2003
DOI: 10.1007/3-540-36175-8_33
|View full text |Cite
|
Sign up to set email alerts
|

Position Coded Pre-order Linked WAP-Tree for Web Log Sequential Pattern Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0

Year Published

2004
2004
2011
2011

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(20 citation statements)
references
References 4 publications
0
20
0
Order By: Relevance
“…Usually, a proposed algorithm also has a proposed data structure to accompany it, such as SPADE [Zaki 1998] with vertical databases; PrefixSpan [Pei at al. 2001] with projected databases; WAP-Mine ] with WAP-tree; and PLWAP [Lu and Ezeife 2003] with its PLWAP-tree.…”
Section: A Taxonomy Of Sequential Pattern-mining Algorithmsmentioning
confidence: 99%
See 2 more Smart Citations
“…Usually, a proposed algorithm also has a proposed data structure to accompany it, such as SPADE [Zaki 1998] with vertical databases; PrefixSpan [Pei at al. 2001] with projected databases; WAP-Mine ] with WAP-tree; and PLWAP [Lu and Ezeife 2003] with its PLWAP-tree.…”
Section: A Taxonomy Of Sequential Pattern-mining Algorithmsmentioning
confidence: 99%
“…(1) Sampling and/or compression: Compression is mainly used in pattern-growth tree projection methods, such as FS-Miner [El-Sayed et al 2004]; WAP-tree ; PLWAP [Lu and Ezeife 2003]; and PS-tree (a progressive sequential-mining algorithm [Huang et al 2006]). In the apriori-based category, compression is used to solve the problem of fast memory consumption due to the explosive growth of candidate sequences by some apriori-based algorithms, like Apriori-GST [Tanasa 2005].…”
Section: Seven More Features In the Taxonomy For Pattern-growth Algormentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithms were implemented in Java, and run in the JBuilder 8 personal edition. Synthetic datasets were generated using the publicly available data generation program from the IBM Quest data-mining project 1 , which has been used in several web-usage mining studies [Pei et al 2000;Lu and Ezeife 2003]. The following parameters are used to generate the datasets: |D| -number of sequences in the database; |C| -average length of the sequences; |S| -average length of potentially frequent sequences; and |N| -number of objects in the database.…”
Section: Discovering Navigational Paths Of Users Without Pre-defined mentioning
confidence: 99%
“…We compare the performance of our technique to the apriori-based technique for discovering contiguous navigational patterns [CPY98]. (Note that the tree-based algorithms for discovering navigational patterns [Pei et al 2000;Lu and Ezeife 2003] cannot differentiate contiguous navigational patterns, thus, we do not include them in our evaluations.) The results of our experiments are reported in Table II. 1 http://www.almaden.ibm.com/cs/quest We also tested the algorithms with publicly available, anonymous, real-world web logs of "msnbc.com" users [Hettich and Bay 1999].…”
Section: Discovering Navigational Paths Of Users Without Pre-defined mentioning
confidence: 99%