{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:23:17Z","timestamp":1763641397627},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642152795"},{"type":"electronic","value":"9783642152801"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15280-1_5","type":"book-chapter","created":{"date-parts":[[2010,8,23]],"date-time":"2010-08-23T09:55:30Z","timestamp":1282557330000},"page":"16-27","source":"Crossref","is-referenced-by-count":7,"title":["Finding Minimal Rare Itemsets and Rare Association Rules"],"prefix":"10.1007","author":[{"given":"Laszlo","family":"Szathmary","sequence":"first","affiliation":[]},{"given":"Petko","family":"Valtchev","sequence":"additional","affiliation":[]},{"given":"Amedeo","family":"Napoli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/3-540-48912-6_27","volume-title":"Methodologies for Knowledge Discovery and Data Mining","author":"H. Liu","year":"1999","unstructured":"Liu, H., Lu, H., Feng, L., Hussain, F.: Efficient Search of Reliable Exceptions. In: Zhong, N., Zhou, L. (eds.) PAKDD 1999. LNCS (LNAI), vol.\u00a01574, pp. 194\u2013203. Springer, Heidelberg (1999)"},{"issue":"11","key":"5_CR2","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1515\/CCLM.2002.190","volume":"40","author":"M. Mansour-Chemaly","year":"2002","unstructured":"Mansour-Chemaly, M., Haddy, N., Siest, G., Visvikis, S.: Family studies: their role in the evaluation of genetic cardiovascular risk factors. Clin. Chem. Lab. Med.\u00a040(11), 1085\u20131096 (2002)","journal-title":"Clin. Chem. Lab. Med."},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1007730.1007734","volume":"6","author":"G. Weiss","year":"2004","unstructured":"Weiss, G.: Mining with rarity: a unifying framework. SIGKDD Explor. Newsl.\u00a06(1), 7\u201319 (2004)","journal-title":"SIGKDD Explor. Newsl."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Liu, B., Hsu, W., Ma, Y.: Mining Association Rules with Multiple Minimum Supports. In: Proc. of the 5th ACM SIGKDD Intl. Conf. on Knowledge discovery and data mining (KDD 1999), pp. 337\u2013341. ACM Press, New York (1999)","DOI":"10.1145\/312129.312274"},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/S0164-1212(02)00128-0","volume":"67","author":"H. Yun","year":"2003","unstructured":"Yun, H., Ha, D., Hwang, B., Ryu, K.: Mining association rules on significant rare data using relative support. Journal of Systems and Software\u00a067(3), 181\u2013191 (2003)","journal-title":"Journal of Systems and Software"},{"key":"5_CR6","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/11430919_13","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Y. Koh","year":"2005","unstructured":"Koh, Y., Rountree, N.: Finding Sporadic Rules Using Apriori-Inverse. In: Ho, T.-B., Cheung, D., Liu, H. (eds.) PAKDD 2005. LNCS (LNAI), vol.\u00a03518, pp. 97\u2013106. Springer, Heidelberg (2005)"},{"key":"5_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/11731139_55","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Y. Koh","year":"2006","unstructured":"Koh, Y., Rountree, N., O\u2019Keefe, R.: Mining Interesting Imperfectly Sporadic Rules. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS (LNAI), vol.\u00a03918, pp. 473\u2013482. Springer, Heidelberg (2006)"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Szathmary, L., Napoli, A., Valtchev, P.: Towards Rare Itemset Mining. In: Proc. of the 19th IEEE Intl. Conf. on Tools with Artificial Intelligence (ICTAI 2007), Patras, Greece, vol.\u00a01, pp. 305\u2013312 (2007)","DOI":"10.1109\/ICTAI.2007.30"},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1145\/956750.956780","volume-title":"KDD 2003: Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"K. Wang","year":"2003","unstructured":"Wang, K., Jiang, Y., Lakshmanan, L.V.S.: Mining unexpected rules by pushing user dynamics. In: KDD 2003: Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 246\u2013255. ACM, New York (2003)"},{"issue":"3","key":"5_CR10","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1023\/A:1009796218281","volume":"1","author":"H. Mannila","year":"1997","unstructured":"Mannila, H., Toivonen, H.: Levelwise Search and Borders of Theories in Knowledge Discovery. Data Mining and Knowledge Discovery\u00a01(3), 241\u2013258 (1997)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"5_CR11","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-45728-3_8","volume-title":"Pattern Detection and Discovery","author":"M. Kryszkiewicz","year":"2002","unstructured":"Kryszkiewicz, M.: Concise Representations of Association Rules. In: Hand, D.J., Adams, N.M., Bolton, R.J. (eds.) Pattern Detection and Discovery. LNCS (LNAI), vol.\u00a02447, pp. 92\u2013109. Springer, Heidelberg (2002)"},{"issue":"2","key":"5_CR12","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/380995.381017","volume":"2","author":"Y. Bastide","year":"2000","unstructured":"Bastide, Y., Taouil, R., Pasquier, N., Stumme, G., Lakhal, L.: Mining Frequent Patterns with Counting Inference. SIGKDD Explor. Newsl.\u00a02(2), 66\u201375 (2000)","journal-title":"SIGKDD Explor. Newsl."},{"issue":"1","key":"5_CR13","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1021571501451","volume":"7","author":"J.F. Boulicaut","year":"2003","unstructured":"Boulicaut, J.F., Bykowski, A., Rigotti, C.: Free-Sets: A Condensed Representation of Boolean Data for the Approximation of Frequency Queries. Data Mining and Knowledge Discovery\u00a07(1), 5\u201322 (2003)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"5_CR14","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/11615576_4","volume-title":"Constraint-Based Mining and Inductive Databases","author":"T. Calders","year":"2006","unstructured":"Calders, T., Rigotti, C., Boulicaut, J.F.: A Survey on Condensed Representations for Frequent Sets. In: Boulicaut, J.F., De Raedt, L., Mannila, H. (eds.) Constraint-Based Mining and Inductive Databases. LNCS (LNAI), vol.\u00a03848, pp. 64\u201380. Springer, Heidelberg (2006)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/3-540-45841-7_10","volume-title":"STACS 2002","author":"E. Boros","year":"2002","unstructured":"Boros, E., Gurvich, V., Khachiyan, L., Makino, K.: On the Complexity of Generating Maximal Frequent and Minimal Infrequent Sets. In: Alt, H., Ferreira, A. (eds.) STACS 2002. LNCS, vol.\u00a02285, pp. 133\u2013141. Springer, Heidelberg (2002)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/3-540-64383-4_17","volume-title":"Research and Development in Knowledge Discovery and Data Mining","author":"M. Kryszkiewicz","year":"1998","unstructured":"Kryszkiewicz, M.: Representative Association Rules. In: Wu, X., Kotagiri, R., Korb, K.B. (eds.) PAKDD 1998. LNCS, vol.\u00a01394, pp. 198\u2013209. Springer, Heidelberg (1998)"},{"key":"5_CR17","unstructured":"Szathmary, L.: Symbolic Data Mining Methods with the Coron Platform. PhD Thesis in Computer Science, Univ. Henri Poincar\u00e9 \u2013 Nancy 1, France (November 2006)"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15280-1_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:04:24Z","timestamp":1606187064000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15280-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642152795","9783642152801"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15280-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}