Full metadata record
DC FieldValueLanguage
dc.contributor.authorChuang, Kun-Taen_US
dc.contributor.authorHuang, Jiun-Longen_US
dc.contributor.authorChen, Ming-Syanen_US
dc.date.accessioned2014-12-08T15:11:08Z-
dc.date.available2014-12-08T15:11:08Z-
dc.date.issued2008-08-01en_US
dc.identifier.issn1066-8888en_US
dc.identifier.urihttp://dx.doi.org/10.1007/s00778-007-0078-6en_US
dc.identifier.urihttp://hdl.handle.net/11536/8530-
dc.description.abstractWe explore in this paper a practicably interesting mining task to retrieve top-k (closed) itemsets in the presence of the memory constraint. Specifically, as opposed to most previous works that concentrate on improving the mining efficiency or on reducing the memory size by best effort, we first attempt to specify the available upper memory size that can be utilized by mining frequent itemsets. To comply with the upper bound of the memory consumption, two efficient algorithms, called MTK and MTK_Close, are devised for mining frequent itemsets and closed itemsets, respectively, without specifying the subtle minimum support. Instead, users only need to give a more human-understandable parameter, namely the desired number of frequent (closed) itemsets k. In practice, it is quite challenging to constrain the memory consumption while also efficiently retrieving top-k itemsets. To effectively achieve this, MTK and MTK_Close are devised as level-wise search algorithms, where the number of candidates being generated-and-tested in each database scan will be limited. A novel search approach, called delta-stair search, is utilized in MTK and MTK_Close to effectively assign the available memory for testing candidate itemsets with various itemset-lengths, which leads to a small number of required database scans. As demonstrated in the empirical study on real data and synthetic data, instead of only providing the flexibility of striking a compromise between the execution efficiency and the memory consumption, MTK and MTK_Close can both achieve high efficiency and have a constrained memory bound, showing the prominent advantage to be practical algorithms of mining frequent patterns.en_US
dc.language.isoen_USen_US
dc.titleMining top-k frequent patterns in the presence of the memory constrainten_US
dc.typeArticleen_US
dc.identifier.doi10.1007/s00778-007-0078-6en_US
dc.identifier.journalVLDB JOURNALen_US
dc.citation.volume17en_US
dc.citation.issue5en_US
dc.citation.spage1321en_US
dc.citation.epage1344en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000257396700017-
dc.citation.woscount13-
Appears in Collections:Articles


Files in This Item:

  1. 000257396700017.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.