Perfect hashing schemes for mining association rules

被引:18
作者
Chang, CC [1 ]
Lin, CY [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chaiyi 621, Taiwan
关键词
D O I
10.1093/comjnl/bxh074
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hashing schemes are widely used to improve the performance of data mining association rules, as in the DHP algorithm that utilizes the hash table in identifying the validity of candidate itemsets according to the number of the table's bucket accesses. However, since the hash table used in DHP is plagued by the collision problem, the process of generating large itemsets at each level requires two database scans, which leads to poor performance. In this paper we propose perfect hashing schemes to avoid collisions in the hash table. The main idea is to employ a refined encoding scheme, which transforms large itemsets into large 2-itemsets and thereby makes the application of perfect hashing feasible. Our experimental results demonstrate that the new method is also efficient (about three times faster than DHP), and scalable when the database size increases. We also propose another variant of the perfect hash scheme with reduced memory requirements. The properties and performances of several perfect hashing schemes are also investigated and compared.
引用
收藏
页码:168 / 179
页数:12
相关论文
共 16 条
[1]  
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[2]  
Agrawal R, 1994, P 20 INT C VER LARG, V1215, P487
[3]  
Atici M., 2000, Journal of Combinatorial Mathematics and Combinatorial Computing, V35, P127
[4]   A LETTER-ORIENTED MINIMAL PERFECT HASHING SCHEME [J].
CHANG, CC ;
LEE, RCT .
COMPUTER JOURNAL, 1986, 29 (03) :277-281
[5]   A SCHEME FOR CONSTRUCTING ORDERED MINIMAL PERFECT HASHING FUNCTIONS [J].
CHANG, CC .
INFORMATION SCIENCES, 1986, 39 (02) :187-195
[6]   Data mining: An overview from a database perspective [J].
Chen, MS ;
Han, JW ;
Yu, PS .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1996, 8 (06) :866-883
[7]   DYNAMIC PERFECT HASHING - UPPER AND LOWER BOUNDS [J].
DIETZFELBINGER, M ;
KARLIN, A ;
MEHLHORN, K ;
AUFDERHEIDE, FM ;
ROHNERT, H ;
TARJAN, RE .
SIAM JOURNAL ON COMPUTING, 1994, 23 (04) :738-761
[8]   STORING A SPARSE TABLE WITH O(1) WORST CASE ACCESS TIME [J].
FREDMAN, ML ;
KOMLOS, J ;
SZEMEREDI, E .
JOURNAL OF THE ACM, 1984, 31 (03) :538-544
[9]  
HAN J, 2000, P 2000 ACM SIGMOD IN, P1, DOI DOI 10.1145/342009.335372
[10]   Mining association rules using inverted hashing and pruning [J].
Holt, JD ;
Chung, SM .
INFORMATION PROCESSING LETTERS, 2002, 83 (04) :211-220