{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:02:43Z","timestamp":1772910163525,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9006397","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T01:05:34Z","timestamp":1582592734000},"page":"4864-4873","source":"Crossref","is-referenced-by-count":27,"title":["Exploiting Anti-Monotonic Constraints in Mining Palindromic Motifs from Big Genomic Data"],"prefix":"10.1109","author":[{"given":"Oluwafemi A.","family":"Sarumi","sequence":"first","affiliation":[]},{"given":"Carson K.","family":"Leung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347166"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2000.839450"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/276304.276307"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/958942.958944"},{"key":"ref31","first-page":"18","article-title":"Constraint-Based Sequential Pattern Mining in Large Databases","author":"pei","year":"2002","journal-title":"Proc 2002 Int&#x2019;l Conf Information and Knowledge Management (CIKM &#x2019;02)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2014.53"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/253260.253327"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-8265-9_5046"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2014.11"},{"key":"ref34","author":"mitasiunaite","year":"2009","journal-title":"Mining string data under similarity and soft-frequency constraints Application to promoter sequence analysis"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud.2014.136"},{"key":"ref27","first-page":"1175","article-title":"A data analytic algorithm for managing, querying, and processing uncertain big data in cloud environments","author":"jiang","year":"0","journal-title":"Algorithms 8(4) special issue on algorithms for managing querying and processing big data in cloud environments"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13186-3_70"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.07.294"},{"key":"ref1","first-page":"874","article-title":"Mining sequential patterns from uncertain big DNA in the spark framework","author":"jiang","year":"2016","journal-title":"Proc IEEE BIBM"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CGC.2012.17"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-7598-6.ch002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/CyberSciTech.2019.00190"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-010-3.ch049"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2837060.2837076"},{"key":"ref26","first-page":"188","article-title":"Constraint-Based Rule Mining on Large, Dense Data Sets","author":"bayardo","year":"1999","journal-title":"Proc 1999 Int&#x2019;l Conf Data Eng (ICDE &#x2019;99)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/276304.276307"},{"key":"ref50","first-page":"118","article-title":"Scalable Data Science and Machine Learning Algorithm for Gene Prediction","author":"sarumi","year":"2019","journal-title":"In The 7th International Conference on Big Data Applications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.6026\/97320630009255"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/dnares\/dsr004"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-8265-9_5048"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM.2016.7822637"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE.2016.35"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CICT.2015.72"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00179-0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2164-15-394"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054110007647"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2513591.2527071"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.50"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-8674(00)81805-X"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1101\/gad.1724708"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1111\/j.1749-0774.2005.00003.x"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1074\/jbc.M400354200"},{"key":"ref8","article-title":"The distributions of short palindromes in Bacteria genomes","author":"goh","year":"2009","journal-title":"Symposium on Progress in Information & Communication Technology"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/nrc2591"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1637-7"},{"key":"ref9","article-title":"Detection of palindromes in DNA sequences using periodicity transform","author":"ravi","year":"2004","journal-title":"Proc IEEE Int Workshop on Biomedical Circuits and Systems"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.2005.12.331"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/568574.568581"},{"key":"ref48","author":"zaharia","year":"2011","journal-title":"Resilient Distributed Datasets A Fault-tolerant Abstraction for In-memory Cluster Computing"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/STUDENT.2012.6408403"},{"key":"ref42","first-page":"433","article-title":"Mining frequent item sets with convertible constraints","author":"pei","year":"2001","journal-title":"Proceedings of the 17th International Conference on Data Engineering"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-8265-9_5049"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-8265-9_5047"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000023674.74932.4c"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","location":"Los Angeles, CA, USA","start":{"date-parts":[[2019,12,9]]},"end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09006397.pdf?arnumber=9006397","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:48:26Z","timestamp":1658080106000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9006397\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9006397","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}