Frequent pattern mining: current status and future directions

J Han, H Cheng, D **n, X Yan - Data mining and knowledge discovery, 2007 - Springer
Frequent pattern mining has been a focused theme in data mining research for over a
decade. Abundant literature has been dedicated to this research and tremendous progress …

[LIBRO][B] Data mining: concepts and techniques

J Han, J Pei, H Tong - 2022 - books.google.com
Data Mining: Concepts and Techniques, Fourth Edition introduces concepts, principles, and
methods for mining patterns, knowledge, and models from various kinds of data for diverse …

Itemset mining: A constraint programming perspective

T Guns, S Nijssen, L De Raedt - Artificial Intelligence, 2011 - Elsevier
The field of data mining has become accustomed to specifying constraints on patterns of
interest. A large number of systems and techniques has been developed for solving such …

Mining high utility patterns in one phase without generating candidates

J Liu, K Wang, BCM Fung - IEEE Transactions on knowledge …, 2015 - ieeexplore.ieee.org
Utility mining is a new development of data mining technology. Among utility mining
problems, utility mining with the itemset share framework is a hard one as no anti …

Discovering leaders from community actions

A Goyal, F Bonchi, LVS Lakshmanan - … of the 17th ACM conference on …, 2008 - dl.acm.org
We introduce a novel frequent pattern mining approach to discover leaders and tribes in
social networks. In particular, we consider social networks where users perform actions …

Constraint programming for itemset mining

L De Raedt, T Guns, S Nijssen - Proceedings of the 14th ACM SIGKDD …, 2008 - dl.acm.org
The relationship between constraint-based mining and constraint programming is explored
by showing how the typical constraints used in pattern mining can be formulated for use in …

DSTree: a tree structure for the mining of frequent sets from data streams

CKS Leung, QI Khan - … Conference on Data Mining (ICDM'06), 2006 - ieeexplore.ieee.org
With advances in technology, a flood of data can be produced in many applications such as
sensor networks and Web click streams. This calls for efficient techniques for extracting …

HVLearn: Automated black-box analysis of hostname verification in SSL/TLS implementations

S Sivakorn, G Argyros, K Pei… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
SSL/TLS is the most commonly deployed family of protocols for securing network
communications. The security guarantees of SSL/TLS are critically dependent on the correct …

CanTree: a canonical-order tree for incremental frequent-pattern mining

CKS Leung, QI Khan, Z Li, T Hoque - Knowledge and Information Systems, 2007 - Springer
Since its introduction, frequent-pattern mining has been the subject of numerous studies,
including incremental updating. Many existing incremental mining algorithms are Apriori …

Non-redundant data clustering

D Gondek, T Hofmann - Knowledge and Information Systems, 2007 - Springer
Data clustering is a popular approach for automatically finding classes, concepts, or groups
of patterns. In practice, this discovery process should avoid redundancies with existing …