skip to main content
10.1145/967900.968011acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Mining dependence rules by finding largest itemset support quota

Authors Info & Claims
Published:14 March 2004Publication History

ABSTRACT

In the paper a new data mining algorithm for finding the most interesting dependence rules is described. Dependence rules are derived from the itemsets with support significantly different from its expected value and therefore considered interesting. Since such itemsets are distributed non-monotonically in the lattice of all itemsets the support monotonicity property cannot be used for their search. Instead we estimate upper/lower bounds for the support to find itemsets with large interval of possible support values called support quota. Since the support quota is known to be monotonically decreasing the search space can be effectively restricted. Strongly dependent itemsets are selected by computing their expected support using iterative proportional fitting algorithm and comparing it with the real itemset support.

References

  1. A. A. Freitas, On rule interestingness measures, Knowlege Based Systems 12, 309--315, 1999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Agrawal, T. Imielinski, A. Swami. Mining association rules between sets of items in large databases. Proc. of the ACM SIGMOD Conference on Management of Data, Washington, D.C., May 1993, 207--216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. Liu, L.-P. Ku and W. Hsu, Discovering Interesting Holes in Data, Proceedings of Fifteenth International Joint Conference on Artificial Intelligence (IJCAI-97), pp. 930--935, August 23--29, 1997, Nagoya, Japan. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Savinov, Mining Possibilistic Set-Valued Rules by Generating Prime Disjunctions, Proc. 3rd European Conference on Principles of Data Mining and Knowledge Discovery (PKDD'99), LNCS No. 1704, pp. 536--541. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Savinov, Mining Interesting Possibilistic Set-Valued Rules, in: Fuzzy If-Then Rules in Computational Intelligence: Theory and Applications (Eds.: Da Ruan and Etienne E. Kerre), Kluwer, 2000, 107--133.Google ScholarGoogle Scholar
  6. S. Brin, R. Motwani, and C. Silverstein, Beyond market basket: Generalizing association rules to correlations, SIGMOD'97, pp. 265--276. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Silverstein, S. Brin, and R. Motwani, Beyond Market Baskets: Generalizing Association Rules to Dependence Rules, Data Mining and Knowledge Discovery 2(1), 39--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Meo, Theory of dependence values, ACM Transactions on Database Systems, 25(3), 2000, 380--406. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. Calders and B. Goethals. Mining all non-derivable frequent itemsets. Proc. 6th European Conference on Principles of Data Mining and Knowledge Discovery (PKDD'02), LNCS No. 2431, pp. 74--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Darroch and D. Ratchli, Generalized Iterative Scaling for Log-Linear Models, The Annals of Mathematical Statistics, Vol. 43, No. 5, pp. 1470--1480, 1972.Google ScholarGoogle ScholarCross RefCross Ref
  11. S. Jaroszewicz and D. A. Simovici. Pruning Redundant Association Rules Using Maximum Entropy Principle. Advances in Knowledge Discovery and Data Mining, 6th Pacific-Asia Conference, PAKDD'02, 135--147. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Mining dependence rules by finding largest itemset support quota

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SAC '04: Proceedings of the 2004 ACM symposium on Applied computing
      March 2004
      1733 pages
      ISBN:1581138121
      DOI:10.1145/967900

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 March 2004

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,650of6,669submissions,25%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader