{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T05:51:30Z","timestamp":1778824290193,"version":"3.51.4"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2018,5,2]],"date-time":"2018-05-02T00:00:00Z","timestamp":1525219200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s10489-018-1182-6","type":"journal-article","created":{"date-parts":[[2018,5,2]],"date-time":"2018-05-02T03:15:32Z","timestamp":1525230932000},"page":"3902-3914","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Mining web access patterns with super-pattern constraint"],"prefix":"10.1007","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9254-5937","authenticated-orcid":false,"given":"Trang","family":"Van","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Atsuo","family":"Yoshitaka","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bac","family":"Le","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,5,2]]},"reference":[{"key":"1182_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal R, Srikant R (1995) Mining sequential patterns. Proceedings of the 11th International Conference on Data Engineering, pp 3\u201314","DOI":"10.1109\/ICDE.1995.380415"},{"key":"1182_CR2","doi-asserted-by":"crossref","unstructured":"Ayres J, Gehrke JE, Yiu T, Flannick J (2002) Sequential pattern mining using a bitmap representation. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Dada Mining, pp 429\u2013435","DOI":"10.1145\/775047.775109"},{"key":"1182_CR3","doi-asserted-by":"crossref","unstructured":"B\u00e9chet N, Cellier P, Charnois T, Cr\u00e9milleux B (2015) Sequence mining under multiple constraints. Proceedings of the 30th Annual ACM Symposium on Applied Computing, pp 908\u2013914","DOI":"10.1145\/2695664.2695889"},{"issue":"1","key":"1182_CR4","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1016\/j.ins.2007.10.014","volume":"176","author":"E Chen","year":"2008","unstructured":"Chen E, Cao H, Li Q, Qian T (2008) Efficient strategies for tough aggregate constraint-based sequential pattern mining. Inf Sci 176(1):1498\u20131518","journal-title":"Inf Sci"},{"key":"1182_CR5","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-319-06608-0_4","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Philippe Fournier-Viger","year":"2014","unstructured":"Fournier-Viger FV, Gomariz A, Campos M, Thomas R (2014) Fast Vertical Mining of Sequential Patterns Using Co-occurrence Information. PAKDD\u201914, pp 40\u201352"},{"key":"1182_CR6","first-page":"7","volume":"99","author":"MN Garofalakis","year":"1999","unstructured":"Garofalakis MN, Rastogi R, Shim K (1999) SPIRIT: Sequential pattern with mining regular expression constraints. VLDB 99:7\u201310","journal-title":"VLDB"},{"issue":"1","key":"1182_CR7","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jcss.2009.05.008","volume":"76","author":"K Gouda","year":"2010","unstructured":"Gouda K, Hassaan M, Zaki MJ (2010) Prism: An effective approach for frequent sequence mining via prime-block encoding. Comput Syst Sci 76(1):88\u2013102","journal-title":"Comput Syst Sci"},{"key":"1182_CR8","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.knosys.2013.04.014","volume":"49","author":"A Guerbas","year":"2013","unstructured":"Guerbas A, Addam O, Nagi M, Elhajj A, Ridley M, Alhajj R (2013) Effective web log mining and online navigational pattern prediction. Knowl-Based Syst 49:50\u201362","journal-title":"Knowl-Based Syst"},{"key":"1182_CR9","unstructured":"Ho J, Lukov L, Chawla S (2005) Sequential pattern mining with constraints on large protein databases. In: COMAD, pp 89\u2013100"},{"issue":"1","key":"1182_CR10","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/s10489-014-0630-1","volume":"43","author":"B Le","year":"2015","unstructured":"Le B, Tran MT, Vo B (2015) Mining frequent closed inter-sequence patterns efficiently using dynamic bit vectors. Appl Intell 43(1):74\u201384","journal-title":"Appl Intell"},{"key":"1182_CR11","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-36175-8_33","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Yi Lu","year":"2003","unstructured":"Lu Y, Ezeife CI (2003) Position Coded Pre-order Linked WAP-Tree for Web Log Sequential Pattern Mining. In: PAKDD 2003, LNCS (LNAI), vol 2637, pp 337\u2013349"},{"key":"1182_CR12","unstructured":"Mary SP, Baburaj E (2016) A novel framework for an efficient online recommendation system using constraint based web usage mining techniques. Biomedical Research, pp 92\u201398"},{"issue":"2","key":"1182_CR13","doi-asserted-by":"publisher","first-page":"2677","DOI":"10.1016\/j.eswa.2008.01.021","volume":"36","author":"F Masseglia","year":"2009","unstructured":"Masseglia F, Poncelet P, Teisseire M (2009) Efficient mining of sequential patterns with time constraints: Reducing the combinations. Expert Syst Appl 36(2):2677\u20132690","journal-title":"Expert Syst Appl"},{"issue":"2","key":"1182_CR14","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/2431211.2431218","volume":"45","author":"CH Mooney","year":"2013","unstructured":"Mooney CH, Roddick JF (2013) Sequential pattern mining-approaches and algorithms. ACM Comput Surv 45(2):19","journal-title":"ACM Comput Surv"},{"key":"1182_CR15","doi-asserted-by":"crossref","unstructured":"Orlando S, Perego R, Silvestri C (2004) A New Algorithm for gap constrained sequence mining. In: Proceedings of the ACM Symposium on Applied Computing, pp 540\u2013547","DOI":"10.1145\/967900.968014"},{"issue":"11","key":"1182_CR16","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.1109\/TKDE.2004.77","volume":"16","author":"J Pei","year":"2004","unstructured":"Pei J, Han J, Mortazavi-Asl B, Wang J, Pinto H, Chen Q, Dayal U, Hsu MC (2004) Mining sequential patterns by pattern-growth: The PrefixSpan approach. IEEE Trans Knowl Data Eng 16(11):1424\u20131440","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"2","key":"1182_CR17","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s10844-006-0006-z","volume":"28","author":"J Pei","year":"2007","unstructured":"Pei J, Han J, Wang W (2007) Constraint-based sequential pattern mining: the pattern-growth methods. J Intell Inf Syst 28(2):133\u2013160","journal-title":"J Intell Inf Syst"},{"key":"1182_CR18","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/3-540-45571-X_47","volume-title":"Knowledge Discovery and Data Mining. Current Issues and New Applications","author":"Jian Pei","year":"2000","unstructured":"Pei J, Han J, Mortazavi-asl B, Zhu H (2000) Mining access patterns efficiently from web logs. In PAKDD 2000, LNCS, vol 1805, pp 396\u2013407"},{"issue":"6","key":"1182_CR19","first-page":"17152","volume":"5","author":"KS Rathore","year":"2016","unstructured":"Rathore KS, Sharma S (2016) Web personalization based on enhanced web access pattern using sequential pattern mining. Int Eng Comput Sci 5(6):17152\u201317159","journal-title":"Int Eng Comput Sci"},{"key":"1182_CR20","first-page":"24","volume-title":"Web access pattern mining\u2013a survey. Data Engineering, Management, Lecture Notes in Computer Science, vol 6411","author":"A Rajimol","year":"2012","unstructured":"Rajimol A, Raju G (2012) Web access pattern mining\u2013a survey. Data Engineering, Management, Lecture Notes in Computer Science, vol 6411. Springer, Berlin, pp 24\u201331"},{"key":"1182_CR21","doi-asserted-by":"crossref","unstructured":"Srikant R, Agrawal R (1996) Mining sequential patterns: Generalizations and performance improvements. Advances in Database Technology, EDBT\u201996, pp 1\u201317","DOI":"10.1007\/BFb0014140"},{"key":"1182_CR22","unstructured":"Tang P, Turkia MP, Gallivan KA (2007) Mining web access patterns with first-occurrencelinked WAP-trees. In SEDE\u2019, vol 07, pp 247\u2013252"},{"issue":"11","key":"1182_CR23","first-page":"21","volume":"149","author":"Y Thushara","year":"2016","unstructured":"Thushara Y, Ramesh V (2016) A study of web mining application on E-commerce using google analytics tool. Int J Comput Appl 149(11):21\u201326","journal-title":"Int J Comput Appl"},{"key":"1182_CR24","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.engappai.2014.10.021","volume":"38","author":"MT Tran","year":"2015","unstructured":"Tran MT, Le B, Vo B (2015) Combination of dynamic bit vectors and transaction information for mining frequent closed sequences efficiently. Eng Appl Artif Intell 38:183\u2013189","journal-title":"Eng Appl Artif Intell"},{"key":"1182_CR25","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-642-19953-0_15","volume-title":"New Challenges for Intelligent Information and Database Systems","author":"Thien-Trang Van","year":"2011","unstructured":"Van T, Vo B, Le B (2011) Mining sequential rules based on prefix-tree. In New Challenges for Intelligent Information and Database Systems, pp 147\u2013156"},{"issue":"3","key":"1182_CR26","doi-asserted-by":"publisher","first-page":"31","DOI":"10.5121\/ijdms.2010.2304","volume":"2","author":"S Vijayalakshmi","year":"2010","unstructured":"Vijayalakshmi S, Mohan V, Suresh RS (2010) Mining of users access behavior for frequent sequential pattern from web logs. Int J Database Manag Syst 2(3):31\u201345","journal-title":"Int J Database Manag Syst"},{"issue":"8","key":"1182_CR27","doi-asserted-by":"publisher","first-page":"7196","DOI":"10.1016\/j.eswa.2012.01.062","volume":"39","author":"B Vo","year":"2012","unstructured":"Vo B, Hong TP, Le B (2012) DBV-Miner: A Dynamic Bit vector approach for fast mining frequent closed itemsets. Expert Syst Appl 39(8):7196\u20137206","journal-title":"Expert Syst Appl"},{"issue":"5","key":"1182_CR28","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.compbiomed.2013.02.006","volume":"43","author":"X Wu","year":"2013","unstructured":"Wu X, Zhu X, He Y, Arslan AN (2013) PMBC: Pattern mining from biological sequences with wildcard constraints. Comput Biol Med 43(5):481\u2013492","journal-title":"Comput Biol Med"},{"key":"1182_CR29","doi-asserted-by":"crossref","unstructured":"Zaki MJ (2000) Sequence mining in categorical domains: incorporating constraints. Proceedings of the 9th International Conference on Information and Knowledge Management, pp 422\u2013429","DOI":"10.1145\/354756.354849"},{"issue":"1","key":"1182_CR30","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1023\/A:1007652502315","volume":"42","author":"MJ Zaki","year":"2001","unstructured":"Zaki MJ (2001) SPADE: An Efficient Algorithm for Mining Frequent Sequences. Mach Learn 42(1):31\u201360","journal-title":"Mach Learn"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-018-1182-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-018-1182-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-018-1182-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:37:55Z","timestamp":1556739475000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-018-1182-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,2]]},"references-count":30,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["1182"],"URL":"https:\/\/doi.org\/10.1007\/s10489-018-1182-6","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,2]]},"assertion":[{"value":"2 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}