Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chuang, Kun-Ta | en_US |
dc.contributor.author | Huang, Jiun-Long | en_US |
dc.contributor.author | Chen, Ming-Syan | en_US |
dc.date.accessioned | 2014-12-08T15:11:08Z | - |
dc.date.available | 2014-12-08T15:11:08Z | - |
dc.date.issued | 2008-08-01 | en_US |
dc.identifier.issn | 1066-8888 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1007/s00778-007-0078-6 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/8530 | - |
dc.description.abstract | We explore in this paper a practicably interesting mining task to retrieve top-k (closed) itemsets in the presence of the memory constraint. Specifically, as opposed to most previous works that concentrate on improving the mining efficiency or on reducing the memory size by best effort, we first attempt to specify the available upper memory size that can be utilized by mining frequent itemsets. To comply with the upper bound of the memory consumption, two efficient algorithms, called MTK and MTK_Close, are devised for mining frequent itemsets and closed itemsets, respectively, without specifying the subtle minimum support. Instead, users only need to give a more human-understandable parameter, namely the desired number of frequent (closed) itemsets k. In practice, it is quite challenging to constrain the memory consumption while also efficiently retrieving top-k itemsets. To effectively achieve this, MTK and MTK_Close are devised as level-wise search algorithms, where the number of candidates being generated-and-tested in each database scan will be limited. A novel search approach, called delta-stair search, is utilized in MTK and MTK_Close to effectively assign the available memory for testing candidate itemsets with various itemset-lengths, which leads to a small number of required database scans. As demonstrated in the empirical study on real data and synthetic data, instead of only providing the flexibility of striking a compromise between the execution efficiency and the memory consumption, MTK and MTK_Close can both achieve high efficiency and have a constrained memory bound, showing the prominent advantage to be practical algorithms of mining frequent patterns. | en_US |
dc.language.iso | en_US | en_US |
dc.title | Mining top-k frequent patterns in the presence of the memory constraint | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1007/s00778-007-0078-6 | en_US |
dc.identifier.journal | VLDB JOURNAL | en_US |
dc.citation.volume | 17 | en_US |
dc.citation.issue | 5 | en_US |
dc.citation.spage | 1321 | en_US |
dc.citation.epage | 1344 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000257396700017 | - |
dc.citation.woscount | 13 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.