2015 Conference on Technologies and Applications of Artificial Intelligence (TAAI) 2015
DOI: 10.1109/taai.2015.7407089
|View full text |Cite
|
Sign up to set email alerts
|

Mining closed+ high utility itemsets without candidate generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
72
0
2

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 42 publications
(74 citation statements)
references
References 14 publications
0
72
0
2
Order By: Relevance
“…EFIM-Closed relies on two new upper bounds, named local utility and sub-tree utility, to prune the search space, and a FUC technique to calculate these upper bounds efficiently. Inspired by utility-list [24], some more efficient one-phase algorithms have been proposed to address this interesting issue, such as CHUI-Miner [117] and CHUM [118].…”
Section: Concise Representations Of Utility Patternsmentioning
confidence: 99%
“…EFIM-Closed relies on two new upper bounds, named local utility and sub-tree utility, to prune the search space, and a FUC technique to calculate these upper bounds efficiently. Inspired by utility-list [24], some more efficient one-phase algorithms have been proposed to address this interesting issue, such as CHUI-Miner [117] and CHUM [118].…”
Section: Concise Representations Of Utility Patternsmentioning
confidence: 99%
“…In last few years, HUIs mining came in trend to solve the problems of items that have quantity and weight (profit or price; Ahmed et al, ; Chan et al, ; Chu et al, ; Erwin et al, ; Fournier‐Viger et al, ; Fournier‐Viger, Zida, Lin, Wu, & Tseng, ; Krishnamoorthy, ; Liu and Qu, ; Liu et al, a; Liu et al, b; Song et al, ; Tseng et al, ; Wu, Fournier‐Viger, Gu, & Tseng , Yao et al, ; Yun, Ryang, & Ryu, ; Zida, Fournier‐Viger, Lin, Wu, & Tseng, ; Zida et al, ). HUIs mining algorithms can be categorized into two types: two‐phase and one‐phase algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Overall, these are efficient approaches for extracting CHUIs and generators directly from a database. Wu et al (2015) provided a solution to mine Closed + High Utility Itemsets, compact and lossless representations of HUIs. This approach helps to resolve the issue of large numbers of candidates being generated, and thus has better performance in both runtime and memory consumption.…”
Section: Chuis and Generators Miningmentioning
confidence: 99%
“…A CHUI is a HUI having no proper supersets which are HUIs and exists in the same transactions set (Tseng, Wu, Fournier-Viger, & Yu, 2015). In HUIM, there have been many investigations on extracting CHUIs and generators (Fournier-Viger, Gomariz, Soltani, & Gueniche, 2014;Sahoo, Das, & Goswami, 2015;Wu, Fournier-Viger, Gu, & Tseng, 2015).…”
Section: Introductionmentioning
confidence: 99%