{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:05:47Z","timestamp":1775253947725,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030029210","type":"print"},{"value":"9783030029227","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02922-7_32","type":"book-chapter","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T05:42:24Z","timestamp":1539927744000},"page":"468-482","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cpriori: An Index-Based Framework to Extract the Generalized Center Strings"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6738-4107","authenticated-orcid":false,"given":"Shuhan","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7064-8836","authenticated-orcid":false,"given":"Shengluan","family":"Hou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9164-0019","authenticated-orcid":false,"given":"Chaoqun","family":"Fei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,20]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Mining sequential patterns. In: 1995 Proceedings of the Eleventh International Conference on Data Engineering, pp. 3\u201314. IEEE (1995)","DOI":"10.1109\/ICDE.1995.380415"},{"key":"32_CR2","unstructured":"Agrawal, R., Srikant, R., et al.: Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference on Very Large Data Bases, VLDB, vol. 1215, pp. 487\u2013499 (1994)"},{"issue":"10","key":"32_CR3","doi-asserted-by":"publisher","first-page":"2645","DOI":"10.1109\/TKDE.2015.2420557","volume":"27","author":"OK Alkan","year":"2015","unstructured":"Alkan, O.K., Karagoz, P.: CRoM and HuspExt: improving efficiency of high utility sequential pattern extraction. IEEE Trans. Knowl. Data Eng. 27(10), 2645\u20132657 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"32_CR4","unstructured":"Cao, H., Mamoulis, N., Cheung, D.W.: Mining frequent spatio-temporal sequential patterns. In: Fifth IEEE International Conference on Data Mining, pp. 82\u201389. IEEE (2005)"},{"issue":"1","key":"32_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.knosys.2010.03.003","volume":"24","author":"JH Chang","year":"2011","unstructured":"Chang, J.H.: Mining weighted sequential patterns in a sequence database with a time-interval weight. Know. Based Syst. 24(1), 1\u20139 (2011)","journal-title":"Know. Based Syst."},{"issue":"1\u20133","key":"32_CR6","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/S0304-3975(03)00320-7","volume":"306","author":"PA Evans","year":"2003","unstructured":"Evans, P.A., Smith, A.D., Wareham, H.T.: On the complexity of finding common approximate substrings. Theoret. Comput. Sci. 306(1\u20133), 407\u2013430 (2003)","journal-title":"Theoret. Comput. Sci."},{"issue":"6","key":"32_CR7","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TFUZZ.2007.894976","volume":"15","author":"C Fiot","year":"2007","unstructured":"Fiot, C., Laurent, A., Teisseire, M.: From crispness to fuzziness: three algorithms for soft sequential pattern mining. IEEE Trans. Fuzzy Syst. 15(6), 1263\u20131277 (2007)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"32_CR8","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-642-35527-1_36","volume-title":"Advanced Data Mining and Applications","author":"P Fournier-Viger","year":"2012","unstructured":"Fournier-Viger, P., Gueniche, T., Tseng, V.S.: Using partially-ordered sequential rules to generate more accurate sequence prediction. In: Zhou, S., Zhang, S., Karypis, G. (eds.) ADMA 2012. LNCS (LNAI), vol. 7713, pp. 431\u2013442. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35527-1_36"},{"key":"32_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/11671299_53","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"RA Garc\u00eda-Hern\u00e1ndez","year":"2006","unstructured":"Garc\u00eda-Hern\u00e1ndez, R.A., Mart\u00ednez-Trinidad, J.F., Carrasco-Ochoa, J.A.: A new algorithm for fast discovery of maximal sequential patterns in a document collection. In: Gelbukh, A. (ed.) CICLing 2006. LNCS, vol. 3878, pp. 514\u2013523. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11671299_53"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-319-18032-8_19","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"J Ge","year":"2015","unstructured":"Ge, J., Xia, Y., Wang, J.: Mining uncertain sequential patterns in iterative mapreduce. In: Cao, T., Lim, E.-P., Zhou, Z.-H., Ho, T.-B., Cheung, D., Motoda, H. (eds.) PAKDD 2015. LNCS (LNAI), vol. 9078, pp. 243\u2013254. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18032-8_19"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. In: ACM SIGMOD Record, vol. 29, pp. 1\u201312. ACM (2000)","DOI":"10.1145\/335191.335372"},{"issue":"1","key":"32_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1023\/B:DAMI.0000005258.31418.83","volume":"8","author":"J Han","year":"2004","unstructured":"Han, J., Pei, J., Yin, Y., Mao, R.: Mining frequent patterns without candidate generation: a frequent-pattern tree approach. Data Min. Knowl. Disc. 8(1), 53\u201387 (2004)","journal-title":"Data Min. Knowl. Disc."},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Hong, T.P., Lin, K.Y., Wang, S.L.: Mining fuzzy sequential patterns from multiple-item transactions. In: 2001 Joint 9th IFSA World Congress and 20th NAFIPS International Conference, vol. 3, pp. 1317\u20131321. IEEE (2001)","DOI":"10.1109\/NAFIPS.2001.943738"},{"key":"32_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-15294-8_27","volume-title":"Algorithms in Bioinformatics","author":"F Hufsky","year":"2010","unstructured":"Hufsky, F., Kuchenbecker, L., Jahn, K., Stoye, J., B\u00f6cker, S.: Swiftly computing center strings. In: Moulton, V., Singh, M. (eds.) WABI 2010. LNCS, vol. 6293, pp. 325\u2013336. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15294-8_27"},{"key":"32_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1007\/3-540-45061-0_73","volume-title":"Automata, Languages and Programming","author":"J K\u00e4rkk\u00e4inen","year":"2003","unstructured":"K\u00e4rkk\u00e4inen, J., Sanders, P.: Simple linear work suffix array construction. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol. 2719, pp. 943\u2013955. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-45061-0_73"},{"issue":"11","key":"32_CR16","doi-asserted-by":"publisher","first-page":"5071","DOI":"10.1016\/j.eswa.2014.02.022","volume":"41","author":"GC Lan","year":"2014","unstructured":"Lan, G.C., Hong, T.P., Tseng, V.S., Wang, S.L.: Applying the maximum utility measure in high utility sequential pattern mining. Exp. Syst. Appl. 41(11), 5071\u20135081 (2014)","journal-title":"Exp. Syst. Appl."},{"issue":"1","key":"32_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/S0890-5401(03)00057-9","volume":"185","author":"JK Lanctot","year":"2003","unstructured":"Lanctot, J.K., Li, M., Ma, B., Wang, S., Zhang, L.: Distinguishing string selection problems. Inf. Comput. 185(1), 41\u201355 (2003)","journal-title":"Inf. Comput."},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Liu, A.X., Shen, K., Torng, E.: Large scale hamming distance query processing. In: 2011 IEEE 27th International Conference on Data Engineering (ICDE), pp. 553\u2013564. IEEE (2011)","DOI":"10.1109\/ICDE.2011.5767831"},{"issue":"4","key":"32_CR19","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/TKDE.2007.1001","volume":"19","author":"R Lu","year":"2007","unstructured":"Lu, R., Jia, C., Zhang, S., Chen, L., Zhang, H.: An exact data mining method for finding center strings and all their instances. IEEE Trans. Knowl. Data Eng. 19(4), 509\u2013522 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Miliaraki, I., Berberich, K., Gemulla, R., Zoupanos, S.: Mind the gap: large-scale frequent sequence mining. In: Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, pp. 797\u2013808. ACM (2013)","DOI":"10.1145\/2463676.2465285"},{"key":"32_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-24577-0_12","volume-title":"Advances in Databases","author":"M Muzammal","year":"2011","unstructured":"Muzammal, M.: Mining sequential patterns from probabilistic databases by pattern-growth. In: Fernandes, A.A.A., Gray, A.J.G., Belhajjame, K. (eds.) BNCOD 2011. LNCS, vol. 7051, pp. 118\u2013127. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24577-0_12"},{"key":"32_CR22","doi-asserted-by":"crossref","unstructured":"Sahli, M., Mansour, E., Kalnis, P.: Parallel motif extraction from very long sequences. In: Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, pp. 549\u2013558. ACM (2013)","DOI":"10.1145\/2505515.2505575"},{"key":"32_CR23","doi-asserted-by":"crossref","unstructured":"Shang, J., Peng, J., Han, J.: Macfp: Maximal approximate consecutive frequent pattern mining under edit distance. In: Proceedings of the 2016 SIAM International Conference on Data Mining, pp. 558\u2013566. SIAM (2016)","DOI":"10.1137\/1.9781611974348.63"},{"key":"32_CR24","unstructured":"Smith, A.D.: Common approximate substrings. Ph.D. thesis. Citeseer (2004)"},{"key":"32_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0014140","volume-title":"Advances in Database Technology \u2014 EDBT \u201996","author":"R Srikant","year":"1996","unstructured":"Srikant, R., Agrawal, R.: Mining sequential patterns: generalizations and performance improvements. In: Apers, P., Bouzeghoub, M., Gardarin, G. (eds.) EDBT 1996. LNCS, vol. 1057, pp. 1\u201317. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/BFb0014140"},{"issue":"8","key":"32_CR26","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TKDE.2007.1043","volume":"19","author":"J Wang","year":"2007","unstructured":"Wang, J., Han, J., Li, C.: Frequent closed sequence mining without candidate maintenance. IEEE Trans. Knowl. Data Eng. 19(8), 1042\u20131056 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"32_CR27","doi-asserted-by":"crossref","unstructured":"Yang, X., Wang, Y., Wang, B., Wang, W.: Local filtering: improving the performance of approximate queries on string collections. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp. 377\u2013392. ACM (2015)","DOI":"10.1145\/2723372.2749445"},{"key":"32_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-540-70542-0_11","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"T-F Yen","year":"2008","unstructured":"Yen, T.-F., Reiter, M.K.: Traffic aggregation for malware detection. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 207\u2013227. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70542-0_11"},{"key":"32_CR29","doi-asserted-by":"crossref","unstructured":"Yin, J., Zheng, Z., Cao, L.: USpan: an efficient algorithm for mining high utility sequential patterns. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 660\u2013668. ACM (2012)","DOI":"10.1145\/2339530.2339636"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02922-7_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:48:05Z","timestamp":1775249285000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02922-7_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030029210","9783030029227"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02922-7_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wise2018.connect.rs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}