{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:40:08Z","timestamp":1750858808548,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,18]]},"DOI":"10.1145\/3703323.3703334","type":"proceedings-article","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T12:03:28Z","timestamp":1750853008000},"page":"66-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Depth-First Search Approach for Mining Frequent Chain Episodes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1009-9254","authenticated-orcid":false,"given":"Santhosh B.","family":"Gandreti","sequence":"first","affiliation":[{"name":"Electrical Engineering, Indian Institute of Science, Bangalore, Karnataka, IN"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-1931","authenticated-orcid":false,"given":"Chandan","family":"J.","sequence":"additional","affiliation":[{"name":"Electrical Engineering, Indian Institute of Science, Bangalore, Karnataka, IN"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7863-8088","authenticated-orcid":false,"given":"P. S.","family":"Sastry","sequence":"additional","affiliation":[{"name":"Electrical Engineering, Indian Institute of Science, Bangalore, Karnataka, IN"}]}],"member":"320","published-online":{"date-parts":[[2025,6,25]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"A. Achar A. Ibrahim and P.\u00a0S. Sastry. 2013. Pattern-growth Based Frequent Serial Episode Discovery. Data and Knowledge Engineering 87 (2013) 91\u2013108. 10.1016\/j.datak.2013.06.005","DOI":"10.1016\/j.datak.2013.06.005"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","unstructured":"A. Achar S. Laxman and P.\u00a0S. Sastry. 2012. A unified view of the apriori-based algorithms for frequent episode discovery. Knowledge and Information Systems 31 2 (2012) 223\u2013250. 10.1007\/s10115-011-0408-2","DOI":"10.1007\/s10115-011-0408-2"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"A. Achar S. Laxman R. Viswanathan and P.\u00a0S. Sastry. 2012. Discovering Injective Episodes with General Partial Orders. Data Mining and Knowledge Discovery 25 1 (2012) 67\u2013108. 10.1007\/s10618-011-0233-y","DOI":"10.1007\/s10618-011-0233-y"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","unstructured":"A. Achar and P.\u00a0S. Sastry. 2019. Discovering frequent chain episodes. Knowledge and Information Systems 60 1 (2019) 447\u2013494. 10.1007\/s10115-019-01349-y","DOI":"10.1007\/s10115-019-01349-y"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","unstructured":"A. Augusto R. Conforti M. Dumas M.\u00a0L. Rosa and A. Polyvyanyy. 2019. Split miner: automated discovery of accurate and simple business process models from event logs. Knowledge and Information Systems 59 2 (2019) 251\u2013284. 10.1007\/s10115-018-1214-x","DOI":"10.1007\/s10115-018-1214-x"},{"key":"e_1_3_3_2_7_2","unstructured":"O. Barkol S. Golan R. Bergman Y. Felder A. Sityon M.\u00a0J. Zaki and P. Anchuri. 2020. Discovering representative composite CI patterns in an IT system. (21 Jan 2020). U. S. Patent no. 10540354 URL https:\/\/patents.google.com\/patent\/US20130097138A1\/en."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939761"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.89"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/11871637_9"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"J. C\u00fcppers J. Kalofolias and J. Vreeken. 2022. Omen: discovering sequential patterns with reliable prediction delays. Knowledge and Information Systems 64 4 (2022) 1013\u20131045. 10.1007\/s10115-022-01660-1","DOI":"10.1007\/s10115-022-01660-1"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539398"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3632410.3632445"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3570991.3571012"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08751-6_33"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"K. Huang and C. Chang. 2008. Efficient mining of frequent episodes from complex sequences. Information Systems 33 1 (2008) 96\u2013114. 10.1016\/j.is.2007.07.003","DOI":"10.1016\/j.is.2007.07.003"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"A. Ibrahim S. Sastry and P.\u00a0S. Sastry. 2016. Discovering compressing serial episodes from event sequences. Knowledge and Information Systems 47 2 (2016) 405\u2013432. 10.1007\/s10115-015-0854-3","DOI":"10.1007\/s10115-015-0854-3"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2004.1460414"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","unstructured":"H.\u00a0T. Lam F. M\u00f6rchen D. Fradkin and T. Calders. 2014. Mining Compressing Sequential Patterns. Statistical Analysis and Data Mining The ASA Data Science Journal 7 1 (2014) 34\u201352. 10.1002\/sam.11192","DOI":"10.1002\/sam.11192"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401947"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","unstructured":"P. Lei. 2020. Mining maritime traffic conflict trajectories from a massive AIS data. Knowledge and Information Systems 62 1 (2020) 259\u2013285. 10.1007\/s10115-019-01355-0","DOI":"10.1007\/s10115-019-01355-0"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"J. Luo and S. Bridges. 2000. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection. International Journal of Intelligent Systems 15 8 (2000) 687\u2013703. doi: 10.1002\/1098-111X(200008)15:8 < 687::AID-INT1 > 3.0.CO;2-X.","DOI":"10.1002\/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","unstructured":"F. Lv W. Wang L. Han D. Wang Y. Pei J. Huang B. Wang and M. Pechenizkiy. 2022. Mining trading patterns of pyramid schemes from financial time series data. Future Generation Computer Systems 134 (2022) 388\u2013398. 10.1016\/j.future.2022.02.017","DOI":"10.1016\/j.future.2022.02.017"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","unstructured":"H. Mannila H. Toivonen and A. I.\u00a0Verkamo. 1997. Discovery of Frequent Episodes in Event Sequences. Data Mining and Knowledge Discovery 1 3 (1997) 259\u2013289. 10.1023\/A:1009748302351","DOI":"10.1023\/A:1009748302351"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30116-5_30"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","unstructured":"S. Naulaerts S. Moens K. Engelen W.\u00a0V. Berghe B. Goethals K. Laukens and P. Meysman. 2016. Practical Approaches for Mining Frequent Patterns in Molecular Datasets. Bioinformatics and Biology Insights 10 (2016) 37\u201347. 10.4137\/BBI.S38419","DOI":"10.4137\/BBI.S38419"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","unstructured":"O. Oualid F. Nouioua and P. Fournier-Viger. 2024. Discovering frequent parallel episodes in complex event sequences by counting distinct occurrences. Applied Intelligence 54 1 (2024) 701\u2013721. 10.1007\/s10489-023-05187-y","DOI":"10.1007\/s10489-023-05187-y"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","unstructured":"D. Patnaik P.\u00a0S. Sastry and K.\u00a0P. Unnikrishnan. 2008. Inferring Neuronal Network Connectivity from Spike Data: A Temporal Data Mining Approach. Scientific Programming 16 1 (2008) 49\u201377. 10.3233\/SPR-2008-0242","DOI":"10.3233\/SPR-2008-0242"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","unstructured":"B. Shie H. Hsiao and V.\u00a0S. Tseng. 2013. Efficient algorithms for discovering high utility user behavior patterns in mobile commerce environments. Knowledge and Information Systems 37 2 (2013) 363\u2013387. 10.1007\/s10115-012-0483-z","DOI":"10.1007\/s10115-012-0483-z"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","unstructured":"S. Sivanantham V. Mohanraj Y. Suresh and J. Senthilkumar. 2023. Association Rule Mining Frequent-Pattern-Based Intrusion Detection in Network. Computer Systems Science and Engineering 44 2 (2023) 1617\u20131631. 10.32604\/csse.2023.025893","DOI":"10.32604\/csse.2023.025893"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020589"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","unstructured":"N. Tatti and B. Cule. 2012. Mining Closed Strict Episodes. Data Mining and Knowledge Discovery 25 1 (2012) 34\u201366. 10.1007\/s10618-011-0232-z","DOI":"10.1007\/s10618-011-0232-z"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339606"},{"key":"e_1_3_3_2_34_2","unstructured":"K.\u00a0P. Unnikrishnan B.\u00a0Q. Shadid P.\u00a0S. Sastry and S. Laxman. 2009. Root Cause diagnostics using Temporal datamining. (24 Mar 2009). U. S. Patent no. 7509234 URL https:\/\/eprints.iisc.ac.in\/44037\/."},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2008.144"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","unstructured":"X. Zhang G. Chen L. Song W. Gan and Y. Song. 2023. HEPM: High-efficiency pattern mining. Knowledge-Based Systems 281 (2023) 111068. 10.1016\/j.knosys.2023.111068","DOI":"10.1016\/j.knosys.2023.111068"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","unstructured":"H. Zhou and K. Hirasawa. 2019. Spatiotemporal traffic network analysis: technology and applications. Knowledge and Information Systems 60 1 (2019) 25\u201361. 10.1007\/s10115-018-1225-7","DOI":"10.1007\/s10115-018-1225-7"}],"event":{"name":"CODS-COMAD 2024: 8th International Conference on Data Science and Management of Data (12th ACM IKDD CODS and 30th COMAD)","location":"Jodhpur India","acronym":"CODS-COMAD Dec '24"},"container-title":["Proceedings of the 8th International Conference on Data Science and Management of Data (12th ACM IKDD CODS and 30th COMAD)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3703323.3703334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:05:37Z","timestamp":1750856737000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703323.3703334"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,18]]},"references-count":36,"alternative-id":["10.1145\/3703323.3703334","10.1145\/3703323"],"URL":"https:\/\/doi.org\/10.1145\/3703323.3703334","relation":{},"subject":[],"published":{"date-parts":[[2024,12,18]]},"assertion":[{"value":"2025-06-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}