Perfect hashing schemes for mining traversal patterns

被引:0
|
作者
Chang, CC
Lin, CY
Chou, H
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
data mining; traversal patterns; perfect hashing; performance analysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Hashing schemes area common technique to improve the performance in mining not only association rules but also sequential patterns or traversal patters. However, the collision problem in hash schemes may result in severe performance degradation. In this paper, we propose perfect hashing schemes for mining traversal patterns to avoid collisions in the hash table. The main idea is to transform each large itemsets into one large 2-itemset by employing a delicate encoding scheme. Then perfect hash schemes designed only for itemsets of length two, rather than varied lengths, are applied. The experimental results show that our method is more than twice as faster than FS algorithm. The results also show our method is scalable to database sizes. One variant of our perfect hash scheme, called partial hash, is proposed to cope with the enormous memory space required by typical perfect hash functions. We also give a comparison of the performances of different perfect hash variants and investigate their properties.
引用
收藏
页码:185 / 202
页数:18
相关论文
共 50 条
  • [31] An efficient mining and clustering algorithm for interactive walk-through traversal patterns
    Hung, SS
    Kuo, TC
    Liu, DSM
    IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2004), PROCEEDINGS, 2004, : 356 - 362
  • [32] Mining user access patterns with traversal constraint for predicting web page requests
    Shyu, Mei-Ling
    Haruechaiyasak, Choochart
    Chen, Shu-Ching
    KNOWLEDGE AND INFORMATION SYSTEMS, 2006, 10 (04) : 515 - 528
  • [33] Efficient mining of temporal traversal patterns from very large Web logs
    Chen, ZX
    DMIN '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON DATA MINING, 2005, : 10 - 16
  • [34] A Lattice-Based Framework for Interactively and Incrementally Mining Web Traversal Patterns
    Lee, Yue-Shi
    Yen, Show-Jane
    Hsieh, Min-Chi
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2005, 1 (04) : 197 - +
  • [35] A family of perfect hashing methods
    Majewski, BS
    Wormald, NC
    Havas, G
    Czech, ZJ
    COMPUTER JOURNAL, 1996, 39 (06): : 547 - 554
  • [36] Perfect hashing for network applications
    Lu, Yi
    Prabhakar, Balaji
    Bonomi, Flavio
    2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 2774 - +
  • [37] Recursive bounds for perfect hashing
    Fachini, E
    Nilli, A
    DISCRETE APPLIED MATHEMATICS, 2001, 111 (03) : 307 - 311
  • [38] COLLECTIONS OF FUNCTIONS FOR PERFECT HASHING
    BERMAN, F
    BOCK, ME
    DITTERT, E
    ODONNELL, MJ
    PLANK, D
    SIAM JOURNAL ON COMPUTING, 1986, 15 (02) : 604 - 618
  • [39] Quasi-perfect hashing
    Czech, ZJ
    COMPUTER JOURNAL, 1998, 41 (06): : 416 - 421