is not restricted to equality and range predicates. Recently, the technique of Hashed Sampling was proposed for the result size estimation of the set similarity for selection queries [61]. It builds a randomly sampled inverted index structure for the selection queries and the selectivity of a query is estimated by performing selection query processing on the samples. Basically join size can be estimated using the Hashed Sampling by applying an SSJoin algorithm on the constructed inverted index. However, it suffers from quadratic processing time and may not be useful for query optimization purposes. Furthermore, we observe that the estimate is highly dependent on the actual samples used (i.e., large variance). This can be compensated by having much larger sample sizes, which makes it impractical for query optimization. In this chapter, we hypothesize that it is possible to perform SSJoin size estimation in a sample-independent fashion. As an overview, our approach works as follows. We first generate Min-Hash signatures for the samples filtered by other predicates. As a succinct representation of a set, min-hash signatures generally result in a faster operations due to its smaller size [17, 34]. Then we perform frequent pattern mining on the signatures. The distribution information of the signature patterns, captured in Power-laws, is used in estimating the size of union. Finally, the estimated size is adjusted so that it correctly reflects the SSJoin size in the original set space. Specifically, we make the following contributions. \u2022 We reduce the SSJ problem to a pattern mining problem on the signatures, which enables very efficient counting of pairs. \u2022 Naive approaches using the signature patterns fail since a pair could be counted multiple times in several patterns. We propose a novel counting technique called Lattice Counting which counts the number of pairs satisfying the threshold minimizing over-counting. \u2022 Recently, it was observed in [33] that pattern frequency-count distribution generally follows a Power-law distribution. We exploit this observation to efficiently extract the necessary information for the Lattice Counting formula. It is possible because we only need the count information and do not need the actual patterns. A high minimum support threshold can be used so that it is fast enough to be used in query optimization. \u2022 We observe that there is a systematic overestimation when Min-Hashing is used. We establish a model to simulate the count shift. An efficient method for correcting the overestimation is proposed. 77 5.2. Signature Pattern This chapter is structured as follows. Section 5.2 introduces the Min-Hash signature and signature pattern, and gives an overview of the framework. Section 5.3 presents the Union Formula which gives the SSJoin size based on the mined pattern distribution. Efficient processing based on the Power-law distribution is proposed in Section 5.4. A procedure to overcome the systematic overestimation by Min-Hashing is introduced in Section 5.5. The experimental results are presented in Section 5.6. Section 5.7 concludes with future directions. 5.2 Signature Pattern 5.2.1 Min-Hash Signature We use Min-Hash signatures introduced in Section 4.2.2 for a succinct representation of a set. The Min-Hash signature of r is denoted by sig(r) and we will call it the signature of r in the remainder of the chapter. For each set r, we build its Min-Hash signature sig(r). We denote the Min-Hash signature representation of DB by sig(DB). A difference from its use in Chapter 4 is that a Min-Hash signature is built for each record and it concisely encodes elements in the record. In Chater 4, however, a Min-Hash signature is built for an element (q-gram), not for a record, and it encodes the record ids that contain the element. The use of Min-Hash signature in this chapter (resp. Chapter 4) bears similarity to that of HSol (resp. VSol) in [105]. Figure 5.1 shows an example DB and corresponding signatures, sig(DB). The signature size M = 4 and the universe of hash functions is [1, 5]. Hash functions are not shown for simplicity. DB r1 {7, 10, 19, 52, 67} r2 {10, 19, 43, 52} r3 {10, 13, 43, 52, 67, 85} r4 {10, 38, 43, 49, 80, 94} r5 {3, 25, 29, 47, 50, 66, 73, 75} sig(DB) sig(r1) [4, 3, 5, 2] sig(r2) [4, 3, 3, 5] sig(r3) [4, 3, 2, 2] sig(r4) [3, 3, 3, 2] sig(r5) [1, 1, 1, 3] Figure 5.1: An Example DB Suppose \u03c4 = 0.5 is given. Using Equation (4.3), we can estimate JS(ri, rj) for ri, rj \u2208 DB with their signatures. For instance, J\u0302S(r1, r2)= 0.5 since sig(r1) and sig(r2) match at two positions (i.e., the first and the second) out of 4 positions. The true similarity, JS(r1, r2) is |{10,19,52}||{7,10,19,43,52,67}| = 0.5. Considering all 5 sets in DB, there are 6 pairs {(r1, r2), (r1, r3), (r2, r3), (r1, r4), (r3, r4), (r2, r4)} that have at least two matching positions out of 4 positions in their signatures and thus J\u0302S \u2265 0.5. Using the Min-Hash signatures, SSJoin size estimation can be done by estimating the number of pairs (r, s) such that sig(r) and sig(s) overlap at least at \u2308\u03c4 \u00b7M\u2309 positions. A naive way to estimate the join size using the signatures is to first build signatures for all sets and then to compute every pairwise similarity. Although similarity computation between two signatures are generally assumed to be cheaper, this approach still has quadratic complexity. 78 5.2. Signature Pattern signature pattern length matching sets freq. [4, 3, X,X] 2 r1, r2, r3 3 [4, X,X, 2] 2 r1, r3 2 [X, 3, 3, X] 2 r2, r4 2 [X, 3, X, 2] 2 r1, r3, r4 3 [4, 3, X, 2] 3 r1, r3 2 Figure 5.2: An Example of Signature Patterns (freq \u2265 2) 5.2.2 The FSP Problem An interesting observation is that any pair (r, s) from a group of records which shares the same values at least at \u2308\u03c4M\u2309 positions in their signatures satisfy JS(r, s) \u2265 \u03c4 with high probability. For instance, in the above example, r1, r2 and r3 have 4 and 3 at the first and the second signature positions. Any pair from r1, r2, r3 matches at least at those two positions in their signatures. There are 3 such pairs: (r1, r2), (r1, r3), (r2, r3) and they are estimated to have JS \u2265 0.5. We formalize this intuition with signature patterns. Definition 5 (Signature Pattern). A signature pattern is a signature where any of its values is possibly substituted with X which denotes a \u2018don\u2019t care\u2019 position. A signature (or a set in the database) matches a signature pattern if its signature values are the same as the pattern values at all positions that are not X. Signature values at positions marked by X do not matter. For a pattern, sig, we define the following notations. \u2022 length, len(sig): the number of non-X values in the pattern; \u2022 frequency, freq(sig): the number of sets in the database whose signatures match the pattern. Example 3. Figure 5.2 shows signature patterns with freq \u2265 2 found in the example of Figure 5.1 with their lengths, matching sets and frequencies. For instance, len([4, 3, X,X]) = 2 since it has two non-X values. Its frequency is 3 because three sets, r1,r2,r3 match the pattern. Based on the signature pattern, we define the Frequent Signature Pattern problem as follows. Definition 6 (FSP Problem). Given a threshold t on the pattern length, FSP (t) is the number of pairs which share a pattern sig such that len(sig) \u2265 t and freq(sig) \u2265 2. To solve the SSJ(\u03c4) problem, we solve the FSP (t) problem where t = \u2308\u03c4M\u2309. In the sequel, we implicitly assume a fixed value ofM . If we view the signature of each set as a trans- action and each signature value along with its position as an item, we can apply traditional frequent pattern mining algorithms to the FSP problem. Given \u03c4 we discover the signature patterns with length \u2265 \u2308\u03c4M\u2309 and freq \u2265 2. A minimum frequency of 2 is necessary to pro- duce a pair. If the frequency of a pattern is k, there are at least npair(k) \u2261 (k2) = k(k\u2212 1)\/2 pairs satisfying the similarity threshold \u03c4 in the database. Exploiting this observation, we can have the following two step approach in estimating the SSJoin size. 79 5.3. Lattice Counting 1. Compute the frequent signature patterns with length \u2265 \u2308\u03c4M\u2309 and freq \u2265 2. 2. For each pattern of frequency k, count the number of pairs by npair(k) = k(k \u2212 1)\/2, and then aggregate all the number of pairs. However, this approach has several critical challenges. \u2022 There are overlaps among the signature patterns. Consider sig1 = [4, 3, X,X], sig2 = [X, 3, X, 2]. If \u03c4 = 0.5, both patterns should be considered in the answer since their length \u2265 2 = 0.5 \u00b7 4. There are 3 pairs from sig1 and 3 pairs from sig2 satisfying \u03c4 = 0.5: (r1, r2), (r1, r3), (r2, r3) from sig1 and (r1, r3), (r1, r4), (r3, r4) from sig2. If we simply add the two counts 3 and 3, we are counting the pair (r1, r3) twice. Without consideration of this overlap, the estimate could be a large overestimation. \u2022 We need all signature patterns with freq \u2265 2. It is equivalent to setting the minimum support threshold to 2 in the frequent pattern mining problem. However, the search space for such a low threshold is not generally feasible. We address the first issue in the following section and the second issue in Section 5.4. 5.3 Lattice Counting In this section, we describe how we can consider overlapping counts of signature patterns. We show that join size can be computed with union size of signature patterns and there are underlying lattice structures among the patterns. The framework proposed for the STR problem in Chapter 3 is applied to compute the union size. Although the STR problem and the SSJ problem do not bear immediate affinity, we show that techniques developed in Chapter 3 can serve as the basis with novel insights on the connection. 5.3.1 Computing The Union Cardinality Let Sp(sig) denote the set of pairs not including the self-pairs that match with a pattern sig. We call Sp(sig) thematching set of sig. Let I\u2113 denote the index set of all the signature patterns in DB such that length \u2265 \u2113 and freq \u2265 2. The SSJoin size, SSJ(\u03c4), is the same as FSP (t) which is the number of pairs that match any pattern sigi, i \u2208 It, where t = \u2308\u03c4 \u00b7M\u2309. As a pair (r, s) can match with multiple signature patterns, we need to compute the cardinality of the union of the set of pairs as follows. Given \u03c4 , FSP (t) = | \u22c3 i\u2208It Sp(sigi)| where t = \u2308\u03c4 \u00b7M\u2309 . (5.1) Example 4. Consider Example 3 with \u03c4 = 0.5 and M = 4. Every signature pattern with freq \u2265 2 and length \u2265 0.5 \u00b74 contributes to FSP (2). As shown in Figure 5.2, there are 5 such patterns in DB, we have I2 = {1, 2, 3, 4, 5} and can compute the size from Equation (5.1) as follows. SSJ(0.5) = FSP (2) = |Sp(sig1) \u222a \u00b7 \u00b7 \u00b7 \u222a Sp(sig5)| = 6 80 5.3. Lattice Counting sigi Sp(sigi) or Si (matching set) sig1 = [4, 3, X,X] {(r1, r2), (r1, r3), (r2, r3)} sig2 = [4, X,X, 2] {(r1, r3)} sig3 = [X, 3, 3, X] {(r2, r4)} sig4 = [X, 3, X, 2] {(r1, r3), (r1, r4), (r3, r4)} sig5 = [4, 3, X, 2] {(r1, r3)} If we ignore the overlap, FSP (t) is \u2211 i\u2208It |Sp(sigi)|. We call this naive strategy the Independent Sum (IS) method. The correct way of computing cardinality of the union is to use the set Inclusion-Exclusion (IE) principle. However, the IE formula has exponential complexity in the number of sets. 5.3.2 The Union Formula Exploiting Lattice In this section, we describe details on modeling overlaps using lattices. The idea of modeling union with a lattice is the same as the string replacement semi-lattice in Chapter 3, but the actual construction of lattices requires new intuition. This application is possible due to the same underlying idea of the framework; we consider similar groups of possible variants together and model their overlaps with lattice structures. In Chapter 3, groups of similar strings are formed by q-grams with wildcards, and in this section, groups of similar sets are formed by signature patterns. We identify necessary properties of lattices to apply the framework. Consider an example of FSP (2) which computes |Sp(sig1) \u222a Sp(sig2) \u222a Sp(sig4)|. Let us use Si to denote Sp(sigi) for simplicity. Using the IE principle, FSP (2) is computed in the following way: |S1|+ |S2|+ |S4| \u2212 (|S1 \u2229 S2|+ |S1 \u2229 S4|+ |S2 \u2229 S4|) +|S1 \u2229 S2 \u2229 S4| = 3 + 1 + 3\u2212 (1 + 1 + 1) + 1 = 5. Interestingly, if we look into all the intersections, we see that many of them result in the same set: S1 \u2229 S2 = S1 \u2229 S4 = S2 \u2229 S4 = {(r1, r3)}. We can structure this overlap with the semi-lattice shown in Figure 5.3. The patterns and their matching sets are organized using lattices (or semi-lattices). The edges represent the inclusion relationship. The level of a pattern is the number of non-X values and the level of a matching set is the level of the corresponding pattern. For instance, S5 has edges to S1 and S2 and S1 \u2229S2 = S5. S5 has three children and an intersection between any two children will result in S5. This implies that S5 appears three times in the intersections between two sets in the IE formula since there are three ways of choosing two children out of three. Likewise, it appears once in the intersections among three sets, S1 \u2229S2 \u2229S4. The net effect is that S5\u2019s contribution to the IE formula is |S5| multiplied by (\u22123+1). The negative sign of \u22123 is from the alternating signs in the IE formula. Incorporating this observation, the above IE formula is simplified as follows without actually performing any intersections. |S1|+ |S2|+ |S2|+ (\u22123 + 1)|S5| = 3 + 1 + 3\u2212 2 \u00b7 1 = 5. Exploiting the lattice structure, each count (|Sp(sigi)|) is processed exactly once whereas the IE method computes every intersection unaware of the underlying structure. Notice that 81 5.3. Lattice Counting Figure 5.3: Overlapping Relationship Figure 5.4: Example Pattern Lattice Structures this approach only involves individual quantities, |Sp(sig)|, which can be acquired by pattern mining through |Sp(sig)| = npair(freq(sig)) = ( freq(sig) 2 ) . From this example, we make the following crucial observations. \u2022 Signature patterns and their matching sets can be organized with the lattice structure. A node in the pattern lattice represents a signature pattern and a node in the matching set lattice represents the set of matching pairs for each pattern. \u2022 The FSP (t) problem can be solved by finding the cardinality of the union of matching sets at level t. In Figure 5.3, FSP (2) is the cardinality of the union of matching sets at level 2, |S1 \u222a S2 \u222a S4|. \u2022 The multiplicity of a set in the IE formula is expressed by a coefficient. The coefficient only depends on the lattice structure. For instance, in the above example, |S5| has a coefficient of \u22122. Let us generalize this intuition. The pattern lattice and the matching set lattice are isomorphic to a power set lattice, 2{1,...,M}. Figure 5.4 shows the lattice structures for the database in Figure 5.1. Figure 5.4 (a) depicts the underlying power set lattice, 2{1,...,4}. Figure 5.4 (b) shows the pattern lattice. The pattern lattice needs some modifications; a pattern in the pattern lattice is a generalization of a signature pattern where \u2018 \u2019 denotes matching positions and \u2018X\u2019 denotes don\u2019t care positions. Figure 5.4 (c) is the matching set lattice corresponding to the pattern lattice for the database in Figure 5.1. A node in the matching set lattice represents the set of pairs whose signatures match at the positions marked \u2018 \u2019 in the corresponding pattern. The specific matching values are not important. For instance, [ , , X,X] is a pattern selecting all pairs which match at their first and second 82 5.3. Lattice Counting positions, and {(r1, r2), (r1, r3), (r2, r3)} are the corresponding matching sets. If there were r6, r7 such that sig(r6) = [1, 1, 6, 2] and sig(r7) = [1, 1, 2, 4] then (r6, r7) would have been in the matching set as well. Consider the coefficient of node [ , , , X] for FSP (2). The sublattice structure whose top is [ , , , X] is the same as the lattice in Figure 5.3 (a), and thus we can infer it has the same coefficient. In other words, it appears the same number of times in the IE formula for union cardinality of sets at level 2. Moreover, observe that all the other nodes at level 3 have the identical structure, which gives the same coefficient. We can see that all nodes at the same level will have the same coefficient since there will be the same number of ways to choose a certain number of nodes at a level. Thus, we can work with the sum of the cardinalities of matching sets at each level since they all have the same coefficient. Let the sum at level \u2113 be F\u2113. We call it the level sum. Define the index set I\u2113 that lists all patterns at level \u2113, then F\u2113 = \u2211 i\u2208I\u2113 |Sp(pi)|. (5.2) Using the level sum, the computation is as follows. F2 = |Sp(sig1)|+ |Sp(sig2)|+ |Sp(sig3)|+ |Sp(sig4)| F3 = |Sp(sig5)| FSP (2) = C2F2 + C3F3 = 1 \u00b7 (3 + 1 + 1 + 3) + (\u22122) \u00b7 1 = 6 Formalizing this intuition, we define the pattern lattice structure and the Lattice Counting (LC) problem as follows. Definition 7 (Pattern Lattice Structure). Given a set collection of sets R and the signature size M , the pattern lattice structure is a tuple L = (M,LP ,LR) where M = {1, ...,M}, LP is the pattern lattice and LR is the matching set lattice. For each m \u2282M, the corresponding p \u2208 LP is a signature pattern such that p has \u2018 \u2019 in the position i \u2208 m and \u2018X\u2019 in the other positions. For each p \u2208 LP , Sp(p) \u2208 LR is the set of pairs (r, s), r, s \u2208 R such that sig(r) and sig(s) have the same values at position marked \u2018 \u2019 in p. The partial order \u2264, the least upper bound \u2228, and the greatest lower bound \u2227 of x, y \u2208 LP are defined by \u2286, \u222a and \u2229 between the corresponding subsets in the power set respectively. For any x, y, z \u2208 LP the following conditions hold. \u2022 Inclusion: x \u2264 y iff Sp(x) \u2287 Sp(y) \u2022 Refinement: x \u2228 y = z iff Sp(x) \u2229 Sp(y) = Sp(z) Definition 8 (LC Problem). Given L = (M,LP ,LR) and a level threshold t, the LC problem is to estimate the cardinality of union of matching sets at level t in LR. LC(t) = | \u22c3 i\u2208It Sp(pi)| 83 5.3. Lattice Counting We can think of the LC(t) problem as the FSP (t) problem defined on the lattice. We simplify the IE formula as the sum of the cardinality of each matching set S \u2208 LDB multiplied by some coefficient. As all the matching sets at the same level have the same coefficient, we can compute LC(t) using \u2211M l=tC\u2113,t \u00b7 F\u2113. We give the exact answer for LC(t) for an arbitrary pattern lattice structure in the next equation. LC(t) = M\u2211 l=t C\u2113,t \u00b7 F\u2113,where (5.3) C\u2113,t = (Mt )\u2211 r=2 (\u22121)r+1B\u2113,t,r B\u2113,t,r = i<\u2113\u2212t\u2211 i=0 (\u22121)i \u00b7 ( \u2113 i ) \u00b7 (( \u2113\u2212i \u2113\u2212t\u2212i ) r ) The coefficient C can be computed by counting how many times a node appears at all intersections of size r \u2265 2 in the IE formula. B keeps track of the occurrence at each r. The intermediate derivation depends on the inclusion and the refinement properties. 5.3.3 Level Sum Computation Note that in Equation (5.3), only F\u2113 depends on the data. So computing LC(t) reduces to computing the level sums F\u2113, t \u2264 \u2113 \u2264M . F\u2113 is counted as follows. F\u2113 = \u2211 i\u2208I\u2113 |Sp(pi)| = \u2211 i\u2208I\u2113 npair(freq(pi)) (5.4) The right hand side of Equation (5.4) uses the frequencies of all the signature patterns of length \u2113, and I\u2113 lists all such patterns. We can simplify the F\u2113 computation by noting that patterns with the same freq value will have the same npair(freq(pi)) value. Rather than repeatedly evaluating the npair function for the same frequency, a better strategy will be to count how many patterns have the frequency of f for each f and to evaluate npair just once for each f . As there are a large number of patterns at low frequencies this reduction could be huge. Let us group all patterns pi, i \u2208 I\u2113 by their frequencies. Let Il,f denote the index set for the patterns such that |pi| = l and freq(pi) = f if and only if i \u2208 Il,f . For instance, I2,3 lists all the length-2 patterns with frequency of 3. In the example I2,3 = {1, 4} since |sig1| = |sig4| = 2 and freq(sig1) = freq(sig4) = 3 (see Figure 5.2). Il,f defines a partitioning over I\u2113 and |Il,f | is the number of patterns with freq = f in the level \u2113. If we use mf(I\u2113) for max(freq(xi)), i \u2208 I\u2113, F\u2113 = \u2211 2\u2264f\u2264mf(I\u2113) npair(f) \u00b7 |Il,f | . (5.5) A frequent pattern mining algorithm gives all the frequent patterns above the minimum support threshold. We extract the count information grouped first by pattern length and then by pattern frequency. This gives us |Il,f | for all l and f found in the database. For a specific \u2113, we call the set of tuples (f, |Il,f |) pattern distribution for level \u2113. 84 5.4. Power-Law Based Estimation Example 5. The next table is the signature pattern distribution for the running example. pattern distribution level \u2113 f (freq) |I\u2113,f | sig. pattern matching sets 2 2 2 [4, X,X, 2] r1, r3 [X, 3, 3, X] r2, r4 3 2 [4, 3, X,X] r1, r2, r3 [X, 3, X, 2] r1, r3, r4 3 2 1 [4, 3, X, 2] r1, r3 |I2,2| = 2 since two signature patterns, [4, X,X, 2] and [X, 3, 3, X], have two matching sets (f = 2). Likewise |I2,3| = 2 since two signature patterns have three matching sets (f = 3). For F2, each of the two patterns with f = 2 generates one pair ( ( 2 2 ) \u00b7 2 = 2), and each of the two patterns with f = 3 generates three patterns ( ( 3 2 ) \u00b7 2 = 6). So F2 = 2 + 6 = 8. The whole level sum computation is as follows. F2 = \u2211 2\u2264f\u22643 npair(f) \u00b7 |I2,f | = ( 2 2 ) \u00b7 2 + ( 3 2 ) \u00b7 2 = 8 F3 = \u2211 2\u2264f\u22642 npair(f) \u00b7 |I3,f | = ( 2 2 ) \u00b7 1 = 1 After computing the level sums, the rest of the LC computation is summing those level sums multiplied by coefficients in Equation (5.3). SSJ(0.5) = LC(2) = 6 is computed as follows. level \u2113 F\u2113 C4,\u2113 C4,\u2113 \u00b7 F\u2113 2 F2 = 8 1 1\u00d7 8 = 8 3 F3 = 1 -2 \u22122\u00d7 1 = \u22122 4 F4 = 0 3 0\u00d7 3 = 0 LC(2) = \u2211 4 \u2113=2 C4,\u2113,2 \u00b7 F\u2113 6 5.4 Power-Law Based Estimation Note from Equation (5.5) that we only need the frequency of patterns not the actual patterns for our estimation purposes. Thus, our framework only counts patterns and does not exactly generate and store patterns. Equation (5.5) also requires the distribution of all signature patterns with freq \u2265 2. Most frequent pattern mining algorithms are not designed to handle such a low support threshold. Even if they could, it would take too long to be used for the query optimization task. In this section, we address this issue and show how we can efficiently compute Equation (5.5). 5.4.1 Level Sum with Power-Law Distribution Chung et al. recently discovered that a Power-law relationship is found in the pattern support distribution [32]. A Power-law is a special relationship between two quantities. It is found in many fields of natural and man-made worlds. A quantity x obeys a Power-law if it is drawn from a probability distribution p(x) \u221d x\u03b1, \u03b1 < 0 [33]. The Zipf distribution is one of 85 5.4. Power-Law Based Estimation related discrete Power-law probability distributions and it characterizes the \u201cfrequency-count\u201d relationship [32]. When ci is the count of distinct entities that appear fi times in the data set, the distribution is described by ci = f \u03b1 i \u00b7 10\u03b2 . (5.6) Chung et al.\u2019s hypothesis refers to the distribution of the pattern count versus the pattern frequency. 1 10 100 1 10 100 1K 10K signature pattern frequency # of s ig na tu re p at te rn s (pa tte rn co un t) level 3 level 9 minimum support threshold Figure 5.5: Signature Pattern Distribution Figure 5.5 plots the signature pattern distributions of level 3 and 9 in the DBLP data set when M = 10. The x-axis is pattern frequency and y-axis is pattern count. For instance, x=10, y=121 for level 3 in the plot means there are 121 length-3 patterns that appear 10 times in the DB. The pattern count (y-value) decreases as the frequency (x-value) increases; a majority of patterns appear only in a small number of sets and a few patterns appear in many sets. We can also observe that the points of a higher level (e.g., level 9) distribution are on the lower side of points of a low level (e.g., level 3) distribution. This is because when a pattern is frequent, its sub-patterns are at least as frequent. This distribution corresponds to (f, |Il,f |) for each level \u2113. If we have this information for all f \u2265 2 and \u2113, we have the exact level sums by Equation (5.5) and thus the exact answer for the SSJ problem. Consider a practical minimum support threshold of \u03be > 2, e.g., \u03be = 10 in Figure 5.5. It is shown as the vertical line in Figure 5.5. The problem of having \u03be > 2 is that we will miss the pattern distribution on the left side of the vertical line, i.e., patterns with 2 \u2264 freq < \u03be, because the frequent pattern mining algorithm will only find patterns with freq \u2265 \u03be. For patterns at level 3, we see the pattern distribution on the left of the \u03be line is missing. We address the problem of the missing pattern distribution with the Power-law distribu- tion. In accordance with Chung et al\u2019s hypothesis, a linear relationship between the pattern count and the frequency is observed in Figure 5.5. Exploiting this relationship, the strategy is as follows. 1. Find frequent patterns with \u03be > 2 for efficiency. 86 5.4. Power-Law Based Estimation Algorithm 4 Power-Law Estimation Input: A collection of set DB, a Jaccard threshold \u03c4 , minimum support \u03be, Min-Hash functions {mh1, ...,mhM} 1: build sig(DB) by computing sig(s) for all s \u2208 DB 2: run a frequent pattern mining algorithm on sig(DB) with \u03be 3: for all 1 \u2264 \u2113 \u2264M do 4: estimate \u03b1\u2113 and \u03b2\u2113 (using a linear regression) 5: end for 6: t = \u2308\u03c4 \u00b7M\u2309 7: Est = 0 8: for all t \u2264 \u2113 \u2264M do 9: F\u2113 = \u2211 2\u2264f\u2264mf(I\u2113) npair(f) \u00b7 f\u03b1\u2113 \u00b7 10\u03b2\u2113 10: Est += C\u2113,t \u00b7 F\u2113 11: end for 12: return Est 2. Estimate the parameters for the Power-law distribution at each level with the acquired patterns. 3. Compute the necessary level sums with the pattern distribution based on the estimated parameters. Our algorithm is independent of the specific choice of the frequent pattern mining algorithm. This gives an opportunity to exploit the extensive studies in the literature. Algorithm 4 outlines this approach. At line 4, we use linear regression based on the least square fitting to estimate the parameters of the Power-law distribution \u03b1\u2113 and \u03b2\u2113 for each level \u2113. Other methods such as maximum likelihood estimation could be more reliable, but we use linear regression as in [32] since it is very efficient and is sufficient for our purposes. See [32, 33] for more discussions on this topic. The next challenge is that we may not have enough points for estimating the parameters when we use a high \u03be. This is likely for the distribution at higher levels since patterns at higher levels (longer patterns) are fewer than the ones at lower levels. For instance, we cannot estimate the distribution at level 9 in Figure 5.5 since most of the points are on the left side of the \u03be line and we cannot estimate the parameters. Equation (5.3) requires all the level sum F\u2113, t \u2264 \u2113 \u2264M . For example, when M = 10, LC(5) needs F5, F6, ..., F10. We present our solution below. 5.4.2 Approximate Lattice Counting To compute LC(t), we use the pattern lattice structure to consider all the intersections among the patterns at level t. In the lattice, nodes at a higher level represent more complex rela- tionships among nodes at level t. Observe that the counts of those complex intersections are relatively small as we can infer from Figure 5.5; the pattern counts of higher levels are much smaller than those of lower levels. Based on this intuition, we employ a truncation heuristic which considers only parts of the lattice ignoring some of the complex intersections in the IE formula. Consider {1, 2, 3, 4} in Figure 5.6 (a). It represents complex intersections such 87 5.4. Power-Law Based Estimation Figure 5.6: Relaxed Lattice as {1, 2} \u2229 {1, 3} \u2229 {3, 4}. If we ignore such higher level intersections, we have a part of the original lattice as in Figure 5.6 (b) where we only consider intersections between two nodes. Intersections like {1, 2}\u2229{1, 3}\u2229{3, 4} are ignored in the relaxed lattice structure. Generaliz- ing this intuition, we define Max-k relaxed lattice where given LC(t), we only consider nodes between level t and min(M, t+ k) ignoring more complicated intersections at level t+ k + 1 or higher. This gives us the relaxed form of Equation (5.3). LCk(t) = K\u2211 \u2113=t C\u0302\u2113,t(k) \u00b7 F\u2113, where (5.7) C\u0302\u2113,t(k) = (Kt )\u2211 r=2 (\u22121)r+1B\u2113,t,r K = min(M, t+ k) Notice the replacement of M by K in the summations. We now only sum up to the level t + k. This approximate Union Counting formula lets us estimate the SSJoin size when not all the signature lines are available. With LCk(t) where k is the relaxing parameter, we only need F\u2113 for t \u2264 \u2113 \u2264 t + k. For instance, when M = 10, LC2(5) can be computed with only F5, F6 and F7 without F8, F9 and F10. In Section 3.4, we developed a technique for approximating coefficients with a replacement semi-lattice. The goal was to avoid computing coefficients on-the-fly and to use the formula when a lattice has a similar, but not identical, shape to a replacement semi-lattice. Counts of all the nodes in the lattice are necessary and only their coefficients are approximated. The goal of approximation in this section is to compute the formula without high level nodes. The lattice itself is already in the same shape as a replacement semi-lattice, so the approximation in Section 3.4 cannot be applied. 5.4.3 Estimation With Limited Pattern Distribution Depending on the available pattern distributions and the similarity threshold, the approxi- mation formula may not be enough to answer SSJ(t). Assume that signature size M = 10 and we acquire pattern distributions up to level 6: F0, ..., F6. Using the Max-2 relaxed lattice, we can compute LC2(4) since it only needs F4, F5 and F6. However, we still cannot answer LC(t), t \u2265 7 since we do not have F\u2113, \u2113 \u2265 7. Recall that the value of t corresponds to the Jaccard similarity threshold. For instance, whenM = 10, t = 7 corresponds to \u03c4 = 0.7. Thus, we still cannot handle a threshold such as 0.7 or higher. For this situation, we make use of a new observation found in a skewed distribution. 88 5.5. Correction of The Estimation 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 100 102 104 106 108 Jaccard similarity (i\/M) # of p ai rs 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 100 102 104 106 108 Jaccard similarity (i\/M) # of p ai rs (a) First subset (b) Estimation of T (i) in Second subset Figure 5.7: # pair-similarity Plot of 2 Subsets of the DBLP Data Set Let T (i) denote the number of pairs (r, s) such that JS(r, s) = i\/M with rounding. The difference with LC(i) is that LC(i) counts pairs (r, s) such that JS(r, s) \u2265 i\/M . Thus LC(t) =\u2211 \u2113=t T (\u2113). Figure 5.7 (a) and (b) plot the number of pairs versus the Jaccard similarity in log-log scale in two randomly selected 80K subsets of the DBLP data set. That is it plots (i, T (i)). Again a Power-law relationship is observed. This result may be of independent interest but it is beyond the scope of this dissertation. We can estimate the missing T (i) values using a linear regression. Figure 5.7 (b) shows an example. If we acquired pattern distributions up to level 6, we can compute LC(0), ..., LC(4) with the Max-2 relaxed lattice. Since T (i) = LC(i)\u2212LC(i+1), we have T (0), T (1), T (2), T (3). These are depicted as circles in Figure 5.7 (b). We use these points to estimate the missing T (i)\u2019s which are shown as rectangles: T (4), ..., T (10). Now we can answer, for example, LC(7) = T (7) + ...+ T (10). This enables us to estimate SSJoin size even when we have very limited pattern distribution and the Equation (5.7) cannot be applied. Parameter estimation will produce poor estimations if the initial estimations produced by the Lattice Counting, which are the circles in Figure 5.7 (b), are not accurate. Section 5.6 verifies the hypothesis and the accuracy of Lattice Counting. 5.5 Correction of The Estimation 5.5.1 Systematic Overestimation By Min-Hash While Min-Hash signatures present several benefits, they can cause overestimation. Figure 5.8 shows the SSJoin size by the original sets and by their Min-Hash signatures in the DBLP data set. We see that the overestimation by Min-Hash is rather huge. Figure 5.9 log-plots the true SSJoin size and the size by Min-Hashing. A clear distribution shift is observed. This is problematic since similarity thresholds between 0.5 and 0.9 are typically used [13]. One may suspect that the hash collision is the problem. However, through experiments, we found that this is not the dominating cause as long as the hash domain is not too small. We study the cause of this systematic overestimation and propose a correction procedure below. 5.5.2 Error Correction By State Transition Model Recall that T (i) denotes the true number of pairs (r, s) such that JS(r, s) = i\/M . When JS(r, s) = i\/M , we call the pair is in state i assuming the signature size M is fixed. We define 89 5.5. Correction of The Estimation Figure 5.8: SSJoin Size Distribution in the DBLP data JS True # pairs # pairs by Min-Hash Relative Error 0 3,167,244,255 3,167,244,255 0.00% 0.1 22,750,745 306,062,044 1245.28% 0.2 577,313 51,556,984 8830.51% 0.3 128,078 6,470,509 4952.01% 0.4 5,634 587,761 10332.39% 0.5 2,049 55,623 2614.64% 0.6 980 6,597 573.16% 0.7 495 1,477 198.38% 0.8 384 645 67.97% 0.9 298 419 40.60% 1 286 318 11.19% 0 0.2 0.4 0.6 0.8 1 2 3 4 5 6 7 8 9 10 Jaccard similarity SS Jo in s ize (lo g1 0) TRUE Min\u2212Hash Figure 5.9: SSJoin size: True vs. MinHash O(i) to be the number of observed pairs (r, s) such that JS(r, s) = i\/M . Let us define two vectors T and O as T = [T (0), ..., T (M)]T and O = [O(0), ..., O(M)]T . The state transition of a pair from state i to state j means that the pair\u2019s true similarity is i\/M but is estimated to be j\/M . For example, if M = 4 and there are 100 pairs such that JS = 2\/4, we say that 100 pairs are in state 2. If there is a 30% chance of state transition from state 2 to 3, 30 of them are falsely estimated to have JS = 3\/4. The key point is that when the distribution of T is skewed, it can cause overestimation in O. Figure 5.10: An Example of Imbalance in Transitions Example 6. Assume M = 4 and the distribution of T (i) is as in Figure 5.10. For instance, 100 pairs have JS = 2\/4 and they are in state 2. There exist state transitions since Min-Hash is probabilistic. In the example of Figure 5.1, JS(r3, r4) = 1\/5 so the pair\u2019s true state is 1 (rounding up 1\/5 to 1\/4). However with the signatures, it is estimated as J\u0302S(r3, r4) = 2\/4 and is in state 2. Suppose there is a 10% of state transition probability to each neighboring 90 5.5. Correction of The Estimation state. If the distribution of T (i) is skewed, it causes unbalance in the transitions. For instance, although T (2) = 100, O(2) = 181 since 20 pairs go to state 1 or 3, and 100 pairs come from state 1, and 1 pair comes from state 3. Given a pair (r, s) such that JS(r, s) = i\/M , let I denote its state i, and J denote the actual number of matching positions in sig(r) and sig(s). At each position, the matching probability Pr(\u03c0k(r) = \u03c0k(s)) is i\/M and all \u03c0k are independent. Thus J is a binomial random variable with parameter i\/M . That is Pr(J = j|I = i) = ( M j ) ( i M )j(1\u2212 i M )M\u2212j . (5.8) If we use P (j|i) for Pr(J = j|I = i), Pr(j|i) is the probability of having j matching positions when the true number of matching positions is i. The observed countO(j) is the sum of all T (i) multiplied by P (j|i) which is moving in mass from state i. Thus \u2211Mi=0 Pr(j|i)T (i) = O(j). This gives us a system of equations for 0 \u2264 j \u2264 M . Define the matrix A as Aj,i = Pr(j|i). The system is described by AT = O. (5.9) Example 7. When M = 4, based on Equation (5.8), A is as follows. A = \uf8eb \uf8ec\uf8ec\uf8ec\uf8ec\uf8ed P (0|0) P (0|1) P (0|2) P (0|3) P (0|4) P (1|0) P (1|1) P (1|2) P (1|3) P (1|4) P (2|0) P (2|1) P (2|2) P (2|3) P (2|4) P (3|0) P (3|1) P (3|2) P (3|3) P (3|4) P (4|0) P (4|1) P (4|2) P (4|3) P (4|4) \uf8f6 \uf8f7\uf8f7\uf8f7\uf8f7\uf8f8 Then by Equation (5.9), AT = O becomes \uf8eb \uf8ec\uf8ec\uf8ec\uf8ec\uf8ed 1.000 0.316 0.063 0.004 0 0 0.422 0.250 0.047 0 0 0.211 0.375 0.211 0 0 0.047 0.250 0.422 0 0 0.004 0.063 0.316 1.000 \uf8f6 \uf8f7\uf8f7\uf8f7\uf8f7\uf8f8 \uf8eb \uf8ec\uf8ec\uf8ec\uf8ec\uf8ed T (0) T (1) T (2) T (3) T (4) \uf8f6 \uf8f7\uf8f7\uf8f7\uf8f7\uf8f8 = \uf8eb \uf8ec\uf8ec\uf8ec\uf8ec\uf8ed O(0) O(1) O(2) O(3) O(4) \uf8f6 \uf8f7\uf8f7\uf8f7\uf8f7\uf8f8 . Let us analyze O(3). 0 \u00b7T (0)+0.047 \u00b7T (1)+0.25 \u00b7T (2)+0.422 \u00b7T (3)+0 \u00b7T (4) = O(3). 4.7% of T (1) constributes to O(3). 25% of T (2) goes to O(3) and 42.2% of T (3) goes to O(3). The huge incoming counts from T (i) to O(j), i < j can inflate O(j). Since L\u0302C(t) =\u2211M i=tO(i), without appropriate correction, LC(t) is doomed to be a massive overestimation. A tempting option is to compute T by solving the system of linear equations. A is non-singular and only depends on the choice of M . The join size is computed by T\u0302 = A\u22121O. However, this simple approach does not work for two reasons. First, T\u0302 might have negative values. Second, O is highly skewed: O(i) \u226b O(j) when i < j. So lower entries in O, say O(0), O(1) and O(2), will have a dominating effect making higher entries negligible. Thus, rather than solving the system of linear equations, we solve a NNLS (non-negative least square) constrained optimization problem [88]. To prevent the solution from being 91 5.6. Experimental Evaluation Algorithm 5 LC with Error Correction Procedure LCWithErrorCorrection Input: similarity threshold t, max iteration count \u03b8 Output: LC(t) 1: Compute LC(\u2113) for 1 \u2264 \u2113 \u2264M (estimates without correction) 2: O(0) = N \u00b7 (N \u2212 1)\/2, O(M) = LC(M) \/\/ N : data set size 3: O(\u2113) = LC(\u2113)\u2212 LC(\u2113+ 1), 1 \u2264 \u2113 < M 4: SanityCheck(LC(\u2113), O(\u2113), 1 \u2264 \u2113 \u2264M) \/\/ desc. in Sec 7.1 5: PowerLawInterpolate(O) 6: minimize \u2016WAX \u2212WO\u2016 with \u03b8, subject to X \u2265 0 7: PowerLawInterpolate(X) 8: return LC(t) = \u2211M \u2113=tX(\u2113) Procedure PowerLawInterpolate Input: vector V = [V1, ..., Vk] Output: modified V = [V1, ..., Vk] 1: Estimate Power-law parameter \u03b1 and \u03b2 from (\u2113, V\u2113) 2: for all V (\u2113) \u2264 0 do 3: V (\u2113) = \u2113\u03b1 \u00b7 10\u03b2 4: end for dominated by lower entries, we scale the matrix by a weight matrix W so that higher entries in O will have approximately the same effect in the least square solution. We could use W defined as Wi,i = 1\/O(i) and Wi,j = 0, i 6= j. In summary, the final step of our estimation corrects the estimation by solving the next NNLS problem. minimize \u2016WAX \u2212WO\u2016 subject to X \u2265 0 (5.10) The dimension of the matrix of interest is not big, say 10, and we can solve the system fairly efficiently. (i.e., milliseconds) The NNLS may fail for several reasons. It may diverge or have zero estimates in X. We use the technique in Section 5.4.3 in these cases. Missing T or X values are interpolated using the found values. Algorithm 5 outlines the Lattice Counting with correction. It applies the NNLS correction step at line 6. Missing O or X values are estimated using the Power-law hypothesis in Section 5.4.3. 5.6 Experimental Evaluation 5.6.1 Experimental Setup Data sets: We have conducted experiments using two types of data sets: real-life data and synthetic data. The DBLP data set is used as the real-life data. It is built as described in [8]. The DBLP data set consists of 794,061 sets. We call this full data set the 800K data set. Note that this full data set corresponds to more than 300 billion pairs! We also use part of this data set to show scalability. In particular, we use 40K, 80K, 160K, 240K and 400K randomly selected subsets. The average set size is 14, and the smallest is 3 and the biggest is 92 5.6. Experimental Evaluation 219. The synthetic data set is generated using the IBM Quest synthetic data generator [69]. The data set contains 50,000 sets and the universe of sets is 10,000. We varied the average set size from 15 to 50. The pattern correlation parameter is set to 0.25. Algorithms compared: We implemented the following algorithms for the SSJoin size estimation. \u2022 LC(\u03be): It is Lattice Counting with the approximation in Section 5.4.2. \u03be gives the mini- mum support threshold and we use a value between 0.015% and 0.10%. The estimation is corrected with Algorithm 5. The exact LC is not used due to its long pattern mining time. \u2022 LCNC(\u03be): It is identical to LC(\u03be) except that the error correction procedure, Algo- rithm 5, is not applied after the initial estimation. \u2022 IS: This estimation does not rely on the IE principle and Lattice Counting; it only relies on Power-law estimation. Given LC(t), it assumes that all signature patterns are independent and, sums F\u2113\u2019s, \u2113 \u2265 t. \u2022 HS(\u03c1): This is an adaptation of Hashed Sampling [61] to the SSJ problem. \u03c1 gives the sampling ratio. A signature size of 10 is used with a hash space of 215. For LC and LCNC, we use the relaxing parameter k = 2 as described in Section 5.4.2. Linear regression for the Power-law parameter estimation needs special attention. In general, the tail of the Power-law distri- bution is not reliable. We used only up to 40 leftmost points. The max iteration count \u03b8 in Algorithm 5 is set to 100. However, the solution of Equation (5.10) converged without reaching the count limit most of the time. We apply sanity bounds to LC and O values in line 4 of Algorithm 5. Specifically, we make sure LC(\u2113) is no smaller than LC(\u2113+1) by setting it to LC(\u2113 + 1) if LC(\u2113) \u2113. In the extreme case of O(\u2113) = 0 for 1 \u2264 \u2113 \u2264M , we set O(M) to 1. For the SSJoin algorithm in HS, we used the ProbeOptMerge algorithm [130], which can be used with Hashed Sampling and Jaccard similarity. We did not implement the clustering version since the the improvement was marginal [13, 130]. Evaluation metric: We use absolute count and average (absolute) relative error to show the accuracy. A relative error is defined as |est size \u2212 true size|\/|true size|. We use both measures since the average relative error favors underestimation and can be misleading. That is even if we always answer with 0, the error is capped by -100%. Counts are shown in log scale as the distribution is highly skewed. Given the nature of random sampling, accuracy figures are given with the median value across three runs. This applies to HS, as well as the subsets of the full DBLP data set. For efficiency, we measure the runtime, which is divided into pre-processing time and estimation time. HS assumes pre-complied samples and pre-processing time corresponds to the time for building the sampled inverted index. For LC, LCNC and IS, it is the time necessary for Min-Hash signature generation. The estimation time is the time required for the actual estimation. For HS, it is the SSJoin time on the samples. For LC, LCNC and 93 5.6. Experimental Evaluation 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 100 101 102 103 104 105 106 107 Jaccard similarity SS Jo in s ize True LC(0.1%) LC(0.04%) HS(5%) HS(2%) Figure 5.11: Accuracy on the DBLP Data Set IS, the time includes the frequent pattern mining time, level sum computation time, as well as the time for Lattice Counting. LC adds the NNLS solving time on top of it. All the times measured include disk I\/O\u2019s. We implemented all the estimation algorithms in Java. We downloaded the NNLS solver package from [62]. For the pattern mining algorithm, we downloaded the trie-based Apriori algorithm from [46], but almost any frequent pattern mining algorithms can be used for our estimation purposes. We ran all our experiments on a desktop PC running Linux Kernel 2.6.22 over a 3.00 GHz Pentium 4 CPU with 1GB of main memory. 5.6.2 DBLP Data Set: Accuracy and Efficiency We first report the results on the accuracy and runtime using the 40K DBLP data set. Figure 5.11 shows the true and estimated SSJoin sizes of LC(0.1%), LC(0.04%), HS(5%), and HS(2%). HS(5%) and HS(2%) deliver relatively accurate estimates for \u03c4 \u2264 0.3. However, we may be more interested in higher threshold ranges. For \u03c4 \u2265 0.4, both HS(5%) and HS(2%) consistently estimate the join size to be zero, which is not a meaningful estimate. LC(0.1%) performs better than HS(5%) and HS(2%) for \u03c4 between 0.4 and 0.7. However, the clear winner is LC(0.04%) which is by far the closest to the true size. Figure 5.12 shows the runtime performance. It is clear that for both estimation time and pre-processing time, LC is at least as efficient as HS. Yet, as shown in Figure 11 and discussed before, LC can be significantly more accurate, particularly for \u03c4 \u2265 0.4. 5.6.3 Effectiveness of Lattice Counting and Error Correction Figure 5.13 (a) shows the average relative error of IS, LC(0.02%) and LCNC(0.02%) in the 160K DBLP data set. Recall that IS does not apply Lattice Counting and LCNC does not apply the error correction procedure in Section 5.5. A huge overestimation is observed in IS. LCNC is better than IS but still shows a rather large overestimation. LC shows the best accuracy. Its errors are very small especially in the high threshold range. This verifies that the Lattice Counting effectively considers the overlaps in counting and that the error correction step indeed offsets the systematic overestimation by Min-Hashing. 94 5.6. Experimental Evaluation HS(5%) HS(2%) LC(0.1%) LC(0.04%)0 2 4 6 8 10 12 ru n tim e (se c) HS(5%) HS(2%) LC(0.1%),LC(0.04%)0 0.5 1 1.5 2 2.5 3 3.5 4 ru n tim e (se c) (a) Estimation time (b) Pre-processing time Figure 5.12: Performance on the DBLP Data Set 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 \u221210 0 10 20 30 40 50 60 70 80 Jaccard similarity re la tiv e er ro r IS LCNC(0.02%) LC(0.02%) 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 \u22121 0 1 2 3 4 5 6 Jaccard similarity re la tiv e er ro r IS LCNC(0.02%) LC(0.02%) IS LCNC(0.02%) LC(0.02%)0 1 2 3 4 5 6 e st im at io n tim e (se c) (a) 160K (b) 800K (c) Runtime Figure 5.13: Effectiveness of Lattice Counting and the Error Correction Figure 5.13 (b) shows the results of the full data set. An interesting difference is that IS almost consistently produces a relative error of \u22121. At first glance, \u22121 might seem better than LCNC; but this indicates that the IS estimation is zero and is not useful. The underestimation is due to the poor estimation of Power-law parameters. As stated in Section 5.4.3, we use the Power-law distribution of number of pairs-similarity relationship. In this case, IS performs poor parameter estimation, i.e., an overestimation of \u03b1, and this results in the severe underestimations. We can see IS produces very unstable estimation. The overestimation of LCNC is again apparent and we can see that the error correction step is very effective. Figure 5.13 (c) shows of the estimation time for each algorithm using the 160K DBLP data set. This graph clearly shows that lattice counting (Section 5.3), the Power-law parameter estimation (Section 5.4) and overestimation correction (Section 5.5) all take negligible runtime overhead. The NNLS optimization generally takes less than 50 milliseconds. 5.6.4 Scalability Figure 5.14 compares the accuracy and runtime of LC(0.02%) and HS(1%) varying the data set size with \u03c4 = 0.8. HS(1%) does not provide meaningful estimates until the data set size reaches 400K where there are sufficiently many highly similar pairs. Its produces zero estimates for size between 40K and 160K. The estimates of LC(0.02%) are quite reliable, and are consistently below a relative error of 10. A relative error of 10 may seem big; but it is reasonable considering the high selectivity 95 5.6. Experimental Evaluation 40k 80k 160k 240k 400k 800k 0 2 4 6 8 10 data set size re la tiv e er ro r f or \u03c4 = 0. 8 LC(0.02%) HS(1%) 40K 80K 160K 240K 400K 800K 0 20 40 60 80 100 120 data set size pr ep ro ce ss in g tim e (se c) LC(0.02%) HS(1%) 40K 80K 160K 240K 400K 800K 0 20 40 60 80 100 120 140 data set size e st im at io n tim e (se c) LC(0.02%) HS(1%) (a) Relative error (b) Pre-processing time (c) Estimation time Figure 5.14: Scalability Using the DBLP Data Set 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 100 101 102 103 104 105 106 107 108 Jaccard similarity SS Jo in s ize True LC(0.1%) LC(0.04%) HS(5%) HS(10%) 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 100 101 102 103 104 105 106 107 Jaccard similarity SS Jo in s ize True LC(0.1%) LC(0.04%) HS(5%) HS(10%) (a) Avg set size=20 (b) Avg set size=25 Figure 5.15: Accuracy on the Synthetic Data Set of a high threshold such as \u03c4 = 0.8. For instance, in the 80K data set, there are more than 6 billion pairs and the selectivity of \u03c4 = 0.8 is about 0.000012% compared to the total number of pairs. Figure 5.14 (b) and (c) show the pre-processing and estimation time of HS(1%) and LC(0.02%). LC(0.02%) has consistently lower pre-processing time than HS(1%). We can observe the quadratic increase of estimation time of HS(1%). LC(0.02%) also exhibits an increase in the estimation time primarily due to the increase in the frequent pattern mining time. However the increase is rather mild. Chuang et al. proposed a sampling method for computing the pattern distribution [32]. Such a technique should make LC even more scalable. 5.6.5 Synthetic Data Set: Accuracy, Efficiency and Scalability We now report the results on the synthetic data set. We varied the average set size parameter from 15 to 50. Figure 5.15 (a) and (b) show the accuracy when the average set size is 20 and 25 respectively. In both cases, the estimation of LC(0.04%) is close to the true SSJoin size. The estimates generated by LC(0.1%) are not as good as those generated by LC(0.04%). However, the estimation is still close to the true size and and generates reasonable estimates. Both HS(5%) and HS(10%) produce reliable estimates at lower similarity ranges, but fail to create non-trivial estimates at high simialrity ranges. 96 5.7. Conclusion The following table shows how the estimation time (in seconds) of LC(0.1%) and HS(5%) varies with average set size. LC is not much affected by increasing the average set size. LC performs analysis on the standardized representation of sets, Min-Hash signatures. Thus, its runtime is almost invariant to the original set size. In contrast, HS(5%) is affected greatly by increasing the average set size. This is due primarily to the size of the inverted index. avg. set size 15 20 25 30 50 LC(0.1%) 1.34 1.39 1.39 1.38 1.34 HS(5%) 0.71 1.17 1.77 2.47 6.43 5.6.6 On Power-law Hypotheses In this chapter, the key hypothesis is that using simple sampling to estimate SSJoin size is unreliable 11. A better approach is to rely on Power-laws and to estimate the parameters of Power-laws in a sample-independent fashion. Certainly, one can argue that the minimum support threshold is effectively doing \u201csubsetting\u201d. But we believe that subsetting by the minimum support threshold is a more principled way of selection than sampling is. The experimental results shown so far support this hypothesis. An interesting question would be if the Power-law really holds in the data set. In Sec- tion 5.4, we rely on two Power-law hypotheses. The first one is on the count-frequency rela- tionship in the patterns and the second one is on the number of pairs-similarity relationship. Proving that a distribution really follows a Power-law distribution is not a trivial task. Some of the efforts to quantify the relationship includes the p-value for the Kolmogorov-Smirnov test [33]. However, in our case, the number of points are not sufficient for drawing a con- clusion with statistical significance. Moreover, an approximate modeling was enough for our purposes. Therefore we show the log-log plots instead. Figure 5.7 and Figure 5.15 present the number of pairs distribution-similarity distribution and the pattern count-frequency distribu- tion. Our observations agree with the findings in [32], but formally verifying the relationship is an open problem. 5.6.7 Summary of Experiments We evaluated the proposed solutions, LC, using a real-world data set and a synthetic data set. LC is compared with HS, which is an adaptation of Hashed Samples [61] to the SSJ problem. While random sampling based HS showed poor estimation at high thresholds, LS consistently delivered estimation within relative errors of a few factors. Analysis at each step shows that each step effectively reduces overestimation errors by an order of magnitude. 5.7 Conclusion We propose an accurate and efficient technique for the SSJoin size estimation. Our technique uses Min-Hash signatures which are succinct representation of sets. We propose a lattice 11We discuss how we can use random sampling for similarity join size estimation in the following chapter. 97 5.7. Conclusion based counting technique called Lattice Counting to efficiently count the number of pairs satisfying the similarity threshold. We exploit Power-law distributions to efficiently compute the pattern distribution necessary for the Lattice Counting. A systematic overestimation by relying on Min-Hash signatures is observed and we also propose a procedure to correct it. In the future, we plan to exploit sampling in the frequent pattern mining for the pattern distribution [15, 32]. 98 Chapter 6 Vector Similarity Join Size Estimation In this chapter, we study the VSJ problem in Section 1.4.3, where a record is a vector. It is a generalization of the SSJ problem in the previous chapter. We first consider the difference between the two problem formulation and the challenges in the following section. 6.1 Introduction As introduced in the previous chapter, given a similarity measure and a minimum similarity threshold, a similarity join finds all pairs of objects whose similarity is at least as large as the similarity threshold. The object in a similarity join is often a vector. For instance, a document can be represented by a vector of words in the document, or an image can be represented by a vector from its color histogram. In this chapter, we focus on the vector representation of objects and study the VSJ problem in Definition 4. In the previous chapter, the similarity join size estimation problem has been defined using sets using Definition 3. The formulation of similarity joins with vectors is more general and can handle more practical applications. For instance, while in the SSJ problem a document is simply a set of words in the document, in the VSJ problem a document can be modeled with a vector of words with TF-IDF weights. It can also deal with multiset semantics with occurrences. In fact, most of the studies on similarity joins first formulate the problem with sets and then extend it with TF-IDF weights, which is indeed a vector similarity join. A straightforward extension of SSJ techniques for the VSJ problem is to embed a vector into a set space. We convert a vector into a set by treating a dimension as an element and repeating the element as many times as the dimension value, using standard rounding tech- niques if values are not integral [8]. In practice, however, this embedding can have adversary effects in performance, accuracy or required resources [8]. Intuitively, a set is a special case of a binary vector and is not more difficult to handle than the vector. For instance, Bayardo et al. [13] define the vector similarity join problem and add special optimizations that are possible when binary vectors (sets). In our VSJ problem, we consider cosine similarity as the similarity measure sim since it has been successfully used across several domains [13]. Let u[i] denote the i-th dimension value of vector u. Cosine similarity is defined as cos(u, v) = u \u00b7v\/ \u2016u\u2016 \u2016v\u2016, where u \u00b7v =\u2211i u[i] \u00b7v[i] and \u2016u\u2016 =\u221a\u2211i u[i]2. We first focus on self-join size estimation, and discuss non-self joins at Section 6.5.2. One of the key challenges in similarity join size estimation is that the join size can change 99 6.2. Baseline Methods dramatically depending on the input similarity threshold. While the join size can be close to n2 at low thresholds where n is the database size, it can be extremely small at high thresholds. For instance, in the DBLP data set, the join selectivity is only about 0.00001 % at \u03c4 = 0.9! While many sampling algorithms have been proposed for the (equi-)join size estimation, their guarantees fail in such a high selectivity range, e.g., [49, 58, 96]. Intuitively, it is not practical to apply random sampling in such a high selectivity. This is problematic since similarity thresholds between 0.5 and 0.9 are typically used [13]. In this chapter, we propose sampling based techniques that exploit the Locality Sensitive Hashing (LSH) scheme, which has been successfully applied in similarity searches across many domains. LSH builds hash tables such that similar objects are more likely to be in the same buckets. Our key idea is that although sampling a pair satisfying a high threshold is very difficult, it is relatively easy to sample the pair using the LSH scheme because it groups similar objects together. We show that the proposed algorithm LSH-SS gives good estimates at both high and low thresholds with a sample size of \u2126(n) pairs of vectors (i.e., \u2126( \u221a n) tuples from each join relation in an equi-join) with probabilistic guarantees. The proposed solution only needs minimal addition to the existing LSH index and can be easily applied. Thus it is readily applicable to many similarity search applications. As a summary, we make the following contributions: \u2022 We present two baseline methods in Section 6.2. We consider random sampling and adapt Lattice Counting (LC) [92] which is proposed for the SSJ problem. \u2022 We extend the LSH index to support similarity join size estimation in Section 4. We also propose LSH-S which relies on an LSH function analysis. \u2022 We describe a stratified sampling algorithm LSH-SS that exploits the LSH index in Section 6.4. We apply different sampling procedures for the two partitions induced by an LSH index: the pairs of vectors that are in the same buckets and those that are not. \u2022 We compare the proposed solutions with random sampling and LC using real-world data sets in Section 6.6. The experimental results show that LSH-SS is the most accurate with small variance. 6.2 Baseline Methods 6.2.1 Random Sampling The first baseline method is uniform random sampling. We selectm pairs of vectors uniformly at random (with replacement) and count the number of pairs satisfying the similarity threshold \u03c4 . We return the count scaled up by M\/m where M denotes the total number of pairs of vectors in the database V . We note two challenges in the VSJ problem compared to the equi-join size estimation. In the equi-join of |R \u22b2\u22b3 S|, we can focus on frequency distribution on the join column of each relation R and S. For instance, if we know a value v appears nr(v) times in R and ns(v) times in S, the contribution of v in the join size is simply nr(v) \u00b7 ns(v), i.e. multiplication of two 100 6.3. LSH Index for the VSJ Problem frequencies. We do not need to compare all the nr(v)\u00b7ns(v) pairs. In similarity joins, however, we need tof actually compare the pairs to measure similarity. This difficulty invalidates the use of popular auxiliary structures such as indexes [28, 58] or histograms [28]. Furthermore, similarity join size at high thresholds can be much smaller than the join size assumed in equi-joins. For instance, in the DBLP data set (n = 800K), the join size of \u2126(n log n) assumed in bifocal sampling is more than 15M pairs and corresponds to the cosine similarity value of only about 0.4. In the most cases, users will be interested in much smaller join sizes and thus higher thresholds. 6.2.2 Adaptation of Lattice Counting We proposed Lattice Counting (LC) in the previous chapter to estimate SSJ size with Jaccard similarity. LC performs an analysis on the Min-Hash signatures of all sets. We observe that the analysis of LC is valid as long as the number of matching positions in the signatures of two objects is proportional to their similarity. Note that this requirement is exactly the property of the LSH scheme. Thus LC can be applied for the VSJ problem with an appropriate LSH scheme. In fact, Min-Hashing is the LSH scheme for Jaccard similarity. For the VSJ problem, we first build the signature database by applying an LSH scheme to the vector database and then apply LC. 6.3 LSH Index for the VSJ Problem We first describe how we extend the LSH index and present a naive method using the extended LSH index with a uniformity assumption. We then present LSH-S which improves the naive method with simple random sampling. 6.3.1 Preliminary: LSH Indexing Let H be a family of hash functions such that h \u2208 H : Rd \u2192 U . Consider a function h that is chosen uniformly at random from H and a similarity function sim : Rd \u00d7 Rd \u2192 [0, 1]. The family H is called locality sensitive if it satisfies the following property [23]. Definition 9. [Locality Sensitive Hashing] For any vectors u, v \u2208 Rd, P (h(u) = h(v)) = sim(u, v). That is, the more similar a pair of vectors is, the higher the collision (or matching) probability is. The LSH scheme works as follows [23, 70]: For an integer k, we define a function family G = {g : Rd \u2192 Uk} such that g(v) = (h1(v), ..., hk(v)), where hi \u2208 H, i.e. g is the concatenation of k LSH functions. For an integer \u2113, we choose \u2113 functions G = {g1, ..., g\u2113} from G independently and uniformly at random. Each gi, 1 \u2264 i \u2264 \u2113, effectively constructs a hash table denoted by Dgi . A bucket in Dgi stores all v \u2208 V that have the same gi values. Since the total number of buckets may be large, we only store existing buckets by resorting to standard hashing. G defines a collection of \u2113 tables IG = {Dg1 , ..., Dg\u2113} and we call it an LSH index. 101 6.3. LSH Index for the VSJ Problem The definition of LSH in Definition 9 is slightly different from the original definition in [70]. However, they are fundamentally the same and many LSH functions satisfy this definition [23]. LSH families have been developed for several (dis)similarity measures including Hamming distance, \u2113p distance, Jaccard similarity, and cosine similarity [7]. We rely on the LSH scheme proposed by Charikar [23] that supports cosine similarity. The proposed algorithms can easily support other similarity measures by using an appropriate LSH family. Extending The LSH Scheme with Bucket Counts We describe algorithms using a single LSH table: g = (h1, ..., hk) and an LSH table Dg. Extensions with multiple LSH tables are in Section 6.5.2. Suppose that Dg has ng buckets; all vectors in the database are hashed into one of the ng buckets. We denote a bucket by Bj , 1 \u2264 j \u2264 ng. Given a vector v, B(v) denotes the bucket to which v belongs. In the LSH table, each bucket Bj stores the set of vectors that are hashed into Bj . We extend this traditional LSH table by adding a bucket count bj for each bucket Bj that is the number of vectors in the database that are hashed into Bj . The overhead of adding a bucket count to each bucket is not significant compared to other information such as vectors. Depending on implementation, the count may be freely available. 6.3.2 Estimation with Uniformity Assumption Given a collection of vectors V , and a similarity threshold \u03c4 , let M denote the number of total pairs in V , i.e. M = ( n 2 ) . Consider a random pair (u, v) with u, v,\u2208 V, u 6= v. We denote the event sim(u, v) \u2265 \u03c4 by T , and the event sim(u, v) < \u03c4 by F . We call (u, v) a true pair (resp. false pair) if sim(u, v) \u2265 \u03c4 (resp. sim(u, v) < \u03c4). Depending on whether u and v are in the same bucket, we denote the event B(u) = B(v) by H and the event B(u) 6= B(v) by L. With these notations, we can define various probabilities. For instance, P (T ) is the probability of sampling a true pair. P (H|T ) is the probability that a true pair is in the same bucket and P (T |H) is the probability that a pair of vectors from a bucket is a true pair. We use NE to denote the cardinality of the set of pairs that satisfy the condition of event E . For instance, NT is the number of true pairs (the VSJ size J) and NH is the number of pairs in the same buckets. NH can be computed by NH = \u2211ng j=1 (bj 2 ) , where bj is the number of vectors in bucket Bj and ng is the number of buckets in LSH table Dg. The key observation is that if we consider all the pairs of vectors in a bucket, they are either true pairs or false pairs. Using Bayes\u2019 rule [111], we can express this observation as follows: NH = NT \u00b7 P (H|T ) +NF \u00b7 P (H|F ). That is, the total number of pairs of vectors in the same buckets is the sum of the number of true pairs that are in the same buckets (NT \u00b7 P (H|T )) and the number of false pairs that happened to be in the same buckets (NF \u00b7 P (H|F )). Since NF = M \u2212 NT where M is the total number of pairs in V , rearranging the terms gives NT = (NH\u2212M \u00b7P (H|F ))\/(P (H|T )\u2212 P (H|F )). Using \u2018\u02c6\u2019 for an estimated quantity, we have an estimator for the join size J = NT 102 6.3. LSH Index for the VSJ Problem similarity0 1 1 Pr[ g(u) = g(v) ] similarity0 1 1 Pr[ g(u) \u2260 g(v) ] (a) PDF for LSH collision u & v are in the same bucket \u03c4 P[H\u2229T] P[L\u2229T] \u03c4 (b) PDF for LSH non-collision u & v are not in the same bucket Figure 6.1: Probability Density Functions of (non-) Collision in the LSH Scheme as follows: N\u0302T = J\u0302U = NH \u2212M \u00b7 P\u0302 (H|F ) P\u0302 (H|T )\u2212 P\u0302 (H|F ) . (6.1) Note thatM = ( |V | 2 ) is a constant given the database V and NH can be computed using NH =\u2211ng j=1 (bj 2 ) given Dg. The conditional probabilities in Equation (6.1) need to be estimated to compute N\u0302T . We next present our first estimator that relies on an LSH function analysis and the uniformity assumption to estimate the conditional probabilities. Consider a random pair (u, v) such that sim(u, v) is selected from [0, 1] uniformly at random. Recall that when sim(u, v) = s, P (h(u) = h(v)) = s from Definition 9. P (g(u) = g(v)) = sk since g concatenates k hash values. Figure 6.1(a) shows the collision probability density function (PDF) f(s) = sk where s = sim(u, v). The vertical dotted line represents the similarity threshold \u03c4 . The darker area on the right side of the \u03c4 line is the good collision probability, i.e. the probability that B(u) = B(v) (u and v are in the same bucket) and sim(u, v) \u2265 \u03c4 . Thus the area represents P (H \u2229T ). Likewise, the area on the left side of the \u03c4 line is P (H \u2229 F ), which is the probability that sim(u, v) < \u03c4 , but B(u) = B(v). Notice that the area below f(s) does not equal to 1 since it does not cover the entire event space; u and v may not be in the same bucket. Figure 6.1(b) shows the other case where u and v are in different buckets. Its probability density function is 1\u2212 f(s) as shown as the curve. P (L\u2229T ) and P (L \u2229 F ) are defined similarly as shown in the figure. Given g (and thus f) and \u03c4 , P (H\u2229F ), P (H\u2229T ), P (L\u2229F ) and P (L\u2229T ) can be estimated by computing the corresponding areas in Figure 6.1. Based on these areas, we can estimate the desired conditional probabilities using the following: P (H|T ) = P (H \u2229 T ) P (H \u2229 T ) + P (L \u2229 T ) (6.2) P (H|F ) = P (H \u2229 F ) P (H \u2229 T ) + P (L \u2229 F ) (6.3) 103 6.3. LSH Index for the VSJ Problem Since f(s) = sk, the four areas defined in Figure 6.1 can be calculated as follows: P [H \u2229 F ] = \u222b \u03c4 0 f(s)ds = \u03c4k+1 k + 1 P [H \u2229 T ] = \u222b 1 \u03c4 f(s)ds = 1\u2212 \u03c4k+1 k + 1 P [L \u2229 F ] = \u222b \u03c4 0 1\u2212 f(s)ds = \u03c4 \u2212 \u03c4 k+1 k + 1 P [L \u2229 T ] = \u222b 1 \u03c4 1\u2212 f(s)ds = 1\u2212 \u03c4 \u2212 1\u2212 \u03c4 k+1 k + 1 . Using the above probabilities in Equation (6.2) and (6.3) gives, P (H|T ) = 1 1\u2212 \u03c4 \u222b 1 \u03c4 f(s)ds = \u2211k i=0 \u03c4 i k + 1 (6.4) P (H|F ) = 1 \u03c4 \u222b \u03c4 0 f(s)ds = \u03c4k k + 1 . (6.5) Using above P (H|T ) and P (H|F ) in Equation (6.1), J\u0302U = NH \u2212M \u00b7 P\u0302 (H|F ) P\u0302 (H|T )\u2212 P\u0302 (H|F ) = NH \u2212M \u00b7 \u03c4kk+1 \u2211k i=0 \u03c4 i k+1 \u2212 \u03c4 k k+1 = (k + 1)NH \u2212M \u00b7 \u03c4k\u2211k\u22121 i=0 \u03c4 i . Thus we have the following estimator J\u0302U for the VSJ size: J\u0302U = (k + 1)NH \u2212 \u03c4k \u00b7M\u2211k\u22121 i=0 \u03c4 i . (6.6) A drawback with J\u0302U is that it assumes that the similarity of pairs is uniformly distributed in [0, 1]. However, this distribution is generally highly skewed [92]; most of pairs have low similarity values and only a small number of pairs have high similarity values. We next present LSH-S that removes the uniformity assumption with sampling. 6.3.3 LSH-S: Removing Uniformity Assumption We consider two methods for removing the uniformity assumption. First, we can estimate the conditional probabilities by random sampling without resorting to the LSH function analysis. For instance, we can estimate P (H|T ) by counting the number of pairs in the same buckets among the true pairs in the sample. Second, we can estimate the distribution of similarity. 104 6.3. LSH Index for the VSJ Problem Algorithm 6 LSH-S Input: sample size m 1: st = 0, sf = 0, nt = 0, nf = 0 2: for k = 1...m do 3: sample a pair (u, v), u 6= v uniformly at random 4: if sim(u, v) \u2265 \u03c4 then 5: st = st + (sim(u, v)) k, nt = nt + 1 6: else 7: sf = sf + (sim(u, v)) k, nf = nf + 1 8: end if 9: end for 10: P\u0302 (H|T ) = st\/nt, P\u0302 (H|F ) = sf\/nf 11: return J\u0302S = max( NH\u2212MP\u0302 (H|F ) P\u0302 (H|T )\u2212P\u0302 (H|F ) , 1) For instance, if all the pairs in the sample have a similarity value of 0.3, we can only consider similarity s = 0.3 in Figure 6.1 without considering the whole area. We only present the second method since it outperformed the first one in our experiments. We estimate similarity distribution with random sampling. Marginal probabilities P (H|T ) and P (H|F ) can be written as the following where w(s) is the probability density function of sim(u, v) = s and P (H|s) = f(s) is the probability that two vectors are in the same bucket when their similarity is s. P (H|T ) = \u222b 1 \u03c4 w(s) \u00b7 P (H|s)ds (6.7) P (H|F ) = \u222b \u03c4 0 w(s) \u00b7 P (H|s)ds (6.8) Note that with uniform assumption of similarity, w(s) = 1 and the above probabilities are the areas defined in Figure 6.1. With a sample of pairs S, we only consider the similarities that exist in the sample discretizing the similarity space. Then w(s) is approximated as follows: w(s) = |{(u, v) \u2208 S : sim(u, v) = s}|\/|S|. (6.9) For instance, if similarities in S are {0.1, 0.1, 0.1,0.2, 0.2, 0.3}, w(0.1) = 1\/2, w(0.2) = 1\/3, w(0.3) = 1\/6 and w(s) = 0 for s \/\u2208 {0.1, 0.2, 0.3}. Let ST denote the subset of true pairs in S and SF denote the subset of false pairs. Since f(s) = sk, using Equation (6.9) in Equation (6.7) and (6.8) gives P\u0302 (H|T ) = \u2211 (u,v)\u2208ST (sim(u, v))k\/|ST | (6.10) P\u0302 (H|F ) = \u2211 (u,v)\u2208SF (sim(u, v))k\/|SF |. (6.11) In LSH-S in Algorithm 6, lines 3\u223c8 accumulate counts for P (H|s) values weighted by Equa- tion (6.9). Line 10 computes P\u0302 (H|T ) and P\u0302 (H|F ) using Equation (6.10) and (6.11). We rely on the uniformity assumption when st = 0. Line 11 returns the estimate using Equation (6.1). 105 6.4. Stratified Sampling using LSH 6.4 Stratified Sampling using LSH A difficulty in LSH-S is that the conditional probabilities, e.g., P (H|T ), need to be estimated and it is hard to acquire reliable estimates of them. In this section, we present an algorithm that overcomes this difficulty by using the LSH index in a slightly different way. An interesting view of an LSH index is that it partitions all pairs of vectors in V into two groups: the pairs that are in the same buckets and the pairs that are not. The pairs in the same buckets are likely to be more similar from the property of the LSH scheme. Recall that the difficulty of sampling at high thresholds is that the join size is very small and sampling a true pair is very hard. Our key intuition to overcome this difficulty is that even with high thresholds it is relatively easy to sample a true pair from the set of pairs that are in the same buckets. We demonstrate our intuition with a real-world example. Table 6.1 shows actual proba- bilities varying \u03c4 using the DBLP data set. We observe that other than at low thresholds, say 0.1 \u223c 0.3, P (T ) is close to 0, which implies that naive random sampling is not going to work well with any reasonable sample size. However, note that P (T |H) is consistently higher than 0.04 even at high thresholds. That is, it is not difficult to sample true pairs among the pairs in the same buckets. Also observe that P (H|T ) is large at high thresholds but very small at low thresholds. This means that at high thresholds, a sufficient fraction of true pairs are in the same buckets. But at low thresholds, most of true pairs are not in the same buckets, which implies that the estimate from the pairs in the same buckets is not enough. However, at low thresholds, P (T |L) becomes larger and thus sampling from pairs that are not in the same buckets becomes feasible. \u03c4 P (T ) P (T |H) P (H|T ) P (T |L) 0.1 .082 0.31 0.00001 0.082 0.3 .00024 0.054 0.00041 0.00024 0.5 .000003 0.049 0.0028 0.00003 0.7 0 0.045 0.21 0 0.9 0 0.040 0.86 0 Table 6.1: An Example Probabilities in DBLP Our stratified sampling algorithm exploits this trend for reliable estimation at both high and low thresholds. We formalize this idea in the following section. 6.4.1 LSH-SS: Stratified Sampling We define two strata of pairs of vectors as follows depending on whether two vectors of a pair are in the same bucket. \u2022 Stratum H (SH): {(u, v) : u, v \u2208 V,B(u) = B(v)} \u2022 Stratum L (SL): {(u, v) : u, v \u2208 V,B(u) 6= B(v)}. Note that SH and SL are disjoint and thus we can independently estimate the join size from each stratum and add the two estimates. SH and SL are fixed given Dg. Let JH = 106 6.4. Stratified Sampling using LSH |{(u, v) \u2208 SH : sim(u, v) \u2265 \u03c4}|, JL = |{(u, v) \u2208 SL : sim(u, v) \u2265 \u03c4}|, and let J\u0302H and J\u0302L be their estimates. We estimate the join size as follows: J\u0302SS = J\u0302H + J\u0302L (6.12) A straightforward implementation of this scheme would be to perform uniform random sampling in SH and SL, and aggregate the two estimates. However, this simple approach does not work well at high thresholds. The problem is that J\u0302L is unstable with large variance due to very small P (T |L) at high thresholds. See the next example. Example 8. Assume that |NL| = 1, 000, 000, JL = 1 at \u03c4 = 0.9, and the sample size is 10; only one pair out of 1, 000, 000 pairs satisfies \u03c4 = 0.9 and we sample 10 pairs. In most cases, the true pair will not be sampled and J\u0302L = 0. But if the only true pair is sampled, J\u0302L = 100, 000. The estimate fluctuates between 0 and 100, 000 and is not reliable. Our solution for this problem is to use different sampling procedures in the two strata. Recall that similarities of the pairs in SH are higher and P (T |H) is not too small, even at high thresholds. Thus, for SH , we use uniform random sampling. Relatively small sample size will suffice for reliable estimation in SH . In SL, however, P (T |L) varies a lot depending on the similarity threshold. While at low thresholds P (T |L) is relatively high and the estimate can be reliable, P (T |L) becomes very small at high thresholds and the resulting estimate has huge variance as illustrated in Example 8. What is needed is to use J\u0302L only when it is expected to be reliable and discard J\u0302L when it is not. Discarding J\u0302L at high thresholds does not hurt accuracy much since the contribution of JL in J is not large. Observe that in Table 6.1, when the similarity thresholds is high, P (H|T ) is large, which means that a large fraction of true pairs are in SH , not in SL. Thus in SL, we use adaptive sampling [96] since it enables us to detect when the estimate is not reliable. A novelty is that we return a safe lower bound discarding the unstable estimate when it is not expected to be reliable. Algorithm 7 describes the proposed stratified sampling algorithm LSH-SS. It applies a different sampling subroutine to each stratum. For SH , it runs the random sampling sub- routine SampleH. For SL, it runs the adaptive sampling subroutine SampleL. The final estimate is the sum of estimates from the two Strata as in Equation (6.12) (line 3). Sampling in Stratum H SampleH of Algorithm 7 describes the random sampling in SH . First, a bucket Bj is randomly sampled weighted by the number of pairs in the bucket, weight(Bj) = (bj 2 ) (line 3). We then select a random pair (u, v) from Bj (line 4). The resulting pair (u, v) is a uniform random sample from SH . SampleH has one tunable parameter mH which is the sample size. We count the number of pairs satisfying the similarity threshold \u03c4 in mH sample pairs and return the count scaled up by NH\/mH (line 9). Sampling in Stratum L SampleL of Algorithm 7 specifies the adaptive sampling [96] in SL. It has two tunable pa- rameters \u03b4 and mL. \u03b4 specifies the answer size threshold, the number of true samples to give 107 6.4. Stratified Sampling using LSH Algorithm 7 LSH-SS Procedure LSH-SS Input: similarity threshold \u03c4 , sample size for Stratum H mH , answer size threshold \u03b4, max sample size for Stratum L mL 1: J\u0302H = SampleH(\u03c4,mH) 2: J\u0302L = SampleL(\u03c4, \u03b4,mL) 3: return J\u0302SS = J\u0302H + J\u0302L Procedure SampleH Input: \u03c4 , mH (sample size) 1: nH = 0 2: for i from 1 to mH do 3: sample a bucket Bj with weight(Bj) = ( bj 2 ) 4: sample two vectors u, v \u2208 Bj , u 6= v 5: if sim(u, v) \u2265 \u03c4 then 6: nH = nH + 1 7: end if 8: end for 9: return J\u0302H = nH \u00b7NH\/mH Procedure SampleL Input: \u03c4 , \u03b4 (answer size th.), mL (sample size th.) 1: i = 0, nL = 0 2: while nL < \u03b4 and i < mL do 3: sample a uniform random pair (u, v), B(u) 6= B(v) 4: if sim(u, v) \u2265 \u03c4 then 5: nL = nL + 1 6: end if 7: i = i+ 1 8: end while 9: if i \u2265 mL then 10: return J\u0302L = nL 11: end if 12: return J\u0302L = nL \u00b7NL\/i a reliable estimate, and mL is the maximum number of samples. We sample a pair from SL (line 3) and see if it satisfies the given threshold (line 4). In case LSH computation for the bucket checking at line 3 is expensive, we can delay the checking till line 5, which in effect makes mL slightly smaller. The while-loop at line 2 can terminate in two ways: (1) by ac- quiring a sufficiently large number of true samples, nL \u2265 \u03b4 or (2) by reaching the sample size threshold i \u2265 mL, where i is the number of samples taken. In the former case, we return the count scaled up by NL\/i (line 12). In the latter case, we cannot guarantee that the estimate is reliable and simply return the number of true samples without scaling up (line 10). We justify this design by the following theorem which is a direct adaptation of Theorem 3.1 in [96]. Theorem 1. Suppose that in a run of SampleL in Algorithm 7, the while-loop terminates when we reach the condition i \u2265 mL. Then for 0 < p < 1, if mL \u2265 1\/(1 \u2212 p), the relative 108 6.4. Stratified Sampling using LSH error in J\u0302L is less than n 2 with probability p, where n is the database size. Adaptive sampling gives an upper bound when the loop terminates due to the sample size threshold mL. But the bound from Theorem 1 in our case is a trivial bound n 2, which implies we cannot guarantee that the scaled-up estimate is reliable. Thus we simply return the number of true pairs found in the sample, nL, as J\u0302L without scaling it up. Since JL is at least as large as nL, we call J\u0302L = nL a safe lower bound. For the tunable parameters, we used mH = n and mL = n and \u03b4 = log n (all logarithms used are base-2 logarithms) where n is the database size, n = |V |. Note that the size is expressed in the number of pairs of vectors, not the number of vectors. If we are sampling from two collections of vectors, n pairs corresponds to \u221a n vectors from each collection (n = \u221a n\u00d7\u221a n), which is even smaller than the sample size \u221a n logn in the equi-join size estimation [49]. The parameter values used in our experiments give provably good estimates at both high and low thresholds. We give the details in the following section. 6.4.2 Analysis Let \u03b1 = P (T |H) and \u03b2 = P (T |L) for the sake of presentation. In our analysis, a similarity threshold \u03c4 is considered high when \u03b1 \u2265 log n\/n and \u03b2 < 1\/n, and is considered low when \u03b1 \u2265 logn\/n and \u03b2 \u2265 logn\/n. Our model is analogous to the classic approach [28, 49] of distinguishing high frequency values from low frequency values to meet the challenge of skewed data. Our distinction effectively models different conditional probabilities that hold in different threshold values as in Table 6.1. 12 We first analyze the high threshold case and then analyze the low threshold case. Guarantees at high thresholds Recall that \u03b1 = P (T |H) is the probability that a pair of vectors in a bucket are indeed a true pair and \u03b2 = P (T |L) is the probability that a pair of vectors that are not in the same bucket is a true pair. We assume \u03b1 \u2265 log n\/n and \u03b2 < 1\/n at high thresholds. The former condition on \u03b1 intuitively states that even when the join size is small, the fraction of true pairs in SH is not too small from the property of the LSH scheme. The latter condition on \u03b2 states that it is very hard to sample true pairs in SL at high thresholds. As a sanity check, consider the example in Table 6.1. In the data set, n = 34, 000 and \u03b2 \u223c 0.00003(= 1\/n) at \u03c4 = 0.5. Thus high thresholds correspond to [0.5, 1.0]. At high thresholds, \u03b1 = P (T |H) is consistently higher than 0.04 which is well over the assumed value of \u03b1 which is 0.00046(= log n\/n) for the data set. \u03b2 = P (T |L) is also below or very close to the calculated 0.00003(\u03b2 = 1\/n) in the range. The following theorem states that LSH-SS gives a good estimate at high thresholds. 12We can also perform a similar analysis by categorizing high and low thresholds by join size as done in the equi-join size estimation [49]. However, they are fundamentally the same and we feel that our current notations enable a more direct and clearer analysis. 109 6.4. Stratified Sampling using LSH Theorem 2. Let 0 < \u01eb < 1 be an arbitrary constant. Assume \u03b1 \u2265 logn\/n and \u03b2 < 1\/n. Then for sufficiently large n with c = 1\/(log e \u00b7 \u01eb2), mH = cn and mL = cn, Pr(|J\u0302SS \u2212 J | \u2264 (1 + \u01eb)J) \u2265 1\u2212 2 n . To prove Theorem 2, we analyze the behavior of SampleH and SampleL in Algorithm 7 separately by the two lemmas below. We then combine the two results using Equation (6.12). First, the following lemma shows that SampleH in Algorithm 7 gives a reliable estimate at high thresholds. Lemma 1. Let 0 < \u01eb < 1 be an arbitrary constant. Assume \u03b1 \u2265 logn\/n. Then with c = 4\/(log e \u00b7 \u01eb2) and mH = cn, we have Pr(|J\u0302H \u2212 JH | \u2264 \u01ebJH) \u2265 1\u2212 1 n . Proof. Let X be a random variable denoting the number of pairs in the sample that satisfy \u03c4 in SampleH of Algorithm 7. Then X is a binomial random variable with parameters (mH , \u03b1) [111]. Since mH = cn and \u03b1 \u2265 logn\/n, E(X) \u2265 clogn. For an arbitrary constant 0 < \u01eb < 1, by Chernoff bounds [111] Pr(|X \u2212 E(X)| > \u01ebE(X)) \u2264 e\u2212 clogn\u01eb 2 4 . Letting c = 4\/(log e \u00b7 \u01eb2) gives Pr(|X \u2212 E(X)| > \u01ebE(X)) \u2264 1 n . E(X) = JH \u00b7 mHNH . Thus, NH mH \u00b7 E(X) = NHmH \u00b7mH \u00b7 JH NH = JH . Therefore, Pr(|NH mH \u00b7X \u2212 JH | > \u01ebJH) \u2264 1 n . J\u0302H = X \u00b7 NH\/mH in SampleH of Algorithm 7. Plugging in J\u0302H in the above inequality completes the proof. Second, the following lemma states that SampleL returns a safe lower bound with high probability. Lemma 2. Assume \u03b2 < 1\/n. Then for sufficiently large n, an arbitrary constant c\u2032 and mL = c \u2032n, we have Pr(J\u0302L \u2264 c\u2032) \u2265 1\u2212 1 n . 110 6.4. Stratified Sampling using LSH Proof. Let Y be a random variable denoting the number of pairs in the samples satisfying \u03c4 in SampleL of Algorithm 7. We show that Y is not likely to be bigger than \u03b4 =log n. Y is a binomial random variable with parameters (mL, \u03b2). For an arbitrary constant \u01eb\u2032 \u2265 2e\u2212 1, by Chernoff bounds [111] Pr(Y > (1 + \u01eb\u2032)E(Y )) \u2264 2\u2212E(Y )(1+\u01eb\u2032). Therefore, the probability that the loop of SampleL terminates by acquiring enough number of true pairs (\u03b4 = log n) is as follows: Pr(Y > \u03b4 = logn) \u2264 2\u2212logn = 1 n . Since mL = c \u2032n and \u03b2 < 1\/n, E(X) < c\u2032. If Y \u2264 \u03b4, SampleL of Algorithm 7 returns J\u0302L = Y without scaling it up. Therefore, Pr(J\u0302L = E(Y ) < c \u2032) \u2265 1\u2212 1 n . Finally, we prove Theorem 2 using Lemma 1 and Lemma 2. Proof. For sufficiently large n, c\u2032 \u2264 JL. Thus from Lemma 2, Pr(|J\u0302L \u2212 JL| \u2264 JL) \u2265 1\u2212 1 n . Since J\u0302SS = J\u0302H+ J\u0302L and J = JH+HL, combining the above inequality with Lemma 1 proves the theorem. Guarantees at low thresholds At low thresholds, we assume that \u03b1 \u2265 log n\/n and \u03b2 \u2265 logn\/n. The rationale is that as the actual join size increases, more true pairs are in SL and sampling true pairs in SL becomes not so difficult any more. Again these conditions are usually met when the threshold is low as in the example in Table 6.1. In fact, the contribution from SL, JL dominates the join size at low thresholds. The following theorem states that our estimate using Equation (6.12) gives a reliable estimate even when the threshold is low. Theorem 3. Let 0 < \u01eb < 1 be an arbitrary constant. Assume \u03b1 \u2265 log n\/n and \u03b2 \u2265 logn\/n. Then with c = 4\/(log e \u00b7 \u01eb2), c\u2032 = max(c, 1\/(1\u2212 \u01eb)), mH = cn and mL = c\u2032n, Pr(|J\u0302SS \u2212 J | \u2264 \u01ebJ) \u2265 1\u2212 3 n . 111 6.5. Additional Discussions Proof. As we have the same conditions on \u03b1, mH , and c, Lemma 1 still holds in the low threshold range as well. However, due to the increased \u03b2, a different analysis needs to be done for SampleL (Lemma 2). We first show that SampleL returns a scaled-up estimate not a safe lower bound with high probability, and then show that the scaled-up estimate is reliable. Similarly as in Lemma 2, Y is a binomial random variable with parameters (mL, \u03b2). Since mL = c \u2032n and \u03b2 \u2265 logn\/n, E(Y ) \u2265 c\u2032logn. From the given condition, c\u2032 \u2265 2\/(log e \u00b7 \u01eb2) and c\u2032 \u2265 1\/(1\u2212 \u01eb). Thus, by Chernoff bounds, Pr(Y \u2265 (1\u2212 \u01eb)E(Y ) \u2265 (1\u2212 \u01eb)c\u2032logn \u2265 logn = \u03b4) \u2265 1\u2212 1 n . This means that the while-loop (line 2) of SampleL Algorithm 7 terminates by reaching the desired answer size threshold \u03b4 with high probability. Then SampleL returns J\u0302L = Y \u00b7JL\/mL. Moreover, since c\u2032 \u2265 4\/(log e \u00b7 \u01eb2), by Chernoff bounds, Pr(|Y \u2212 E(Y )| \u2265 \u01ebE(Y )) \u2264 2 n . Therefore, Pr(|J\u0302L \u2212 JL| \u2264 \u01ebJL) \u2265 1\u2212 2 n . Since J\u0302SS = J\u0302H + J\u0302L and J = JH +HL, the above inequality along with Lemma 1 completes the proof. When 1\/n \u2264 \u03b2 < log n\/n for which we do not guarantee the accuracy, one can use a dampened scaling up factor between 1 and NL\/i (instead of 1 or NL\/i) at line 12 of SampleL. We do not focus on such heuristics in this chapter. We demonstrate that our guarantees indeed hold and thus LSH-SS provides reliable estimates at both high and low thresholds with real-world data sets in the following section. 6.5 Additional Discussions 6.5.1 The Optimal-k for The VSJ Problem Recall that k is the number of LSH functions for g. Ideally, we want high P (T |H) and P (H|T ) because the estimate from SH is more reliable and having more true pairs in SH reduces the dependency on SL. When SH has all the true pairs (P (H|T ) = 1)) and does not have any false pairs (P (T |H) = 1)), we can trivially solve the VSJ problem; J\u0302 = NH = J . P (T |H) (resp. P (H|T )) is analogous to precision (resp. recall) in information retrieval. We note that k value has the following trade-offs between P (T |H) and P (H|T ). \u2022 A larger k increases P (T |H) but decreases P (H|T ). With a sufficiently large k, only exactly the same vectors will be in the same buckets. P (T |H) = 1 in this case since any pairs of vectors from a bucket are the same vector. However, only a very small fraction of true pairs is in the same buckets resulting in a very small P (H|T ). 112 6.5. Additional Discussions \u2022 A smaller k decreases P (T |H) but increases P (H|T ). In an extreme case of k = 0, SH consists of all the pairs of vectors in V , and thus P (H|T ) = 1. However, P (T |H) = P (T ) and the LSH scheme does not offer any benefit. Observe that P (T |H) \u2265 P (T |L) from the property of the LSH indexing. The intuition on choosing k is that we want to increase JH as long as we have good estimates with high probability. Since decreasing k increases P (H|T ) and JH , this means that we can decrease k as long as P (T |H) is not too small. Decreasing k also reduces the LSH function computation time. With this intuition, we can formalize the problem of choosing k as follows: Definition 10 (The Optimal-k Problem). Given a desired error bound \u01eb > 0 and the bound on the probabilistic guarantee p, find the minimum k such that P (T |H) \u2265 \u03c1, where \u03c1 = \u03c1(\u01eb, p). Assuming a similarity distribution of the database (and thus a formula on P (T |H), e.g., Figure 6.1), we can analytically find the optimal k. However, P (T |H) is dependent on the data and the LSH scheme used, and so is the optimal value of k. We empirically observed that 5 \u2264 k \u2264 15 generally gives the best accuracy for the binary LSH function used for cosine similarity. We also observed that using a too small value of k, say 5, had adversary impacts on runtime as well as accuracy. 6.5.2 Extensions Using Multiple LSH Tables The proposed algorithms so far assume only a single LSH table, but a typical LSH index consists of multiple LSH tables. In this section, we describe how we can utilize more than one LSH tables for the estimation purposes. We consider two estimation algorithms using multiple LSH tables: median estimator and virtual bucket estimator. Median estimator. The median estimator applies LSH-SS to each LSH table inde- pendently without modifying LSH-SS and merge the estimates. Suppose an LSH index IG = {Dg1 , . . . , Dg\u2113} with \u2113 tables. From each table Dgi , 1 \u2264 i \u2264 \u2113, we generate an estimate J\u0302i with a sample of n pairs. Its estimate, J\u0302m, is the median of the estimates, J\u0302i, 1 \u2264 i \u2264 \u2113. This approach makes the algorithm more reliable reducing the probability that J\u0302m deviates much from the true size. From Theorems 2 and 3, the probability that J\u0302i differs from J by more than a factor of 1+ \u01eb is less than 2\/n with the assumed join size and sample size. When taking the median, the probability that more than \u2113\/2 J\u0302i\u2019s deviate by more than (1 + \u01eb)J is at most 2\u2212\u2113\/2 by the standard estimate of Chernoff [111]. This states that J\u0302m is within the same factor of error with higher probability than the guarantees in Theorems 2 and 3. The effective sample size increases by a factor of \u2113. When a sample size that is greater than n is affordable, exploiting multiple LSH tables can make the estimate more reliable. However, dividing a total sample size of n into multiple estimates can impair the accuracy of individual estimates, and thus it is not recommended. Virtual bucket estimator. The second approach is to consider virtual buckets formed by multiple LSH tables. In this approach, a pair (u, v) is regarded as in the same bucket if u and v are in the same bucket in any of \u2113 LSH tables. This can improve the accuracy when an existing LSH scheme has a relatively large k than necessary. Recall from the discussions 113 6.5. Additional Discussions in the previous section that when k is too large, the hash function g becomes overly selective and SH can be too small. Then the true pairs from SH can be only a small portion of the true pairs. Considering virtual buckets can address this problem by relaxing the bucket conditions; B(u) = B(v) if and only if \u2203Dgi , Bj \u2208 Dgi such that Bj(u) = Bj(v), 1 \u2264 i \u2264 \u2113. With virtual buckets, when we check B(u) = B(v) (or 6=) for (u, v), we need to check up to \u2113 tables. At lines 3 and 4 of SampleH in Algorithm 7, a pair (u, v) is chosen from V uniformly at random and is discarded if u and v are not in the same bucket in any Dgi , 1 \u2264 i \u2264 \u2113. At line 3 of SampleL, B(u) 6= B(v) is checked for all Dgi and if B(u) = B(v) in any Dgi , the sample pair (u, v) is discarded. The analysis remains the same but the set of pairs in same buckets, SH becomes effectively larger, which gives potentially better accuracy. The runtime increases because now the bucket checking is done for multiple LSH tables. Non-self Joins In this section, we discuss how to extend the proposed algorithms to handle a joins between two collections of vectors U and V . The basic ideas remain the same but we need to make sure that a pair under consideration consists of one vector from each collection. Definition 11 (The General VSJ Problem). Given two collection of real-valued vectors V = {v1, ..., vn1}, U = {u1, ..., un2} and a threshold \u03c4 on similarity sim, estimate the number of pairs J = |{(u, v) : u \u2208 U, v \u2208 V, sim(u, v) \u2265 \u03c4}|. Suppose that we have two LSH tables Dg and Eg that are built on U and V respectively using g = (g1, . . . , g\u2113). We describe how we modify LSH-S and LSH-SS for general join processing. LSH-S.We make two changes for general joins in LSH-S: NH computation and sampling in Algorithm 6. In self-joins, NH in Equation 6.1 is the number of pairs in the same buckets: NH = \u2211ng j=1 (bj 2 ) . In general joins, NH = \u2211ng j=1 bj \u00b7 ci such that Bj \u2208 Dg, Ci \u2208 Eg, bj is the bucket count of Bj , ci is the bucket count of Ci, and g(Bj) = g(Ci), where g(B) denotes the g value that identifies bucket B. For Bi, if there does not exist a bucket Ci \u2208 Eg such that g(Ci) = g(Bj), ci = 0. Next, the pair (u, v) is sampled uniformly at random such that u \u2208 U and v \u2208 V at line 3 in Algorithm 6. LSH-SS. Intuitively, SH is the set of pairs (u, v), u \u2208 U, v \u2208 V such that g(u) = g(v). That is, the buckets of u and v have the same g value: g(Bj) = g(Ci) where u \u2208 Bj in Dg and u \u2208 Ci in Eg. SL is the set of pairs (u, v), u \u2208 U, v \u2208 V such that g(u) 6= g(v). To sample a pair from SH , we randomly sample a bucket Bj with weight(Bj) = bj \u00b7 ci where g(Ci) = g(Bj), Bj \u2208 Dg and Ci \u2208 Eg. Then we sample u from Bj and v from Ci uniformly at random within the buckets. The resulting pair (u, v) is a uniform random sample from SH . Alternatively, we can sample u \u2208 U and v \u2208 V uniformly at random, and discard (u, v) if g(u) 6= g(v). Lines 3 and 4 of SampleH in Algorithm 7 need to be changed accordingly. To sample from SL, we sample u \u2208 U and v \u2208 V uniformly at random. The pair (u, v) is discarded if g(u) = g(v). This requires corresponding changes in line 3 of SampleH. 114 6.6. Experimental Evaluation Symbol Description V a collection of vectors, database J join size n database size, |V | = n m sample size u, v vectors \u03c4 similarity threshold h an LSH function, e.g., h1(u) k # LSH functions for an LSH table \u2113 # LSH tables in an LSH index g g = (h1, . . . , hk), vector of LSH functions Dg , Eg an LSH table using g G G = {g1, . . . , g\u2113} IG an LSH index with using G that consists of Dg1 , . . . , Dg\u2113 B a bucket in an LSH table, e.g., B(u): the bucket of u bj , ci bucket counts, e.g., bj is the bucket count of bucket Bj T True pairs, (u, v) such that sim(u, v) \u2265 \u03c4 F False pairs, (u, v) such that sim(u, v) < \u03c4 H High (expected) sim. pairs that are in the same buckets L Low (expected) sim. pairs that are not in the same buckets P (T |H) given (u, v) s.t. B(u) = B(v), prob. of sim(u, v) \u2265 \u03c4 P (H|T ) given (u, v) s.t. sim(u, v) \u2265 \u03c4 , prob. of B(u) = B(v) P (T |L) given (u, v) s.t. B(u) 6= B(v), prob. of sim(u, v) \u2265 \u03c4 P (L|T ) given (u, v) s.t. sim(u, v) \u2265 \u03c4 , prob. of B(u) 6= B(v) S stratum. e.g., SH : set of pairs that are in the same buckets N # pairs, e.g., NH : # pairs in the same buckets M # pairs in V , M = (|V | 2 ) Table 6.2: Summary of Notations 6.6 Experimental Evaluation 6.6.1 Set Up Data sets: We have conducted experiments using three data sets. The DBLP data set consists of 794,016 publications is the same as the data set used in [13]. Each vector is constructed from authors and title of a publication. There are about 56,000 distinct words in total and each word is associated with a dimension in a vector. The vector of a publication represents whether the corresponding word is present in the publication. Thus this data set is a binary vector data set. The average number of features is 14, and the smallest is 3 and the biggest is 219. The NYT data set is NYTimes news articles downloaded from UCI Machine Learning Repository13 and consists of 149,649 vectors. Again each dimension represents a word and has the corresponding TF-IDF weight. The dimensionality is about 100k and the average number of feature is 232. The PUBMED data set is constructed from PubMed abstracts and is also downloaded from the UCI repository. It consists of 400,151 TF-IDF vectors. The dimensionality is about 140k. Algorithms compared: We implemented the following algorithms for the VSJ problem. \u2022 LC(\u03be) is the Lattice Counting algorithm in [92] with a minimum support threshold \u03be. \u2022 LSH-S is the LSH index based algorithm in Section 6.3. 13http:\/\/archive.ics.uci.edu\/ml\/datasets.html 115 6.6. Experimental Evaluation \u2022 LSH-SS is the LSH index based stratified sampling algorithm in Section 6.4. We used m1 = n, \u03b4 = log n, m2 = n and k = 20 unless specified otherwise. \u2022 RS is uniform random sampling with sample size mR = d \u00b7 n where d > 1 is a data set dependent constant to compare algorithms with roughly the same runtime. Evaluation metric: We use average relative error to show the accuracy. A relative error is defined as est size \/ true size. We do not take the absolute value to show under- estimation more clearly. We report each error averaged over 10 experiments. Positive and negative values can cancel each other when taking the average, but in our experiments, most of the algorithms consistently show either overestimation or underestimation depending on the threshold. Moreover, we separately report variance of errors. To measure reliability of each algorithm, we report the standard deviation (STD) of errors. For efficiency, we measure the runtime, which is time taken for estimation. For all algorithms, we loaded necessary data structures (data set or index) in memory. We implemented all the algorithms in Java. We ran all our experiments on a server running 64 GNU\/Linux 2.6.27 over 2.93 GHz Intel Xeon CPUs with 64GB of main memory. 6.6.2 DBLP: Accuracy, Variance and Efficiency We first report the results on the accuracy, variance and runtime using the DBLP data set. Figure 6.2(a) shows relative error of various algorithms over the similarity threshold range and Figure 6.2(b) shows variance. Figure 6.2(a) is also presented in Table 6.3 for more details. The estimations of LSH-S have large errors at high thresholds, e.g., \u03c4 \u2265 0.6. This is because the estimations of conditional probabilities are not reliable due to insufficient number of true pairs sampled. Its variance is large since Equation (6.1) is sensitive to those estimations. LSH-SS delivers accurate estimation over the whole range. For most threshold values, its estimate is the most accurate one. The following table shows the actual join size J and its selectivity at various similarity threshold \u03c4 . Note the dramatic differences in the join \u03c4 0.1 0.3 0.5 0.7 0.9 J (join size) 105B 267M 11M 103K 42K selectivity 33% 0.085% 0.0036% 0.000064% 0.000013% size depending on \u03c4 . At \u03c4 = 0.1 there are more than 100 billion true pairs, and its selectivity is about 30 %. But at \u03c4 = 0.9 there are only 42, 000 true pairs, and the selectivity is only 0.00001%. Yet LSH-SS is able to estimate the join size quite accurately and reliably exploiting the LSH index; its average relative error is 48% at \u03c4 \u2265 0.7. Moreover, LSH-SS has very small variance at high thresholds. At low thresholds, the STD of LSH-SS is as big as or larger than that of RS. However, in this range, the true join size itself is very large; its STD is still much smaller than the true join size. RS is as accurate as LSH-SS in the low threshold range. However as the threshold increases, its error rapidly increases; its average relative error is 745% at \u03c4 \u2265 0.7. Moreover, the variance of RS is an order of magnitude larger than the true join size at high thresholds. This is expected from the hardness of sampling true answers with high selectivity. The high 116 6.6. Experimental Evaluation -100 0 100 200 300 400 500 600 700 800 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 R el at iv e Er ro r ( %) Similarity Threshold \u03c4 LSH-SS RS LSH-S LC(1%) (a) Relative error 10 100 1000 10000 100000 1e+06 1e+07 1e+08 1e+09 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 ST D Similarity Threshold \u03c4 LSH-SS RS LSH-S LC(1%) (b) Variance Figure 6.2: Accuracy\/Variance on DBLP error and variance of RS at high thresholds are problematic since similarity thresholds between 0.5 and 0.9 are typically used [13]. LC underestimate over the whole threshold range. We hypothesize that it is because the characteristic of the LSH function for cosine similarity. The LSH for cosine similarity we used is a binary function, and thus intuitively it needs more hash functions (larger k) to distinguish objects. However, increasing the number of hash function has negative impact on the runtime for its mining process. It appears that LC is not adequate for binary LSH functions. For runtime, LSH-S took 1028 msec. LSH-SS took 757 msec, and RS took 789 msec on the average. The runtime of LC was 3 sec. \u03c4 LSH-SS LSH-S RS LC 0.1 \u221274.28% \u221238% \u221275.50% \u221299.99% 0.2 \u221277.83% 9% \u221279.76% \u221299.97% 0.3 \u221263.14% 171% \u221270.19% \u221299.81% 0.4 \u221214.92% 1843% \u221227.29% \u221299.58% 0.5 \u22121.39% 232% 0.46% \u221299.55% 0.6 \u221295.29% 6123% 45.54% \u221295.25% 0.7 \u221285.67% 7562% 132.90% \u221292.39% 0.8 \u221269.66% 1116% 298.60% \u221292.79% 0.9 \u221232.68% 1771% 1021.12% \u221292.35% 1.0 \u22124.69% 1810% 1522.46% \u221295.88% Table 6.3: Relative Error on DBLP 117 6.6. Experimental Evaluation -150 -100 -50 0 50 100 150 200 250 300 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 R el at iv e Er ro r ( %) Similarity Threshold \u03c4 LSH-SS RS (a) Relative error 10 100 1000 10000 100000 1e+06 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 ST D Similarity Threshold \u03c4 LSH-SS RS (b) Variance Figure 6.3: Accuracy\/Variance on NYT 6.6.3 NYT: Accuracy, Variance and Efficiency Figure 6.3(a) and (b) show relative error and variance on the NYT data set. We only show LSH-SS and RS for clarity since they dominate the other algorithms. We observe the same phenomena in the NYT data set. LSH-SS gives good estimates over the whole thresholds. It shows underestimation at 0.3 \u2264 \u03c4 \u2264 0.5. This is because it takes conservative approach of not scaling up the number of true pairs in the sample when its reliability is not certain. But in general this is not the most interesting similarity range. Heuristics such as using a dampened scaling up factor as briefly mentioned in Section 6.4.2 can improve the accuracy in this range if needed. Its variance is two orders of magnitude smaller than the variance of RS except at very low thresholds. RS also shows large overestimation at high thresholds. For runtime, LSH-SS took 1091 msec and RS took 920 msec on average. 6.6.4 PUBMED: Accuracy, Variance, Efficiency Figure 6.5 shows the accuracy and variance on the PUBMED data set with k = 5. The average error of LSH-SS is 73% and that of RS is 117%. LSH-SS shows underestimation tendency but its STD is more than an order of magnitude smaller than that of RS. When the data set is largely dissimilar, smaller k improves accuracy. In such cases, constructing an LSH table on-the-fly can be a viable option. For runtime, LSH-SS took 1188 msec and RS took 717 msec on average. 118 6.6. Experimental Evaluation -100 -50 0 50 100 150 10 20 30 40 50 R el at iv e Er ro r ( %) , \u03c4 = 0. 5 Number of hash functions k LSH-SS LSH-S -100 0 100 200 300 400 500 10 20 30 40 50 R el at iv e Er ro r ( %) , \u03c4 = 0. 8 Number of hash functions k LSH-SS LSH-S (a) Accuracy, \u03c4 = 0.5 (b) Accuracy, \u03c4 = 0.8 Figure 6.4: Impact of k on DBLP -100 0 100 200 300 400 500 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 R el at iv e Er ro r ( %) Similarity Threshold \u03c4 LSH-SS RS 10 100 1000 10000 100000 1e+06 1e+07 1e+08 1e+09 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 ST D Similarity Threshold \u03c4 LSH-SS RS (a) Relative error (b) Variance Figure 6.5: Accuracy\/Variance on PUBMED 6.6.5 Impact of Parameters We assume a pre-built LSH index with parameters optimized for its similarity search. The relevant parameter for our estimation purposes is k which specifies the number of hash func- tions used for an LSH table. We analyze the impact of k on accuracy and variance. RS is not relevant to k, so we only compare LSH-SS and LSH-S. Figure 6.4 shows accuracy at \u03c4 = 0.5, 0.8; the conclusion is the same at other thresholds. We observe that LSH-SS is not much affected by k. This is because an LSH table provides sufficient distinguishing power with relatively small k. LSH-SS will work with any reason- able choice of k. LSH-S is highly sensitive to k for the reason specified in Section 6.6.2. The same observation is made in variance as well. k = 10 k = 20 k = 30 k = 40 k = 50 size (MB) 3.2 7.5 12.6 14.1 16.5 The above table shows space occupied by a LSH table on the DBLP data set ignoring implementation-dependent overheads. When k = 20, there are about 480K non-empty buck- ets which adds roughly 7.5M of space for the g function values (string representation for k concatenated binary values), bucket counts, and vector ids. The DBLP binary file is about 119 6.6. Experimental Evaluation 50M . If we are given the freedom of choosing k, we observe that slightly smaller k values, say between 5 and 15, generally give better accuracy. Impact of Parameters: \u03b4 and m In this section, we study the impact of parameters related with the sample size using the DBLP data set. The goal is to see if our analysis and choice of parameter values are appropriate. Recall that LSH-SS and RS have the following parameters. \u2022 mH (LSH-SS): the sample size in the SampleH subroutine for Stratum H \u2022 \u03b4 (LSH-SS): the answer size threshold in the adaptive sampling procedure SampleL for Stratum L \u2022 mL (LSH-SS): the (maximum) sample size in the adaptive sampling procedure SampleL for Stratum L \u2022 mR (RS): the sample size. In our analysis and experiments, we used the following parameter values: mH = mL = n, \u03b4 = log n, and mR = 1.5n. Since mH ,mL and mR controls the overall sample size and \u03b4 specifies the answer size threshold, we use two functions f1 and f2 to control the parameters: mH = mL = f1(n), mR = 1.5f1(n) and \u03b4 = f2(n). We test the following alternatives: \u2022 f1(= m): \u221a n, n\/ logn, 0.5n, n, 2n, and n logn \u2022 f2: 0.5 logn, logn, 2 logn, and \u221a n We perform two types of combinations of f1 and f2. First, we fix f1(n) = n and experiment the above alternatives for f2. Next, we fix f2(n) = \u03b4 = log n and experiment the above alternatives for f1. For each combination we show two results: the average absolute error for \u03c4 = {0.1, 0.2, ..., 1.0} and the number of \u03c4 values with large errors among the 10 \u03c4 values. We show the number to algorithms\u2019 over\/underestimation tendency. We define an error to be a big overestimation when J\u0302\/J \u2265 10 and define it to be a big underestimation when J\/J\u0302 \u2265 10. We first analyze the impact of \u03b4 and then analyze the impact of m. Answer Size Threshold \u03b4 Figure 6.6 gives the average (absolute) relative error varying \u03b4 and Figure 6.7 gives the number of \u03c4 values that give large. m(= f1) is fixed at n. Recall that SampleL terminates the loop when the number of true sample reaches \u03b4 regardless of the sample size. \u03b4 > 2 log n has a big underestimation problem. A large \u03b4 may prevent even a reliable estimate from being scaled up and result in a huge loss in contributions from SL. For instance, \u03b4 = \u221a n is too conservative and its estimate is less than 10% of the true size at 4 out of 10 \u03c4 values. We recommend \u03b4 = O(logn) for general settings. Simple heuristics such as using different \u03b4 depending on the threshold can improve the performance. For instance using 0.1 log n \u2264 \u03b4 \u2264 0.5 log n at high thresholds, e.g., \u03c4 \u2265 0.7, 120 6.6. Experimental Evaluation 0 0.5 1 1.5 2 2.5 3 LSH-SS \u03b4=0.5 log n LSH-SS \u03b4=log n LSH-SS \u03b4=2log n LSH-SS \u03b4= n1\/2 RS m=1.5n Av er ag e Re la tiv e Er ro r, m =n Figure 6.6: Relative Error Varying \u03b4 (the Answer Size Threshold) in SampleL 0 1 2 3 4 5 LSH-SS \u03b4=0.5 log n LSH-SS \u03b4=log n LSH-SS \u03b4=2log n LSH-SS \u03b4= n1\/2 RS m=1.5n # \u03c4 w ith B ig E rro r Underestimation Overestimation Figure 6.7: The Number of \u03c4 with J\u0302\/J \u2265 10 (overest.) or J\/J\u0302 \u2265 10 (underest.) Varying \u03b4. The total number of \u03c4 is 10: {0.1, 0.2, ..., 1.0} greatly improved the runtime without sacrificing accuracy in our experiments. At low thresh- olds, e.g., \u03c4 \u2264 0.3, using a slightly bigger value of \u03b4, e.g., 2 log n, resulted in better accuracy and variance without increasing the runtime much. Sample Size Threshold m Figure 6.8 gives the average (absolute) relative error varying the sample size and Figure 6.9 gives the number of \u03c4 values that give large errors. \u03b4 is fixed at logn. We see that f1 < 0.5n causes serious underestimations in both algorithms. With f1 = n logn, LSH-SS does not give any big over\/underestimations. But the runtime roughly increases by log n. f1 = O(n) is recommended for general settings. 6.6.6 Summary of Experiments We evaluated the proposed solutions, LSH-S and LSH-SS, using three real-world data sets: DBLP, New York Times articles, and PUBMED abstracts. They are compared with LC, which is adapted to the VSJ problem, and random sampling (RS). While RS exhibited severe under estimation problems at high thresholds, LSH-SS consistently showed relative errors smaller than 50% throughout all the thresholds and data sets, which is big improvements over the adapted LC. The required sample size was only n pairs, which also improves the runtime of the adapted LC. 121 6.7. Conclusion 0 0.5 1 1.5 2 2.5 3 3.5 4 sqrt(n) n\/log n 0.5n n 2n nlog n Av er ag e Re la tiv e Er ro r, \u03b4= lo g n Sample Size m LSH-SS RS Figure 6.8: Relative Error Varying the Sample Size m 0 1 2 3 4 5 6 sqrt(n) n\/log n 0.5n n 2n nlog n # \u03c4 w ith B ig E rro r Sample Size m LSH-SS, Overestimation RS, Overestimation LSH-SS, Underestimation RS, Underestimation Figure 6.9: The Number of \u03c4 with J\u0302\/J \u2265 10 (overestimation) or J\/J\u0302 \u2265 10 (underestimation) Varying the sample size m. The total number of \u03c4 is 10: {0.1, 0.2, ..., 1.0} 6.7 Conclusion We propose size estimation techniques for vector similarity joins. The proposed methods rely on the ubiquitous LSH indexing and enable reliable estimates even at high similarity thresh- olds. We show that the proposed stratified sampling algorithm LSH-SS gives good estimates throughout the threshold range with probabilistic guarantees. The proposed solution only needs minimal addition to the existing LSH index and can be easily applied. 122 Chapter 7 Conclusion Approximate text processing is crucial in handling textual data in databases; exact matching can miss meaningful results due to pervasive errors in text. There has been extensive interest in approximate text processing, and commercial databases have begun to incorporate such functionalities. One of the key components in successful integration of approximate text handling in RDBMSs is to have reliable selectivity estimation techniques, which is central to optimizing queries. However, these developments are relatively new and we lack solid techniques for estimating selectivity of them. This dissertation aims to provide reliable selectivity estimation techniques for approximate predicates on text. Among many possible predicates, we focus on two types of predicates which are the two fundamental building blocks of SQL queries: selections and joins. Depending on the matching semantics, we study two different semantics for each type of operator. We review the key contributions and discuss future research directions in this chapter. 7.1 Key Contributions We make three major contributions in this dissertation. The first major contribution is that we propose a lattice based framework for counting possible variants in similarity matching. A common challenge in the selectivity estimation of approximate matching is that there can be a huge number of variants to consider given a query string and a similarity threshold. We consider a group of similar variants for efficient counting rather than each and every possible variant. For selection problems in Chapter 3 and 4, the group is formed by wildcard. Strings that have same characters other than positions marked by wildcards are considered together. For the join problem in Chapter 5, the group is formed by frequent patterns in the signature representation of a database. Although the grouping enables efficient counting for many variants, a challenge is that the groups may have overlaps in their counts. We organize groups with lattice structures, and propose formulas and algorithms that can perform counting without duplicates based on the lattice structures. The second contribution is that we develop selectivity estimation algorithms for approxi- mate selection and join operators based on the framework. We show how we can apply recent developments for approximate matching on the framework. We extend summary structures for exact text matching to support approximate matching and integrate them with Min-Hashing signatures. The last contribution is that we adapt classical random sampling algorithms to similarity join size estimation. Similarity joins fall into hard cases for algorithms developed for equi- join size estimation and their guarantees are not meaningful in similarity joins. However, we show that those algorithms can be adapted to similarity join size estimation as well. We 123 7.2. Future Work combine two random sampling algorithms and make use of the LSH scheme, which is originally developed for the nearest neighbor search problem. We summarize our contributions by chapters as follows. \u2022 In Chapter 3, we present solutions for the string problem. We extend the Q-gram table [26] with wildcard called the EQ-gram table, which enables efficient counting of strings of a similar form. The lattice is formed by inclusion relationships among possible forms of strings within an edit distance threshold. We then propose the replace-only formula, which handles the duplicated counting problem using the lattice. Algorithm OptEQ is proposed for a general edit distance case and it also exploits observations on the lattice for efficiency. \u2022 In Chapter 4, we develop algorithms for the substring problem, which is a generalization of the string problem. We propose two solutions, MOF and LBS. MOF uses the EQ- gram table and is based on a generalization of the SIS assumption [26]. LBS augments the EQ-gram table with Min-Hash signatures and apply Set Hashing [30] for better accuracy. \u2022 In Chapter 5, we develop algorithms for the set similarity join size estimation (SSJ). We show that there is relationship between the number of frequent patterns in the signature representation of sets, and apply a Power-Law for efficient estimation of the number of frequent signature patterns. The signature pattern conceptually groups similar sets and we define lattice structure to model their relationships. The replace-only formula developed for the string problem is adapted to the SSJ problem to account for the overlaps among signature patterns. We observe that there is distribution shift by relying on Min-Hashing and propose a procedure to compensate the errors from the shift. \u2022 In Chapter 6, we present algorithms for the vector similarity join size estimation (VSJ), which is a generalization of the SSJ problem. The proposed algorithm performs random samplings on the LSH index. We make use of Adaptive Sampling [96] and present probabilistic guarantee on its performance. 7.2 Future Work This dissertation provides significant initial steps toward selectivity estimation of approximate predicates on text. However, approximate matching has rich contexts and it still leaves ample opportunities for future research. We look into several future research directions. 7.2.1 Supporting Diverse Similarity Measures We studied several similarity measure in this dissertation including edit distance, hamming distance, overlap count, Jaccard similarity, cosine distance. Although we dealt with major similarity measures and their extensions, there exist many more ways to consider similar strings such as Soundex, synonym, distance query, abbreviation, just to name a few. In 124 7.2. Future Work reality, it is not likely that any single measure will work best for all cases, which is one of the reasons why there are diverse similarity measure developed. Approximate text processing engines often provide more than one similarity semantics. For instance, the Oracle CONTAINS operator supports \u2018broader term\u2019, \u2018narrower term\u2019, con- straints on term proximity, related terms, synonyms, or Soundex. Developing selectivity estimation techniques for all the measure can be tricky. There are largely two approaches for selectivity estimation purposes: summary structure- based algorithms and random sampling-based algorithms. In this dissertation, we examined both directions. The proposed lattice based framework utilizes summary structures and is generative in the sense that it first generate candidate forms for variants and then estimate the number of strings that match any of the candidate forms. The proposed framework has opportunities for supporting more diverse measure by changing the way candidate forms are generated. Random sampling has several benefits [9] that make it a good candidate for selectivity estimation technique for approximate predicates. For instance, it is not limited to equality and range predicates and does not use the attribute-value-independence assumption. However, it has several additional challenges when applied to similarity matching (Chapter 6) and has to be applied with caution. We looked into the possibility of using random sampling for this purposes in Chapter 6. This direction is worth further investigation. 7.2.2 Adaptation for Query Processing Although the proposed framework is for selectivity estimation, some concepts have opportu- nities for approximate query processing as well. The basic idea is to associate, instead of a count, a tuple id list for each entries in the EQ-gram table or signature patterns. For instance the entry \u2018rdb??\u2019 will have a list of tuple ids which have a substring that matches \u2018rdb??\u2019. The same idea can also be applied to signature patterns. Intuitively, we are pre-computing and storing tuple ids with similar strings, and it is a form of trade-offs between time and space, or build-time and runtime costs. As a tuple may be represented in more than one lists, it can easily blow up the space and may need special attention. 7.2.3 Integration with Full-Fledged RDBMSs Another next step from this dissertation could be evaluation of the proposed techniques in a full-fledged RDBMS. Commercial database systems are conservative in integrating new techniques into their engines since real-world use of RDBMSs can be very complex and large scale. Many components interact and any integration has to go through a strict validation. For this reason, many research studies are yet to be incorporated into RDBMS engines. For example, even though there have been many studies on multi-dimensional histograms (e.g., [19, 112, 121, 141]) or parametric query optimization (e.g., [14, 67, 72]), most of commercial database systems still take much simpler approaches. Validating the proposed techniques in a full-fledged RDBMS can open more issues or demand improvements. For instance, can we make it more space efficient or can we better prune the proposed summary structures given a space budget? Would it work well in much larger analytic queries? Are building and maintenance costs acceptable in an operational 125 RDBMS? This dissertation has addressed these questions to some extent and more through validation can be done by testing them in a full-fledged RDBMS. 7.2.4 Incremental Maintenance of Summary Structures Another crucial factor in operational RDBMSs is incremental maintenance of data structures such as histograms, and indexes. In general, the summary structures proposed in this disser- tation can be incrementally maintained in a rather straightforward way. The EQ-gram table in Chapters 3 and 4 can be maintained by incrementing counts (resp. decrementing counts) of q-grams of the inserted string (resp. the deleted string). Maintaining an EQ-gram table with Min-Hash signatures is easy with insertions but can be tricky with deletions. When a string is deleted, for each of the q-grams of the string, we compare the Min-Hash values of the string with existing signature values. We do not need to modify the existing signature value when the Min-Hash value of the string is larger. However, when the Min-Hash value (of the string to be deleted) is the same as the signature value, we need to find a new Min-Hash value among the rest of strings that contain the q-gram. This may require a database scan. We can perform periodic updates tolerating some degree of \u201cstaleness\u201d, but a more principled approach is desirable. The Min-Hash signature representation of the database in Chapter 5 does not have the problem since we can simply add or delete the corresponding signature. The maintenance of the LSH index in Chapter 6 is also simple. As records are inserted or deleted, we only need to add or remove them in corresponding buckets [12]. In an update-intensive database, updating the data structures on-the-fly can be a bottle- neck and may not be desirable. In such cases, sampling or periodic updates may be the choice, e.g., [5, 50, 139]. More detailed studies on this direction are also worth further investigation. 126 Bibliography [1] S. Acharya, P. B. Gibbons, V. Poosala, and S. Ramaswamy. Join synopses for approxi- mate query answering. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 275\u2013286, 1999. [2] Parag Agrawal, Arvind Arasu, and Raghav Kaushik. On Indexing Error-Tolerant Set Containment. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 927\u2013938, 2010. [3] R. Agrawal and R. Srikant. Fast Algorithms for Mining Association Rules. In Proceed- ings of the Conference on Very Large Data Bases, pages 487\u2013499, 1994. [4] Sanjay Agrawal, Surajit Chaudhuri, and Gautam Das. DBXplorer: A System for Key- word Search over Relational Databases. In Proceedings of the IEEE International Con- ference on Data Engineering, pages 5\u201316, 2002. [5] Noga Alon, Philip B. Gibbons, Yossi Matias, and Mario Szegedy. Tracking join and self-join sizes in limited storage. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 10\u201320, 1999. [6] Rohit Ananthakrishna, Surajit Chaudhuri, and Venkatesh Ganti. Eliminating Fuzzy Duplicates in Data Warehouses. In Proceedings of the Conference on Very Large Data Bases, pages 586\u2013597, 2002. [7] Alexandr Andoni and Piotr Indyk. Near-Optimal Hashing Algorithms for Approximate Nearest in High Dimensions. CACM, 51(1):117\u2013122, 2008. [8] Arvind Arasu, Venkatesh Ganti, and Raghav Kaushik. Efficient Exact Set-Similarity Joins. In Proceedings of the Conference on Very Large Data Bases, pages 918\u2013929, 2006. [9] Brian Babcock and Surajit Chaudhuri. Towards a robust query optimizer: a principled and practical approach. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 119\u2013130, 2005. [10] Ricardo Baeza-Yates and Berthier Ribeiro-Neto. Modern Information Retrieval. Addison-Wesley Publishing Company, 1999. [11] Shumeet Baluja and Michele Covell. Audio Fingerprinting: Combining Computer Vision & Data Stream Processing. In EEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, pages 213\u2013216, 2007. 127 [12] Mayank Bawa, Tyson Condie, and Prasanna Ganesan. LSH Forest: Self-Tuning Indexes for Similarity Search. In Proceedings of the International World Wide Web Conference, pages 651\u2013660, 2005. [13] Roberto J. Bayardo, Yiming Ma, and Ramakrishnan Srikant. Scaling up all pairs sim- ilarity search. In Proceedings of the International World Wide Web Conference, pages 131\u2013140, 2007. [14] Pedro Bizarro, Nicolas Bruno, and David J. DeWitt. Progressive Parametric Query Optimization. IEEE Transaction on Knowledge and Data Engineering, 21(4):582\u2013594, 2009. [15] Mario Boley and Henrik Grosskreutz. A Randomized Approach for Approximating the Number of Frequent Sets. In Proceedings of the International Conference on Database Mining, pages 43\u201352, 2008. [16] Andrei Z. Border, Moses Charikar, Alan M. Frieze, and Michael Mitzenmacher. Min- Wise Independence Permutations. In Proceedings of the ACM Symposium on Theory of Computing, pages 327\u2013336, 1998. [17] Andrei Z. Broder. On the Resemblance and Containment of Documents. In Proc. SEQUENCES, pages 21\u201329, 1997. [18] Nicolas Bruno and Surajit Chaudhuri. Exploiting Statistics on Query Expressions for Optimization. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 263\u2013274, 2002. [19] Nicolas Bruno, Surajit Chaudhuri, and Luis Gravano. STHoles: a multidimensional workload-aware histogram. In Proceedings of the ACM SIGMOD International Confer- ence on the Management of Data, pages 211\u2013222, 2001. [20] Michael J. Carey and Donald Kossmann. On Saying Enough Already! in SQL. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 219\u2013230, 1997. [21] Kaushik Chakrabarti, Surajit Chaudhuri, Venkatesh Ganti, and Dong Xin. An effi- cient filter for approximate membership checking. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 805\u2013818, 2008. [22] Moses Charikar, Kevin Chen, and Martin Farach-Colton. Finding Frequent Items in Data Streams. Theoretical Computer Science, 312(1):3\u201315, 2004. [23] Moses S. Charikar. Similarity Estimation Techniques from Rounding Algorithms. In Proceedings of the ACM Symposium on Theory of Computing, pages 380\u2013388, 2002. [24] Surajit Chaudhuri, Kris Ganjam, Venkatesh Ganti, Rahul Kapoor, Vivek Narasayya, and Theo Vassilakis. Data cleaning in microsoft SQL server 2005. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 918\u2013920, 2005. 128 [25] Surajit Chaudhuri, Kris Ganjam, Venkatesh Ganti, and Rajeev Motwani. Robust and Efficient Fuzzy Match for Online Data Cleaning. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 313\u2013324, 2003. [26] Surajit Chaudhuri, Venkatesh Ganti, and Luis Gravano. Selectivity Estimation for String Predicates: Overcoming the Underestimation Problem. In Proceedings of the IEEE International Conference on Data Engineering, pages 227\u2013238, 2004. [27] Surajit Chaudhuri, Venkatesh Ganti, and Raghav Kaushik. A Primitive Operator for Similarity Joins in Data Cleaning. In Proceedings of the IEEE International Conference on Data Engineering, pages 5\u201316, 2006. [28] Surajit Chaudhuri, Rajeev Motwani, and Vivek Narasayya. On Random Sampling over Joins. In Proceedings of the ACM SIGMOD International Conference on the Manage- ment of Data, 1999. [29] Surajit Chaudhuri, Anish Das Sarma, Venkatesh Ganti, and Raghav Kaushik. Lever- aging Aggregate Constraints for Deduplication. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 437\u2013448, 2007. [30] Zhiyuan Chen, Flip Korn, Nick Koudas, and S. Muthukrishnan. Selectivity Estimation For Boolean Queries. In Proceedings of ACM Symposium on Principles of Database Systems, pages 216\u2013225, 2000. [31] Zhiyuan Chen, Flip Korn, Nick Koudas, and S. Muthukrishnan. Selectivity Estimation For Boolean Queries. Journal of Computer and System Sciences, 66:98\u2013132, 2003. [32] Kun-Ta Chuang, Jiun-Long Huang, and Ming-Syan Chen. Power-law relationship and self-similarity in the itemset support distribution: analysis and applications. The VLDB Journal, 17(5):1121\u20131141, 2008. [33] Aaron Clauset, Cosma Rohilla Shalizi, and M. E. J. Newman. Power-law distributions in empirical data. SIAM Review, 51(4):661\u2013703, 2009. [34] Edith Cohen. Size-estimation framework with applications to transitive closure and reachability. Journal of Computer and System Sciences, 55(3):441\u2013453, 1997. [35] Edith Cohen, Mayur Datar, Shinji Fujiwara, Aristides Gionis, Pioty Indyk, Rajeev Motwani, Jeffrey D. Ullman, and Cheng Yang. Finding Interesting Associations without Support Pruning. IEEE Transaction on Knowledge and Data Engineering, 13(1):64\u201378, 2001. [36] David Cohn, Les Atlas, and Richard Ladner. Improving Generalization with Active Learning. Machine Learning, 15(2):201\u2013221, 1994. [37] Tamraparni Dasu, Theodore Johnson, S. Muthukrishnan, and Vladislav Shkapenyuk. Mining database structure; or, how to build a data quality browser. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 240\u2013251, 2002. 129 [38] R. Dixon and T. Martin. Automatic Speech and Speaker Recognition. John Wiley & Sons, Inc, 1979. [39] Xin Dong, Alon Halevy, and Jayant Madhavan. Reference Reconciliation in complex Information Spaces. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 85\u201396, 2005. [40] Ahmed K. Elmagarmid, Panagiotis G. Ipeirotis, and Vassilios S. Verykios. Duplicate record detection: A survey. IEEE Transaction on Knowledge and Data Engineering, 19(1):1\u201316, 2007. [41] Cristian Estan and Jeffrey F. Naughton. End-biased Samples for Join Cardinality Es- timation. In Proceedings of the IEEE International Conference on Data Engineering, pages 119\u2013130, 2006. [42] Ronald Fagin, Amnon Lotem, and Moni Naor. Optimal aggregation algorithms for middleware. Journal of Computer and System Sciences, 66(4):614\u2013656, 2003. [43] Christos Faloutsos, Bernhard Seeger, Agma Traina, and Jr. Caetano Traina. Spatial join selectivity using power laws. In SIGMOD, pages 177\u2013188, 2000. [44] Ian De Felipe, Vagelis Hristidis, and Naphtali Rishe. Keyword Search on Spatial Databases. In Proceedings of the IEEE International Conference on Data Engineer- ing, pages 656\u2013665, 2008. [45] Ivan Fellegi and Alan Sunter. A theory for record linkage. Journal of the American Statistical Association, 64(328):1183\u20131210, 1969. [46] Ferenc Bodon. Apriori implementation of ferenc bodon. http:\/\/www.cs.bme.hu\/ bodon\/en\/apriori\/. [47] Yoav Freund, H. Sebastian Seung, Eli Shamir, and Naftali Tishby. Selective sampling using the query by committee algorithm. Mach. Learn., 28(2-3):133\u2013168, 1997. [48] Ariel Fuxman, Elham Fazli, and Rene\u0301e J. Miller. Conquer: Efficient management of inconsistent databases. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 155\u2013166, 2005. [49] Sumit Ganguly, Phillip B. Gibbons, Yossi Matias, and Avi Silberschatz. Bifocal sam- pling for skew-resistant join size estimation. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 271\u2013281, 1996. [50] Phillip B. Gibbons, Yossi Matias, and Viswanath Poosala. Fast incremental maintenance of approximate histograms. ACM Transaction on Database Systems, 27:261\u2013298, 2002. [51] Aristides Gionis, Dimitrios Gunopulos, and Nick Koudas. Efficient and Tunable Similar Set Retrieval. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 247\u2013258, 2001. 130 [52] Aristides Gionis, Piotr Indyk, and Rajeev Motwani. Similarity Search in High Dimen- sions via Hashing. In Proceedings of the Conference on Very Large Data Bases, pages 518\u2013529, 1999. [53] Luis Gravano, Panagiotis G. Ipeirotis, H. V. Jagadish, Nick Koudas, S. Muthukrishnan, and Divesh Srivastava. Approximate String Joins in a Database (Almost) for Free. In Proceedings of the Conference on Very Large Data Bases, pages 491\u2013500, 2001. [54] Luis Gravano, Panagiotis G. Ipeirotis, Nick Koudas, and Divesh Srivastava. Text Joins in an RDBMS for Web Data Integration. In Proceedings of the International World Wide Web Conference, pages 90\u2013101, 2003. [55] Lifang Gu, Rohan Baxter, Deanne Vickers, and Chris Rainsford. Record Linkage: Cur- rent Practice and Future Directions. Cambridge Univ. Press, 1997. [56] D. Gusfield. Algorithms on Strings, Trees and Sequences. Cambridge Univ. Press, 1997. [57] P. Haas, J. Naughton, P. Seshadri, and L. Stokes. Sampling-based estimation of the number of distinct values of an attribute. In Proceedings of the Conference on Very Large Data Bases, pages 311\u2013322, 1995. [58] Peter J. Haas, Jeffrey F. Naughton, S. Seshadri, and Arun N. Swami. Fixed-Precision Estimation of Join Selectivity. In Proceedings of ACM Symposium on Principles of Database Systems, pages 190\u2013201, 1993. [59] Peter J. Haas and Arun N. Swami. Sequential Sampling Procedures For Query Size Estimation. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 341\u2013350, 1992. [60] Marios Hadjieleftheriou, Amit Chandel, Nick Koudas, and Divesh Srivastava. Fast Indexes and Algorithms for Set Similarity Selection Queries. In Proceedings of the IEEE International Conference on Data Engineering, pages 267\u2013276, 2008. [61] Marios Hadjieleftheriou, Xiaohui Yu, Nick Koudas, and Divesh Srivastava. Hashed Samples: Selectivity Estimators For Set Similarity Selection Queries. In Proceedings of the Conference on Very Large Data Bases, pages 201\u2013212, 2008. [62] Hans D. Mittelmann. Decision tree for optimization software. http:\/\/plato.asu.edu\/sub\/nonlsq.html. [63] Sven Helmer and Guido Moerkotte. Evaluation of main memory join algorithms for joins with set comparison join predicates. In Proceedings of the Conference on Very Large Data Bases, pages 386\u2013395, 1997. [64] Mauricio A. Herna\u2019ndez and Salvatore J. Stolfo. The merge\/purge problem for large databases. In Proceedings of the ACM SIGMOD International Conference on the Man- agement of Data, pages 127\u2013138, 1995. 131 [65] Timorthy C. Hoad and Justin Zobel. Methods for Identifying Versioned and Plagiarized Documents. Journal of the American Society for Information Science and Technology, 54(3):203\u2013215, 2003. [66] Vagelis Hristidis, Luis Gravano, and Yannis Papakonstantinou. Efficient IR-Style Key- word Search over Relational Databases. In Proceedings of the Conference on Very Large Data Bases, pages 850\u2013861, 2003. [67] Arvind Hulgeri and S. Sudarshan. Parametric query optimization for linear and piece- wise linear cost functions. In Proceedings of the Conference on Very Large Data Bases, pages 167\u2013178, 2002. [68] IBM. Ibm fuzzy search. http:\/\/publib.boulder.ibm.com\/infocenter\/db2luw\/v9r7\/index.jsp ?topic=\/com.ibm.db2.luw.admin.nse.topics.doc\/doc\/t0052178.html. [69] IBM. Quest synthetic data generation code. http:\/\/www.almaden.ibm.com\/cs\/disciplines\/iis\/. [70] Piotr Indyk and Rajeev Motwani. Approximate Nearest Neighbors: Towards Removing the Curse of Dimensionality. In Proceedings of the ACM Symposium on Theory of Computing, pages 604\u2013613, 1998. [71] Yannis E. Ioannidis and Stavros Christodoulakis. On the Propagation of Errors in the Size of Join Results. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 268\u2013277, 1991. [72] Yannis E. Ioannidis, Raymond T. Ng, Kyuseok Shim, and Timos K. Sellis. Parametric query optimization. VLDB journal, 6(2):132\u2013151, 1997. [73] Panagiotis G. Ipeirotis, Eugene Agichtein, Pranay Jain, and Luis Gravano. To search or to crawl?: towards a query optimizer for text-centric tasks. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 265\u2013276, 2006. [74] Edwin H. Jacox and Hanan Samet. Spatial join techniques. ACM Transaction on Database Systems, 32(1):1\u201344, 2007. [75] H. V. Jagadish, Ol Kapitskaia, Raymond T. Ng, and Divesh Srivastava. One dimensional and multi-dimensional substring selectivity estimation. VLDB journal, 9:214\u2013230, 2000. [76] H. V. Jagadish, Olga Kapitskaia, Raymond T. Ng, and Divesh Srivastava. Muti- Dimensional Substring Selectivity Estimation. In Proceedings of the Conference on Very Large Data Bases, pages 387\u2013398, 1999. [77] H. V. Jagadish, Raymond T. Ng, and Divesh Srivastava. Substring Selectivity Esti- mation. In Proceedings of ACM Symposium on Principles of Database Systems, pages 249\u2013260, 1999. [78] Liang Jin, Nick Koudas, Chen Li, and Anthony K.H. Tung. Indexing Mixed Types for Approximate Retrieval. In Proceedings of the Conference on Very Large Data Bases, pages 793\u2013804, 2005. 132 [79] Liang Jin and Chen Li. Selectivity Estimation for Fuzzy String Predicates in Large Data Sets. In Proceedings of the Conference on Very Large Data Bases, pages 397\u2013408, 2005. [80] D. V. Kalashnikov, S. Mehrotra, and Z. Chen. Exploiting Relationships for Domain- independent Data Cleaning. In SIAM Data Mining (SDM) Conf., 2005. [81] Yan Ke, Rahul Sukthankar, and Larry Huston. Efficient Near duplicate and Sub-image Retrieval. In ACM Multemedia, pages 869\u2013876, 2004. [82] R. P. Kelley. Blocking Considerations for Record Linkage Under Conditions of Uncer- tainty. In Proc. of Social Statistics Section, pages 602\u2013605, 1984. [83] Aleksander Kolcz, Abdur Chowdhury, and Joshua Alspector. Improved Robustness of Signature-Based Near-Replica via Lexicon Randomization. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 605\u2013610, 2004. [84] Nick Koudas, Chen Li, Anthony Tung, and Rares Vernica. Relaxing Join and Selection Queries. In Proceedings of the Conference on Very Large Data Bases, pages 199\u2013210, 2006. [85] Nick Koudas, Amit Marathe, and Divesh Srivastava. Flexible string matching against large databases in practice. In Proceedings of the Conference on Very Large Data Bases, pages 1078\u20131086, 2004. [86] Nick Koudas, Sunita Sarawagi, and Divesh Srivastava. Record linkage: similarity mea- sures and algorithms. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 802\u2013803, 2006. [87] P. Krishnan, Jeffrey Scott Vitter, and Bala Iyer. Estimating Alphanumeric Selectiv- ity in the Presence of Wildcards. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 282\u2013293, 1996. [88] Charles L. Lawson and Richard J. Hanson. Solving Least Squares Problems. Society for Industrial Mathematics, 1987. [89] Hongrae Lee, Raymond T. Ng, and Kyuseok Shim. Extending Q-Grams to Estimate Selectivity of String Matching with Edit Distance. In Proceedings of the Conference on Very Large Data Bases, pages 195\u2013206, 2007. [90] Hongrae Lee, Raymond T. Ng, and Kyuseok Shim. Approximate Substring Selectivity Estimation. In Proceedings of the International Conference on Extending Database Technology, pages 827\u2013838, 2009. [91] Hongrae Lee, Raymond T. Ng, and Kyuseok Shim. Approximate Substring Selectivity Estimation. In Proceedings of the International Conference on Extending Database Technology, pages 827\u2013838, 2009. 133 [92] Hongrae Lee, Raymond T. Ng, and Kyuseok Shim. Power-Law Based Estimation of Set Similarity Join Size. In Proceedings of the VLDB Endowment, pages 658\u2013669, 2009. [93] M. Ley. Dblp. http:\/\/www.fnformatick.uni-tier.de\/ ley\/db. [94] Chen Li, Bin Wang, and Xiaochun Yang. VGRAM: Improving Performance of Approx- imate Queries on String Collections Using Variable-Length Grams. In Proceedings of the Conference on Very Large Data Bases, pages 303\u2013314, 2007. [95] Richard Lipton and Jeffrey F. Naughton. Query size estimation by adaptive sampling. In Proceedings of ACM Symposium on Principles of Database Systems, pages 40\u201346, 1990. [96] Richard Lipton, Jeffrey F. Naughton, and Donovan A. Schneider. Practical selectivity estimation through adaptive sampling. In Proceedings of the ACM SIGMOD Interna- tional Conference on the Management of Data, pages 1\u201311, 1990. [97] Jiaheng Lu, Jialong Han, and Xiaofeng Meng. Efficient algorithms for approximate member extraction using signature-based inverted lists. In Proceedings of the Interna- tional Conference on Information and Knowledge Management, pages 315\u2013324, 2009. [98] Qin Lv, Willian Josephson, Zhe Wang, Moses Charikar, and Kai Li. Multi-Probe LSH: Efficient Indexing for High-Dimensional Similarity Search. In Proceedings of the Con- ference on Very Large Data Bases, pages 950\u2013961, 2007. [99] Jayant Madhavan, David Ko, Lucja Kot, Vignesh Ganapathy, Alex Rasmussen, and Alon Halevy. Googles DeepWeb Crawl. In Proceedings of the VLDB Endowment, pages 1241\u20131252, 2008. [100] B. Malin. Unsupervised Name Disambiguation via Social Network Similarity. In SIAM SDM Workshop on Link Analysis, Counterterrorism and Security, pages 93\u2013102, 2005. [101] Nikos Mamoulis. Efficient Processing of Joins on Set-valued Attributes. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 157\u2013168, 2003. [102] Nikos Mamoulis, David W. Cheung, and Wang Lian. Similarity Search in Sets and Categorical Data Using the Signature Tree. In Proceedings of the IEEE International Conference on Data Engineering, pages 75\u201386, 2003. [103] Udi Manber. Finding Similar Files in a Large File System. In USENIX Winter, pages 1\u201310, 1994. [104] Gurmeet Singh Manku, Arvind Jain, and Anish Das Sarma. Detecting Near-Duplicates for Web Crawling. In Proceedings of the International World Wide Web Conference, pages 141\u2013149, 2007. 134 [105] Arturas Mazeika, Michael H. Bo\u0308hlen, Nick Koudas, and Divesh Srivastava. Estimating the selectivity of approximate string queries. ACM Transaction on Database Systems, 32(1), 2007. [106] Sergey Melnik and Hector Garcia-Molina. Adaptive Algorithms for Set Containment Joins. In ACM Transaction on Database Systems, pages 56\u201399, 2003. [107] A. Metwally, D. Agrawal, and E. El Abbadi. DETECTIVES: DETEcting Coalition hiT Inflation attacks in adVertising nEtworks Streams. In Proceedings of the International World Wide Web Conference, pages 241\u2013250, 2007. [108] David R. H. Miller, Tim Leek, and Richard M. Schwartz. A hidden Markov model in- formation retrieval system. In Proceedings of the ACM SIGIR International Conference on Research and Development in Information Retrieval, pages 214\u2013221, 1999. [109] Chaitanya Mishra and Nick Koudas. Stretch \u2019n\u2019 Shrink: Resizing Queries to User Preferences. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 1227\u20131229, 2008. [110] Alvaro E. Monge. Matching algorithms within a duplicate detection system. IEEE Data Eng. Bull., 23(4):14\u201320, 2000. [111] Rajeev Motwani and Prabhakar Raghavan. Randomized Algorithms. Cambridge Uni- versity Press, 1995. [112] M. Muralikrishna and David J. DeWitt. Equi-depth multidimensional histograms. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 328\u2013342, 1988. [113] G. Navarro and M. Raffinot. Fast and flexible string matching by combining bit- parallelism and suffix automata. Journal of Experimental Algorithmics, 5(4), 2000. [114] Gonzalo Navarro. A guided tour to approximate string matching. ACM Computing Surveys, 33(1):31\u201388, 2001. [115] Gonzalo Navarro and Ricardo Baeza-Yates. A New Indexing Method for Approximate String Matching. In Proceedings of the Annual Symposium on Combinatorial Pattern Matching, pages 163\u2013185, 1999. [116] Byung-Won On, Nick Koudas, Dongwon Lee, and Divesh Srivastava. Group Linkage. In Proceedings of the IEEE International Conference on Data Engineering, pages 496\u2013505, 2007. [117] Oracle. Oracle text. http:\/\/www.oracle.com\/technology\/products\/text\/index.html. [118] Rina Panigrahy. Entropy based Nearest Neighbor Search in High Dimensions. In Pro- ceedings of the ACM-SIAM Symposium on Discrete Algorithms, pages 1186\u20131195, 2006. 135 [119] Theoni Pitoura and Peter Triantafillou. Self-join size estimation in large-scale dis- tributed data systems. In ICDE, pages 764\u2013773, 2008. [120] Jay M. Ponte and W. Bruce Croft. A language modeling approach to information retrieval. In Proceedings of the ACM SIGIR International Conference on Research and Development in Information Retrieval, pages 275\u2013281, 1998. [121] Viswanath Poosala and Yannis E. Ioannidis. Balancing histogram optimality and prac- ticality for query result size estimation. In Proceedings of the ACM SIGMOD Interna- tional Conference on the Management of Data, pages 486\u2013495, 1997. [122] Lu Qin, Jeffrey Xu Yu, and Lijun Chang. Keyword Search in Databases: The Power of RDBMS. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 681\u2013693, 2009. [123] Erhard Rahm and Hong Hai Do. Data cleaning: Problems and current approaches. IEEE Data Eng. Bull., 23(4):3\u201313, 2000. [124] Raghu Ramakrishnan and Johannes Gehrke. Database Management Systems. McGraw- Hill, 2002. [125] Karthikeyan Ramasamy, Jignesh M Patel, Jeffrey F Naughton, and Raghav Kaushik. Set Containment Joins: The good, The Bad and The Ugly. In Proceedings of the Conference on Very Large Data Bases, pages 351\u2013362, 2000. [126] S. E. Robertson and S. Walker. Some simple effective approximations to the 2-Poisson model for probabilistic weighted retrieval. In Proceedings of the ACM SIGIR Interna- tional Conference on Research and Development in Information Retrieval, pages 232\u2013 241, 1994. [127] M. Sahami and T. Heilman. A Web-based Kernel Function for Measuring the Similarity of Short Text Snippets. In Proceedings of the International World Wide Web Conference, pages 377\u2013386, 2006. [128] Sunita Sarawagi. Letter from the special issue editor. IEEE Data Eng. Bull., 23(4):2, 2000. [129] Sunita Sarawagi and Anuradha Bhamidipaty. Interactive Deduplication using Active Learning. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 269\u2013278, 2002. [130] Sunita Sarawagi and Alok Kirpal. Efficient set joins on similarity predicates. In Pro- ceedings of the ACM SIGMOD International Conference on the Management of Data, pages 743\u2013754, 2004. [131] Mayssam Sayyadian, Hieu LeKhac, AnHai Doan, and Luis Gravano. Efficient Key- word Search Across Heterogeneous Relational Databases. In Proceedings of the IEEE International Conference on Data Engineering, pages 346\u2013355, 2007. 136 [132] Saul Schleimer, Daniel S. Wilkerson, and Alex Aiken. Winnowing: local algorithms for document fingerprinting. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 76\u201385, 2003. [133] P. G. Selinger, D. D. Chamberlin M. M. Astrahan, R. A. Lorie, and T. G. Price. Access path selection in a relational database management system. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 23\u201334, 1979. [134] Rajendra Shinde, Ashish Goel, Pankaj Gupta, and Debojyoti Dutta. Similarity Search and Locality Sensitive Hashing using Ternary Content Addressable Memories. In Pro- ceedings of the ACM SIGMOD International Conference on the Management of Data, pages 375\u2013386, 2010. [135] Benno Stein. Principles of Hash-based Text Retrieval. In Proceedings of the ACM SIGIR International Conference on Research and Development in Information Retrieval, pages 527\u2013534, 2007. [136] Manolis Terrovitis, Spyros Passas, Panos Vassiliadis, and Timos Sellis. A Combination of Trie-trees and Inverted Files for the Indexing of Set-valued Attributes. In Proceedings of the International Conference on Information and Knowledge Management, pages 728\u2013737, 2006. [137] Trillium Software. http:\/\/www.trilliumsoftware.com. [138] UCI. Flamingo project. http:\/\/www.ics.uci.edu\/ flamingo\/. [139] Jeffrey S. Vitter. Random sampling with a reservoir. ACM Transactions on Mathemat- ical Software, 11(1):37\u201357, 1985. [140] P. Ravikmar W. Cohen and S. Fienberg. A Comparison of String Metrics for Matching Names and Records. In Proc. of KDD Workshop on Data Cleaning, pages 73\u201378, 2003. [141] Hai Wang and Kenneth C. Sevcik. A multi-dimensional histogram for selectivity esti- mation and fast approximate query answering. In Proceedings of the 2003 conference of the Centre for Advanced Studies on Collaborative research, pages 328\u2013342, 2003. [142] Min Wang, Jeffrey Scott Vitter, and Bala Iyer. Selectivity Estimation in the Presence of Alphanumeric Correlations. In Proceedings of the IEEE International Conference on Data Engineering, pages 169\u2013180, 1997. [143] Wei Wang, Chuan Xiao, Xuemin Lin, and Chengqi Zhang. Efficient approximate en- tity extraction with edit distance constraints. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 759\u2013770, 2009. [144] Roger Weber, Hans-J. Schek, and Stephen Blott. A Quantitative Analysis and Perfor- mance Study for Similarity-Search Methods in High-Dimensional Spaces. In Proceedings of the ACM Symposium on Theory of Computing, pages 194\u2013205, 1998. 137 [145] William E Winkler. Record linkage software and methods for merging administrative lists. In Exchange of Technology and Knowhow, pages 313\u2013322, 1999. [146] William E Winkler. Overview of Record Linkage and Current Research Directions. In Research Reports, U.S. Census Bureau, Statistical Research Division, 2006. [147] Chuan Xiao, Wei Wang, and Xuemin Lin. Ed-Join: An Efficient Algorithm for Similarity Joins With Edit Distance Constraints. In Proceedings of the VLDB Endowment, pages 933\u2013944, 2008. [148] Chuan Xiao, Wei Wang, Xuemin Lin, and Jeffrey Xu Yu. Efficient Similarity Joins for Near Duplicate Detection. In Proceedings of the International World Wide Web Conference, pages 131\u2013140, 2008. [149] Jiong Yang, Wei Wang, and Philip Yu. BASS: Approximate Search on Large String Databases. In SSDBM, pages 181\u2013190, 2004. [150] Bin Yao, Feifei Li, Marios Hadjieleftheriou, and Kun Hou. Approximate String Search in Spatial Databases. In Proceedings of the IEEE International Conference on Data Engineering, pages 545\u2013556, 2010. [151] Bei Yu, Guoliang Li, Karen Sollins, and Anthony K. H. Tung. Effective Keyword-based Selection on Relational Databases. In Proceedings of the ACM SIGMOD International Conference on the Management of Data, pages 139\u2013150, 2007. 138","type":"literal","lang":"en"}],"http:\/\/www.europeana.eu\/schemas\/edm\/hasType":[{"value":"Thesis\/Dissertation","type":"literal","lang":"en"}],"http:\/\/vivoweb.org\/ontology\/core#dateIssued":[{"value":"2010-11","type":"literal","lang":"en"}],"http:\/\/www.europeana.eu\/schemas\/edm\/isShownAt":[{"value":"10.14288\/1.0051964","type":"literal","lang":"en"}],"http:\/\/purl.org\/dc\/terms\/language":[{"value":"eng","type":"literal","lang":"en"}],"https:\/\/open.library.ubc.ca\/terms#degreeDiscipline":[{"value":"Computer Science","type":"literal","lang":"en"}],"http:\/\/www.europeana.eu\/schemas\/edm\/provider":[{"value":"Vancouver : University of British Columbia Library","type":"literal","lang":"en"}],"http:\/\/purl.org\/dc\/terms\/publisher":[{"value":"University of British Columbia","type":"literal","lang":"en"}],"http:\/\/purl.org\/dc\/terms\/rights":[{"value":"Attribution-NonCommercial-NoDerivatives 4.0 International","type":"literal","lang":"en"}],"https:\/\/open.library.ubc.ca\/terms#rightsURI":[{"value":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/","type":"literal","lang":"en"}],"https:\/\/open.library.ubc.ca\/terms#scholarLevel":[{"value":"Graduate","type":"literal","lang":"en"}],"http:\/\/purl.org\/dc\/terms\/title":[{"value":"Selectivity estimation of approximate predicates on text","type":"literal","lang":"en"}],"http:\/\/purl.org\/dc\/terms\/type":[{"value":"Text","type":"literal","lang":"en"}],"https:\/\/open.library.ubc.ca\/terms#identifierURI":[{"value":"http:\/\/hdl.handle.net\/2429\/28645","type":"literal","lang":"en"}]}}