2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, 2015
DOI: 10.1109/cit/iucc/dasc/picom.2015.33
|View full text |Cite
|
Sign up to set email alerts
|

An Optimization to CHARM Algorithm for Mining Frequent Closed Itemsets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…For the comparison we used DCI-closed, a famous algorithm for mining frequent closed itemsets to be compared with CHARM Algorithm. For performance comparison, we used the original source or object code for DCI-closed provided to us by [10]. Figure 7 illustrate the execution time in the data of both algorithms with different minsup.…”
Section: Resultsmentioning
confidence: 99%
“…For the comparison we used DCI-closed, a famous algorithm for mining frequent closed itemsets to be compared with CHARM Algorithm. For performance comparison, we used the original source or object code for DCI-closed provided to us by [10]. Figure 7 illustrate the execution time in the data of both algorithms with different minsup.…”
Section: Resultsmentioning
confidence: 99%
“…-CHARM simultaneously explores the item space and the transaction space, above a new IT-tree [6,7] search space (tree of itemsets-tidset). On the other hand, most methods use only the item search space.…”
Section: Charm Algorithmmentioning
confidence: 99%
“…-CHARM also uses a new vertical representation of data called diffset [7], for fast frequency calculations. Diffsets keep track of differences in the details of a candidate pattern from its prefix pattern.…”
Section: Charm Algorithmmentioning
confidence: 99%