{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T08:25:58Z","timestamp":1745828758445,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030557881"},{"type":"electronic","value":"9783030557898"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-55789-8_75","type":"book-chapter","created":{"date-parts":[[2020,9,3]],"date-time":"2020-09-03T23:07:57Z","timestamp":1599174477000},"page":"884-895","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Maintenance of Prelarge High Average-Utility Patterns in Incremental Databases"],"prefix":"10.1007","author":[{"given":"Jimmy Ming-Tai","family":"Wu","sequence":"first","affiliation":[]},{"given":"Qian","family":"Teng","sequence":"additional","affiliation":[]},{"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Fournier-Viger","sequence":"additional","affiliation":[]},{"given":"Chien-Fu","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,4]]},"reference":[{"key":"75_CR1","unstructured":"Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: The 20th International Conference on Very Large Data Bases, pp. 487\u2013499 (1994)"},{"issue":"12","key":"75_CR2","doi-asserted-by":"publisher","first-page":"1708","DOI":"10.1109\/TKDE.2009.46","volume":"21","author":"CF Ahmed","year":"2009","unstructured":"Ahmed, C.F., Tanbeer, S.K., Jeong, B.S., Lee, Y.K.: Efficient tree structures for high utility pattern mining in incremental databases. IEEE Trans. Knowl. Data Eng. 21(12), 1708\u20131721 (2009)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"75_CR3","unstructured":"Cheung, D.W., Han, J., Ng, V.T., Wang, C.Y.: Maintenance of discovered association rules in large databases: an incremental updating technique. In: The International Conference on Data Engineering, pp. 106\u2013114 (2002)"},{"issue":"2","key":"75_CR4","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/69.683753","volume":"10","author":"MS Chen","year":"1998","unstructured":"Chen, M.S., Park, J.S., Yu, P.: Efficient data mining for path traversal patterns. IEEE Trans. Knowl. Data Eng. 10(2), 209\u2013221 (1998)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"75_CR5","doi-asserted-by":"publisher","first-page":"12047","DOI":"10.1109\/ACCESS.2019.2891105","volume":"7","author":"CM Chen","year":"2019","unstructured":"Chen, C.M., Xiang, B., Liu, Y., Wang, K.H.: A secure authentication protocol for intermet of vehicles. IEEE Access 7, 12047\u201312057 (2019)","journal-title":"IEEE Access"},{"key":"75_CR6","doi-asserted-by":"crossref","unstructured":"Fournier-Viger, P., et al.: The SPMF open-source data mining library version 2. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 36\u201340 (2016)","DOI":"10.1007\/978-3-319-46131-1_8"},{"issue":"3","key":"75_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3314107","volume":"13","author":"W Gan","year":"2019","unstructured":"Gan, W., Lin, J.C.W., Fournier-Viger, P., Chao, H.C., Yu, S.: A survey of parallel sequential pattern mining. ACM Trans. Knowl. Disc. Data 13(3), 1\u201334 (2019). Article 25","journal-title":"ACM Trans. Knowl. Disc. Data"},{"key":"75_CR8","doi-asserted-by":"crossref","unstructured":"Gan, W., Lin, J.C.W., Fournier-Viger, P., Chao, H.C., Tseng, V., Yu, P.: A survey of utility-oriented pattern mining. IEEE Trans. Knowl. Data Eng. (2019)","DOI":"10.1109\/TKDE.2019.2942594"},{"key":"75_CR9","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1023\/B:DAMI.0000005258.31418.83","volume":"8","author":"J Han","year":"2004","unstructured":"Han, J., Pei, J., Yin, Y., Mao, R.: Mining frequent patterns without candidate generation: a frequent-pattern tree approach. Data Min. Knowl. Disc. 8, 53\u201387 (2004)","journal-title":"Data Min. Knowl. Disc."},{"key":"75_CR10","doi-asserted-by":"publisher","first-page":"2424","DOI":"10.1016\/j.eswa.2007.04.009","volume":"34","author":"TP Hong","year":"2008","unstructured":"Hong, T.P., Lin, C.W., Wu, Y.L.: Incrementally fast updated frequent pattern trees. Expert Syst. Appl. 34, 2424\u20132435 (2008)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"75_CR11","doi-asserted-by":"publisher","first-page":"111","DOI":"10.3233\/IDA-2001-5203","volume":"5","author":"TP Hong","year":"2001","unstructured":"Hong, T.P., Wang, C.Y., Tao, Y.H.: A new incremental data mining algorithm using pre-large itemsets. Intell. Data Anal. 5(2), 111\u2013129 (2001)","journal-title":"Intell. Data Anal."},{"key":"75_CR12","doi-asserted-by":"crossref","unstructured":"Hong, T.P., Lee, C.H., Wang, S.L.: An incremental mining algorithm for high average-utility itemsets. In: The International Symposium on Pervasive Systems, Algorithms, and Networks, pp. 421\u2013425 (2009)","DOI":"10.1109\/I-SPAN.2009.24"},{"issue":"7","key":"75_CR13","doi-asserted-by":"publisher","first-page":"8259","DOI":"10.1016\/j.eswa.2011.01.006","volume":"38","author":"TP Hong","year":"2011","unstructured":"Hong, T.P., Lee, C.H., Wang, S.L.: Effective utility mining with the measure of average utility. Expert Syst. Appl. 38(7), 8259\u20138265 (2011)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"75_CR14","first-page":"43","volume":"1","author":"NV Kim","year":"2017","unstructured":"Kim, N.V.: Some determinants affecting purchase intention of domestic products at local markets in Tien Giang province, Vietnam. Data Sci. Pattern Recogn. 1(2), 43\u201352 (2017)","journal-title":"Data Sci. Pattern Recogn."},{"issue":"5","key":"75_CR15","doi-asserted-by":"publisher","first-page":"9498","DOI":"10.1016\/j.eswa.2008.03.014","volume":"36","author":"CW Lin","year":"2009","unstructured":"Lin, C.W., Hong, T.P., Lu, W.H.: The pre-FUFP algorithm for incremental mining. Expert Syst. Appl. 36(5), 9498\u20139505 (2009)","journal-title":"Expert Syst. Appl."},{"issue":"8","key":"75_CR16","doi-asserted-by":"publisher","first-page":"7173","DOI":"10.1016\/j.eswa.2012.01.072","volume":"39","author":"CW Lin","year":"2009","unstructured":"Lin, C.W., Lan, G.C., Hong, T.P.: An incremental mining algorithm for high utility itemsets. Expert Syst. Appl. 39(8), 7173\u20137180 (2009)","journal-title":"Expert Syst. Appl."},{"key":"75_CR17","doi-asserted-by":"crossref","unstructured":"Lin, C.W., Hong, T.P., Lu, W.H.: Efficiently mining high average utility itemsets with a tree structure. In: The Asian Conference on Intelligent Information and Database Systems, pp. 131\u2013139 (2010)","DOI":"10.1007\/978-3-642-12145-6_14"},{"issue":"6","key":"75_CR18","doi-asserted-by":"publisher","first-page":"7419","DOI":"10.1016\/j.eswa.2010.12.082","volume":"38","author":"CW Lin","year":"2011","unstructured":"Lin, C.W., Hong, T.P., Lu, W.H.: An effective tree structure for mining high utility itemsets. Expert Syst. Appl. 38(6), 7419\u20137424 (2011)","journal-title":"Expert Syst. Appl."},{"key":"75_CR19","doi-asserted-by":"crossref","unstructured":"Liu, M., Qu, J.: Mining high utility itemsets without candidate generation. In: ACM International Conference on Information and Knowledge Management, pp. 55\u201364 (2012)","DOI":"10.1145\/2396761.2396773"},{"key":"75_CR20","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1142\/S0219622012500307","volume":"11","author":"GC Lan","year":"2012","unstructured":"Lan, G.C., Hong, T.P., Tseng, V.: Efficient mining high average-utility itemsets with an improved upper-bound strategy. Int. J. Inform. Technol. Decis. Making 11, 1009\u20131030 (2012)","journal-title":"Int. J. Inform. Technol. Decis. Making"},{"key":"75_CR21","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.3233\/IDA-140682","volume":"18","author":"CW Lin","year":"2014","unstructured":"Lin, C.W., Hong, T.P., Lin, W.Y., Lan, G.C.: Efficient updating of sequential patterns with transaction insertion. Intell. Data Anal. 18, 1013\u20131026 (2014)","journal-title":"Intell. Data Anal."},{"key":"75_CR22","doi-asserted-by":"crossref","unstructured":"Lu, T., Vo, B., Nguyen, H.T., Hong, T.P.: A new method for mining high average utility itemsets. In: IFIP International Conference on Computer Information Systems and Industrial Management, pp. 33\u201342 (2015)","DOI":"10.1007\/978-3-662-45237-0_5"},{"issue":"5","key":"75_CR23","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1109\/TKDE.2015.2510012","volume":"28","author":"J Liu","year":"2016","unstructured":"Liu, J., Wang, K., Fung, B.C.M.: Mining high utility patterns in one phase without generating candidates. IEEE Trans. Knowl. Data Eng. 28(5), 1245\u20131257 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"75_CR24","doi-asserted-by":"publisher","first-page":"12927","DOI":"10.1109\/ACCESS.2017.2717438","volume":"5","author":"JCW Lin","year":"2017","unstructured":"Lin, J.C.W., Ren, S., Fournier-Viger, P., Hong, T.P.: EHAUPM: efficient high average-utility pattern mining with tighter upper-bounds. IEEE Access 5, 12927\u201312940 (2017)","journal-title":"IEEE Access"},{"issue":"1","key":"75_CR25","first-page":"13","volume":"1","author":"JH Su","year":"2017","unstructured":"Su, J.H., Chang, W.Y., Tseng, V.S.: Integrated mining of social and collaborative information for music recommendation. Data Sci. Pattern Recogn. 1(1), 13\u201330 (2017)","journal-title":"Data Sci. Pattern Recogn."},{"key":"75_CR26","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1109\/TKDE.2012.59","volume":"25","author":"V Tseng","year":"2013","unstructured":"Tseng, V., Shie, B.E., Wu, C.W., Yu, P.: Efficient algorithms for mining high utility itemsets from transactional databases. IEEE Trans. Knowl. Data Eng. 25, 1772\u20131786 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"75_CR27","first-page":"25","volume":"2","author":"Z Wang","year":"2018","unstructured":"Wang, Z., Chen, K., He, L.: AsySIM: modeling asymmetric social influence for rating prediction. Data Sci. Pattern Recogn. 2(1), 25\u201340 (2018)","journal-title":"Data Sci. Pattern Recogn."},{"issue":"6","key":"75_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3363571","volume":"13","author":"JMT Wu","year":"2019","unstructured":"Wu, J.M.T., Lin, J.C.W., Tamrakar, A.: High-utility itemset mining with effective pruning strategies. ACM Trans. Knowl. Disc. Data 13(6), 1\u201322 (2019)","journal-title":"ACM Trans. Knowl. Disc. Data"},{"key":"75_CR29","doi-asserted-by":"crossref","unstructured":"Yao, H., Hamilton, H.J., Butz, C.J.: A foundational approach to mining itemset utilities from databases. In: The SIAM International Conference on Data Mining, pp. 215\u2013221 (2004)","DOI":"10.1137\/1.9781611972740.51"},{"issue":"2","key":"75_CR30","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s10115-016-0986-0","volume":"51","author":"S Zida","year":"2016","unstructured":"Zida, S., Fournier-Viger, P., Lin, J.C.-W., Wu, C.-W., Tseng, V.S.: EFIM: a fast and memory efficient algorithm for high-utility itemset mining. Knowl. Inf. Syst. 51(2), 595\u2013625 (2016). https:\/\/doi.org\/10.1007\/s10115-016-0986-0","journal-title":"Knowl. Inf. Syst."},{"key":"75_CR31","doi-asserted-by":"crossref","unstructured":"Liu, Y., Liao, W.K., Choudhary, A.: A two-phase algorithm for fast discovery of high utility itemsets. In: The Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, pp. 689\u2013695 (2005)","DOI":"10.1007\/11430919_79"}],"container-title":["Lecture Notes in Computer Science","Trends in Artificial Intelligence Theory and Applications. Artificial Intelligence Practices"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-55789-8_75","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T10:42:29Z","timestamp":1608028949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-55789-8_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030557881","9783030557898"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-55789-8_75","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IEA\/AIE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ieaaie2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/jsasaki3.wixsite.com\/ieaaie2020\/organizations","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"119","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4,35","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}