Perfect hashing schemes for mining traversal patterns

被引:0
|
作者
Chang, CC
Lin, CY
Chou, H
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
data mining; traversal patterns; perfect hashing; performance analysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Hashing schemes area common technique to improve the performance in mining not only association rules but also sequential patterns or traversal patters. However, the collision problem in hash schemes may result in severe performance degradation. In this paper, we propose perfect hashing schemes for mining traversal patterns to avoid collisions in the hash table. The main idea is to transform each large itemsets into one large 2-itemset by employing a delicate encoding scheme. Then perfect hash schemes designed only for itemsets of length two, rather than varied lengths, are applied. The experimental results show that our method is more than twice as faster than FS algorithm. The results also show our method is scalable to database sizes. One variant of our perfect hash scheme, called partial hash, is proposed to cope with the enormous memory space required by typical perfect hash functions. We also give a comparison of the performances of different perfect hash variants and investigate their properties.
引用
收藏
页码:185 / 202
页数:18
相关论文
共 50 条
  • [21] PRACTICAL PERFECT HASHING
    CORMACK, GV
    HORSPOOL, RNS
    KAISERSWERTH, M
    COMPUTER JOURNAL, 1985, 28 (01): : 54 - 58
  • [22] Mining User-generated Path Traversal Patterns in an Information Network
    Takes, Frank W.
    Kosters, Walter A.
    2013 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 1, 2013, : 284 - 289
  • [23] Minimal perfect hashing
    Pescio, C
    DR DOBBS JOURNAL, 1996, 21 (07): : 101 - +
  • [24] Mining Weighted-Frequent Traversal Patterns using Graph Topology
    Park, Hyu Chan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (10): : 20 - 26
  • [25] Efficient Mining of Utility-Based Web Path Traversal Patterns
    Ahmed, Chowdhury Farhan
    Tanbeer, Syed Khairuzzaman
    Jeong, Byeong-Soo
    Lee, Young-Koo
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 2215 - 2218
  • [26] Perfect Hashing as an Almost Perfect Subtype Test
    Ducournau, Roland
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 30 (06):
  • [27] DYNAMIC HASHING SCHEMES
    ENBODY, RJ
    DU, HC
    COMPUTING SURVEYS, 1988, 20 (02) : 85 - 113
  • [28] A minimal perfect hashing scheme to mining association rules from frequently updated data
    Tseng, Judy C. R.
    Hwang, Gwo-Jen
    Tsai, Wen-Fu
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2006, 29 (03) : 391 - 401
  • [29] DYNAMIC HASHING SCHEMES
    RAMAMOHANARAO, K
    LLOYD, JW
    COMPUTER JOURNAL, 1982, 25 (04): : 478 - 485
  • [30] Mining user access patterns with traversal constraint for predicting web page requests
    Mei-Ling Shyu
    Choochart Haruechaiyasak
    Shu-Ching Chen
    Knowledge and Information Systems, 2006, 10 : 515 - 528