{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:02:44Z","timestamp":1778601764126,"version":"3.51.4"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s10115-018-1161-6","type":"journal-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T09:49:15Z","timestamp":1517478555000},"page":"311-330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Mining sequential patterns with itemset constraints"],"prefix":"10.1007","volume":"57","author":[{"given":"Trang","family":"Van","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bay","family":"Vo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bac","family":"Le","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,2,1]]},"reference":[{"key":"1161_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal R, Srikant R (1995) Mining sequential patterns. In: The 11th international conference on data engineering, pp 3\u201314","DOI":"10.1109\/ICDE.1995.380415"},{"key":"1161_CR2","doi-asserted-by":"crossref","unstructured":"Ayres J, Gehrke JE, Yiu T, Flannick J (2002) Sequential pattern mining using a bitmap representation. In: The 8th ACM SIGKDD international conference on knowledge discovery and data mining, pp 429\u2013435","DOI":"10.1145\/775047.775109"},{"issue":"1","key":"1161_CR3","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1016\/j.ins.2007.10.014","volume":"176","author":"E Chen","year":"2008","unstructured":"Chen E, Cao H, Li Q, Qian T (2008) Efficient strategies for tough aggregate constraint-based sequential pattern mining. Inf Sci 176(1):1498\u20131518","journal-title":"Inf Sci"},{"issue":"2","key":"1161_CR4","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1016\/j.dss.2005.10.006","volume":"42","author":"YL Chen","year":"2006","unstructured":"Chen YL, Hu YH (2006) Constraint-based sequential pattern mining: the consideration of recency and compactness. Decis Support Syst 42(2):1203\u20131215","journal-title":"Decis Support Syst"},{"key":"1161_CR5","doi-asserted-by":"crossref","unstructured":"Chen J, Gu J, Yang, Qiao Z (2010) Efficient strategies for average constraint-based sequential pattern mining. In: The 2010 international conference on multimedia communications, pp 254\u2013257","DOI":"10.1109\/MEDIACOM.2010.31"},{"issue":"3","key":"1161_CR6","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/j.datak.2006.08.009","volume":"62","author":"Sandra Amo de","year":"2007","unstructured":"de Amo Sandra, Furtado DA (2007) First-order temporal pattern mining with regular expression constraints. Data Knowl Eng 62(3):401\u2013420","journal-title":"Data Knowl Eng"},{"issue":"2","key":"1161_CR7","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s10115-015-0884-x","volume":"48","author":"F Pasqua Fumarola","year":"2016","unstructured":"Fumarola F Pasqua, Fabiana Lanotte PF, Ceci M, Malerba D (2016) CloFAST: closed sequential pattern mining using sparse and vertical id-lists. Knowl Inf Syst 48(2):429\u2013463","journal-title":"Knowl Inf Syst"},{"key":"1161_CR8","unstructured":"Garofalakis MN, Rastogi R, Shim K (1999) SPIRIT: Sequential pattern mining with regular expression constraints. In: The 25th international conference on very large data bases, pp 7\u201310"},{"issue":"1","key":"1161_CR9","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jcss.2009.05.008","volume":"76","author":"K Gouda","year":"2010","unstructured":"Gouda K, Hassaan M, Zaki MJ (2010) Prism: a primal-encoding approach for frequent sequence mining. J Comput Syst Sci 76(1):88\u2013102","journal-title":"J Comput Syst Sci"},{"key":"1161_CR10","doi-asserted-by":"crossref","unstructured":"Han J, Pei J, Mortazavi-Asl B, Chen Q, Dayal U, Hsu M-C Freespan (2000) Frequent pattern projected sequential pattern mining. In: The 6th ACM SIGKDD international conference on knowledge discovery and data mining, pp 355\u2013359","DOI":"10.1145\/347090.347167"},{"key":"1161_CR11","unstructured":"Ho J, Lukov L, Chawla S (2005) Sequential pattern mining with constraints on large protein databases. In: The 12th international conference on management of data (COMAD 2005), pp 89\u2013100"},{"key":"1161_CR12","unstructured":"https:\/\/www.mediafire.com\/folder\/nebwi57vp4gjw\/Synthetic_DB"},{"issue":"2","key":"1161_CR13","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/380995.381033","volume":"2","author":"R Kohavi","year":"2000","unstructured":"Kohavi R, Brodley C, Frasca B, Mason L, Zheng Z (2000) KDD-Cup 2000 organizers\u2019 report: peeling the onion. SIGKDD Explor 2(2):86\u201398","journal-title":"SIGKDD Explor"},{"issue":"1","key":"1161_CR14","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/s10489-014-0630-1","volume":"43","author":"B Le","year":"2015","unstructured":"Le B, Tran MT, Vo B (2015) Mining frequent closed inter-sequence patterns efficiently using dynamic bit vectors. Appl Intell 43(1):74\u201384","journal-title":"Appl Intell"},{"issue":"3","key":"1161_CR15","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1007\/s10115-012-0602-x","volume":"38","author":"VCC Liao","year":"2014","unstructured":"Liao VCC, Chen MS (2014) DFSP: a depth-first spelling algorithm for sequential pattern mining of biological sequences. Knowl Inf Syst 38(3):623\u2013639","journal-title":"Knowl Inf Syst"},{"issue":"4","key":"1161_CR16","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s10115-004-0182-5","volume":"7","author":"MY Lin","year":"2005","unstructured":"Lin MY, Lee SY (2005) Efficient mining of sequential patterns with time constraints by delimited pattern growth. Knowl Inf Syst 7(4):499\u2013514","journal-title":"Knowl Inf Syst"},{"key":"1161_CR17","doi-asserted-by":"crossref","unstructured":"Lo D, Khoo SC, Li, J: Mining and ranking generators of sequential patterns. In: The 9th SIAM international conference on data mining, pp 553\u2013564 (2008)","DOI":"10.1137\/1.9781611972788.51"},{"issue":"1","key":"1161_CR18","first-page":"33","volume":"11","author":"B Mallick","year":"2014","unstructured":"Mallick B, Garg D, Grover PS (2014) Constraint-based sequential pattern mining: a pattern growth algorithm incorporating compactness, length and monetary. Int Arab J Inf Technol 11(1):33\u201342","journal-title":"Int Arab J Inf Technol"},{"issue":"2","key":"1161_CR19","doi-asserted-by":"publisher","first-page":"2677","DOI":"10.1016\/j.eswa.2008.01.021","volume":"36","author":"F Masseglia","year":"2009","unstructured":"Masseglia F, Poncelet P, Teisseire M (2009) Efficient mining of sequential patterns with time constraints: reducing the combinations. Expert Syst Appl 36(2):2677\u20132690","journal-title":"Expert Syst Appl"},{"key":"1161_CR20","doi-asserted-by":"crossref","unstructured":"Orlando S, Perego R, Silvestri C (2004) A new algorithm for gap constrained sequence mining. In: The 2004 ACM symposium on applied computing, pp 540\u2013547","DOI":"10.1145\/967900.968014"},{"key":"1161_CR21","doi-asserted-by":"crossref","unstructured":"Orlando S, Perego R, Silvestri C (2004) A new algorithm for gap constrained sequence mining. In: The ACM symposium on applied computing (SAC), pp 540\u2013547","DOI":"10.1145\/967900.968014"},{"issue":"11","key":"1161_CR22","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.1109\/TKDE.2004.77","volume":"16","author":"J Pei","year":"2004","unstructured":"Pei J et al (2004) Mining sequential patterns by pattern-growth: the PrefixSpan approach. IEEE Trans Knowl Eng 16(11):1424\u20131440","journal-title":"IEEE Trans Knowl Eng"},{"issue":"2","key":"1161_CR23","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s10844-006-0006-z","volume":"28","author":"J Pei","year":"2007","unstructured":"Pei J, Han J, Wang W (2007) Constraint-based sequential pattern mining: the pattern-growth methods. J Intell Inf Syst 28(2):133\u2013160","journal-title":"J Intell Inf Syst"},{"key":"1161_CR24","unstructured":"Pokou JM, Fournier-Viger P, Moghrabi C (2016) Authorship attribution using small sets of frequent part-of-speech skip-grams. In: The international Florida artificial intelligence research society conference, pp 86\u201391"},{"issue":"3","key":"1161_CR25","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s10115-011-0386-4","volume":"30","author":"P Senkul","year":"2012","unstructured":"Senkul P, Salin S (2012) Improving pattern quality in web usage mining by using semantic information. Knowl Inf Syst 30(3):527\u2013541","journal-title":"Knowl Inf Syst"},{"key":"1161_CR26","doi-asserted-by":"crossref","unstructured":"Srikant R, Agrawal R (1996) Mining sequential patterns: generalizations and performance improvements. In: The 5th international conference on extending database technology, pp 3\u201317","DOI":"10.1007\/BFb0014140"},{"key":"1161_CR27","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.engappai.2014.10.021","volume":"38","author":"MT Tran","year":"2015","unstructured":"Tran MT, Le B, Vo B (2015) Combination of dynamic bit vectors and transaction information for mining frequent closed sequences efficiently. Eng Appl Artif Intell 38:183\u2013189","journal-title":"Eng Appl Artif Intell"},{"issue":"2","key":"1161_CR28","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s10489-016-0765-3","volume":"45","author":"MT Tran","year":"2016","unstructured":"Tran MT, Le B, Vo B, Hong TP (2016) Mining non-redundant sequential rules with dynamic bit vectors and pruning techniques. Appl Intell 45(2):333\u2013342","journal-title":"Appl Intell"},{"key":"1161_CR29","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.knosys.2014.09.012","volume":"73","author":"CY Tsai","year":"2015","unstructured":"Tsai CY, Lai BH (2015) A location-item-time sequential pattern mining algorithm for route recommendation. Knowl Based Syst 73:97\u2013110","journal-title":"Knowl Based Syst"},{"issue":"2","key":"1161_CR30","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s40595-013-0012-3","volume":"1","author":"TT Van","year":"2014","unstructured":"Van TT, Vo B, Le B (2014) IMSR_PreTree: an improved algorithm for mining sequential rules based on the prefix-tree. Vietnam J Comput Sci 1(2):97\u2013105","journal-title":"Vietnam J Comput Sci"},{"issue":"8","key":"1161_CR31","doi-asserted-by":"publisher","first-page":"7196","DOI":"10.1016\/j.eswa.2012.01.062","volume":"39","author":"B Vo","year":"2012","unstructured":"Vo B, Hong TP, Le B (2012) DBV-miner: a dynamic bit-vector approach for fast mining frequent closed itemsets. Expert Syst Appl 39(8):7196\u20137206","journal-title":"Expert Syst Appl"},{"key":"1161_CR32","doi-asserted-by":"crossref","unstructured":"Vo B, Tran MT, Nguyen H, Hong TP, Le B (2012) A dynamic bit-vector approach for efficiently mining inter-sequence patterns. In: 2012 third international conference on innovations in bio-inspired computing and applications (IBICA), pp 51\u201356","DOI":"10.1109\/IBICA.2012.31"},{"key":"1161_CR33","doi-asserted-by":"crossref","unstructured":"Yen SJ, Lee YS (2004) Mining sequential patterns with item constraints. In: Data warehousing and knowledge discovery, pp 381\u2013390","DOI":"10.1007\/978-3-540-30076-2_38"},{"issue":"4","key":"1161_CR34","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1142\/S0219622010003968","volume":"9","author":"U Yun","year":"2010","unstructured":"Yun U, Ryu KH (2010) Discovering important sequential patterns with length-decreasing weighted support constraints. Int J Inf Technol Decis Mak 9(4):575\u2013599","journal-title":"Int J Inf Technol Decis Mak"},{"key":"1161_CR35","doi-asserted-by":"crossref","unstructured":"Zaki MJ (2000) Sequence mining in categorical domains: incorporating constraints. In: The 9th international conference on information and knowledge management. ACM, pp 422\u2013429","DOI":"10.1145\/354756.354849"},{"issue":"1\/2","key":"1161_CR36","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1023\/A:1007652502315","volume":"42","author":"MJ Zaki","year":"2000","unstructured":"Zaki MJ (2000) SPADE: an efficient algorithm for mining frequent sequences. Mach Learn J 42(1\/2):31\u201360","journal-title":"Mach Learn J"},{"key":"1161_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.knosys.2015.06.014","volume":"89","author":"J Zhang","year":"2015","unstructured":"Zhang J, Wang Y, Yang D (2015) CCSpan: mining closed contiguous sequential patterns. Knowl Based Syst 89:1\u201313","journal-title":"Knowl Based Syst"},{"issue":"5","key":"1161_CR38","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1109\/TCBB.2015.2495132","volume":"13","author":"J Zhang","year":"2016","unstructured":"Zhang J, Wang Y, Zhang C, Shi Y (2016) Mining contiguous sequential generators in biological sequences. IEEE\/ACM Trans Comput Biol Bioinform 13(5):855\u2013867","journal-title":"IEEE\/ACM Trans Comput Biol Bioinform"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-018-1161-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-018-1161-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-018-1161-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T11:26:14Z","timestamp":1751282774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-018-1161-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,1]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["1161"],"URL":"https:\/\/doi.org\/10.1007\/s10115-018-1161-6","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,1]]},"assertion":[{"value":"24 August 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}