Efficient frequent pattern mining based on linear prefix tree

G Pyun, U Yun, KH Ryu - Knowledge-Based Systems, 2014 - Elsevier
Outstanding frequent pattern mining guarantees both fast runtime and low memory usage
with respect to various data with different types and sizes. However, it is hard to improve the …

Mining top-k frequent patterns with combination reducing techniques

G Pyun, U Yun - Applied intelligence, 2014 - Springer
Top-k frequent pattern mining finds interesting patterns from the highest support to the k-th
support. The approach can be effectively applied in numerous fields such as marketing …

TAG: learning timed automata from logs

L Cornanguer, C Largouët, L Rozé… - Proceedings of the AAAI …, 2022 - ojs.aaai.org
Event logs are often one of the main sources of information to understand the behavior of a
system. While numerous approaches have extracted partial information from event logs, in …

Investigating the dark cyberspace: Profiling, threat-based analysis and correlation

C Fachkha, E Bou-Harb, A Boukhtouta… - … Conference on Risks …, 2012 - ieeexplore.ieee.org
An effective approach to gather cyber threat intelligence is to collect and analyze traffic
destined to unused Internet addresses known as darknets. In this paper, we elaborate on …

Debugging embedded multimedia application traces through periodic pattern mining

P López Cueva, A Bertaux, A Termier… - Proceedings of the …, 2012 - dl.acm.org
Increasing complexity in both the software and the underlying hardware, and ever tighter
time-to-market pressures are some of the key challenges faced when designing multimedia …

Efficient mining of robust closed weighted sequential patterns without information loss

U Yun, G Pyun, E Yoon - International Journal on Artificial …, 2015 - World Scientific
Sequential pattern mining has become one of the most important topics in data mining. It has
broad applications such as analyzing customer purchase data, Web access patterns …

Data mining mpsoc simulation traces to identify concurrent memory access patterns

S Lagraa, A Termier, F Pétrot - … & Test in Europe Conference & …, 2013 - ieeexplore.ieee.org
Due to a growing need for flexibility, massively parallel Multiprocessor SoC (MPSoC)
architectures are currently being developed. This leads to the need for parallel software, but …

Efficiently rewriting large multimedia application execution traces with few event sequences

C Kamdem Kengne, LC Fopa, A Termier… - Proceedings of the 19th …, 2013 - dl.acm.org
The analysis of multimedia application traces can reveal important information to enhance
program execution comprehension. However typical size of traces can be in gigabytes …

基于事务映射区间求交的高效频繁模式挖掘算法.

吴磊, 程良伦, 王涛 - Application Research of Computers …, 2019 - search.ebscohost.com
关联规则挖掘是数据挖掘的重要研究课题. 大数据处理对关联规则挖掘算法效率提出了更高要求
, 而关联规则挖掘最耗时的步骤是频繁模式挖掘. 针对当前频繁模式挖掘算法效率不高的问题 …

[PDF][PDF] Watson: A workflow-based data storage optimizer for analytics

J Zou, M Zhao, J Shi, C Wang - 36th Intl. Conf. on Massive Storage …, 2021 - par.nsf.gov
T his pa per st u dies t he a ut om atic o pti miz ati on of d at a pl ace me nt p ar a meters f or t
he i nter-j ob write o nce re adma ny (WORM) sce n ari ow here d at a is first m ateri alize dto …