2006
DOI: 10.1109/tkde.2006.10
|View full text |Cite
|
Sign up to set email alerts
|

Fast and memory efficient mining of frequent closed itemsets

Abstract: Abstract-This paper presents a new scalable algorithm for discovering closed frequent itemsets, a lossless and condensed representation of all the frequent itemsets that can be mined from a transactional database.Our algorithm exploits a divide-and-conquer approach and a bitwise vertical representation of the database, and adopts a particular visit and partitioning strategy of the search space based on an original theoretical framework, which formalizes the problem of closed itemsets mining in detail. The algo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
190
0

Year Published

2007
2007
2019
2019

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 204 publications
(190 citation statements)
references
References 15 publications
0
190
0
Order By: Relevance
“…7,8,9,10,11,12,13,14,15,16,17,18,19,to 20 show that CAR-Incre is more efficient than CAR-Miner in most cases, especially in large datasets or large minSup. Examples are Poker-hand (a large number of records) or Chess (minSup is large).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…7,8,9,10,11,12,13,14,15,16,17,18,19,to 20 show that CAR-Incre is more efficient than CAR-Miner in most cases, especially in large datasets or large minSup. Examples are Poker-hand (a large number of records) or Chess (minSup is large).…”
Section: Resultsmentioning
confidence: 99%
“…Pattern mining has widely used applications in a lot of areas such as association rule mining [4,13,18,24], sequence mining [19,21], and others [3,14]. Association rule mining is to mine relationships among items in a transaction database.…”
Section: Introductionmentioning
confidence: 99%
“…The first optimization is to use bit vectors for representing tidsets and database transactions (when the database fits into memory). The benefits of using bit vectors is that it can greatly reduce the memory used and that the intersection of two tidsets can be done very efficiently with the logical AND operation [13]. The second optimization is to implement L and R with data structures supporting efficient insertion, deletion and finding the smallest element and maximum element.…”
Section: Fig 2 the Topkrules Algorithmmentioning
confidence: 99%
“…The functions of the Galois connection are thus used to compute the closure of the enumerated set and the associated component on the other dimension. Several techniques have been proposed to guarantee that each formal concept is uniquely generated [10].…”
Section: A Data Miningmentioning
confidence: 99%