2010
DOI: 10.1007/s10994-010-5210-y
|View full text |Cite
|
Sign up to set email alerts
|

Multi-way set enumeration in weight tensors

Abstract: The analysis of n-ary relations receives attention in many different fields, for instance biology, web mining, and social studies. In the basic setting, there are n sets of instances, and each observation associates n instances, one from each set. A common approach to explore these n-way data is the search for n-set patterns, the n-way equivalent of itemsets. More precisely, an n-set pattern consists of specific subsets of the n instance sets such that all possible associations between the corresponding instan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 46 publications
0
10
0
Order By: Relevance
“…It enforces as well a closedness constraint, which discards all strict sub-patterns of a valid pattern, and can prune the search with additional relevance constraints that every pattern must satisfy, e. g., the minimal size constraint -"involving at least γ i ∈ N elements of D i ". DCE [6] is the only other complete algorithm to mine patterns in fuzzy tensors. Cerf and Meira [3] show that DCE's definition catches patterns that are not sub-patterns of any pattern planted in a synthetic dataset, even if there is little noise affecting that dataset.…”
Section: Complete Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…It enforces as well a closedness constraint, which discards all strict sub-patterns of a valid pattern, and can prune the search with additional relevance constraints that every pattern must satisfy, e. g., the minimal size constraint -"involving at least γ i ∈ N elements of D i ". DCE [6] is the only other complete algorithm to mine patterns in fuzzy tensors. Cerf and Meira [3] show that DCE's definition catches patterns that are not sub-patterns of any pattern planted in a synthetic dataset, even if there is little noise affecting that dataset.…”
Section: Complete Algorithmsmentioning
confidence: 99%
“…Constraint (5) forces the returned pattern X to be a super-pattern of the grown fragment F , i. e., X ⊇ F . Constraint (6) forces the returned pattern…”
Section: Algorithm 1: Bigfootmentioning
confidence: 99%
“…Graph-based methods were used for rules induction [54,58], clustering [23], substructure detection [16,34]. However, for such methods, there is still a need for developing proper forgetting mechanisms and a method for applying incremental learning.…”
Section: Related Workmentioning
confidence: 99%
“…The first approach is the OLIN algorithm, which applies graphs to represent rules [42]. The second one is the work of Georgii et al who use a graph as a space search and an inverse search method for finding clusters [23]. Last but not least, the presented approach is strongly influenced by Pawlak's flow graphs [52].…”
Section: Problem Of Forgetting In Rule-based Modelsmentioning
confidence: 99%
“…There are several recent efficient algorithms for mining closed ternary sets (triconcepts) and even more general algorithms than Trias. Thus, Data-Peeler (Cerf et al 2009) is able to mine n-ary formal concepts and its descendant mines fault-tolerant n-sets (Cerf et al 2013); the latter was compared with DCE algorithm for fault-tolerant n-sets mining from Georgii et al (2011). The paper (Spyropoulou et al 2014) generalises n-ary formal concept mining to multi-relational setting in databases.…”
Section: Introduction and Related Workmentioning
confidence: 99%