完整後設資料紀錄
DC 欄位語言
dc.contributor.authorChuang, Kun-Taen_US
dc.contributor.authorHuang, Jiun-Longen_US
dc.contributor.authorChen, Ming-Syanen_US
dc.date.accessioned2014-12-08T15:11:08Z-
dc.date.available2014-12-08T15:11:08Z-
dc.date.issued2008-08-01en_US
dc.identifier.issn1066-8888en_US
dc.identifier.urihttp://dx.doi.org/10.1007/s00778-007-0078-6en_US
dc.identifier.urihttp://hdl.handle.net/11536/8530-
dc.description.abstractWe explore in this paper a practicably interesting mining task to retrieve top-k (closed) itemsets in the presence of the memory constraint. Specifically, as opposed to most previous works that concentrate on improving the mining efficiency or on reducing the memory size by best effort, we first attempt to specify the available upper memory size that can be utilized by mining frequent itemsets. To comply with the upper bound of the memory consumption, two efficient algorithms, called MTK and MTK_Close, are devised for mining frequent itemsets and closed itemsets, respectively, without specifying the subtle minimum support. Instead, users only need to give a more human-understandable parameter, namely the desired number of frequent (closed) itemsets k. In practice, it is quite challenging to constrain the memory consumption while also efficiently retrieving top-k itemsets. To effectively achieve this, MTK and MTK_Close are devised as level-wise search algorithms, where the number of candidates being generated-and-tested in each database scan will be limited. A novel search approach, called delta-stair search, is utilized in MTK and MTK_Close to effectively assign the available memory for testing candidate itemsets with various itemset-lengths, which leads to a small number of required database scans. As demonstrated in the empirical study on real data and synthetic data, instead of only providing the flexibility of striking a compromise between the execution efficiency and the memory consumption, MTK and MTK_Close can both achieve high efficiency and have a constrained memory bound, showing the prominent advantage to be practical algorithms of mining frequent patterns.en_US
dc.language.isoen_USen_US
dc.titleMining top-k frequent patterns in the presence of the memory constrainten_US
dc.typeArticleen_US
dc.identifier.doi10.1007/s00778-007-0078-6en_US
dc.identifier.journalVLDB JOURNALen_US
dc.citation.volume17en_US
dc.citation.issue5en_US
dc.citation.spage1321en_US
dc.citation.epage1344en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000257396700017-
dc.citation.woscount13-
顯示於類別:期刊論文


文件中的檔案:

  1. 000257396700017.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。