Reducing Redundancy in Characteristic Rule Discovery by Using IP-Techniques

نویسندگان

  • Tom Brijs
  • Koen Vanhoof
  • Geert Wets
چکیده

The discovery of characteristic rules is a well-known data mining technique and has lead to several successful applications. Unfortunately, typically a (very) large number of rules is discovered during the mining stage. This makes monitoring and control of these rules extremely costly and difficult. Therefore, a selection of the most promising rules is desirable. In this paper, we propose an integer programming model to solve the problem of selecting the most promising subset of characteristic rules. The proposed technique allows to control a user-defined level of overall quality of the model in combination with a maximum reduction of the redundancy extant in the original ruleset. We use real-world data to evaluate the performance of the proposed technique against the wellknown RuleCover heuristic.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reducing redundancy in characteristic rule discovery by using integer programming techniques

The discovery of characteristic rules is a well-known data mining task and has lead to several successful applications. However, because of the descriptive nature of characteristic rules, typically a (very) large number of them is discovered during the mining stage. This makes monitoring and control of these rules, in practice, extremely costly and difficult. Therefore, a selection of the most ...

متن کامل

Topology Discovery Using an Address Prefix Based Stopping Rule

Recently, a first step towards a highly distributed IP-level topology discovery tool has been made with the introduction of the Doubletree algorithm. Doubletree is an efficient cooperative algorithm that allows the discovery of a large portion of nodes and links in the network while strongly reducing probing redundancy on nodes and destinations as well as the amount of probes sent. In this pape...

متن کامل

Soft Computing and Fault Management

Soft computing is a partnership between A.I. techniques that are tolerant of imprecision, uncertainty and partial truth, with the aim of obtaining a robust solution for complex systems. Telecommunication systems are built with extensive redundancy and complexity to ensure robustness and quality of service. To facilitate this requires complex fault identification and management systems. Fault id...

متن کامل

Weighted-HR: An Improved Hierarchical Grid Resource Discovery

Grid computing environments include heterogeneous resources shared by a large number of computers to handle the data and process intensive applications. In these environments, the required resources must be accessible for Grid applications on demand, which makes the resource discovery as a critical service. In recent years, various techniques are proposed to index and discover the Grid resource...

متن کامل

Accidental discovery of a hydatid cyst with primary presentation in an unusual location: a case report

A hydatid cyst is a zoonotic infection caused by the larval forms of mostly the Echinococcus granulosus. In humans, the most common site of cyst development is the liver (60%), followed by the lungs (20%), and much less commonly in other organs such as kidney, spleen, brain, and other soft tissues. The localization of cysts in muscles and subcutaneous is very rare. We report a case of 38-year-o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000