Frequent pattern mining: current status and future directions
Frequent pattern mining has been a focused theme in data mining research for over a
decade. Abundant literature has been dedicated to this research and tremendous progress …
decade. Abundant literature has been dedicated to this research and tremendous progress …
[LIBRO][B] Data mining: concepts and techniques
Data Mining: Concepts and Techniques, Fourth Edition introduces concepts, principles, and
methods for mining patterns, knowledge, and models from various kinds of data for diverse …
methods for mining patterns, knowledge, and models from various kinds of data for diverse …
Itemset mining: A constraint programming perspective
The field of data mining has become accustomed to specifying constraints on patterns of
interest. A large number of systems and techniques has been developed for solving such …
interest. A large number of systems and techniques has been developed for solving such …
Mining high utility patterns in one phase without generating candidates
Utility mining is a new development of data mining technology. Among utility mining
problems, utility mining with the itemset share framework is a hard one as no anti …
problems, utility mining with the itemset share framework is a hard one as no anti …
Discovering leaders from community actions
We introduce a novel frequent pattern mining approach to discover leaders and tribes in
social networks. In particular, we consider social networks where users perform actions …
social networks. In particular, we consider social networks where users perform actions …
Constraint programming for itemset mining
The relationship between constraint-based mining and constraint programming is explored
by showing how the typical constraints used in pattern mining can be formulated for use in …
by showing how the typical constraints used in pattern mining can be formulated for use in …
DSTree: a tree structure for the mining of frequent sets from data streams
CKS Leung, QI Khan - … Conference on Data Mining (ICDM'06), 2006 - ieeexplore.ieee.org
With advances in technology, a flood of data can be produced in many applications such as
sensor networks and Web click streams. This calls for efficient techniques for extracting …
sensor networks and Web click streams. This calls for efficient techniques for extracting …
HVLearn: Automated black-box analysis of hostname verification in SSL/TLS implementations
SSL/TLS is the most commonly deployed family of protocols for securing network
communications. The security guarantees of SSL/TLS are critically dependent on the correct …
communications. The security guarantees of SSL/TLS are critically dependent on the correct …
CanTree: a canonical-order tree for incremental frequent-pattern mining
CKS Leung, QI Khan, Z Li, T Hoque - Knowledge and Information Systems, 2007 - Springer
Since its introduction, frequent-pattern mining has been the subject of numerous studies,
including incremental updating. Many existing incremental mining algorithms are Apriori …
including incremental updating. Many existing incremental mining algorithms are Apriori …
Non-redundant data clustering
D Gondek, T Hofmann - Knowledge and Information Systems, 2007 - Springer
Data clustering is a popular approach for automatically finding classes, concepts, or groups
of patterns. In practice, this discovery process should avoid redundancies with existing …
of patterns. In practice, this discovery process should avoid redundancies with existing …