{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:23:15Z","timestamp":1740122595845,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,10,12]],"date-time":"2018-10-12T00:00:00Z","timestamp":1539302400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2017M3C4A7069432"],"award-info":[{"award-number":["NRF-2017M3C4A7069432"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11277-018-5985-x","type":"journal-article","created":{"date-parts":[[2018,10,12]],"date-time":"2018-10-12T04:09:25Z","timestamp":1539317365000},"page":"673-689","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Batch-Free Event Sequence Pattern Mining for Communication Stream Data with Instant and Persistent Events"],"prefix":"10.1007","volume":"105","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0132-0260","authenticated-orcid":false,"given":"Keon Myung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Chan Sik","family":"Han","sequence":"additional","affiliation":[]},{"given":"Joong Nam","family":"Jun","sequence":"additional","affiliation":[]},{"given":"Jee Hyong","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sang Ho","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,12]]},"reference":[{"key":"5985_CR1","volume-title":"Data mining: Practical machine learning tools and techniques","author":"IH Witten","year":"2016","unstructured":"Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016). Data mining: Practical machine learning tools and techniques. Los Altos: Morgan Kaufmann."},{"key":"5985_CR2","first-page":"1","volume-title":"Advances in database technology. Lecture notes in computer science","author":"R Srikant","year":"1996","unstructured":"Srikant, R., & Agrawa, R. (1996). Mining sequential patterns: Generalizations and performance improvements. In P. Apers, M. Bouzeghoub, & G. Gardarin (Eds.), Advances in database technology. Lecture notes in computer science (Vol. 1057, pp. 1\u201317). Berlin: Springer."},{"key":"5985_CR3","unstructured":"Han, J., Pei, J., Mortazavi-Asl, B., Pinto, H., Chen, Q., Dayal, U., & Hsu, M. C. (2001). Prefixspan: Mining sequential patterns efficiently by prefix-projected pattern growth. In Proceedings of the 17th international conference on data engineering (pp. 215\u2013224)."},{"key":"5985_CR4","doi-asserted-by":"crossref","unstructured":"Buczak, A. L., Berman, D. S., Yen, S. W., Watkins, L. A., Duong, L. T., & Chavis, J. S. (2017). Using sequential pattern mining for common event format (CEF) cyber data. In Proceedings of the 12th annual conference on cyber and information security research, ACM.","DOI":"10.1145\/3064814.3064822"},{"key":"5985_CR5","doi-asserted-by":"crossref","unstructured":"Lu, Y., Hassani, M., & Seidl, T. (2017). Incremental temporal pattern mining using efficient batch-free stream clustering. In Proceedings of the 29th international conference on scientific and statistical database management, ACM.","DOI":"10.1145\/3085504.3085511"},{"issue":"5","key":"5985_CR6","first-page":"2627","volume":"4","author":"RS Rao","year":"2017","unstructured":"Rao, R. S., & Arora, J. (2017) A survey on methods used in web usage mining. International Research Journal of Engineering and Technology,\n                           4(5), 2627\u20132631.","journal-title":"International Research Journal of Engineering and Technology"},{"issue":"S1","key":"5985_CR7","doi-asserted-by":"publisher","first-page":"S103","DOI":"10.3233\/IDA-170874","volume":"21","author":"M Zihayat","year":"2017","unstructured":"Zihayat, M., Wu, C. W., An, A., Tseng, V. S., & Lin, C. (2017). Efficiently mining high utility sequential patterns in static and streaming data. Intelligent Data Analysis,\n                           21(S1), S103\u2013S135.","journal-title":"Intelligent Data Analysis"},{"key":"5985_CR8","doi-asserted-by":"crossref","unstructured":"Ouyang, W. (2016). Mining rare sequential patterns in data streams with a sliding window. In Proceedings of the third international conference on systems and informatics (pp. 1023\u20131027).","DOI":"10.1109\/ICSAI.2016.7811101"},{"key":"5985_CR9","doi-asserted-by":"crossref","unstructured":"Lozonavu, M., Vlachou-Konchylaki, M., & Huang, V. (2017). Relation discovery of mobile network alarms with sequential pattern mining. In Proceedings of international conference on computing, networking and communications (ICNC) (pp. 363\u2013367), IEEE.","DOI":"10.1109\/ICCNC.2017.7876155"},{"issue":"I.4","key":"5985_CR10","doi-asserted-by":"publisher","first-page":"5597","DOI":"10.1007\/s11277-017-4797-8","volume":"97","author":"J Wu","year":"2017","unstructured":"Wu, J., Lu, H., Xiang, Y., Cai, B., Wang, W., & Liu, R. (2017). Improving bandwidth utilization of intermittent links in highly dynamic ad hoc networks. Wireless Personal Communications,\n                           97(I.4), 5597\u20135619.","journal-title":"Wireless Personal Communications"},{"issue":"I.3","key":"5985_CR11","doi-asserted-by":"publisher","first-page":"2753","DOI":"10.1007\/s11277-017-4999-0","volume":"98","author":"M Solera","year":"2018","unstructured":"Solera, M., Toril, M., Palomo, I., Gomez, G., & Poncela, J. (2018). A testbed for evaluating video streaming services in LTE. Wireless Personal Communications,\n                           98(I.3), 2753\u20132773.","journal-title":"Wireless Personal Communications"},{"issue":"I.1","key":"5985_CR12","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1007\/s11277-017-4898-4","volume":"98","author":"D Rosy Salomi Victoria","year":"2018","unstructured":"Rosy Salomi Victoria, D. (2018). Optimized cooperative and random scheduling packet transmissions and comparison of their parameters. Wireless Personal Communications,\n                           98(I.1), 857\u2013878.","journal-title":"Wireless Personal Communications"},{"issue":"I.2","key":"5985_CR13","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1023\/A:1019912421877","volume":"22","author":"IG Niemegeers","year":"2002","unstructured":"Niemegeers, I. G., & Groot, S. M. H. D. (2002). From personal area networks to personal networks: A user oriented approach. Wireless Personal Communications,\n                           22(I.2), 175\u2013186.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"5985_CR14","doi-asserted-by":"publisher","first-page":"68","DOI":"10.5391\/IJFIS.2017.17.2.68","volume":"17","author":"Y Yoon","year":"2017","unstructured":"Yoo, Y. (2017).\u00a0Sequential detection of P300 waves for high-throughput brain-computer interfaces.\u00a0International Journal of Fuzzy Logic and Intelligent Systems,\u00a017(2), 68\u201375.","journal-title":"International Journal of Fuzzy Logic and Intelligent Systems"},{"key":"5985_CR15","unstructured":"Hassani, M., Beecks, C., Tows, D., & Seidl, T. (2015). Mining sequential patterns of event streams in a smart home applications. In Proceedings of the LWA 2015 workshops, Germany (pp. 159\u2013170)."},{"key":"5985_CR16","unstructured":"Tows, D., Hassani, M., Beecks, C., & Seidl, T. (2015). Optimizing sequential pattern mining within multiple streams. In Proceedings of the BTW workshops (pp. 223\u2013232)."},{"key":"5985_CR17","first-page":"278","volume":"7121","author":"A Koper","year":"2011","unstructured":"Koper, A., & Nguyen, H. S. (2011). Sequential pattern mining from stream data. LNAI,\n                           7121, 278\u2013291.","journal-title":"LNAI"},{"key":"5985_CR18","doi-asserted-by":"crossref","unstructured":"Chang, L., Wang, T., Yang, D., & Luan, H. (2008). SeqStream: Mining closed sequential patterns over stream sliding windows. In Prceedings of 2008 eighth IEEE international conference on data mining (pp. 83\u201392).","DOI":"10.1109\/ICDM.2008.36"},{"issue":"1","key":"5985_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5391\/IJFIS.2018.18.1.1","volume":"18","author":"V Novak","year":"2018","unstructured":"Novak, V. (2018). Detection of structured breaks in time series using fuzzy techniques. International Journal of Fuzzy Logic and Intelligent Systems,\n                           18(1), 1\u201312.","journal-title":"International Journal of Fuzzy Logic and Intelligent Systems"},{"issue":"I.7","key":"5985_CR20","first-page":"132","volume":"3","author":"AP Joshi","year":"2017","unstructured":"Joshi, A. P., & Patel, B. V. (2017). Issues in real time knowledge discovery through data stream mining. International Journal of Scientific Research in Science and Technology,\n                           3(I.7), 132\u2013135.","journal-title":"International Journal of Scientific Research in Science and Technology"},{"key":"5985_CR21","volume-title":"Introduction to algorithms","author":"TH Cormen","year":"2009","unstructured":"Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2009). Introduction to algorithms. Cambridge: MIT Press."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5985-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5985-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5985-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T19:19:27Z","timestamp":1570821567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5985-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,12]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["5985"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5985-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,10,12]]},"assertion":[{"value":"12 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}