Results 21 to 30 of about 2,164 (156)
LUIM: New Low-Utility Itemset Mining Framework
High-utility itemset mining (HUIM), which is the detection of high-utility itemsets (HUIs) in a transactional database, provides the decision maker with greater flexibility to exploit item utilities, such as quantity and profits, to extract remarkable ...
Naji Alhusaini +5 more
doaj +1 more source
Hiding Sensitive High Utility and Frequent Itemsets Based on Constrained Intersection Lattice
Hiding high utility and frequent itemset is the method used to preserve sensitive knowledge from being revealed by pattern mining process. Its goal is to remove sensitive high utility and frequent itemsets from a database before sharing it for data ...
Vy Huynh Trieu +4 more
doaj +1 more source
TUB-HAUPM: Tighter Upper Bound for Mining High Average-Utility Patterns
High-utility itemset mining (HUIM) has been gaining popularity in the field of data mining. Frequent itemset mining used to be the main tool to reveal high-frequency patterns but failed to consider the concept of profit.
Jimmy Ming-Tai Wu +3 more
doaj +1 more source
An Efficient Approach for Mining Reliable High Utility Patterns
Utility mining is one of the most thriving research topics with a wide range of real-world applications. High utility pattern mining uses a utility function to extract all desired patterns that exceed a minimum utility threshold.
Mohammed A. Fouad +4 more
doaj +1 more source
Flexible constrained sampling with guarantees for pattern mining [PDF]
Pattern sampling has been proposed as a potential solution to the infamous pattern explosion. Instead of enumerating all patterns that satisfy the constraints, individual patterns are sampled proportional to a given quality measure.
A Giacometti +15 more
core +3 more sources
Proof Learning in PVS With Utility Pattern Mining
Interactive theorem provers (ITPs) are software tools that allow human users to write and verify formal proofs. In recent years, an emerging research area in ITPs is proof mining, which consists of identifying interesting proof patterns that can be used ...
M. Saqib Nawaz +2 more
doaj +1 more source
An Efficient Method for Mining Closed Potential High-Utility Itemsets
High-utility itemset mining (HUIM) has become a key phase of the pattern mining process, which has wide applications, related to both quantities and profits of items. Many algorithms have been proposed to mine high-utility itemsets (HUIs).
Bay Vo +5 more
doaj +1 more source
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware [PDF]
Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android's permission model is well studied, the enforcement of the protection policy has received ...
Arzt Steven +16 more
core +2 more sources
An efficient parallel method for mining frequent closed sequential patterns [PDF]
Mining frequent closed sequential pattern (FCSPs) has attracted a great deal of research attention, because it is an important task in sequences mining.
Huynh, Bao, Snášel, Václav, Vo, Bay
core +1 more source
A Parallel High-Utility Itemset Mining Algorithm Based on Hadoop
High-utility itemset mining (HUIM) can consider not only the profit factor but also the profitable factor, which is an essential task in data mining. However, most HUIM algorithms are mainly developed on a single machine, which is inefficient for big ...
Zaihe Cheng +3 more
doaj +1 more source

