{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T05:10:09Z","timestamp":1746076209694,"version":"3.40.4"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319040479"},{"type":"electronic","value":"9783319040486"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-04048-6_1","type":"book-chapter","created":{"date-parts":[[2013,12,13]],"date-time":"2013-12-13T06:12:53Z","timestamp":1386915173000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Mining Frequent Sequences Using Itemset-Based Extension"],"prefix":"10.1007","author":[{"given":"Ma","family":"Zhixin","sequence":"first","affiliation":[]},{"given":"Xu","family":"Yusheng","sequence":"additional","affiliation":[]},{"given":"Tharam S.","family":"Dillon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Mining Sequential Patterns. In: Proc. of 11th Int\u2019l Conf. on Data Engineering, pp. 3\u201314 (March 1995)","key":"1_CR1","DOI":"10.1109\/ICDE.1995.380415"},{"doi-asserted-by":"crossref","unstructured":"Ayres, J., Gehrke, J., Yiu, T., Flannick, J.: Sequential Pattern Mining Using a Bitmap Representation. In: Proc. of ACM SIGKDD Conf. on Knowledge Discovery and Data Mining, pp. 429\u2013435 (2002)","key":"1_CR2","DOI":"10.1145\/775047.775109"},{"doi-asserted-by":"crossref","unstructured":"Burdick, D., Calimlim, M., Gehrke, J.: MAFIA: A maximal frequent itemset algorithm for transactional databases. In: Proc. of 17th Int\u2019l Conf. on Data Engineering, pp. 443\u2013452 (2001)","key":"1_CR3","DOI":"10.1109\/ICDE.2001.914857"},{"issue":"17","key":"1_CR4","doi-asserted-by":"publisher","first-page":"3067","DOI":"10.1016\/j.ins.2010.03.025","volume":"180","author":"L. Cao","year":"2010","unstructured":"Cao, L.: In-depth Behavior Understanding and Use: the Behavior Informatics Approach. Information Science\u00a0180(17), 3067\u20133085 (2010)","journal-title":"Information Science"},{"doi-asserted-by":"crossref","unstructured":"Cao, L., Yu, P. (eds.): Behavior Computing: Modeling, Analysis, Mining and Decision. Springer (2012)","key":"1_CR5","DOI":"10.1007\/978-1-4471-2969-1"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TKDE.2004.1264816","volume":"16","author":"J. Pei","year":"2004","unstructured":"Pei, J., Han, J., Mortazavi-Asi, B., Wang, J., Pinto, H., Chen, Q.: Mining Sequential Patterns by Pattern-growth: The PrefixSpan Approach. IEEE Transactions on Knowlede and Data Engineering\u00a016, 1\u201317 (2004)","journal-title":"IEEE Transactions on Knowlede and Data Engineering"},{"unstructured":"Rymon, R.: Search through systematic set enumeration. In: Proc. of 3rd Int\u2019l Conf. on Principles of Knowledge Representation and Reasoning, pp. 539\u2013550 (1992)","key":"1_CR7"},{"key":"1_CR8","first-page":"1","volume-title":"Advances in Database Technology \u2014 EDBT '96","author":"Ramakrishnan Srikant","year":"1996","unstructured":"Srikant, R., Agrawal, R.: Mining Sequential Patterns: Generalizations and Performance Improvements. In: Proc. of 15th Int\u2019l Conf. on Extending Database Technology, pp. 3\u201317 (1996)"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1023\/A:1007652502315","volume":"40","author":"M.J. Zaki","year":"2001","unstructured":"Zaki, M.J.: SPADE: An Efficient Algorithms for Mining Frequent Sequences. Machine Learning\u00a040, 31\u201360 (2001)","journal-title":"Machine Learning"},{"doi-asserted-by":"crossref","unstructured":"Tan, H., Dillon, T., Hadzic, F., Chang, E.: SEQUEST: Mining frequent subsequences using DMA Strips. In: Proc. of Data Mining & Information Engineering 2006 (2006)","key":"1_CR10","DOI":"10.2495\/DATA060321"}],"container-title":["Lecture Notes in Computer Science","Behavior and Social Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-04048-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:46:01Z","timestamp":1746074761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-04048-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319040479","9783319040486"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-04048-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}