| 研究生: |
謝百恩 Shie, Bai-En |
|---|---|
| 論文名稱: |
於不同環境下之交易資料庫高效益探勘技術 Mining High Utility Patterns from Transactional Databases under Different Environments |
| 指導教授: |
曾新穆
Tseng, Vincent S. |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2013 |
| 畢業學年度: | 101 |
| 語文別: | 英文 |
| 論文頁數: | 135 |
| 中文關鍵詞: | 高效益樣式探勘 、交易資料庫 、資料串流 、行動交易環境 、興趣樣式 |
| 外文關鍵詞: | Utility pattern mining, transaction database, data stream, mobile commerce environment, interesting pattern |
| 相關次數: | 點閱:145 下載:4 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
資料探勘是從資料庫中找出潛在、未知且有用的資訊的一門學問,其中頻繁樣式探勘在許多資料探勘的應用中是一種常見的基礎技術。目前已有許多既有研究成功地將頻繁樣式探勘應用在不同領域。在商業領域中,從交易資料庫中找出頻繁樣式亦即在交易資料中找出經常被顧客同時購買的商品組合。然而頻繁樣式探勘的架構並未考慮交易環境中兩個相當重要的因素:商品價格與購買數量,故頻繁樣式探勘並無法滿足對找出與「利潤」相關的樣式(如高獲益商品組合)感興趣的使用者。因此同時考慮了商品價格及銷售數量的高效益樣式探勘,在資料探勘領域中成為了一個相當有應用價值的新興領域。在商業領域中應用高效益樣式探勘,找出真正最賺錢的商品組合,可協助決策者做出更精準的商業決策。然而在真實交易環境下,除了傳統的靜態交易資料庫之外,不同環境亦會產生不同類型的交易資料,如新興的兩種資料類型:串流型資料與行動交易資料,皆是最近的熱門研究議題。故本論文主要分為三個研究主題,結合高效益樣式探勘及相關探勘技術,在上述三種不同環境的交易資料庫找出符合使用者需求的結果。
目前已有許多在傳統靜態交易資料庫使用高效益樣式探勘的論文。由於向下封閉性質在高效益探勘並無法適用,故先前研究大多使用兩階段式的探勘架構:於第一階段使用估計效益值,先找出可能為高效益的候選樣式,在第二階段再計算所有候選樣式的實際效益值,以確保輸出真正的高效益樣式。然而此架構的瓶頸在於第一階段過於高估估計效益值,使得太多的候選樣式需要在第二階段被檢查,探勘流程的效能也因此大大降低。因此在此環境下,本論文制訂能有效地降低估計效益值的策略以及設計能有效運用此策略的演算法UP-Growth與UP-Growth+,在第一階段提出新的估計效益值計算方式,有效率地過濾掉許多不必要的候選樣式,可大幅減少探勘流程所需的時間,達到有效增進探勘效能的目標。
對大型企業而言,無時無刻都在產生巨量的交易資料,在無法儲存如此巨量資料的情境下,便造就了串流型資料的分析需求。串流資料反應了該環境的即時狀況,是一種相當重要的資料類型,因此串流資料探勘在許多研究中已被廣泛地討論。串流資料探勘的重要特性為資料快速流過,無法掃描第二次資料,故需要掃描兩次以上資料庫的傳統演算法並無法符合此需求。因此在本論文的第二個研究主題中,我們提出了名為GUIDE的架構,只需掃描一次資料,即可將所需的資訊快速地儲存在資料結構中做有效運用。此外考慮到若輸出的樣式數量過多,會讓使用者面臨無法篩選及應用這些樣式的困境。故我們結合了高效益及最大樣式探勘,在串流資料的界標、滑動型視窗及定期衰退三種模式下,找出最大高效益樣式,有效減少輸出樣式數量,達到精簡的效果。
行動裝置已是目前最被廣泛使用的資訊產品之一,相關的應用領域與學術研究也變得愈來愈熱門。在此熱潮下,行動交易環境下的使用者行為樣式探勘也成為了新興的熱門研究主題。本論文的第三個研究主題結合了使用者的移動路徑及交易行為,從行動交易環境中找出高效益行動循序樣式。且為了讓使用者能表達個人的喜好需求,我們設計讓使用者可依個人喜好輸入之限制條件。本論文所提出的IM-Span演算法採用分治式的子資料庫遞迴探勘,將限制導入有限狀態機,只須掃描原始資料庫一次,即可找出使用者感興趣的高效益行動循序樣式。如此不僅可增進探勘效能,更可進一步地符合行動使用者的需求,達到輸出樣式個人化、減少樣式數量及增進探勘效能的效果。
Data mining is the process of revealing non-trivial, previously unknown and potentially useful information from large databases. Extensive studies have addressed frequent pattern mining and successfully employed it in wide applications. In business domain, mining frequent patterns from transaction databases refers to discovery of itemsets frequently bought together in the transactions. However two important factors, namely unit profit and purchased quantity, are not considered in this framework. Hence, utility mining emerges as an important topic in the data mining field since it considers unit profit and sales quantity and discovers valuable utility patterns from transactional data. However, in real world applications, different environments of transaction databases make the concepts and features of data different. In this dissertation, we address the issues about mining utility patterns from different environments of transaction databases, including traditional transaction databases, transactional data streams and mobile transaction sequence databases.
In recent years, a number of researches have addressed the topic about utility mining from traditional transaction databases. Since downward closure property is not maintained in utility mining, most of them apply the two-phase framework: finding possible high utility patterns in phase I by estimating the upper bound of their utilities and then calculating their actual utility values to ensure the real high utility patterns in phase II. Nevertheless, the bottleneck of this framework is that estimated utilities of itemsets are much overestimated so that large numbers of candidates need to be checked in phase II. This results in poor performance in mining process. In view of this, for the first part of this dissertation, we design two algorithms named UP-Growth and UP-Growth+ with strategies for lowering the estimated utilities during the mining process. With the strategies, the number of candidates is effectively reduced such that the mining performance is significantly improved.
In many applications, huge amount of data are generated in fast and continuous way, which are considered as data streams. The issues about data stream mining are diversely discussed since data streams reflect critical real-time situations for circumstances. Therefore, in the second part of this dissertation, we propose a one-pass framework named GUIDE to discover the compact utility patterns, named maximal high utility itemsets, by integrating the concepts of utility patterns and maximal patterns. The proposed framework not only generates the patterns efficiently but also fits to three data stream models: landmark, sliding window and time fading models.
Mobile devices are getting popular for various applications such that mining user behavior patterns from mobile environments emerges as a novel research issue. In the third part of this dissertation, we aim at discovering high utility mobile sequential patterns from mobile commerce environments. Moreover, we incorporate user-constraints for presenting users’ interests and design an algorithm named IM-Span to find interesting high utility mobile sequential patterns that meet the constraints. Finding patterns by pushing constraints into the mining process turns out to be more useful, personalized and insightful to users since it minimizes the number of resultant patterns and improves the mining performance.
[1] M. Adnan and R. Alhajj, “DRFP-tree: disk-resident frequent pattern tree,” Applied Intelligence, Vol. 30, No. 2, pp. 84-97, 2009.
[2] R. Agrawal and R. Srikant. “Fast algorithms for mining association rules,” in Proc. of the 20th Int’l Conf. on Very Large Databases (VLDB’94), pp. 487-499, 1994.
[3] R. Agrawal and R. Srikant, “Mining sequential patterns,” in Proc. of the 11th Int’l Conference on Data Engineering (ICDE’95), pp. 3-14, March 1995.
[4] C. F. Ahmed, S. K. Tanbeer, B.-S. Jeong and Y.-K. Lee. “Efficient tree structures for high utility pattern mining in incremental databases,” IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 21, Issue 12, pp. 1708-1721, 2009.
[5] C. F. Ahmed, S. K. Tanbeer, B.-S. Jeong and Y.-K. Lee, “HUC-Prune: an efficient candidate pruning technique to mine high utility patterns,” Applied Intelligence, Vol. 34, No. 2, pp. 181-198, 2011.
[6] A. Bifet, G. Holmes, B. Pfahringer, and R. Gavaldà, “Mining frequent closed graphs on evolving data streams,” in Proc. of the 17th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD’11), pp. 591-599, August 2011.
[7] V. Bogorny, S. Camargo, P. M. Engel and L. O. Alvares, “Mining frequent geographic patterns with knowledge constraints,” in Proc. of the 14th annual ACM int’l symposium on Advances in geographic information systems (GIS’06), pp. 139-146, 2006.
[8] C. H. Cai, A. W. C. Fu, C. H. Cheng and W. W. Kwong, “Mining association rules with weighted items,” in Proc. of the Int’l Database Engineering and Applications Symposium (IDEAS’98), pp. 68-77, 1998.
[9] R. Chan, Q. Yang and Y. Shen. “Mining high utility itemsets,” in Proc. of Third IEEE Int'l Conf. on Data Mining (ICDM’03), pp. 19-26, November 2003.
[10] J. H. Chang, “Mining weighted sequential patterns in a sequence database with a time-interval weight,” Knowledge-Based Systems, Vol. 24, Issue 1, 2011.
[11] M.-S. Chen, J.-S. Park and P. S. Yu, “Efficient data mining for path traversal patterns,” IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 10, No. 2, pp. 209-221, 1998.
[12] J. Cheng, Y. Ke and W. Ng, “Maintaining frequent closed itemsets over a sliding window,” in Journal of Intelligent Information Systems (JIIS), Vol. 31, Issue 3, pp. 191-215, 2007.
[13] J. Cheng, Y. Ke and W. Ng, “A survey on algorithms for mining frequent itemsets over data streams,” in Knowledge and Information Systems (KAIS), Vol. 16, Issue 1, pp. 1-27, 2008.
[14] Y. Chi, H. Wang, P. S. Yu and R. R. Muntz, “Moment: maintaining closed frequent itemsets over a stream sliding window,” in Proc. of IEEE Int’l Conf. on Data Mining (ICDM’04), pp. 59-66, 2004.
[15] C. Creighton and S. Hanash, “Mining gene expression databases for association rules,” Bioinformatics, Vol. 19, No. 1, pp. 79-86, 2003.
[16] A. Erwin, R. P. Gopalan and N. R. Achuthan, “Efficient mining of high utility itemsets from large datasets,” in Proc. of the 12th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD’08), Lecture Notes in Artificial Intelligence 5012 (LNAI), pp. 554-561, 2008.
[17] P. G. Ferreira and P. J. Azevedo, “Protein sequence pattern mining with constraints,” in Proc. of the 9th European conference on Principles and Practice of Knowledge Discovery in Databases (PKDD’05) and Lecture Notes in Computer Science (LNCS), Vol. 3721, pp. 96-107, November 2005.
[18] M. M. Gaber, A. B. Zaslavsky and S. Krishnaswamy, “Mining data streams: a review,” in ACM SIGMOD Record, Vol. 34, No. 2, pp. 18-26, 2005.
[19] M. Garofalakis, R. Rastogi and K. Shim, “Mining sequential patterns with regular expression constraints,” IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 14, No. 3, pp. 530-552, 2002.
[20] E. Georgii, L. Richter, U. Rückert and S. Kramer, “Analyzing microarray data using quantitative association rules,” Bioinformatics, Vol. 21, pp. 123-129, 2005.
[21] C. Giannella, J. Han, J. Pei, X. Yan and P. S. Yu, “Mining frequent patterns in data streams as multiple time granularities,” in H. Kargupta, A. Joshi, K. Sivakumar, and Y. Yesha (eds.), Next Generation Data Mining, AAAI/MIT, pp. 191-212, 2003.
[22] L. Golab and M. T. Ozsu, “Issues in data stream management,” in ACM SIGMOD Record, Vol. 32, No. 2, pp. 5-14, June 2003.
[23] L. I. Gomez and A. A. Vaisman, “Efficient constraint evaluation in categorical sequential pattern mining for trajectory databases,” in proc. of the 12th Int’l Conf. on Extending Database Technology (EDBT’09), pp. 541-552, 2009.
[24] K. Gouda and M. J. Zaki. “Efficiently mining maximal frequent itemsets,” in Proc. of the IEEE International Conference on Data Mining (ICDM’01), pp. 163-170, San Jose, 2001.
[25] J. Han, G. Dong, Y. Yin, “Efficient mining of partial periodic patterns in time series database,” in Proc. of the Int’l Conf. on Data Engineering (ICDE’99), pp. 106-115, 1999.
[26] J. Han and Y. Fu, “Discovery of multiple-level association rules from large databases,” in Proc. of the 21th Int’l Conf. on Very Large Databases (VLDB’95), pp. 420–431, September 1995.
[27] J. Han, J. Pei, Y. Yin, “Mining frequent patterns without candidate generation,” in Proc. of the Int'l Conf. on Management of Data (COMAD’00), pp. 1-12, 2000.
[28] J. Ho, L. Lukov and S. Chawla, “Sequential pattern mining with constraints on large protein databases,” in Proc. of the 12th Int’l Conf. on Management of Data (COMAD’05b), pp. 89-100, 2005.
[29] N. Jiang and L. Gruenwald, “CFI-Stream: mining closed frequent itemsets in data streams,” in Proc. of the Utility-Based Data Mining Workshop, ACM KDD (UBDM’06), pp. 592-597, USA, August 2006.
[30] N. Jiang and L. Gruenwald, “Research issues in data stream association rule mining,” in ACM SIGMOD Record, Vol. 35, No. 1, pp. 14-19, March 2006.
[31] C. Jin, W. Qian, C. Sha, J. X. Yu and A. Zhou, “Dynamically maintaining frequent items over a data stream,” in Proc. of the 2003 ACM Int’l Conf. on Information and Knowledge Management (CIKM’03), pp. 287-294, November 2003.
[32] H. Kim and J.-H. Park, “Evaluating the regularity of human behavior from mobile phone usage logs,” in Proc. of 2011 Workshop on Behavior Informatics (BI’11), May 2011.
[33] D. Lee and W. Lee, “Finding maximal frequent itemsets over online data streams adaptively,” in Proc. of Fifth IEEE Int’l Conf. on Data Mining (ICDM’05), November 2005.
[34] S. C. Lee, J. Paik, J. Ok, I. Song and U. M. Kim, “Efficient mining of user behaviors by temporal mobile access patterns,” Int'l. Journal of Computer Science Security, Vol. 7, no. 2, pp. 285-291, 2007.
[35] C. K.-S. Leung and Q. I. Khan, “DSTree: a tree structure for the mining of frequent sets from data streams,” in Proc. of the 6th IEEE Int'l Conf. on Data Mining (ICDM’06), pp. 928-932.
[36] C. K.-S. Leung and F. Jiang, “Frequent itemset mining of uncertain data streams using the damped window model,” in Proc. of the 26th Annual ACM Symposium on Applied Computing (SAC’11), pp. 950-955, March 2011.
[37] H. F. Li, C. C. Hob and S. Y. Lee, “Incremental updates of closed frequent itemsets over continuous data streams,” in Expert Systems with Applications (ESWA), Vol. 36, Issue 2, pp. 2451-2458, 2009.
[38] H. F. Li, H. Y. Huang, Y. C. Chen, Y. J. Liu and S. Y. Lee, “Fast and memory efficient mining of high utility itemsets in data streams,” in Proc. of the 8th IEEE Int'l Conf. on Data Mining (ICDM’08), pp. 881-886, 2008.
[39] Y.-C. Li, J.-S. Yeh and C.-C. Chang, “Isolated items discarding strategy for discovering high utility itemsets,” Data & Knowledge Engineering (DKE’08), Vol. 64, Issue 1, pp. 198-217, January 2008.
[40] C. H. Lin, D. Y. Chiu, Y. H. Wu and A. L. P. Chen, “Mining frequent itemsets from data streams with a time-sensitive sliding window,” in Proc. of the SIAM Int’l Conference on Data Mining (SDM’05), 2005.
[41] D.-R. Liu, C.-H. Lai, W.-J. Lee, “A hybrid of sequential rules and collaborative filtering for product recommendation.” Information Sciences, Vol. 179, Issue 20, pp. 3505-3519, September 2009.
[42] X. Liu, J. Guan and P. Hu, “Mining frequent closed itemsets from a landmark window over online data stream,” in Computers & Mathematics with Applications, Vol. 57, Issue 6, pp. 927-936, 2009.
[43] Y. Liu, W. Liao and A. Choudhary, “A fast high utility itemsets mining algorithm,” in Proc. of the Utility-Based Data Mining Workshop (UBDM’05), 2005.
[44] E. H.-C. Lu, W.-C. Lee and V. S. Tseng, “A framework for personal mobile commerce pattern mining and prediction,” IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 24, No.5, pp.769-782, 2011.
[45] E. H.-C. Lu, C.-Y. Lin and V. S. Tseng, “Trip-Mine: an efficient trip planning approach with travel time constraints,” in Proc. of IEEE Int’l Conf. on Mobile Data Management (MDM’11), Lulea, Sweden, June 2011.
[46] E. H.-C. Lu and V. S. Tseng, “Mining cluster-based mobile sequential patterns in location-based service environments,” in Proc. of IEEE Int’l Conf. on Mobile Data Management (MDM’09), Taipei, Taiwan, May 2009.
[47] E. H.-C. Lu, V. S. Tseng and P. S. Yu, “Mining cluster-based temporal mobile sequential patterns in location-based service environments,” IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 23, no. 6, pp. 914-927, 2011.
[48] R. Martinez, N. Pasquier and C. Pasquier, “GenMiner: mining non-redundant association rules from integrated gene expression data and annotations,” Bioinformatics, Vol. 24, pp. 2643-2644, 2008.
[49] J. Pei, J. Han, H. Lu, S. Nishio, S. Tang and D. Yang, “H-mine: fast and space-preserving frequent pattern mining in large databases,” IIE Transactions, Vol. 39, Issue 6, pp. 593-605, June 2007.
[50] J. Pei, J. Han and R. Mao, “CLOSET: An efficient algorithm for mining frequent closed itemsets,” in Proc. of the ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD’00), pp. 11-20, 2000.
[51] J. Pei, J. Han, B. Mortazavi-Asl, H. Pinto, Q. Chen, U. Dayal and M. C. Hsu, “Mining sequential patterns by pattern-growth: The PrefixSpan approach,” IEEE Transactions on Knowledge and Data Engineering (TKDE’04), Vol.16, No.10, October 2004.
[52] J. Pei, J. Han and W. Wang, “Constraint-based sequential pattern mining in large databases,” in Proc. of Int’l Conf. on Information and Knowledge Management (CIKM’02), pp. 18-25, 2002.
[53] J. Pei, J. Han and W. Wang, “Constraint-based sequential pattern mining: the pattern-growth methods,” Journal of Intelligent Information Systems (JIIS), Vol. 28, Issue 2, pp. 133-160, 2007.
[54] J. Pisharath, Y. Liu, B. Ozisikyilmaz, R. Narayanan, W. K. Liao, A. Choudhary and G. Memik, NU-MineBench version 2.0 dataset and technical report, http://cucis.ece.northwestern.edu/ projects/DMS/MineBench.html
[55] B.-E. Shie, J.-H. Cheng, K.-T. Chuang and V. S. Tseng, “A one-phase method for mining high utility mobile sequential patterns in mobile commerce environments,” in proc. of the 25th Int’l Conf. on Industrial, Engineering & Other Applications of Applied Intelligent Systems (IEA/AIE’12), June 2012.
[56] B.-E. Shie, H.-F. Hsiao and V. S. Tseng. “Efficient algorithms for discovering high utility user behavior patterns in mobile commerce environments,” Knowledge and Information Systems (KAIS), March 2012.
[57] B.-E. Shie, H.-F. Hsiao, V. S. Tseng and P. S. Yu, “Mining high utility mobile sequential patterns in mobile commerce environments,” in Proc. of the 16th Intl. Conf. on DAtabase Systems for Advanced Applications (DASFAA’11) and Lecture Notes in Computer Science (LNCS), Vol. 6587/2011, pp. 224-238, 2011.
[58] B.-E. Shie, H.-F. Hsiao, P. S. Yu and V. S. Tseng, “Discovering valuable user behavior patterns in mobile commerce environments,” in Proc. of the 2011 Workshop on Behavior Informatics (BI’11), joint with PAKDD 2011, 2011.
[59] B.-E. Shie, V. S. Tseng and P. S. Yu, “Online mining of temporal maximal utility itemsets from data streams,” in Proc. of the 25th Annual ACM Symposium on Applied Computing (SAC’10), March 2010.
[60] K. Sun and F. Bai, “Mining weighted association rules without preassigned weights,” IEEE Trans. on Knowledge and Data Engineering (TKDE), Vol. 20, No. 4, 2008.
[61] S. K. Tanbeer, C. F. Ahmed, B.-S. Jeong and Y.-K. Lee, “Efficient frequent pattern mining over data streams,” in Proc. of the ACM 17th Conf. on Information and Knowledge Management (CIKM’08), 2008.
[62] F. Tao, F. Murtagh and M. Farid, “Weighted association rule mining using weighted support and significance framework,” in Proc. of the ACM SIGKDD Conf. on Knowledge Discovery and Data Mining (KDD 2003), pp. 661-666, 2003.
[63] V. S. Tseng, C. J. Chu and T. Liang, “Efficient mining of temporal high utility itemsets from data streams,” in Proc. of ACM KDD Workshop on Utility-Based Data Mining Workshop (UBDM’06), USA, August 2006.
[64] V. S. Tseng and W. C. Lin, “Mining sequential mobile access patterns efficiently in mobile web systems,” in Proc. of the 19th Int’l Conf. on Advanced Information Networking and Applications, pp. 867-871, 2005.
[65] V. S. Tseng, C.-W. Wu, B.-E. Shie and P. S. Yu, “UP-Growth: an efficient algorithm for high utility itemsets mining,” in Proc. of the 16th ACM SIGKDD Conf. on Knowledge Discovery and Data Mining (KDD’10), pp. 253-262, 2010.
[66] Y.-T. Wang and J.-T. Cheng, “Mining periodic movement patterns of mobile phone users based on an efficient sampling approach,” Applied Intelligence, Vol. 35, No. 1, pp. 32-40, 2011.
[67] W. Wang, J. Yang and P. Yu, “Efficient mining of weighted association rules (WAR),” in Proc. of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD’00), pp. 270-274, 2000.
[68] C. W. Wu, B.-E. Shie, P. S. Yu, V. S. Tseng, “Mining top-k high utility itemsets,” in 18th ACM SIG KDD conference on knowledge discovery and data mining (KDD’12), August 2012.
[69] H. Yao and H. J. Hamilton, “Mining itemset utilities from transaction databases,” Data & Knowledge Engineering (DKE), Vol. 59, pp. 603-626, 2006.
[70] H. Yao, H. J. Hamilton and L. Geng, “A unified framework for utility-based measures for mining itemsets,” in Proc. of ACM SIGKDD 2nd Workshop on Utility-Based Data Mining (UBDM’06), pp. 28-37, USA, August 2006.
[71] S.-J. Yen, C. C. Chen and Y.-S. Lee, “A fast algorithm for mining high utility itemsets,” in Proc. of 2011 Workshop on Behavior Informatics (BI’11), May 2011.
[72] S. J. Yen and Y. S. Lee, “Mining high utility quantitative association rules.” In Proc. of 9th Int’l Conf. of Data Warehousing and Knowledge Discovery (DaWaK’07), Lecture Notes in Computer Science (LNCS), Vol. 4654, pp. 283-292, September 2007.
[73] S. J. Yen, Y. S. Lee, C. K. Wang, C. W. Wu and L.-Y. Ouyang, “The studies of mining frequent patterns based on frequent pattern tree,” in Proc. of the 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD’09) and Lecture Notes in Computer Science (LNCS), Vol. 5476, pp. 232-241, 2009.
[74] S. J. Yen, Y. S. Lee, C. W. Wu, and C. L. Lin, “An efficient algorithm for maintaining frequent closed itemsets over data stream,” in proc. of the 22nd Int’l Conf. on Industrial, Engineering & Other Applications of Applied Intelligent Systems (IEA/AIE’09), Lecture Notes in Artificial Intelligence (LNAI), Vol. 5579, pp. 767–776, 2009.
[75] S. J. Yen, C. W. Wu, Y. S. Lee and V. S. Tseng, “A fast algorithm for mining frequent closed itemsets over stream sliding window,” in Proc. of IEEE Int’l Conf. on Fuzzy Systems (FUZZ-IEEE’11), pp. 996-1002, 2011.
[76] C.-H. Yun and M.-S. Chen, “Using pattern-join and purchase-combination for mining web transaction patterns in an electronic commerce environment,” in Proc. of 24th IEEE Annu. Int. Computer Software and Application Conf., pp. 99–104, October 2000.
[77] C.-H. Yun and M.-S. Chen, “Mining mobile sequential patterns in a mobile commerce environment,” IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews, Vol. 37, No. 2, 2007.
[78] U. Yun, “An efficient mining of weighted frequent patterns with length decreasing support constraints,” Knowledge-Based Systems, Vol. 21, Issue 8, pp. 741-752, 2008.
[79] U. Yun and J. J. Leggett, “WFIM: weighted frequent itemset mining with a weight range and a minimum weight,” in Proc. of the SIAM Int’l Conference on Data Mining (SDM’05), pp. 636–640, 2005.
[80] U. Yun and J. J. Leggett, “WIP: mining weighted interesting patterns with a strong weight and/or support affinity,” in Proc. of the SIAM Int’l Conference on Data Mining (SDM’06), pp. 623-627, April 2006.
[81] U. Yun and K. H. Ryu, “Discovering important sequential patterns with length-decreasing weighted support constraints,” Int’l Journal of Information Technology & Decision Making, Vol. 9, Issue 4, pp. 575-599, 2010.
[82] M. J. Zaki, “Scalable algorithms for association mining,” IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 12, No. 3, pp. 372-390, 2000.
[83] F. Zhu, X. Yan, J. Han and P. S. Yu, “gPrune: a constraint pushing framework for graph pattern mining,” in Proc. of the 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD’07), pp. 388-400, 2007.
[84] Frequent itemset mining implementations repository, http://fimi.cs.helsinki.fi/