{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:05:06Z","timestamp":1757617506198,"version":"3.44.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T00:00:00Z","timestamp":1739145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T00:00:00Z","timestamp":1739145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Geoinformatica"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s10707-025-00535-1","type":"journal-article","created":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T01:12:52Z","timestamp":1739149972000},"page":"435-463","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mining targeted spatio-temporal sequential patterns"],"prefix":"10.1007","volume":"29","author":[{"given":"Piotr S.","family":"Maci\u0105g","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,10]]},"reference":[{"issue":"4","key":"535_CR1","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1109\/TKDE.2007.190712","volume":"20","author":"Y Huang","year":"2008","unstructured":"Huang Y, Zhang L, Zhang P (2008) A framework for mining sequential patterns from spatio-temporal event data sets. IEEE Trans Knowl Data Eng 20(4):433\u2013448","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"11","key":"535_CR2","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.1109\/TKDE.2011.146","volume":"24","author":"P Mohan","year":"2012","unstructured":"Mohan P, Shekhar S, Shine JA, Rogers JP (2012) Cascading spatio-temporal pattern discovery. IEEE Trans Knowl Data Eng 24(11):1977\u20131992","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"535_CR3","doi-asserted-by":"publisher","first-page":"1441","DOI":"10.1007\/s10462-021-09994-y","volume":"55","author":"A Hamdi","year":"2022","unstructured":"Hamdi A, Shaban K, Erradi A et al (2022) Spatiotemporal data mining: a survey on challenges and open problems. Artif Intell Rev 55:1441\u20131488. https:\/\/doi.org\/10.1007\/s10462-021-09994-y","journal-title":"Artif Intell Rev"},{"key":"535_CR4","first-page":"283","volume-title":"Spatiotemporal Pattern Mining: Algorithms and Applications","author":"Z Li","year":"2014","unstructured":"Li Z (2014) Spatiotemporal Pattern Mining: Algorithms and Applications. Springer, Cham, pp 283\u2013306"},{"key":"535_CR5","doi-asserted-by":"publisher","first-page":"17262","DOI":"10.1038\/s41598-020-74248-w","volume":"10","author":"Z He","year":"2020","unstructured":"He Z, Tao L, Xie Z et al (2020) Discovering spatial interaction patterns of near repeat crime by spatial association rules mining. Sci Reports 10:17262. https:\/\/doi.org\/10.1038\/s41598-020-74248-w","journal-title":"Sci Reports"},{"key":"535_CR6","doi-asserted-by":"crossref","unstructured":"Maci\u0105g PS, Bembenik R (2019) A novel breadth-first strategy algorithm for discovering sequential patterns from spatio-temporal data. In: Proceedings of the 8th international conference on pattern recognition applications and methods - Volume 1: ICPRAM, pp 459\u2013466. SciTePress, ???","DOI":"10.5220\/0007355804590466"},{"issue":"1","key":"535_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-023-00780-x","volume":"10","author":"PS Maci\u0105g","year":"2023","unstructured":"Maci\u0105g PS, Bembenik R, Dubrawski A (2023) Discovery of crime event sequences with constricted spatio-temporal sequential patterns. J Big Data 10(1):1\u201336","journal-title":"J Big Data"},{"key":"535_CR8","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-319-62416-7_11","volume-title":"Machine learning and data mining in pattern recognition","author":"Y Abboud","year":"2017","unstructured":"Abboud Y, Boyer A, Brun A (2017) Ccpm: A scalable and noise-resistant closed contiguous sequential patterns mining algorithm. In: Perner P (ed) Machine learning and data mining in pattern recognition. Springer, Cham, pp 147\u2013162"},{"key":"535_CR9","doi-asserted-by":"publisher","unstructured":"Maciag PS, Kryszkiewicz M, Bembenik R (2019) Discovery of closed spatio-temporal sequential patterns from event data. In: Knowledge-based and intelligent information & engineering systems: proceedings of the 23rd international conference KES-2019, Budapest, Hungary, 4-6 September 2019, pp 707\u2013716. https:\/\/doi.org\/10.1016\/j.procs.2019.09.226","DOI":"10.1016\/j.procs.2019.09.226"},{"issue":"11","key":"535_CR10","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.1109\/TKDE.2004.77","volume":"16","author":"J Pei","year":"2004","unstructured":"Pei J, Han J, Mortazavi-Asl B, Wang J, Pinto H, Chen Q, Dayal U, Hsu M-C (2004) Mining sequential patterns by pattern-growth: the prefixspan approach. IEEE Trans Knowl Data Eng 16(11):1424\u20131440","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"535_CR11","doi-asserted-by":"crossref","unstructured":"Agrawal R, Srikant R (1995) Mining sequential patterns. In: Proceedings of the eleventh international conference on data engineering, pp 3\u201314","DOI":"10.1109\/ICDE.1995.380415"},{"key":"535_CR12","doi-asserted-by":"crossref","unstructured":"Mohan P, Shekhar S, Shine JA, Rogers JP (2010) Cascading spatio-temporal pattern discovery: A summary of results, pp 327\u2013338","DOI":"10.1137\/1.9781611972801.29"},{"key":"535_CR13","doi-asserted-by":"publisher","unstructured":"Huang G, Gan W, Yu PS (2024) Taspm: Targeted sequential pattern mining. ACM Trans Knowl Discov Data. https:\/\/doi.org\/10.1145\/3639827","DOI":"10.1145\/3639827"},{"key":"535_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119791","volume":"653","author":"K Hu","year":"2024","unstructured":"Hu K, Gan W, Huang S, Peng H, Fournier-Viger P (2024) Targeted mining of contiguous sequential patterns. Inform Sci 653:119791. https:\/\/doi.org\/10.1016\/j.ins.2023.119791","journal-title":"Inform Sci"},{"issue":"1","key":"535_CR15","first-page":"203","volume":"44","author":"M Zihayat","year":"2015","unstructured":"Zihayat M, An A (2015) Tkus: Mining top-k sequential patterns under a user-defined support framework. Knowl Inf Syst 44(1):203\u2013227","journal-title":"Knowl Inf Syst"},{"key":"535_CR16","doi-asserted-by":"crossref","unstructured":"Tzvetkov P, Yan X, Han J (2005) Tsp: Mining top-k closed sequential patterns. In: Proceedings of the 3rd IEEE international conference on data mining (ICDM). IEEE","DOI":"10.1007\/s10115-004-0175-4"},{"key":"535_CR17","doi-asserted-by":"crossref","unstructured":"Cheng T, Haworth J, Anbaroglu B, Tanaksaranond G, Wang J (2021) Spatio-temporal data mining. Handbook of regional science, 1691\u20131709","DOI":"10.1007\/978-3-662-60723-7_68"},{"issue":"4","key":"535_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3161602","volume":"51","author":"G Atluri","year":"2018","unstructured":"Atluri G, Karpatne A, Kumar V (2018) Spatio-temporal data mining: A survey of problems and methods. ACM Comput Surv (CSUR) 51(4):1\u201341","journal-title":"ACM Comput Surv (CSUR)"},{"key":"535_CR19","doi-asserted-by":"crossref","unstructured":"Ansari MY, Ahmad A, Khan SS, Bhushan G et al (2019) Spatiotemporal clustering: a review. Artif Intell Rev 1\u201343","DOI":"10.1007\/s10462-019-09736-1"},{"issue":"6","key":"535_CR20","doi-asserted-by":"publisher","first-page":"1612","DOI":"10.1109\/TFUZZ.2014.2302456","volume":"22","author":"H Izakian","year":"2014","unstructured":"Izakian H, Pedrycz W (2014) Anomaly detection and characterization in spatial time series data: A cluster-centric approach. IEEE Trans Fuzzy Syst 22(6):1612\u20131624","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"1","key":"535_CR21","first-page":"54","volume":"1","author":"P Fournier-Viger","year":"2017","unstructured":"Fournier-Viger P, Lin JC-W, Kiran RU, Koh YS, Thomas R (2017) A survey of sequential pattern mining. Data Sci Pattern Recognit 1(1):54\u201377","journal-title":"Data Sci Pattern Recognit"},{"key":"535_CR22","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-030-04921-8_4","volume-title":"A survey of high utility sequential pattern mining","author":"T Truong-Chi","year":"2019","unstructured":"Truong-Chi T, Fournier-Viger P (2019) A survey of high utility sequential pattern mining. Theory, Algorithms and Applications, High-Utility Pattern Mining, pp 97\u2013129"},{"key":"535_CR23","doi-asserted-by":"crossref","unstructured":"Zaki MJ, Hsiao C-J (2002) CHARM: An Efficient Algorithm for Closed Itemset Mining, pp 457\u2013473","DOI":"10.1137\/1.9781611972726.27"},{"key":"535_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13326-015-0023-3","volume":"6","author":"P Cellier","year":"2015","unstructured":"Cellier P, Charnois T, Plantevit M, Rigotti C, Cr\u00e9milleux B, Gandrillon O, Kl\u00e9ma J, Manguin J-L (2015) Sequential pattern mining for discovering gene interactions and their contextual information from biomedical texts. J Biomed Semant 6:1\u201312","journal-title":"J Biomed Semant"},{"key":"535_CR25","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1186\/s40537-023-00780-x","volume":"10","author":"PS Maci\u0105g","year":"2023","unstructured":"Maci\u0105g PS, Bembenik R, Dubrawski A (2023) Discovery of crime event sequences with constricted spatio-temporal sequential patterns. J Big Data 10:98. https:\/\/doi.org\/10.1186\/s40537-023-00780-x","journal-title":"J Big Data"},{"issue":"2","key":"535_CR26","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s10489-014-0601-6","volume":"42","author":"U Yun","year":"2015","unstructured":"Yun U, Ryang H (2015) Incremental high utility pattern mining with static and dynamic databases. Appl Intell 42(2):323\u2013352","journal-title":"Appl Intell"},{"key":"535_CR27","doi-asserted-by":"publisher","unstructured":"Chen Z, Gan W, Huang G, Zheng Y, Yu PS (2023) Towards contiguous sequences in uncertain data. In: 2023 IEEE 10th International conference on data science and advanced analytics (DSAA), pp 1\u201310. https:\/\/doi.org\/10.1109\/DSAA60987.2023.10302526","DOI":"10.1109\/DSAA60987.2023.10302526"},{"key":"535_CR28","doi-asserted-by":"crossref","unstructured":"Yan X, Han J, Afshar R (2003) Clospan: Mining closed sequential patterns in large datasets. In: Proceedings of the 2003 SIAM international conference on data mining, pp 166\u2013177","DOI":"10.1137\/1.9781611972733.15"},{"issue":"8","key":"535_CR29","doi-asserted-by":"publisher","first-page":"1408","DOI":"10.1109\/TKDE.2011.100","volume":"24","author":"AKC Wong","year":"2012","unstructured":"Wong AKC, Zhuang D, Li GCL, Lee E-SA (2012) Discovery of delta closed patterns and noninduced patterns from sequences. IEEE Trans Knowl Data Eng 24(8):1408\u20131421. https:\/\/doi.org\/10.1109\/TKDE.2011.100","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"535_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109921","volume":"257","author":"H Duong","year":"2022","unstructured":"Duong H, Hoang T, Tran T, Truong T, Le B, Fournier-Viger P (2022) Efficient algorithms for mining closed and maximal high utility itemsets. Knowl-Based Syst 257:109921. https:\/\/doi.org\/10.1016\/j.knosys.2022.109921","journal-title":"Knowl-Based Syst"},{"key":"535_CR31","doi-asserted-by":"crossref","unstructured":"Fournier-Viger P, Gomariz A, Campos M, Thomas R (2014) Fast vertical mining of sequential patterns using co-occurrence information. In: Proceedings of the 18th pacific-asia conference on knowledge discovery and data mining (PAKDD). Springer","DOI":"10.1007\/978-3-319-06608-0_4"},{"key":"535_CR32","unstructured":"City of Seattle (2024) Seattle SDOT Collisions Data. https:\/\/www.kaggle.com\/datasets\/jonleon\/seattle-sdot-collisions-data?resource=download. Accessed 25 June 2024"},{"key":"535_CR33","unstructured":"Boston\u00a0Police\u00a0Department (2014) Crime Incident Reports. http:\/\/plenar.io\/explore. Accessed 25 May 2018"}],"container-title":["GeoInformatica"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-025-00535-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10707-025-00535-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-025-00535-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T04:44:35Z","timestamp":1757133875000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10707-025-00535-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,10]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["535"],"URL":"https:\/\/doi.org\/10.1007\/s10707-025-00535-1","relation":{},"ISSN":["1384-6175","1573-7624"],"issn-type":[{"type":"print","value":"1384-6175"},{"type":"electronic","value":"1573-7624"}],"subject":[],"published":{"date-parts":[[2025,2,10]]},"assertion":[{"value":"24 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"The TaSTSPM algorithm along the two other algorithms tested in this study: STBFM and CST-SPMiner were implemented by the author in Python and are available at:","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Software Availability"}},{"value":"The LLM model was used for text language correction and for supporting the preparation of the algorithm implementations.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Use of LLM Models"}}]}}