Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Data Mining:
Concepts and Techniques
— Slides for Textbook —
— Chapter 6 —
©Jiawei Han and Micheline Kamber
Department of Computer Science
University of Illinois at Urbana-Champaign
www.cs.sfu.ca, www.cs.uiuc.edu/~hanj
May 22, 2017
Data Mining: Concepts and Techniques
1
Chapter 6: Mining Association
Rules in Large Databases
Association rule mining
Mining single-dimensional Boolean association rules
from transactional databases
Mining multilevel association rules from transactional
databases
Mining multidimensional association rules from
transactional databases and data warehouse
From association mining to correlation analysis
Constraint-based association mining
Summary
May 22, 2017
Data Mining: Concepts and Techniques
2
What Is Association Mining?
Association rule mining:
Finding frequent patterns, associations, correlations, or
causal structures among sets of items or objects in
transaction databases, relational databases, and other
information repositories.
Applications:
Basket data analysis, cross-marketing, catalog design,
loss-leader analysis, clustering, classification, etc.
Examples.
Rule form: “Body ead [support, confidence]”.
buys(x, “diapers”) buys(x, “beers”) [0.5%, 60%]
major(x, “CS”) ^ takes(x, “DB”) grade(x, “A”) [1%,
75%]
May 22, 2017
Data Mining: Concepts and Techniques
3
Association Rule: Basic Concepts
Given: (1) database of transactions, (2) each transaction is
a list of items (purchased by a customer in a visit)
Find: all rules that correlate the presence of one set of
items with that of another set of items
E.g., 98% of people who purchase tires and auto
accessories also get automotive services done
Applications
* Maintenance Agreement (What the store should
do to boost Maintenance Agreement sales)
Home Electronics * (What other products should
the store stocks up?)
Attached mailing in direct marketing
Detecting “ping-pong”ing of patients, faulty “collisions”
May 22, 2017
Data Mining: Concepts and Techniques
4
Rule Measures: Support and
Confidence
Customer
buys both
Find all the rules X & Y Z with
minimum confidence and support
support, s, probability that a
transaction contains {X Y
Z}
confidence, c, conditional
Customer
buys beer
probability that a transaction
having {X Y} also contains Z
Transaction ID Items Bought Let minimum support 50%, and
minimum confidence 50%,
2000
A,B,C
we have
1000
A,C
A C (50%, 66.6%)
4000
A,D
5000
B,E,F
C A (50%, 100%)
May 22, 2017
Customer
buys diaper
Data Mining: Concepts and Techniques
5
Association Rule Mining: A Road Map
Boolean vs. quantitative associations (Based on the types of values
handled)
buys(x, “SQLServer”) ^ buys(x, “DMBook”) buys(x, “DBMiner”)
[0.2%, 60%]
age(x, “30..39”) ^ income(x, “42..48K”) buys(x, “PC”) [1%, 75%]
Single dimension vs. multiple dimensional associations (see ex. Above)
Single level vs. multiple-level analysis
What brands of beers are associated with what brands of diapers?
Various extensions
Correlation, causality analysis
Association does not necessarily imply correlation or causality
Maxpatterns and closed itemsets
Constraints enforced
May 22, 2017
E.g., small sales (sum < 100) trigger big buys (sum > 1,000)?
Data Mining: Concepts and Techniques
6
Chapter 6: Mining Association
Rules in Large Databases
Association rule mining
Mining single-dimensional Boolean association rules
from transactional databases
Mining multilevel association rules from transactional
databases
Mining multidimensional association rules from
transactional databases and data warehouse
From association mining to correlation analysis
Constraint-based association mining
Summary
May 22, 2017
Data Mining: Concepts and Techniques
7
Mining Association Rules—An Example
Transaction ID
2000
1000
4000
5000
Items Bought
A,B,C
A,C
A,D
B,E,F
Min. support 50%
Min. confidence 50%
Frequent Itemset Support
{A}
75%
{B}
50%
{C}
50%
{A,C}
50%
For rule A C:
support = support({A C}) = 50%
confidence = support({A C})/support({A}) = 66.6%
The Apriori principle:
Any subset of a frequent itemset must be frequent
May 22, 2017
Data Mining: Concepts and Techniques
8
Mining Frequent Itemsets: the
Key Step
Find the frequent itemsets: the sets of items that have
minimum support
A subset of a frequent itemset must also be a
frequent itemset
i.e., if {AB} is a frequent itemset, both {A} and {B} should
be a frequent itemset
Iteratively find frequent itemsets with cardinality
from 1 to k (k-itemset)
Use the frequent itemsets to generate association
rules.
May 22, 2017
Data Mining: Concepts and Techniques
9
The Apriori Algorithm
Join Step: Ck is generated by joining Lk-1with itself
Prune Step: Any (k-1)-itemset that is not frequent cannot be
a subset of a frequent k-itemset
Pseudo-code:
Ck: Candidate itemset of size k
Lk : frequent itemset of size k
L1 = {frequent items};
for (k = 1; Lk !=; k++) do begin
Ck+1 = candidates generated from Lk;
for each transaction t in database do
increment the count of all candidates in Ck+1
that are contained in t
Lk+1 = candidates in Ck+1 with min_support
end
return k Lk;
May 22, 2017
Data Mining: Concepts and Techniques
10
The Apriori Algorithm — Example
Database D
TID
100
200
300
400
itemset sup.
C1
{1}
2
{2}
3
Scan D
{3}
3
{4}
1
{5}
3
Items
134
235
1235
25
C2 itemset sup
L2 itemset sup
2
2
3
2
{1
{1
{1
{2
{2
{3
C3 itemset
{2 3 5}
Scan D
{1 3}
{2 3}
{2 5}
{3 5}
May 22, 2017
2}
3}
5}
3}
5}
5}
1
2
1
2
3
2
L1 itemset sup.
{1}
{2}
{3}
{5}
2
3
3
3
C2 itemset
{1 2}
Scan D
{1
{1
{2
{2
{3
3}
5}
3}
5}
5}
L3 itemset sup
{2 3 5} 2
Data Mining: Concepts and Techniques
11
How to Generate Candidates?
Suppose the items in Lk-1 are listed in an order
Step 1: self-joining Lk-1
insert into Ck
select p.item1, p.item2, …, p.itemk-1, q.itemk-1
from Lk-1 p, Lk-1 q
where p.item1=q.item1, …, p.itemk-2=q.itemk-2, p.itemk-1 <
q.itemk-1
Step 2: pruning
forall itemsets c in Ck do
forall (k-1)-subsets s of c do
if (s is not in Lk-1) then delete c from Ck
May 22, 2017
Data Mining: Concepts and Techniques
12
How to Count Supports of
Candidates?
Why counting supports of candidates a problem?
The total number of candidates can be very huge
One transaction may contain many candidates
Method:
Candidate itemsets are stored in a hash-tree
Leaf node of hash-tree contains a list of itemsets
and counts
Interior node contains a hash table
Subset function: finds all the candidates contained in
a transaction
May 22, 2017
Data Mining: Concepts and Techniques
13
Example of Generating Candidates
L3={abc, abd, acd, ace, bcd}
Self-joining: L3*L3
abcd from abc and abd
acde from acd and ace
Pruning:
acde is removed because ade is not in L3
C4={abcd}
May 22, 2017
Data Mining: Concepts and Techniques
14
Methods to Improve Apriori’s Efficiency
Hash-based itemset counting: A k-itemset whose corresponding
hashing bucket count is below the threshold cannot be frequent
Transaction reduction: A transaction that does not contain any
frequent k-itemset is useless in subsequent scans
Partitioning: Any itemset that is potentially frequent in DB must be
frequent in at least one of the partitions of DB
Sampling: mining on a subset of given data, lower support
threshold + a method to determine the completeness
Dynamic itemset counting: add new candidate itemsets only when
all of their subsets are estimated to be frequent
May 22, 2017
Data Mining: Concepts and Techniques
15
Is Apriori Fast Enough? — Performance
Bottlenecks
The core of the Apriori algorithm:
Use frequent (k – 1)-itemsets to generate candidate frequent kitemsets
Use database scan and pattern matching to collect counts for the
candidate itemsets
The bottleneck of Apriori: candidate generation
Huge candidate sets:
104 frequent 1-itemset will generate 107 candidate 2-itemsets
To discover a frequent pattern of size 100, e.g., {a1, a2, …,
a100}, one needs to generate 2100 1030 candidates.
Multiple scans of database:
May 22, 2017
Needs (n +1 ) scans, n is the length of the longest pattern
Data Mining: Concepts and Techniques
16
Mining Frequent Patterns Without
Candidate Generation
Compress a large database into a compact, FrequentPattern tree (FP-tree) structure
highly condensed, but complete for frequent pattern
mining
avoid costly database scans
Develop an efficient, FP-tree-based frequent pattern
mining method
May 22, 2017
A divide-and-conquer methodology: decompose mining
tasks into smaller ones
Avoid candidate generation: sub-database test only!
Data Mining: Concepts and Techniques
17
Construct FP-tree from a
Transaction DB
TID
100
200
300
400
500
Items bought
(ordered) frequent items
{f, a, c, d, g, i, m, p}
{f, c, a, m, p}
{a, b, c, f, l, m, o}
{f, c, a, b, m}
{b, f, h, j, o}
{f, b}
{b, c, k, s, p}
{c, b, p}
{a, f, c, e, l, p, m, n}
{f, c, a, m, p}
Steps:
{}
Header Table
1. Scan DB once, find frequent
1-itemset (single item
pattern)
2. Order frequent items in
frequency descending order
3. Scan DB again, construct
FP-tree
May 22, 2017
min_support = 0.5
Item frequency head
f
4
c
4
a
3
b
3
m
3
p
3
Data Mining: Concepts and Techniques
f:4
c:3
c:1
b:1
a:3
b:1
p:1
m:2
b:1
p:2
m:1
18
Benefits of the FP-tree Structure
Completeness:
never breaks a long pattern of any transaction
preserves complete information for frequent pattern
mining
Compactness
reduce irrelevant information—infrequent items are gone
frequency descending ordering: more frequent items are
more likely to be shared
never be larger than the original database (if not count
node-links and counts)
Example: For Connect-4 DB, compression ratio could be
over 100
May 22, 2017
Data Mining: Concepts and Techniques
19
Mining Frequent Patterns Using FP-tree
General idea (divide-and-conquer)
Recursively grow frequent pattern path using the FPtree
Method
For each item, construct its conditional pattern-base,
and then its conditional FP-tree
Repeat the process on each newly created conditional
FP-tree
Until the resulting FP-tree is empty, or it contains only
one path (single path will generate all the combinations of its
sub-paths, each of which is a frequent pattern)
May 22, 2017
Data Mining: Concepts and Techniques
20
Major Steps to Mine FP-tree
1)
Construct conditional pattern base for each node in the
FP-tree
2)
Construct conditional FP-tree from each conditional
pattern-base
3)
Recursively mine conditional FP-trees and grow
frequent patterns obtained so far
May 22, 2017
If the conditional FP-tree contains a single path,
simply enumerate all the patterns
Data Mining: Concepts and Techniques
21
Step 1: From FP-tree to Conditional
Pattern Base
Starting at the frequent header table in the FP-tree
Traverse the FP-tree by following the link of each frequent item
Accumulate all of transformed prefix paths of that item to form a
conditional pattern base
Header Table
Item frequency head
f
4
c
4
a
3
b
3
m
3
p
3
May 22, 2017
{}
Conditional pattern bases
f:4
c:3
c:1
b:1
a:3
b:1
p:1
item
cond. pattern base
c
f:3
a
fc:3
b
fca:1, f:1, c:1
m:2
b:1
m
fca:2, fcab:1
p:2
m:1
p
fcam:2, cb:1
Data Mining: Concepts and Techniques
22
Properties of FP-tree for Conditional
Pattern Base Construction
Node-link property
For any frequent item ai, all the possible frequent
patterns that contain ai can be obtained by following
ai's node-links, starting from ai's head in the FP-tree
header
Prefix path property
May 22, 2017
To calculate the frequent patterns for a node ai in a
path P, only the prefix sub-path of ai in P need to be
accumulated, and its frequency count should carry the
same count as node ai.
Data Mining: Concepts and Techniques
23
Step 2: Construct Conditional FP-tree
For each pattern-base
Accumulate the count for each item in the base
Construct the FP-tree for the frequent items of the
pattern base
Header Table
Item frequency head
f
4
c
4
a
3
b
3
m
3
p
3
{}
f:4
c:3
c:1
b:1
a:3
b:1
p:1
m-conditional pattern
base:
fca:2, fcab:1
{}
f:3
m:2
b:1
c:3
p:2
m:1
a:3
All frequent patterns
concerning m
m,
fm, cm, am,
fcm, fam, cam,
fcam
m-conditional FP-tree
May 22, 2017
Data Mining: Concepts and Techniques
24
Mining Frequent Patterns by Creating
Conditional Pattern-Bases
Item
Conditional pattern-base
Conditional FP-tree
p
{(fcam:2), (cb:1)}
{(c:3)}|p
m
{(fca:2), (fcab:1)}
{(f:3, c:3, a:3)}|m
b
{(fca:1), (f:1), (c:1)}
Empty
a
{(fc:3)}
{(f:3, c:3)}|a
c
{(f:3)}
{(f:3)}|c
f
Empty
Empty
May 22, 2017
Data Mining: Concepts and Techniques
25
Step 3: Recursively mine the
conditional FP-tree
{}
{}
Cond. pattern base of “am”: (fc:3)
f:3
c:3
f:3
am-conditional FP-tree
c:3
{}
Cond. pattern base of “cm”: (f:3)
a:3
f:3
m-conditional FP-tree
cm-conditional FP-tree
{}
Cond. pattern base of “cam”: (f:3)
f:3
cam-conditional FP-tree
May 22, 2017
Data Mining: Concepts and Techniques
26
A Special Case: Single Prefix Path in FP-tree
{}
a1:n1
a2:n2
Suppose a (conditional) FP-tree T has a shared single prefixpath P
Mining can be decomposed into two parts
Reduction of the single prefix path into one node
Concatenation of the mining results of the two
parts
a3:n3
b1:m1
C2:k2
May 22, 2017
r1
{}
C1:k1
C3:k3
r1
=
a1:n1
a2:n2
+
a3:n3
Data Mining: Concepts and Techniques
b1:m1
C2:k2
C1:k1
C3:k3
28
Principles of Frequent Pattern
Growth
Pattern growth property
Let be a frequent itemset in DB, B be 's
conditional pattern base, and be an itemset in B.
Then is a frequent itemset in DB iff is
frequent in B.
“abcdef ” is a frequent pattern, if and only if
May 22, 2017
“abcde ” is a frequent pattern, and
“f ” is frequent in the set of transactions containing
“abcde ”
Data Mining: Concepts and Techniques
29
Why Is Frequent Pattern Growth
Fast?
Our performance study shows
FP-growth is an order of magnitude faster than
Apriori, and is also faster than tree-projection
Reasoning
May 22, 2017
No candidate generation, no candidate test
Use compact data structure
Eliminate repeated database scan
Basic operation is counting and FP-tree building
Data Mining: Concepts and Techniques
30
FP-growth vs. Apriori: Scalability With
the Support Threshold
Data set T25I20D10K
100
D1 FP-grow th runtime
90
D1 Apriori runtime
80
Run time(sec.)
70
60
50
40
30
20
10
0
0
May 22, 2017
0.5
1
1.5
2
Support threshold(%)
Data Mining: Concepts and Techniques
2.5
3
31
FP-growth vs. Tree-Projection: Scalability
with Support Threshold
Data set T25I20D100K
140
D2 FP-growth
Runtime (sec.)
120
D2 TreeProjection
100
80
60
40
20
0
0
May 22, 2017
0.5
1
Support threshold (%)
Data Mining: Concepts and Techniques
1.5
2
32
Presentation of Association Rules
(Table Form )
May 22, 2017
Data Mining: Concepts and Techniques
33
Visualization of Association Rule Using Plane Graph
May 22, 2017
Data Mining: Concepts and Techniques
34
Visualization of Association Rule Using Rule Graph
May 22, 2017
Data Mining: Concepts and Techniques
35
Iceberg Queries
Icerberg query: Compute aggregates over one or a set of
attributes only for those whose aggregate values is above
certain threshold
Example:
select P.custID, P.itemID, sum(P.qty)
from purchase P
group by P.custID, P.itemID
having sum(P.qty) >= 10
Compute iceberg queries efficiently by Apriori:
First compute lower dimensions
Then compute higher dimensions only when all the
lower ones are above the threshold
May 22, 2017
Data Mining: Concepts and Techniques
36
Chapter 6: Mining Association
Rules in Large Databases
Association rule mining
Mining single-dimensional Boolean association rules
from transactional databases
Mining multilevel association rules from transactional
databases
Mining multidimensional association rules from
transactional databases and data warehouse
From association mining to correlation analysis
Constraint-based association mining
Summary
May 22, 2017
Data Mining: Concepts and Techniques
37
Multiple-Level Association Rules
Food
Items often form hierarchy.
Items at the lower level are
expected to have lower
support.
Rules regarding itemsets at
appropriate levels could be
quite useful.
Transaction database can be
encoded based on
dimensions and levels
We can explore shared multilevel mining
May 22, 2017
bread
milk
skim
Fraser
TID
T1
T2
T3
T4
T5
2%
wheat
white
Sunset
Items
{111, 121, 211, 221}
{111, 211, 222, 323}
{112, 122, 221, 411}
{111, 121}
{111, 122, 211, 221, 413}
Data Mining: Concepts and Techniques
38
Mining Multi-Level Associations
A top_down, progressive deepening approach:
First find high-level strong rules:
milk bread [20%, 60%].
Then find their lower-level “weaker” rules:
2% milk wheat bread [6%, 50%].
Variations at mining multiple-level association rules.
Level-crossed association rules:
2% milk
Association rules with multiple, alternative
hierarchies:
2% milk
May 22, 2017
Wonder wheat bread
Wonder bread
Data Mining: Concepts and Techniques
39
Multi-level Association: Uniform
Support vs. Reduced Support
Uniform Support: the same minimum support for all levels
+ One minimum support threshold.
No need to examine itemsets
containing any item whose ancestors do not have minimum
support.
– Lower level items do not occur as frequently. If support threshold
too high miss low level associations
too low generate too many high level associations
Reduced Support: reduced minimum support at lower levels
There are 4 search strategies:
May 22, 2017
Level-by-level independent
Level-cross filtering by k-itemset
Level-cross filtering by single item
Controlled level-cross filtering by single item
Data Mining: Concepts and Techniques
40
Uniform Support
Multi-level mining with uniform support
Level 1
min_sup = 5%
Level 2
min_sup = 5%
Milk
[support = 10%]
2% Milk
Skim Milk
[support = 6%]
[support = 4%]
Back
May 22, 2017
Data Mining: Concepts and Techniques
41
Reduced Support
Multi-level mining with reduced support
Level 1
min_sup = 5%
Level 2
min_sup = 3%
Milk
[support = 10%]
2% Milk
Skim Milk
[support = 6%]
[support = 4%]
Back
May 22, 2017
Data Mining: Concepts and Techniques
42
Multi-level Association: Redundancy
Filtering
Some rules may be redundant due to “ancestor”
relationships between items.
Example
milk wheat bread
[support = 8%, confidence = 70%]
2% milk wheat bread [support = 2%, confidence = 72%]
We say the first rule is an ancestor of the second rule.
A rule is redundant if its support is close to the “expected”
value, based on the rule’s ancestor.
May 22, 2017
Data Mining: Concepts and Techniques
43
Multi-Level Mining: Progressive
Deepening
A top-down, progressive deepening approach:
First mine high-level frequent items:
milk (15%), bread (10%)
Then mine their lower-level “weaker” frequent
itemsets:
2% milk (5%), wheat bread (4%)
Different min_support threshold across multi-levels
lead to different algorithms:
If adopting the same min_support across multilevels
then toss t if any of t’s ancestors is infrequent.
If adopting reduced min_support at lower levels
then examine only those descendents whose ancestor’s
support is frequent/non-negligible.
May 22, 2017
Data Mining: Concepts and Techniques
44
Progressive Refinement of Data
Mining Quality
Why progressive refinement?
Trade speed with quality: step-by-step refinement.
Superset coverage property:
Mining operator can be expensive or cheap, fine or
rough
Preserve all the positive answers—allow a positive false
test but not a false negative test.
Two- or multi-step mining:
First apply rough/cheap operator (superset coverage)
Then apply expensive algorithm on a substantially
reduced candidate set (Koperski & Han, SSD’95).
May 22, 2017
Data Mining: Concepts and Techniques
45
Progressive Refinement Mining of
Spatial Association Rules
Hierarchy of spatial relationship:
“g_close_to”: near_by, touch, intersect, contain, etc.
First search for rough relationship and then refine it.
Two-step mining of spatial association:
Step 1: rough spatial computation (as a filter)
Step2: Detailed spatial algorithm (as refinement)
May 22, 2017
Using MBR or R-tree for rough estimation.
Apply only to those objects which have passed the rough
spatial association test (no less than min_support)
Data Mining: Concepts and Techniques
46
Chapter 6: Mining Association
Rules in Large Databases
Association rule mining
Mining single-dimensional Boolean association rules
from transactional databases
Mining multilevel association rules from transactional
databases
Mining multidimensional association rules from
transactional databases and data warehouse
From association mining to correlation analysis
Constraint-based association mining
Summary
May 22, 2017
Data Mining: Concepts and Techniques
47
Multi-Dimensional Association:
Concepts
Single-dimensional rules:
buys(X, “milk”) buys(X, “bread”)
Multi-dimensional rules: 2 dimensions or predicates
Inter-dimension association rules (no repeated
predicates)
age(X,”19-25”) occupation(X,“student”) buys(X,“coke”)
hybrid-dimension association rules (repeated predicates)
age(X,”19-25”) buys(X, “popcorn”) buys(X, “coke”)
Categorical Attributes
finite number of possible values, no ordering among
values
Quantitative Attributes
numeric, implicit ordering among values
May 22, 2017
Data Mining: Concepts and Techniques
48
Techniques for Mining MD
Associations
Search for frequent k-predicate set:
Example: {age, occupation, buys} is a 3-predicate
set.
Techniques can be categorized by how age are
treated.
1. Using static discretization of quantitative attributes
Quantitative attributes are statically discretized by
using predefined concept hierarchies.
2. Quantitative association rules
Quantitative attributes are dynamically discretized
into “bins”based on the distribution of the data.
3. Distance-based association rules
This is a dynamic discretization process that
considers the distance between data points.
May 22, 2017
Data Mining: Concepts and Techniques
49
Static Discretization of Quantitative
Attributes
Discretized prior to mining using concept hierarchy.
Numeric values are replaced by ranges.
In relational database, finding all frequent k-predicate sets
will require k or k+1 table scans.
Data cube is well suited for mining.
The cells of an n-dimensional
()
(age)
(income)
(buys)
cuboid correspond to the
predicate sets.
(age, income)
Mining from data cubes
can be much faster.
May 22, 2017
(age,buys) (income,buys)
(age,income,buys)
Data Mining: Concepts and Techniques
50
Quantitative Association Rules
Numeric attributes are dynamically discretized
Such that the confidence or compactness of the rules
mined is maximized.
2-D quantitative association rules: Aquan1 Aquan2 Acat
Cluster “adjacent”
association rules
to form general
rules using a 2-D
grid.
Example:
age(X,”30-34”) income(X,”24K 48K”)
buys(X,”high resolution TV”)
May 22, 2017
Data Mining: Concepts and Techniques
51
ARCS (Association Rule Clustering
System)
How does ARCS work?
1. Binning
2. Find frequent
predicateset
3. Clustering
4. Optimize
May 22, 2017
Data Mining: Concepts and Techniques
52
Limitations of ARCS
Only quantitative attributes on LHS of rules.
Only 2 attributes on LHS. (2D limitation)
An alternative to ARCS
Non-grid-based
equi-depth binning
clustering based on a measure of partial
completeness.
“Mining Quantitative Association Rules in
Large Relational Tables” by R. Srikant and R.
Agrawal.
May 22, 2017
Data Mining: Concepts and Techniques
53
Mining Distance-based Association Rules
Binning methods do not capture the semantics of interval
data
Price($)
Equi-width
(width $10)
Equi-depth
(depth 2)
Distancebased
7
20
22
50
51
53
[0,10]
[11,20]
[21,30]
[31,40]
[41,50]
[51,60]
[7,20]
[22,50]
[51,53]
[7,7]
[20,22]
[50,53]
Distance-based partitioning, more meaningful discretization
considering:
density/number of points in an interval
“closeness” of points in an interval
May 22, 2017
Data Mining: Concepts and Techniques
54
Chapter 6: Mining Association
Rules in Large Databases
Association rule mining
Mining single-dimensional Boolean association rules
from transactional databases
Mining multilevel association rules from transactional
databases
Mining multidimensional association rules from
transactional databases and data warehouse
From association mining to correlation analysis
Constraint-based association mining
Summary
May 22, 2017
Data Mining: Concepts and Techniques
57
Interestingness Measurements
Objective measures
Two popular measurements:
support; and
May 22, 2017
confidence
Subjective measures (Silberschatz & Tuzhilin,
KDD95)
A rule (pattern) is interesting if
it is unexpected (surprising to the user);
and/or
actionable (the user can do something with it)
Data Mining: Concepts and Techniques
58
Criticism to Support and Confidence
Example 1: (Aggarwal & Yu, PODS98)
Among 5000 students
3000 play basketball
3750 eat cereal
2000 both play basket ball and eat cereal
play basketball eat cereal [40%, 66.7%] is misleading
because the overall percentage of students eating cereal is 75%
which is higher than 66.7%.
play basketball not eat cereal [20%, 33.3%] is far more
accurate, although with lower support and confidence
basketball not basketball sum(row)
cereal
2000
1750
3750
not cereal
1000
250
1250
sum(col.)
3000
2000
5000
May 22, 2017
Data Mining: Concepts and Techniques
59
Criticism to Support and Confidence
(Cont.)
Example 2:
X and Y: positively correlated,
X and Z, negatively related
support and confidence of
X=>Z dominates
We need a measure of dependent
or correlated events
corrA, B
P( A B)
P( A) P( B)
X 1 1 1 1 0 0 0 0
Y 1 1 0 0 0 0 0 0
Z 0 1 1 1 1 1 1 1
Rule Support Confidence
X=>Y 25%
50%
X=>Z 37.50%
75%
P(B|A)/P(B) is also called the lift
of rule A => B
May 22, 2017
Data Mining: Concepts and Techniques
60
Other Interestingness Measures: Interest
Interest (correlation, lift)
P( A B)
P( A) P( B)
taking both P(A) and P(B) in consideration
P(A^B)=P(B)*P(A), if A and B are independent events
A and B negatively correlated, if the value is less than 1;
otherwise A and B positively correlated
X 1 1 1 1 0 0 0 0
Y 1 1 0 0 0 0 0 0
Z 0 1 1 1 1 1 1 1
May 22, 2017
Itemset
Support
Interest
X,Y
X,Z
Y,Z
25%
37.50%
12.50%
2
0.9
0.57
Data Mining: Concepts and Techniques
61
Chapter 6: Mining Association
Rules in Large Databases
Association rule mining
Mining single-dimensional Boolean association rules
from transactional databases
Mining multilevel association rules from transactional
databases
Mining multidimensional association rules from
transactional databases and data warehouse
From association mining to correlation analysis
Constraint-based association mining
Summary
May 22, 2017
Data Mining: Concepts and Techniques
62
Constraint-Based Mining
Interactive, exploratory mining giga-bytes of data?
Could it be real? — Making good use of constraints!
What kinds of constraints can be used in mining?
Knowledge type constraint: classification, association,
etc.
Data constraint: SQL-like queries
Dimension/level constraints:
small sales (price < $10) triggers big sales (sum > $200).
Interestingness constraints:
May 22, 2017
in relevance to region, price, brand, customer category.
Rule constraints
Find product pairs sold together in Vancouver in Dec.’98.
strong rules (min_support 3%, min_confidence 60%).
Data Mining: Concepts and Techniques
63
Rule Constraints in Association Mining
Two kind of rule constraints:
Rule form constraints: meta-rule guided mining.
Rule (content) constraint: constraint-based query
optimization (Ng, et al., SIGMOD’98).
P(x, y) ^ Q(x, w) takes(x, “database systems”).
sum(LHS) < 100 ^ min(LHS) > 20 ^ count(LHS) > 3 ^ sum(RHS) >
1000
1-variable vs. 2-variable constraints (Lakshmanan, et al.
SIGMOD’99):
1-var: A constraint confining only one side (L/R) of the
rule, e.g., as shown above.
2-var: A constraint confining both sides (L and R).
May 22, 2017
sum(LHS) < min(RHS) ^ max(RHS) < 5* sum(LHS)
Data Mining: Concepts and Techniques
64
Constrain-Based Association Query
Database: (1) trans (TID, Itemset ), (2) itemInfo (Item, Type, Price)
A constrained asso. query (CAQ) is in the form of {(S1, S2 )|C },
where C is a set of constraints on S1, S2 including frequency
constraint
A classification of (single-variable) constraints:
Class constraint: S A. e.g. S Item
Domain constraint:
S v, { , , , , , }. e.g. S.Price < 100
v S, is or . e.g. snacks S.Type
V S, or S V, { , , , , }
e.g. {snacks, sodas } S.Type
Aggregation constraint: agg(S) v, where agg is in {min,
max, sum, count, avg}, and { , , , , , }.
May 22, 2017
e.g. count(S1.Type) 1 , avg(S2.Price) 100
Data Mining: Concepts and Techniques
65
Constrained Association Query
Optimization Problem
Basic idea: Reduce mining cost by pruning with constraints
Main challenge: results must be sound and complete
sound: It only finds frequent sets that satisfy the given
constraints C
complete: All frequent sets satisfy the given constraints
C are found
Question: when and where is the safe point to throw out
invalid data items, or stop checking constraints?
Approach:
analyzing the properties of constraints
push them as deeply as possible inside the frequent set
computation.
May 22, 2017
Data Mining: Concepts and Techniques
66
Anti-monotone and Monotone
Constraints
A constraint Ca is anti-monotone iff. for any
pattern S not satisfying Ca, none of the super-
patterns of S can satisfy Ca
A constraint Cm is monotone iff. for any pattern
S satisfying Cm, every super-pattern of S also
satisfies it
May 22, 2017
Data Mining: Concepts and Techniques
67
Property of Constraints:
Anti-Monotone
Anti-monotonicity: If a set S violates the constraint, any
superset of S violates the constraint.
Examples:
sum(S.Price) v is anti-monotone
sum(S.Price) v is not anti-monotone
sum(S.Price) = v is partly anti-monotone
Application:
Push “sum(S.price) 1000” deeply into iterative
frequent set computation.
May 22, 2017
Data Mining: Concepts and Techniques
68
Characterization of
Anti-Monotonicity Constraints
S v, { , , }
vS
SV
SV
SV
min(S) v
min(S) v
min(S) v
max(S) v
max(S) v
max(S) v
count(S) v
count(S) v
count(S) v
sum(S) v
sum(S) v
sum(S) v
avg(S) v, { , , }
(frequent constraint)
May 22, 2017
yes
no
no
yes
partly
no
yes
partly
yes
no
partly
yes
no
partly
yes
no
partly
convertible
(yes)
Data Mining: Concepts and Techniques
69
Succinct Constraint
A subset of item Is is a succinct set, if it can be
expressed as p(I) for some selection predicate
p, where is a selection operator
SP2I is a succinct power set, if there is a fixed
number of succinct set I1, …, Ik I, s.t. SP can
be expressed in terms of the strict power sets
of I1, …, Ik using union and minus
A constraint Cs is succinct provided SATCs(I) is a
succinct power set
May 22, 2017
Data Mining: Concepts and Techniques
70
Property of Constraints: Succinctness
Succinctness:
For any set S1 and S2 satisfying C, S1 S2 satisfies C
Given A1 is the sets of size 1 satisfying C, then any set S
satisfying C are based on A1 , i.e., it contains a subset
belongs to A1 ,
Example :
sum(S.Price ) v is not succinct
min(S.Price ) v is succinct
Optimization:
If C is succinct, then C is pre-counting prunable. The
satisfaction of the constraint alone is not affected by the
iterative support counting.
May 22, 2017
Data Mining: Concepts and Techniques
71
Characterization of Constraints by
Succinctness
S v, { , , }
vS
S V
SV
SV
min(S) v
min(S) v
min(S) v
max(S) v
max(S) v
max(S) v
count(S) v
count(S) v
count(S) v
sum(S) v
sum(S) v
sum(S) v
avg(S) v, { , , }
(frequent constraint)
May 22, 2017
Yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
weakly
weakly
weakly
no
no
no
no
(no)
Data Mining: Concepts and Techniques
72
The Apriori Algorithm — Example
Database D
TID
100
200
300
400
itemset sup.
C1
{1}
2
{2}
3
Scan D
{3}
3
{4}
1
{5}
3
Items
134
235
1235
25
C2 itemset sup
L2 itemset sup
2
2
3
2
{1
{1
{1
{2
{2
{3
C3 itemset
{2 3 5}
Scan D
{1 3}
{2 3}
{2 5}
{3 5}
May 22, 2017
2}
3}
5}
3}
5}
5}
1
2
1
2
3
2
L1 itemset sup.
{1}
{2}
{3}
{5}
2
3
3
3
C2 itemset
{1 2}
Scan D
{1
{1
{2
{2
{3
3}
5}
3}
5}
5}
L3 itemset sup
{2 3 5} 2
Data Mining: Concepts and Techniques
73
Naïve Algorithm: Apriori + Constraint
Database D
TID
100
200
300
400
itemset sup.
C1
{1}
2
{2}
3
Scan D
{3}
3
{4}
1
{5}
3
Items
134
235
1235
25
C2 itemset sup
L2 itemset sup
2
2
3
2
{1
{1
{1
{2
{2
{3
C3 itemset
{2 3 5}
Scan D
{1 3}
{2 3}
{2 5}
{3 5}
May 22, 2017
2}
3}
5}
3}
5}
5}
1
2
1
2
3
2
L1 itemset sup.
{1}
{2}
{3}
{5}
2
3
3
3
C2 itemset
{1 2}
Scan D
L3 itemset sup
{2 3 5} 2
Data Mining: Concepts and Techniques
{1
{1
{2
{2
{3
3}
5}
3}
5}
5}
Constraint:
Sum{S.price < 5}
74
The Constrained Apriori Algorithm: Push
an Anti-monotone Constraint Deep
Database D
TID
100
200
300
400
itemset sup.
C1
{1}
2
{2}
3
Scan D
{3}
3
{4}
1
{5}
3
Items
134
235
1235
25
C2 itemset sup
L2 itemset sup
2
2
3
2
{1
{1
{1
{2
{2
{3
C3 itemset
{2 3 5}
Scan D
{1 3}
{2 3}
{2 5}
{3 5}
May 22, 2017
2}
3}
5}
3}
5}
5}
1
2
1
2
3
2
L1 itemset sup.
{1}
{2}
{3}
{5}
2
3
3
3
C2 itemset
{1 2}
Scan D
L3 itemset sup
{2 3 5} 2
Data Mining: Concepts and Techniques
{1
{1
{2
{2
{3
3}
5}
3}
5}
5}
Constraint:
Sum{S.price < 5}
75
The Constrained Apriori Algorithm:
Push a Succinct Constraint Deep
Database D
TID
100
200
300
400
itemset sup.
C1
{1}
2
{2}
3
Scan D
{3}
3
{4}
1
{5}
3
Items
134
235
1235
25
C2 itemset sup
L2 itemset sup
2
2
3
2
{1
{1
{1
{2
{2
{3
C3 itemset
{2 3 5}
Scan D
{1 3}
{2 3}
{2 5}
{3 5}
May 22, 2017
2}
3}
5}
3}
5}
5}
1
2
1
2
3
2
L1 itemset sup.
{1}
{2}
{3}
{5}
2
3
3
3
C2 itemset
{1 2}
Scan D
L3 itemset sup
{2 3 5} 2
Data Mining: Concepts and Techniques
{1
{1
{2
{2
{3
3}
5}
3}
5}
5}
Constraint:
min{S.price <= 1 }
76
Convertible Constraint
Difficult constraint: avg(S.price) <= $100
Make it anti-monotone or monotone [Pei et al.
ICDE 2001]:
May 22, 2017
Suppose all items in patterns are listed in a total
order R
A constraint C is convertible anti-monotone iff a
pattern S satisfying the constraint implies that each
suffix of S w.r.t. R also satisfies C
A constraint C is convertible monotone iff a pattern S
satisfying the constraint implies that each pattern of
which S is a suffix w.r.t. R also satisfies C
Data Mining: Concepts and Techniques
77
Example of Convertible Constraints:
Avg(S) V
Let R be the value descending order over the
set of items
E.g. I={9, 8, 6, 4, 3, 1}
Avg(S) v is convertible anti-monotone w.r.t. R
Avg(S) 7
{9, 8, 6} passes, {9, 8, 6, 4} fails
No need to check {9, 8, 6, 4, 3}
May 22, 2017
Data Mining: Concepts and Techniques
78
Strongly Convertible Constraints
Some constraints can be made anti-monotone
or monotone, by using different R.
Avg(S) v is monotone w.r.t. value
ascending order
Monotone constraints can reduce overhead
of checking constraints
Which order to use?
Decide by the selectivity of the constraint
May 22, 2017
Avg(S) $500 vs. avg(S) $2
Data Mining: Concepts and Techniques
79
What Constraints Are Convertible?
Constraint
Convertible
anti-monotone
Convertible
monotone
Strongly
convertible
avg(S) , v
Yes
Yes
Yes
median(S) , v
Yes
Yes
Yes
sum(S) v (items could be of any
value, v 0)
Yes
No
No
sum(S) v (items could be of any
value, v 0)
No
Yes
No
sum(S) v (items could be of any
value, v 0)
No
Yes
No
sum(S) v (items could be of any
value, v 0)
Yes
No
No
……
May 22, 2017
Data Mining: Concepts and Techniques
80
Classification of Constraints
Monotone
Antimonotone
Succinct
Strongly
convertible
Convertible
anti-monotone
Convertible
monotone
Inconvertible
May 22, 2017
Data Mining: Concepts and Techniques
81
Discussion—Handling Multiple
Constraints
Different constraints may require different or even
conflicting item-ordering
If there exists an order R s.t. both C1 and C2 are
convertible w.r.t. R, then there is no conflict between
the two convertible constraints
If there exists conflict on order of items
May 22, 2017
Try to satisfy one constraint first
Then using the order for the other constraint to
mine frequent itemsets in the corresponding
projected database
Data Mining: Concepts and Techniques
82
Chapter 6: Mining Association
Rules in Large Databases
Association rule mining
Mining single-dimensional Boolean association rules
from transactional databases
Mining multilevel association rules from transactional
databases
Mining multidimensional association rules from
transactional databases and data warehouse
From association mining to correlation analysis
Constraint-based association mining
Mining Sequential Patterns: A Pattern-Growth Approach
May 22, 2017
Data Mining: Concepts and Techniques
83
Sequence Databases and Sequential
Pattern Analysis
Transaction databases, time-series databases vs. sequence
databases
Frequent patterns vs. (frequent) sequential patterns
Applications of sequential pattern mining
Customer shopping sequences:
First buy computer, then CD-ROM, and then digital camera,
within 3 months.
Medical treatment, natural disasters (e.g., earthquakes),
science & engineering processes, stocks and markets, etc.
Telephone calling patterns, Weblog click streams
DNA sequences and gene structures
May 22, 2017
Data Mining: Concepts and Techniques
84
What Is Sequential Pattern Mining?
Given a set of sequences, find the complete set
of frequent subsequences
A
sequence
: < (ef) (ab) (df) c b >
A sequence database
SID
sequence
10
<a(abc)(ac)d(cf)>
20
<(ad)c(bc)(ae)>
30
<(ef)(ab)(df)cb>
40
<eg(af)cbc>
An element may contain a set of items.
Items within an element are unordered
and we list them alphabetically.
<a(bc)dc> is a subsequence
of <a(abc)(ac)d(cf)>
Given support threshold min_sup =2, <(ab)c> is a
sequential pattern
May 22, 2017
Data Mining: Concepts and Techniques
85
Challenges on Sequential Pattern
Mining
A huge number of possible sequential patterns are
hidden in databases
A mining algorithm should
find the complete set of patterns, when possible,
satisfying the minimum support (frequency) threshold
be highly efficient, scalable, involving only a small
number of database scans
be able to incorporate various kinds of user-specific
constraints
May 22, 2017
Data Mining: Concepts and Techniques
86
Previous Studies on Sequential Pattern
Mining
Concept introduction and an initial Apriori-like algorithm
R. Agrawal & R. Srikant. “Mining sequential patterns,” ICDE’95
GSP—An Apriori-based, influential mining method (developed at IBM
Almaden)
R. Srikant & R. Agrawal. “Mining sequential patterns:
Generalizations and performance improvements,” EDBT’96
From sequential patterns to episodes (Apriori-like + constraints)
H. Mannila, H. Toivonen & A.I. Verkamo. “Discovery of frequent
episodes in event sequences,” Data Mining and Knowledge
Discovery, 1997
Mining sequential patterns with constraints
Rastogi, et al. “SPIRIT: Mining sequential patterns with regular
expression constraints,” VLDB’99
May 22, 2017
Data Mining: Concepts and Techniques
87
A Basic Property of Sequential Patterns:
Apriori
A basic property: Apriori (Agrawal & Sirkant’94)
If a sequence S is not frequent
Then none of the super-sequences of S is frequent
E.g, <hb> is infrequent so do <hab> and <(ah)b>
Seq. ID
Sequence
10
<(bd)cb(ac)>
20
<(bf)(ce)b(fg)>
30
<(ah)(bf)abf>
40
<(be)(ce)d>
50
<a(bd)bcb(ade)>
May 22, 2017
Given support threshold
min_sup =2
Data Mining: Concepts and Techniques
88
GSP—A Generalized Sequential Pattern
Mining Algorithm
GSP (Generalized Sequential Pattern) mining algorithm
Outline of the method
proposed by Agrawal and Srikant, EDBT’96
Initially, every item in DB is a candidate of length-1
for each level (i.e., sequences of length-k) do
scan database to collect support count for each
candidate sequence
generate candidate length-(k+1) sequences from
length-k frequent sequences using Apriori
repeat until no frequent sequence or no candidate
can be found
Major strength: Candidate pruning by Apriori
May 22, 2017
Data Mining: Concepts and Techniques
89
Finding Length-1 Sequential Patterns
Examine GSP using an example
Initial candidates: all singleton sequences
<a>, <b>, <c>, <d>, <e>, <f>,
<g>, <h>
Scan database once, count support for
candidates
min_sup =2
May 22, 2017
Cand
Sup
<a>
3
<b>
5
<c>
4
<d>
3
<e>
3
<f>
2
Seq. ID
Sequence
10
<(bd)cb(ac)>
<g>
1
20
<(bf)(ce)b(fg)>
<h>
1
30
<(ah)(bf)abf>
40
<(be)(ce)d>
50
<a(bd)bcb(ade)>
Data Mining: Concepts and Techniques
90
Generating Length-2 Candidates
51 length-2
Candidates
<a>
<a>
<b>
<c>
<d>
<e>
<f>
May 22, 2017
<a>
<b>
<c>
<d>
<e>
<f>
<a>
<aa>
<ab>
<ac>
<ad>
<ae>
<af>
<b>
<ba>
<bb>
<bc>
<bd>
<be>
<bf>
<c>
<ca>
<cb>
<cc>
<cd>
<ce>
<cf>
<d>
<da>
<db>
<dc>
<dd>
<de>
<df>
<e>
<ea>
<eb>
<ec>
<ed>
<ee>
<ef>
<f>
<fa>
<fb>
<fc>
<fd>
<fe>
<ff>
<b>
<c>
<d>
<e>
<f>
<(ab)>
<(ac)>
<(ad)>
<(ae)>
<(af)>
<(bc)>
<(bd)>
<(be)>
<(bf)>
<(cd)>
<(ce)>
<(cf)>
<(de)>
<(df)>
Without Apriori
property,
8*8+8*7/2=92
candidates
<(ef)>
Apriori prunes
44.57% candidates
Data Mining: Concepts and Techniques
91
Generating Length-3 Candidates and Finding
Length-3 Patterns
Generate Length-3 Candidates
Self-join length-2 sequential patterns
Based on the Apriori property
<ab>, <aa> and <ba> are all length-2 sequential
patterns <aba> is a length-3 candidate
<(bd)>, <bb> and <db> are all length-2 sequential
patterns <(bd)b> is a length-3 candidate
46 candidates are generated
Find Length-3 Sequential Patterns
Scan database once more, collect support counts for
candidates
19 out of 46 candidates pass support threshold
May 22, 2017
Data Mining: Concepts and Techniques
92
The GSP Mining Process
5th scan: 1 cand. 1 length-5 seq.
pat.
Cand. cannot pass
sup. threshold
<(bd)cba>
Cand. not in DB at all
4th scan: 8 cand. 6 length-4 seq. <abba> <(bd)bc> …
pat.
3rd scan: 46 cand. 19 length-3 seq. <abb> <aab> <aba> <baa> <bab> …
pat. 20 cand. not in DB at all
2nd scan: 51 cand. 19 length-2 seq.
<aa> <ab> … <af> <ba> <bb> … <ff> <(ab)> … <(ef)>
pat. 10 cand. not in DB at all
1st scan: 8 cand. 6 length-1 seq.
<a> <b> <c> <d> <e> <f> <g> <h>
pat.
min_sup =2
May 22, 2017
Seq. ID
Sequence
10
<(bd)cb(ac)>
20
<(bf)(ce)b(fg)>
30
<(ah)(bf)abf>
40
<(be)(ce)d>
50
<a(bd)bcb(ade)>
Data Mining: Concepts and Techniques
93
Is GSP Efficient Enough?—Bottlenecks
A huge set of candidates could be generated
1,000 frequent length-1 sequences generate
1000 999
1000 1000
1,499,500 length-2 candidates!
2
Multiple of scans of database in mining
Real challenge: mining long sequential patterns
An exponential number of short candidates
A length-100 sequential pattern needs 1030
candidate sequences!
100 100
30
2
1
10
i 1 i
100
May 22, 2017
Data Mining: Concepts and Techniques
95
Can We Do Better?—The Evolution Path
of Our Approach
Initial try: Using FP-tree and FP-growth?
Based on our SIGMOD’00 on frequent-pattern mining
Development of a sequential pattern growth approach
FreeSpan (KDD’00)
PrefixSpan (ICDE’01)
Extensions to PrefixSpan
Closed- and max- sequential patterns
Constraint-based sequential pattern growth
From sequential patterns to structured patterns
May 22, 2017
Data Mining: Concepts and Techniques
96
Using FP-Tree and FP-Growth?
FP-tree and FP-growth: A successful frequent-pattern mining
approach
J. Han, J. Pei, and Y. Yin: “Mining frequent patterns without candidate
generation”. In Proc. ACM-SIGMOD’2000, pp. 1-12, Dallas, TX, May
2000.
FP-tree: A compressed transaction database for frequent-pattern
mining
FP-growth: A frequent-pattern growth approach
No candidate generation and test
Growth of frequent-patterns in projected databases
Can we extend FP-growth to sequential pattern mining?
Sequential-pattern tree?— Unfortunately, little sharing can be
explored to compress sequence database!
However, pattern-growth is still valuable
May 22, 2017
Data Mining: Concepts and Techniques
97
Why Does FP-growth Win in Frequent-Pattern
Mining ?
Divide-and-conquer:
Other factors
decompose both the mining task and DB according to
the frequent patterns obtained so far
leads to focused search of smaller databases
no candidate generation, no candidate test
compressed database: FP-tree structure
no repeated scan of entire database
basic ops—counting and FP-tree building, not pattern
search and matching
But no compressed trees in sequential pattern mining!
May 22, 2017
Data Mining: Concepts and Techniques
98
Our First Try: FreeSpan: Frequent Pattern-Projected
Sequential Pattern Mining
J. Han J. Pei, B. Mortazavi-Asi, Q. Chen, U. Dayal, M.C. Hsu, FreeSpan:
Frequent pattern-projected sequential pattern mining, KDD’00.
A divide-and-conquer approach
Recursively project a sequence database into a set of smaller
databases based on the current set of frequent patterns
Mine each projected database to find its patterns
Sequence Database SDB
< (bd) c b (ac) >
< (bf) (ce) b (fg) >
< (ah) (bf) a b f >
< (be) (ce) d >
< a (bd) b c b (ade) >
May 22, 2017
f_list: b:5, c:4, a:3, d:3, e:3, f:2
All seq. pat. can be divided into 6 subsets:
•Seq. pat. containing item f
•Those containing e but no f
•Those containing d but no e nor f
•Those containing a but no d, e or f
•Those containing c but no a, d, e or f
•Those containing only item b
Data Mining: Concepts and Techniques
99
From FreeSpan to PrefixSpan: Why?
Freespan:
Projection-based: No candidate sequence needs to
be generated
But, projection can be performed at any point in the
sequence, and the projected sequences do will not
shrink much
PrefixSpan
May 22, 2017
Projection-based
But only prefix-based projection: less projections and
quickly shrinking sequences
Data Mining: Concepts and Techniques
100
Prefix and Suffix (Projection)
<a>, <aa>, <a(ab)> and <a(abc)> are
prefixes of sequence <a(abc)(ac)d(cf)>
Given sequence <a(abc)(ac)d(cf)>
May 22, 2017
Prefix
Suffix (Prefix-Based Projection)
<a>
<(abc)(ac)d(cf)>
<aa>
<ab>
<(_bc)(ac)d(cf)>
<(_c)(ac)d(cf)>
Data Mining: Concepts and Techniques
101
Mining Sequential Patterns by Prefix
Projections
Step 1: find length-1 sequential patterns
<a>, <b>, <c>, <d>, <e>, <f>
Step 2: divide search space. The complete set of seq. pat.
can be partitioned into 6 subsets:
The ones having prefix <a>;
The ones having prefix <b>;
SID
sequence
…
10
<a(abc)(ac)d(cf)>
The ones having prefix <f>
20
<(ad)c(bc)(ae)>
May 22, 2017
30
<(ef)(ab)(df)cb>
40
<eg(af)cbc>
Data Mining: Concepts and Techniques
102
Finding Seq. Patterns with Prefix <a>
Only need to consider projections w.r.t. <a>
<a>-projected database: <(abc)(ac)d(cf)>,
<(_d)c(bc)(ae)>, <(_b)(df)cb>, <(_f)cbc>
Find all the length-2 seq. pat. Having prefix <a>: <aa>,
<ab>, <(ab)>, <ac>, <ad>, <af>
Further partition into 6 subsets
sequence
Having prefix <aa>;
10
<a(abc)(ac)d(cf)>
<(ad)c(bc)(ae)>
…
20
30
<(ef)(ab)(df)cb>
40
<eg(af)cbc>
May 22, 2017
SID
Having prefix <af>
Data Mining: Concepts and Techniques
103
Completeness of PrefixSpan
SDB
Having prefix <a>
<a>-projected database
<(abc)(ac)d(cf)>
<(_d)c(bc)(ae)>
<(_b)(df)cb>
<(_f)cbc>
SID
sequence
10
<a(abc)(ac)d(cf)>
20
<(ad)c(bc)(ae)>
30
<(ef)(ab)(df)cb>
40
<eg(af)cbc>
Length-1 sequential patterns
<a>, <b>, <c>, <d>, <e>, <f>
Having prefix <c>, …, <f>
Having prefix <b>
<b>-projected database
Length-2 sequential
patterns
<aa>, <ab>, <(ab)>,
<ac>, <ad>, <af>
…
……
Having prefix <aa> Having prefix <af>
<aa>-proj. db
May 22, 2017
…
<af>-proj. db
Data Mining: Concepts and Techniques
104
Efficiency of PrefixSpan
No candidate sequence needs to be generated
Projected databases keep shrinking
Major cost of PrefixSpan: constructing
projected databases
May 22, 2017
Can be improved by bi-level projections
Data Mining: Concepts and Techniques
105
Optimization Techniques in PrefixSpan
Single-level vs. bi-level projection
Bi-level projection with 3-way checking may reduce the
number and size of projected databases
Physical projection vs. pseudo-projection
Pseudo-projection may reduce the effort of projection
when the projected database fits in main memory
Parallel projection vs. partition projection
Partition projection may avoid the blowup of disk space
May 22, 2017
Data Mining: Concepts and Techniques
106
Scaling-up by Bi-level Projection
Partition search space based on length-2
sequential patterns
Only form projected databases and pursue
recursive mining over bi-level projected
databases
May 22, 2017
Data Mining: Concepts and Techniques
107
Pair-wise Checking Using S-matrix
SDB
SID
sequence
10
<a(abc)(ac)d(cf)>
20
<(ad)c(bc)(ae)>
30
<(ef)(ab)(df)cb>
40
<eg(af)cbc>
Length-1 sequential patterns
<a>, <b>, <c>, <d>, <e>, <f>
<aa> happens twice
<(ac)> happens once
<ac> happens
4 times
<ca> happens
twice
a
2
b
(4, 2, 2)
1
c
(4, 2, 1)
(3, 3, 2)
3
d
(2, 1, 1)
(2, 2, 0)
(1, 3, 0)
0
e
(1, 2, 1)
(1, 2, 0)
(1, 2, 0)
(1, 1, 0)
0
f
(2, 1, 1)
(2, 2, 0)
(1, 2, 1)
(1, 1, 1)
(2, 0, 1)
1
a
b
c
d
e
f
S-matrix
All length-2 sequential patterns are found in S-matrix
May 22, 2017
Data Mining: Concepts and Techniques
108
Mining <ab>-projected Database
SDB
Length-1 sequential patterns
<a>, <b>, <c>, <d>, <e>, <f>
SID
sequence
10
<a(abc)(ac)d(cf)>
a
20
<(ad)c(bc)(ae)>
b
30
<(ef)(ab)(df)cb>
40
<eg(af)cbc>
2
4
( , 2, 2)
c
(4, 2, 1)
(3, 3, 2)
3
d
(2, 1, 1)
(2, 2, 0)
(1, 3, 0)
0
e
(1, 2, 1)
(1, 2, 0)
(1, 2, 0)
(1, 1, 0)
0
f
(2, 1, 1)
(2, 2, 0)
(1, 2, 1)
(1, 1, 1)
(2, 0, 1)
1
a
b
c
d
e
f
<ab>-projected database
<(_c)(ac(cf)>
Lead to pattern
<(_c)a>
<a(bc)a>
<c>
Local length-1
sequential patterns:
<a>, <c>, <(_c)>
May 22, 2017
S-matrix
1
No hope to form (_ac), so no
need to count it.
S-matrix
a
0
c
(1, 0, 1)
1
(_c)
(, 2, )
(, 1, )
a
c
(_c)
Data Mining: Concepts and Techniques
109
Benefits of Bi-level Projection
More patterns are found in each shoot
Much less projections
In the example, there are 53 patterns.
53 level-by-level projections
22 bi-level projections
May 22, 2017
Data Mining: Concepts and Techniques
110
Three-Way Apriori Checking
Using Apriori heuristic to prune items in
projected databases
Absorb goodness of Apriori-like algorithms
<acd> cannot be a pattern!
Exclude d from <ac>-projected database
a
2
b
(4, 2, 2)
1
c
(4, 2, 1)
(3, 3, 2)
3
d
(2, 1, 1)
(2, 2, 0)
(1, 3, 0)
0
e
(1, 2, 1)
(1, 2, 0)
(1, 2, 0)
(1, 1, 0)
0
f
(2, 1, 1)
(2, 2, 0)
(1, 2, 1)
(1, 1, 1)
(2, 0, 1)
1
a
b
c
d
e
f
May 22, 2017
Data Mining: Concepts and Techniques
111
Speed-up by Pseudo-projection
Major cost of PrefixSpan: projection
Postfixes of sequences often appear
repeatedly in recursive projected
databases
When (projected) database can be held in main
memory, use pointers to form projections
Pointer to the sequence
Offset of the postfix
s=<a(abc)(ac)d(cf)>
<a>
s|<a>: ( , 2) <(abc)(ac)d(cf)>
<ab>
s|<ab>: ( , 4) <(_c)(ac)d(cf)>
May 22, 2017
Data Mining: Concepts and Techniques
112
Pseudo-Projection vs. Physical Projection
May 22, 2017
Pseudo-projection avoids physically copying
postfixes
Efficient in running time and space when
database can be held in main memory
However, it is not efficient when database cannot fit
in main memory
Disk-based random accessing is very costly
Suggested Approach:
Integration of physical and pseudo-projection
Swapping to pseudo-projection when the data
set fits in memory
Data Mining: Concepts and Techniques
113
Experiments and Performance Analysis
Comparing PrefixSpan with GSP and FreeSpan in large
databases
GSP (IBM Almaden, Srikant & Agrawal EDBT’96)
FreeSpan (J. Han J. Pei, B. Mortazavi-Asi, Q. Chen, U.
Dayal, M.C. Hsu, KDD’00)
Prefix-Span-1 (single-level projection)
Prefix-Scan-2 (bi-level projection)
Comparing effects of pseudo-projection
Comparing I/O cost and scalability
May 22, 2017
Data Mining: Concepts and Techniques
114
Runtime (second)
PrefixSpan Is Faster Than GSP and
FreeSpan
400
PrefixSpan-1
350
PrefixSpan-2
300
FreeSpan
250
GSP
200
150
100
50
0
0.00
0.50
1.00
1.50
2.00
2.50
3.00
Support threshold (%)
May 22, 2017
Data Mining: Concepts and Techniques
115
Effect of Pseudo-Projection
PrefixSpan-1
200
Runtime (second)
PrefixSpan-2
PrefixSpan-1 (Pseudo)
160
PrefixSpan-2 (Pseudo)
120
80
40
0
0.20
0.30
0.40
0.50
0.60
Support threshold (%)
May 22, 2017
Data Mining: Concepts and Techniques
116
I/O Cost: When It Cannot Fit in
Memory
1.E+10
PrefixSpan-1
PrefixSpan-1 (pseudo)
PrefixSpan-2
PrefixSpan-2 (pseudo)
I/O Cost
8.E+09
6.E+09
4.E+09
2.E+09
0.E+00
0.0
1.0
2.0
3.0
Support threshold (% )
May 22, 2017
Data Mining: Concepts and Techniques
117
Scalability (When DB Is Large)
Runtime (thousand
second)
30
25
20
15
10
PrefixSpan-1
5
PrefixSpan-2
0
0
100
200
300
400
500
# of sequences (thousand)
May 22, 2017
Data Mining: Concepts and Techniques
118
Major Features of PrefixSpan
Both PrefixSpan and FreeSpan are patterngrowth methods
Searches are more focused and thus efficient
Prefix-projected pattern growth (PrefixSpan) is
simpler and more elegant than frequent patternguided projection (FreeSpan)
The Apriori heuristic is integrated into bi-level
projection PrefixSpan
Pseudo-projection substantially enhances the
performance of memory-based processing
May 22, 2017
Data Mining: Concepts and Techniques
119
Further Evolution of PrefixSpan
Closed- and max- sequential patterns
Finding only the most meaningful (longest)
sequential patterns
Constraint-based sequential pattern growth
Adding user-specific constraints
From sequential patterns to structured patterns
Beyond sequential patterns, mining structured
patterns in XML documents
May 22, 2017
Data Mining: Concepts and Techniques
120
Closed- and Max- Sequential Patterns
A closed- sequential pattern is a frequent sequence s where there is
no proper super-sequence of s sharing the same support count with s
A max- sequential pattern is a sequential pattern p s.t. any proper
super-pattern of p is not frequent
Benefit of the notion of closed sequential patterns
{<a1 a2 … a50>, <a1 a2 … a100>}, with min_sup = 1
There are 2100 sequential patterns, but only 2 are
closed
Similar benefits for the notion of max- sequential-patterns
May 22, 2017
Data Mining: Concepts and Techniques
121
Methods for Mining Closed- and MaxSequential Patterns
PrefixSpan or FreeSpan can be viewed as projection-guided depth-first
search
For mining max- sequential patterns, any sequence which does not
contain anything beyond the already discovered ones will be removed
from the projected DB
{<a1 a2 … a50>, <a1 a2 … a100>}, with min_sup = 1
If we have found a max-sequential pattern <a1 a2 …
a100>, nothing will be projected in any projected DB
Similar ideas can be applied for mining closed- sequential-patterns
May 22, 2017
Data Mining: Concepts and Techniques
122
Constraint-Based Sequential Pattern Mining
Constraint-based sequential pattern mining
Constraints: User-specified, for focused mining of desired patterns
How to explore efficient mining with constraints? — Optimization
Classification of constraints
Anti-monotone: E.g., value_sum(S) < 150, min(S) > 10
Monotone: E.g., count (S) > 5, S {PC, digital_camera}
Succinct: E.g., length(S) 10, S {Pentium, MS/Office, MS/Money}
Convertible: E.g., value_avg(S) < 25, profit_sum (S) > 160,
max(S)/avg(S) < 2, median(S) – min(S) > 5
Inconvertible: E.g., avg(S) – median(S) = 0
May 22, 2017
Data Mining: Concepts and Techniques
123
Sequential Pattern Growth for ConstraintBased Mining
Efficient mining with convertible constraints
Not solvable by candidate generation-and-test methodology
Easily push-able into the sequential pattern growth framework
Example: push avg(S) < 25 in frequent pattern growth
project items in value (price/profit depending on mining
semantics) ascending/descending order for sequential pattern
growth
Grow each pattern by sequential pattern growth
If avg(current_pattern) 25, toss the current_pattern
May 22, 2017
Why?—future growths always make it bigger
But why not candidate generation?—no structure or ordering in
growth
Data Mining: Concepts and Techniques
124
From Sequential Patterns to Structured
Patterns
Sets, sequences, trees and other structures
Transaction DB: Sets of items
Seq. DB: Sequences of sets:
{{<i1, i2>, …, <im, in, ik>}, …}
Sets of trees (each element being a tree):
{<{i1, i2}, …, {im, in, ik}>, …}
Sets of Sequences:
{{i1, i2, …, im}, …}
{t1, t2, …, tn}
Applications: Mining structured patterns in XML documents
May 22, 2017
Data Mining: Concepts and Techniques
125
Conclusions
Sequential pattern mining—an important task in data
mining
Previous sequential pattern mining methodology:
candidate generation-and-test
Our methodology: sequential pattern growth (mining
sequential patterns without candidate generation)
Project on prefixes by exploring level-by-level & bilevel projections as well as pseudo-projection
Extensions:
May 22, 2017
Mining max-/closed sequential/structured patterns
with constraints
Data Mining: Concepts and Techniques
126
References
R. Agarwal, C. Aggarwal, and V. V. V. Prasad. A tree projection algorithm for generation of frequent
itemsets. In Journal of Parallel and Distributed Computing (Special Issue on High Performance Data
Mining), 2000.
R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large
databases. SIGMOD'93, 207-216, Washington, D.C.
R. Agrawal and R. Srikant. Fast algorithms for mining association rules. VLDB'94 487-499, Santiago,
Chile.
R. Agrawal and R. Srikant. Mining sequential patterns. ICDE'95, 3-14, Taipei, Taiwan.
R. J. Bayardo. Efficiently mining long patterns from databases. SIGMOD'98, 85-93, Seattle,
Washington.
S. Brin, R. Motwani, and C. Silverstein. Beyond market basket: Generalizing association rules to
correlations. SIGMOD'97, 265-276, Tucson, Arizona.
S. Brin, R. Motwani, J. D. Ullman, and S. Tsur. Dynamic itemset counting and implication rules for
market basket analysis. SIGMOD'97, 255-264, Tucson, Arizona, May 1997.
K. Beyer and R. Ramakrishnan. Bottom-up computation of sparse and iceberg cubes. SIGMOD'99, 359370, Philadelphia, PA, June 1999.
D.W. Cheung, J. Han, V. Ng, and C.Y. Wong. Maintenance of discovered association rules in large
databases: An incremental updating technique. ICDE'96, 106-114, New Orleans, LA.
M. Fang, N. Shivakumar, H. Garcia-Molina, R. Motwani, and J. D. Ullman. Computing iceberg queries
efficiently. VLDB'98, 299-310, New York, NY, Aug. 1998.
May 22, 2017
Data Mining: Concepts and Techniques
127
References (2)
G. Grahne, L. Lakshmanan, and X. Wang. Efficient mining of constrained correlated sets. ICDE'00, 512521, San Diego, CA, Feb. 2000.
Y. Fu and J. Han. Meta-rule-guided mining of association rules in relational databases. KDOOD'95, 3946, Singapore, Dec. 1995.
T. Fukuda, Y. Morimoto, S. Morishita, and T. Tokuyama. Data mining using two-dimensional optimized
association rules: Scheme, algorithms, and visualization. SIGMOD'96, 13-23, Montreal, Canada.
E.-H. Han, G. Karypis, and V. Kumar. Scalable parallel data mining for association rules. SIGMOD'97,
277-288, Tucson, Arizona.
J. Han, G. Dong, and Y. Yin. Efficient mining of partial periodic patterns in time series database.
ICDE'99, Sydney, Australia.
J. Han and Y. Fu. Discovery of multiple-level association rules from large databases. VLDB'95, 420-431,
Zurich, Switzerland.
J. Han, J. Pei, and Y. Yin. Mining frequent patterns without candidate generation. SIGMOD'00, 1-12,
Dallas, TX, May 2000.
T. Imielinski and H. Mannila. A database perspective on knowledge discovery. Communications of ACM,
39:58-64, 1996.
M. Kamber, J. Han, and J. Y. Chiang. Metarule-guided mining of multi-dimensional association rules
using data cubes. KDD'97, 207-210, Newport Beach, California.
M. Klemettinen, H. Mannila, P. Ronkainen, H. Toivonen, and A.I. Verkamo. Finding interesting rules
from large sets of discovered association rules. CIKM'94, 401-408, Gaithersburg, Maryland.
May 22, 2017
Data Mining: Concepts and Techniques
128
References (3)
F. Korn, A. Labrinidis, Y. Kotidis, and C. Faloutsos. Ratio rules: A new paradigm for fast, quantifiable
data mining. VLDB'98, 582-593, New York, NY.
B. Lent, A. Swami, and J. Widom. Clustering association rules. ICDE'97, 220-231, Birmingham,
England.
H. Lu, J. Han, and L. Feng. Stock movement and n-dimensional inter-transaction association rules.
SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD'98), 12:112:7, Seattle, Washington.
H. Mannila, H. Toivonen, and A. I. Verkamo. Efficient algorithms for discovering association rules.
KDD'94, 181-192, Seattle, WA, July 1994.
H. Mannila, H Toivonen, and A. I. Verkamo. Discovery of frequent episodes in event sequences. Data
Mining and Knowledge Discovery, 1:259-289, 1997.
R. Meo, G. Psaila, and S. Ceri. A new SQL-like operator for mining association rules. VLDB'96, 122133, Bombay, India.
R.J. Miller and Y. Yang. Association rules over interval data. SIGMOD'97, 452-461, Tucson, Arizona.
R. Ng, L. V. S. Lakshmanan, J. Han, and A. Pang. Exploratory mining and pruning optimizations of
constrained associations rules. SIGMOD'98, 13-24, Seattle, Washington.
N. Pasquier, Y. Bastide, R. Taouil, and L. Lakhal. Discovering frequent closed itemsets for association
rules. ICDT'99, 398-416, Jerusalem, Israel, Jan. 1999.
May 22, 2017
Data Mining: Concepts and Techniques
129
References (4)
J.S. Park, M.S. Chen, and P.S. Yu. An effective hash-based algorithm for mining association rules.
SIGMOD'95, 175-186, San Jose, CA, May 1995.
J. Pei, J. Han, and R. Mao. CLOSET: An Efficient Algorithm for Mining Frequent Closed Itemsets.
DMKD'00, Dallas, TX, 11-20, May 2000.
J. Pei and J. Han. Can We Push More Constraints into Frequent Pattern Mining? KDD'00. Boston,
MA. Aug. 2000.
G. Piatetsky-Shapiro. Discovery, analysis, and presentation of strong rules. In G. Piatetsky-Shapiro
and W. J. Frawley, editors, Knowledge Discovery in Databases, 229-238. AAAI/MIT Press, 1991.
B. Ozden, S. Ramaswamy, and A. Silberschatz. Cyclic association rules. ICDE'98, 412-421, Orlando,
FL.
J.S. Park, M.S. Chen, and P.S. Yu. An effective hash-based algorithm for mining association rules.
SIGMOD'95, 175-186, San Jose, CA.
S. Ramaswamy, S. Mahajan, and A. Silberschatz. On the discovery of interesting patterns in
association rules. VLDB'98, 368-379, New York, NY..
S. Sarawagi, S. Thomas, and R. Agrawal. Integrating association rule mining with relational database
systems: Alternatives and implications. SIGMOD'98, 343-354, Seattle, WA.
A. Savasere, E. Omiecinski, and S. Navathe. An efficient algorithm for mining association rules in
large databases. VLDB'95, 432-443, Zurich, Switzerland.
A. Savasere, E. Omiecinski, and S. Navathe. Mining for strong negative associations in a large
database of customer transactions. ICDE'98, 494-502, Orlando, FL, Feb. 1998.
May 22, 2017
Data Mining: Concepts and Techniques
130
References (5)
C. Silverstein, S. Brin, R. Motwani, and J. Ullman. Scalable techniques for mining causal
structures. VLDB'98, 594-605, New York, NY.
R. Srikant and R. Agrawal. Mining generalized association rules. VLDB'95, 407-419, Zurich,
Switzerland, Sept. 1995.
R. Srikant and R. Agrawal. Mining quantitative association rules in large relational tables.
SIGMOD'96, 1-12, Montreal, Canada.
R. Srikant, Q. Vu, and R. Agrawal. Mining association rules with item constraints. KDD'97, 67-73,
Newport Beach, California.
H. Toivonen. Sampling large databases for association rules. VLDB'96, 134-145, Bombay, India,
Sept. 1996.
D. Tsur, J. D. Ullman, S. Abitboul, C. Clifton, R. Motwani, and S. Nestorov. Query flocks: A
generalization of association-rule mining. SIGMOD'98, 1-12, Seattle, Washington.
K. Yoda, T. Fukuda, Y. Morimoto, S. Morishita, and T. Tokuyama. Computing optimized rectilinear
regions for association rules. KDD'97, 96-103, Newport Beach, CA, Aug. 1997.
M. J. Zaki, S. Parthasarathy, M. Ogihara, and W. Li. Parallel algorithm for discovery of association
rules. Data Mining and Knowledge Discovery, 1:343-374, 1997.
M. Zaki. Generating Non-Redundant Association Rules. KDD'00. Boston, MA. Aug. 2000.
O. R. Zaiane, J. Han, and H. Zhu. Mining Recurrent Items in Multimedia with Progressive
Resolution Refinement. ICDE'00, 461-470, San Diego, CA, Feb. 2000.
May 22, 2017
Data Mining: Concepts and Techniques
131
References (6)
J. Pei, J. Han, H. Pinto, Q. Chen, U. Dayal, and M.-C. Hsu, "PrefixSpan: Mining Sequential Patterns
Efficiently by Prefix-Projected Pattern Growth", Proc. 2001 Int. Conf. on Data Engineering (ICDE'01),
Heidelberg, Germany, April 2001. (U.S. Patent Pending)
J. Han, J. Pei, B. Mortazavi-Asl, Q. Chen, U. Dayal, M.-C. Hsu, "FreeSpan: Frequent Pattern-Projected
Sequential Pattern Mining", Proc. 2000 Int. Conf. on Knowledge Discovery and Data Mining (KDD'00),
Boston, MA, August 2000.
J. Han, J. Pei, and Y. Yin: “Mining frequent patterns without candidate generation”. In Proc. ACMSIGMOD’2000, pp. 1-12, Dallas, TX, May 2000. (U.S. Patent Pending)
J. Pei, J. Han, and L. V. S. Lakshmanan, "Mining Frequent Itemsets with Convertible Constraints", Proc.
2001 Int. Conf. on Data Engineering (ICDE'01), Heidelberg, Germany, April 2001.
J. Pei, J. Han, and R. Mao, "CLOSET: An Efficient Algorithm for Mining Frequent Closed Itemsets", Proc.
2000 ACM-SIGMOD Int. Workshop on Data Mining and Knowledge Discovery (DMKD'00), Dallas, TX,
May 2000.
J. Han, J. Pei, G. Dong, and K. Wang, “Computing Iceberg Data Cubes with Complex Measures”, Proc.
ACM-SIGMOD’2001, Santa Barbara, CA, May 2001. (U.S. Patent Pending)
May 22, 2017
Data Mining: Concepts and Techniques
132
Other Recent Studies: Constraint-Base Data Mining
Constraint-Based Clustering in Large Databases (ICDT'01)
Spatial Clustering in the Presence of Obstacles (ICDE'01)
A. K. H. Tung, J. Hou, and J. Han, "Spatial Clustering in the Presence of Obstacles", Proc. 2001 Int.
Conf. on Data Engineering (ICDE'01), Heidelberg, Germany, April 2001.
Mining Frequent Itemsets with Convertible Constraints (ICDE'01, KDD'00)
A. K. H. Tung, J. Han, L. V. S. Lakshmanan, and R. T. Ng, "Constraint-Based Clustering in Large
Databases", Proc. 2001 Int. Conf. on Database Theory (ICDT'01), London, U.K., Jan. 2001.
J. Pei, J. Han, and L. V. S. Lakshmanan, "Mining Frequent Itemsets with Convertible Constraints",
Proc. 2001 Int. Conf. on Data Engineering (ICDE'01), April 2001.
J. Pei and J. Han "Can We Push More Constraints into Frequent Pattern Mining?", Proc. 2000 Int.
Conf. on Knowledge Discovery and Data Mining (KDD'00), Boston, MA, August 2000.
Constraint-Based Association Mining (SIGMOD’98, SIGMOD’99, COMPUTER’99)
J. Han, L. V. S. Lakshmanan, and R. T. Ng, "Constraint-Based, Multidimensional Data Mining",
COMPUTER (special issues on Data Mining), 32(8): 46-50, 1999.
R. Ng, L.V.S. Lakshmanan, J. Han & A. Pang. “Exploratory mining and pruning optimizations of
constrained association rules.” SIGMOD’98
L. V. S. Lakshmanan, R. Ng, J. Han and A. Pang, "Optimization of Constrained Frequent Set Queries
with 2-Variable Constraints", SIGMOD’99
May 22, 2017
Data Mining: Concepts and Techniques
133
http://www.cs.uiuc.edu/~hanj
Thank you !!!
May 22, 2017
Data Mining: Concepts and Techniques
134