Perfect hashing schemes for mining traversal patterns

被引:0
|
作者
Chang, CC
Lin, CY
Chou, H
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
data mining; traversal patterns; perfect hashing; performance analysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Hashing schemes area common technique to improve the performance in mining not only association rules but also sequential patterns or traversal patters. However, the collision problem in hash schemes may result in severe performance degradation. In this paper, we propose perfect hashing schemes for mining traversal patterns to avoid collisions in the hash table. The main idea is to transform each large itemsets into one large 2-itemset by employing a delicate encoding scheme. Then perfect hash schemes designed only for itemsets of length two, rather than varied lengths, are applied. The experimental results show that our method is more than twice as faster than FS algorithm. The results also show our method is scalable to database sizes. One variant of our perfect hash scheme, called partial hash, is proposed to cope with the enormous memory space required by typical perfect hash functions. We also give a comparison of the performances of different perfect hash variants and investigate their properties.
引用
收藏
页码:185 / 202
页数:18
相关论文
共 50 条
  • [41] Efficient Incremental Mining of Qualified Web Traversal Patterns without Scanning Original Databases
    Ying, Jia-Ching
    Tseng, Vincent S.
    Yu, Philip S.
    2009 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2009), 2009, : 338 - +
  • [42] HASHING SCHEMES FOR EXTENDIBLE ARRAYS
    ROSENBERG, AL
    STOCKMEYER, LJ
    JOURNAL OF THE ACM, 1977, 24 (02) : 199 - 221
  • [43] Blooming Trees for Minimal Perfect Hashing
    Antichi, Gianni
    Ficara, Domenico
    Giordano, Stefano
    Procissi, Gregorio
    Vitucci, Fabio
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [44] Retrieval and Perfect Hashing Using Fingerprinting
    Mueller, Ingo
    Sanders, Peter
    Schulze, Robert
    Zhou, Wei
    EXPERIMENTAL ALGORITHMS, SEA 2014, 2014, 8504 : 138 - 149
  • [45] Mining Preferred Traversal Paths with HITS
    Yeh, Jieh-Shan
    Lin, Ying-Lin
    Chen, Yu-Cheng
    WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 98 - 107
  • [46] Perfect Tabular Hashing in Pseudolinear Time
    Palit, Shekhar
    Wortman, Kevin A.
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 228 - 232
  • [47] A practical minimal perfect Hashing method
    Botelho, FC
    Kohayakawa, Y
    Ziviani, N
    EXPERIMENTAL AND EFFICIENT ALGORITHMS, PROCEEDINGS, 2005, 3503 : 488 - 500
  • [48] AN ALGEBRAIC APPROACH TO CICHELLIS PERFECT HASHING
    GORI, M
    SODA, G
    BIT, 1989, 29 (01): : 2 - 13
  • [49] Traversal pattern mining in web environment
    Jang, MS
    Kim, WG
    Lee, YS
    Woo, J
    INTERNET AND NETWORK ECONOMICS, PROCEEDINGS, 2005, 3828 : 801 - 805
  • [50] PERFECT AND ESSENTIALLY PERFECT AUTHENTICATION SCHEMES
    BEUTELSPACHER, A
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 304 : 167 - 170