Effectively and efficiently mining frequent patterns from dense graph streams on disk

被引:30
作者
Braun, Peter [2 ]
Cameron, Juan J. [2 ]
Cuzzocrea, Alfredo [1 ]
Jiang, Fan [2 ]
Leung, Carson K. [2 ]
机构
[1] ICAR CNR, Via P Bucci 41C, I-87036 Arcavacata Di Rende, CS, Italy
[2] Univ Manitoba, Dept Comp Sci, Winnipeg, MB R3T 2N2, Canada
来源
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 18TH ANNUAL CONFERENCE, KES-2014 | 2014年 / 35卷
基金
加拿大自然科学与工程研究理事会;
关键词
Data mining; frequent pattern mining; graph streams; knowledge-based and intelligent information & engineering systems; knowledge discovery; limited memory; stream mining;
D O I
10.1016/j.procs.2014.08.114
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we focus on dense graph streams, which can be generated in various applications ranging from sensor networks to social networks, from bio-informatics to chemical informatics. We also investigate the problem of effectively and efficiently mining frequent patterns from such streaming data, in the targeted case of dealing with limited memory environments so that disk support is required. This setting occurs frequently (e.g., in mobile applications/systems) and is gaining momentum even in advanced computational settings where social networks are the main representative. Inspired by this problem, we propose (i) a specialized data structure called DSMatrix, which captures important data from dense graph streams onto the disk directly and (ii) stream mining algorithms that make use of such structure in order to mine frequent patterns effectively and efficiently. Experimental results clearly confirm the benefits of our approach. (C) 2014 The Authors. Published by Elsevier B.V.
引用
收藏
页码:338 / 347
页数:10
相关论文
共 30 条
[1]  
Aggarwal C.C., 2011, SDM, P652
[2]   On Dense Pattern Mining in Graph Streams [J].
Aggarwal, Charu C. ;
Li, Yao ;
Yu, Philip S. ;
Jin, Ruoming .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2010, 3 (01) :975-984
[3]  
Agrawal R., P 20 INT C VERY LARG
[4]  
Bifet Albert., 2011, P 17 ACM SIGKDD INT, P591, DOI DOI 10.1145/2020408.2020501
[5]  
Buehrer G, 2006, ACM KDD 2006, P86
[6]  
Cameron J. J., 2011, Proceedings of the 2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), P824, DOI 10.1109/DASC.2011.141
[7]  
Cameron J.J., 2013, P 28 ANN ACM S APPL, P173
[8]  
Cameron J.J., 2014, P WORKSH EDBT ICDT 2, P240
[9]  
Cao L, 2014, PROC INT CONF DATA, P76, DOI 10.1109/ICDE.2014.6816641
[10]  
Carson K. L., 2014, Encyclopedia of business analytics and optimization, V1, P328