Seventh IEEE International Conference on Data Mining (ICDM 2007) 2007
DOI: 10.1109/icdm.2007.85
|View full text |Cite
|
Sign up to set email alerts
|

The Chosen Few: On Identifying Valuable Patterns

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
66
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(66 citation statements)
references
References 9 publications
0
66
0
Order By: Relevance
“…Even when using condensed representations (Mannila and Toivonen 1996;Pasquier et al 1999) or some form of pattern set selection (Bringmann and Zimmermann 2007;Knobbe and Ho 2006b;Peng et al 2005) as a post-processing step, the end result may still be unrealistically large, and represent tiny details of the data overly specifically. The experienced user of discovery algorithms will recognise the large level of redundancy that is common in the final pattern set.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Even when using condensed representations (Mannila and Toivonen 1996;Pasquier et al 1999) or some form of pattern set selection (Bringmann and Zimmermann 2007;Knobbe and Ho 2006b;Peng et al 2005) as a post-processing step, the end result may still be unrealistically large, and represent tiny details of the data overly specifically. The experienced user of discovery algorithms will recognise the large level of redundancy that is common in the final pattern set.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the above-mentioned risk of redundancy with top-k selection, the level of exploration within a beam can become limited, which will adversely affect the quality of the end result. Inspiration for selecting a diverse collection of patterns for the beam at each search level will come from pattern set selection techniques (Bringmann and Zimmermann 2007;Knobbe and Ho 2006b;Peng et al 2005), which were originally designed for post-processing the end-result of discovery algorithms. …”
Section: Introductionmentioning
confidence: 99%
“…However, there is no efficient way to generate a set of patterns that can satisfy global constraints (e.g. cover all data while giving good prediction accuracy) [3] and all of the mentioned methods require costly or ad-hoc post-processing stages for selecting the patterns. In contrast, the proposed histogram of pattern sets does capture the discriminative power of the whole set of patterns and provides an efficient image representation for supervised tasks.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, CBA [1] first computes all frequent itemsets (with their most frequent class label) and then induces an ordered rule-list classifier by removing redundant itemsets. Several alternative techniques (for instance, [28,30]) define measures of redundancy and ways to select only a limited number of patterns. Constructing a concise pattern set for use in classification can be seen as a form of feature selection.…”
Section: Global Heuristic Two Step Techniquesmentioning
confidence: 99%
“…While [9] used an exhaustive two step approach to finding pattern sets, there are numerous heuristic approaches to finding global pattern sets that first perform a local pattern mining step and then heuristically post-process the result ( [1,28]) (see [29] for an overview). Thus the second step does not guarantee that the optimal solutions are found.…”
Section: Global Heuristic Two Step Techniquesmentioning
confidence: 99%