{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:29:35Z","timestamp":1750307375460,"version":"3.41.0"},"reference-count":33,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2010,5,27]],"date-time":"2010-05-27T00:00:00Z","timestamp":1274918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGKDD Explor. Newsl."],"published-print":{"date-parts":[[2010,5,27]]},"abstract":"<jats:p>\n            Mining of frequent patterns is one of the popular knowledge discovery and data mining (KDD) tasks. It also plays an essential role in the mining of many other patterns such as correlation, sequences, and association rules. Hence, it has been the subject of numerous studies since its introduction. Most of these studies find all the frequent patterns from collection of precise data, in which the items within each datum or transaction are definitely known and precise. However, there are many real-life situations in which the user is interested in only some tiny portions of these frequent patterns. Finding all frequent patterns would then be redundant and waste lots of computation. This calls for\n            <jats:italic>constrained mining<\/jats:italic>\n            , which aims to find only those frequent patterns that are interesting to the user. Moreover, there are also many real-life situations in which the data are uncertain. This calls for\n            <jats:italic>uncertain data mining<\/jats:italic>\n            . In this article, we propose algorithms to efficiently find\n            <jats:italic>constrained<\/jats:italic>\n            frequent patterns from collections of\n            <jats:italic>uncertain data<\/jats:italic>\n            .\n          <\/jats:p>","DOI":"10.1145\/1809400.1809425","type":"journal-article","created":{"date-parts":[[2010,6,1]],"date-time":"2010-06-01T12:21:35Z","timestamp":1275394895000},"page":"123-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Efficient algorithms for the mining of constrained frequent patterns from uncertain data"],"prefix":"10.1145","volume":"11","author":[{"given":"Carson Kai-Sang","family":"Leung","sequence":"first","affiliation":[{"name":"The University of Manitoba, Winnipeg, MB, Canada"}]},{"given":"Dale A.","family":"Brajczuk","sequence":"additional","affiliation":[{"name":"The University of Manitoba, Winnipeg, MB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2010,5,27]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557030"},{"key":"e_1_2_1_2_1","first-page":"487","volume-title":"Proc. VLDB","author":"Agrawal R.","year":"1994"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/645806.756628"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"R.J. Bayardo  Jr. (ed.) Special issue on constraints in data mining. SIGKDD Explorations 4(1) 2002.  R.J. Bayardo Jr. (ed.) Special issue on constraints in data mining. SIGKDD Explorations 4(1) 2002.","DOI":"10.1145\/772862.772863"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557039"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150416"},{"key":"e_1_2_1_8_1","first-page":"37","volume-title":"Proc. SDM","author":"Cerf L.","year":"2008"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497506"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1786574.1786585"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1764441.1764451"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535331_23"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281229"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/846219.847312"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401930"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/380995.381002"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335372"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/360402.360421"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401932"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150430"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150431"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/958942.958944"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/380995.381005"},{"volume-title":"Encyclopedia of Database Systems","year":"2009","author":"Leung C.K.-S.","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.157"},{"key":"e_1_2_1_26_1","first-page":"653","volume-title":"Proc. PAKDD","author":"S.","year":"2008"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.38"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2007.38"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/568574.568581"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/276304.276307"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/568574.568580"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150495"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376698"}],"container-title":["ACM SIGKDD Explorations Newsletter"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1809400.1809425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1809400.1809425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:23:05Z","timestamp":1750245785000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1809400.1809425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,27]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,5,27]]}},"alternative-id":["10.1145\/1809400.1809425"],"URL":"https:\/\/doi.org\/10.1145\/1809400.1809425","relation":{},"ISSN":["1931-0145","1931-0153"],"issn-type":[{"type":"print","value":"1931-0145"},{"type":"electronic","value":"1931-0153"}],"subject":[],"published":{"date-parts":[[2010,5,27]]},"assertion":[{"value":"2010-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}