{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:48:59Z","timestamp":1725716939341},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T00:00:00Z","timestamp":1671494400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T00:00:00Z","timestamp":1671494400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,20]]},"DOI":"10.1109\/rivf55975.2022.10013859","type":"proceedings-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T18:54:15Z","timestamp":1674068055000},"page":"536-541","source":"Crossref","is-referenced-by-count":0,"title":["Mining Frequent Weighted Utility Patterns in Dynamic Quantitative Databases"],"prefix":"10.1109","author":[{"given":"Nguyen","family":"Le","sequence":"first","affiliation":[{"name":"iSPACE Cybersecurity Vocational Training College,Faculty of Information Technology,Ho Chi Minh City,Vietnam"}]},{"given":"Huong","family":"Bui","sequence":"additional","affiliation":[{"name":"FPT University,Faculty of Computing Fundamentals,Ho Chi Minh City,Vietnam"}]},{"given":"Minh","family":"Nguyen","sequence":"additional","affiliation":[{"name":"VNU University of Science,Faculty of Mathematics, Mechanics, and Informatics,Hanoi,Vietnam"}]},{"given":"Ham","family":"Nguyen","sequence":"additional","affiliation":[{"name":"HUTECH University,Faculty of Information Technology,Ho Chi Minh City,Vietnam"}]},{"given":"Tuong","family":"Le","sequence":"additional","affiliation":[{"name":"Informetrics Research Group Ton Duc Thang University,Ho Chi Minh City,Vietnam"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/170036.170072"},{"key":"ref2","first-page":"487","article-title":"Fast algorithms for mining association rules","author":"Agrawal","journal-title":"VLDB 94"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335372"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/69.846291"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-012-4638-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-014-0551-z"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-014-0252-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956836"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.08.065"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488517500052"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2015.451"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-016-0799-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.10.039"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106064"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-01899-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107709"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3070132"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2676803"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/ijis"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-014-0644-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1280-5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107422"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.030"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106457"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106653"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2979289"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.04.027"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.12.029"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106596"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/int.22528"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/smc.2016.7844428"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.15625\/1813-9663\/31\/1\/5154"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/EMS.2008.73"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.10.009"},{"year":"2020","key":"ref35","article-title":"Frequent Itemset Mining Dataset Repository"}],"event":{"name":"2022 RIVF International Conference on Computing and Communication Technologies (RIVF)","start":{"date-parts":[[2022,12,20]]},"location":"Ho Chi Minh City, Vietnam","end":{"date-parts":[[2022,12,22]]}},"container-title":["2022 RIVF International Conference on Computing and Communication Technologies (RIVF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10013784\/10013785\/10013859.pdf?arnumber=10013859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T06:26:01Z","timestamp":1707805561000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10013859\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,20]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/rivf55975.2022.10013859","relation":{},"subject":[],"published":{"date-parts":[[2022,12,20]]}}}