<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Abstract and Local Concepts in Attributed Networks</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Henry</forename><surname>Soldano</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">Université Paris 13</orgName>
								<orgName type="institution" key="instit2">Sorbonne Paris Cité</orgName>
								<orgName type="institution" key="instit3">L.I.P.N UMR</orgName>
								<orgName type="institution" key="instit4">CNRS</orgName>
								<address>
									<addrLine>7030</addrLine>
									<postCode>F-93430</postCode>
									<settlement>Villetaneuse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="laboratory" key="lab1">Atelier de BioInformatique</orgName>
								<orgName type="laboratory" key="lab2">ISYEB -UMR 7205</orgName>
								<orgName type="institution" key="instit1">CNRS MNHN UPMC EPHE</orgName>
								<orgName type="institution" key="instit2">Museum National d&apos;Histoire Naturelle</orgName>
								<address>
									<postCode>F-75005</postCode>
									<settlement>Paris</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Guillaume</forename><surname>Santini</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">Université Paris 13</orgName>
								<orgName type="institution" key="instit2">Sorbonne Paris Cité</orgName>
								<orgName type="institution" key="instit3">L.I.P.N UMR</orgName>
								<orgName type="institution" key="instit4">CNRS</orgName>
								<address>
									<addrLine>7030</addrLine>
									<postCode>F-93430</postCode>
									<settlement>Villetaneuse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Dominique</forename><surname>Bouthinon</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">Université Paris 13</orgName>
								<orgName type="institution" key="instit2">Sorbonne Paris Cité</orgName>
								<orgName type="institution" key="instit3">L.I.P.N UMR</orgName>
								<orgName type="institution" key="instit4">CNRS</orgName>
								<address>
									<addrLine>7030</addrLine>
									<postCode>F-93430</postCode>
									<settlement>Villetaneuse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Abstract and Local Concepts in Attributed Networks</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">A7130B8C2A77AD1ADE27B0CC03F59DF6</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T09:09+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>We consider attribute pattern mining in attributed graphs through recent developments of Formal Concept Analysis. The corresponding methods restrain the extensional space 2 O , i.e. the space of possible pattern extensions in the object set O, to a subset satisfying structural properties. When considering an attributed graph, we consider its vertices as the objects under study, each described in a pattern language, as 2 I where I is an attribute set. The restriction of the extensional space depends then on the graph topology. We consider two levels. At the global level, the core idea is to reduce the extension of each pattern in such a way that the corresponding abstract extension induces a subgraph made of dense parts whose nodes satisfy some connectivity property. At the local level a pattern has various extensions each associated to one dense part. We obtain that way abstract closed patterns and local closed patterns, together with abstract and local implication rules. Overall, we propose here a way to extract information associated to the attributes labelling the graph vertices, according to its topology. We consider in particular the detection of communities in subgraphs of an attributed network associated to local closed patterns and local implications.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>We consider an attributed graph G(O, E) where E is the edge set and whose vertices in O are labelled by a description in an attribute pattern language with a lattice structure, typically 2 I where I is a set of binary attributes. A way recently investigated to search for frequent patterns is to define a restricted extensional space which is the range of an interior operator on 2 O (see <ref type="bibr">Section 3)</ref>. The idea of such an operator in the case of an attributed graph is to minimally reduce a vertex subset until all the vertices of the reduced vertex subset, also called an abstract vertex subset, satisfies some connectivity property within the corresponding induced subgraph <ref type="bibr" target="#b8">[1]</ref>. We call a graph abstraction the corresponding extensional space, i.e. the range of the interior operator mentioned above. A typical example of a connectivity property is the degree ≥ k property which is such that all vertices of an abstract vertex subset e have a degree greater than or equal to k in the subgraph G e induced by e. Another example is the k-clique abstraction in which vertices in e have to belong to some k-clique in G e . This approach, based on a previous work on abstraction in Formal Concept Analysis <ref type="bibr" target="#b9">[2]</ref> produces abstract closed patterns i.e. maximal attribute patterns, obtained by applying a closure operator on the abstract support sets obtained when applying the interior operator to the support sets <ref type="foot" target="#foot_0">3</ref> .</p><p>In this case, the set of (abstract support set, abstract closed pattern) pairs forms a lattice called an abstract concept lattice, and we obtain a set of related abstract implications denoted by 2q → 2w that hold whenever the abstract support set of q is included in the abstract support set of w.</p><p>Recent works in attributed graph mining are interested in searching for local patterns made of a constraint on a subset of attributes together with a density constraint on a vertex subset, and this using various notions of maximality <ref type="bibr" target="#b10">[3,</ref><ref type="bibr" target="#b11">4]</ref>. In a companion article <ref type="bibr" target="#b12">[5]</ref>, we have defined local closed patterns corresponding to maximal attribute patterns each associated to one dense subgraph, allowing to extract local implications, particular to specific dense groups of objects. For that purpose Formal Concept Analysis (FCA) had to be extended in order to take into account this notion of locality. In that case, several closure operators may be applied to the same pattern: a closed pattern will then be local as the closure will depend on which region of the extensional space is concerned. The simplest example is obtained by considering that the support set of a pattern induces a subgraph made of various connected components, and associating to each connected component a local closed pattern, i.e. the most specific pattern shared by the vertices of this connected component. In what follows, the subgraph induced by the pattern q support set is simply called the pattern q subgraph. Formally, the dense vertex subsets we consider as elements of the extensional space form a partial order called a confluence in a recent investigation in Formal Concept Analysis <ref type="bibr" target="#b13">[6]</ref> and close to, but different from, confluent familiies recently investigated in <ref type="bibr" target="#b14">[7]</ref>. The confluence structure generalizes the abstraction structure and may have several minimal elements (see Section 4). In the case mentioned above, a simple graph confluence, the minimal elements are the singletons {v}, where v is a vertex, and the elements of the confluence are connected vertex subsets i.e. vertex subsets each inducing a connected subgraph. The structure of the set of (local support set, local closed pattern) pairs, we call local concepts, has been shown to be a more general structure generalizing the lattice structure, and called a pre-confluence <ref type="bibr" target="#b12">[5]</ref>. We call local concept pre-confluence the ordered set of local concepts. Again we may associate to this structure a set of implications, called local implications written 2 m q → 2 m w where m is any minimal element of the confluence. Such a local implication means that the (unique) local support set including m of pattern q is included in the local support set of w including m. In the simple example mentioned above, 2 {v} q → 2 {v} w holds whenever i) v belongs to the support set of q and ii) the connected component containing v of the pattern q subgraph is included in the connected component containing v of the pattern w subgraph.</p><p>Both approaches can be mixed by considering the simple graph confluence F mentioned above together with a graph abstraction A. What happens then is that F A = F ∩A also is a confluence, we call a cc-confluence. In practice, this means that we choose some abstraction A, for instance considering the degree &gt;= k graph abstraction and then consider among its elements only connected vertex subsets. When investigating some attributed graph we have then to chose A, or consider a set of graph abstractions ordered by set theoretic inclusion A 1 , . . . , A n obtained for instance by increasing k of the degree &gt;= k. As we will see in our experiments, we may extract this way local patterns and implications at different levels.</p><p>However connected components of abstract subgraphs as represented in cc-confluences does not always completely capture the idea of communities as considered in social network analysis. As discussed in <ref type="bibr" target="#b12">[5]</ref>, we may however enlarge the local closed patterns approach by deriving a new graph G T from G whose vertex set T is a set of vertex subsets of G. Figure <ref type="figure" target="#fig_0">1</ref> displays a graph whose vertices represents pupils on a school in the West of Scotland, whose edges represent friendship relations and whose vertex attributes concern substance use and sporting activity<ref type="foot" target="#foot_1">4</ref> . As a running example we consider the empty pattern subgraph i.e. the whole graph. By applying a 3-clique graph abstraction we select the vertices related by colored or bold edges. We will then obtain 4 local closed patterns l i each representing the most specific attribute pattern occurring in a connected component of the empty pattern abstract subgraph. However, in this example the largest connected component is clearly made of distinct dense parts, i.e. communities, we would like to consider when defining local closed patterns. Fortunately, when considering k-communities <ref type="bibr" target="#b15">[8]</ref> we can solve this problem by applying the cc-confluence approach to a new graph derived from the original graph. More precisely, a k-community is a vertex subset in a graph G that corresponds to a connected component in a derived graph G T . The vertices of G T are k-cliques in G and an edge relates two vertices whenever the corresponding k-cliques share k − 1 vertices in G. Each colored subgraph in Figure <ref type="figure" target="#fig_0">1</ref> defines such a 3-community. When labelling each vertex in G T by the intersection of the corresponding k-clique vertex labels, the local closed pattern associated to the connected component of some pattern subgraph in G T represents the most specific attribute pattern occurring in the corresponding k-community.</p><p>Section 2 describes the attributed graphs used in our experiments. Section 3 presents abstract concept lattices, abstract implications and graph abstractions. Section 4 defines local concept pre-confluences, related local implications and cc-confluences. In Section 5 we show how using derived c-confluences we extract the set of 3-communities associated to pattern subgraphs, and we display the local concept pre-confluence of the teenage friendship attributed network displayed Figure <ref type="figure" target="#fig_0">1</ref>. In Section 6 we briefly discuss the implementation used in our experiments.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Datasets</head><p>We will further consider experiments in two datasets. In both cases the data is described as a graph G = (O, E) whose vertices have as labels elements of 2 I where I is a set of items, i.e. binary attributes. As objects are not always described using binary attributes, the binarization preprocessing is described when necessary.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Teenage Friends and Lifestyle Study</head><p>The dataset is denoted as s50-1 and is a standard attributed graph dataset <ref type="foot" target="#foot_2">5</ref> . It represents 148 friendship relations between 50 pupils of a school in the West of Scotland, and labels concern the substance use (tobacco, cannabis and alcohol) and sporting activity. Values of the corresponding variables are ordered. The binarization process consists in defining variables representing the value intervals. T stands for Tobacco consumption and has values 1 (no smoking), 2 (occasional) and 3 (regular). C stands for cannabis consumption and has values 1 (never tries) to 4, D stands for alcohol consumption and has values 1 (does not drink) to 5, and S stands for sporting activity and has two values 1 (occasional) and (2) regular. A binary variable represents an interval, as for instance C23 that has value 1 whenever the value of C is in <ref type="bibr" target="#b9">[2,</ref><ref type="bibr" target="#b10">3]</ref>. For sake of simplicity we have merged the two highest values in variables T,C and D. For instance values 4 and 5 in alcohol consumption are merged into a 4m (4 and more) value. We report hereunder the binary attributes whose conjunctions allow to represent any interval (for instance D=2 is obtained as {D12,D23m}):</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Tobacco</head><p>Cannabis Alcohol T1,T2m C1,C12,C23m,C3m D1,D12,D123,D23m,D34m,D4m</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">A DBLP dataset</head><p>This is the DBLP dataset as described in <ref type="bibr" target="#b16">[9]</ref>. There is 45131 vertices, 228188 edges and 555 connected components. Vertices are authors that have published at least one paper in one among 29 journal or conference of the Database and Datamining communities <ref type="foot" target="#foot_3">6</ref> during the 1/1990 to 2/2011 period. An edge links two authors whenever they are coauthors of at least one article. The conferences are clustered in three clusters: DB (databases), DM (data mining) and AI (artificial intelligence) according to a conference ranking site categorization <ref type="foot" target="#foot_4">7</ref> .</p><p>The binary attributes are the journal and conference names together with the three clusters. An attribute has value 1 if the author has published in the corresponding journal or conference or cluster.</p><p>3 Abstract closed patterns in attributed networks</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Abstract closed patterns</head><p>A standard pattern mining consists in considering the set of occurrences of a pattern q, belonging to some pattern language L with a lattice structure<ref type="foot" target="#foot_5">8</ref> , as a subset of an object set O. This language is partially ordered following a general-to-specific ordering and each object o is described as a particular pattern d(o). A pattern q occurs in object o whenever d(o) is less specific than q. The set of occurrences ext(q) of a pattern q is called its support set or its extension in O. A pattern q is said support-closed whenever it is a maximal pattern (i.e. maximally specific) among those that are equivalent in what they share the same support set as q. Now, whenever there is a unique support closed pattern corresponding to a given support set e, as it is the case in the standard FCA or itemset mining framework, an intension function int(e) returns the support-closed pattern associated to the support set e. This means that we relate a pattern q to the corresponding support closed pattern by applying the closure operator int • ext to q. The pattern language L typically is 2 I where I is a set of binary attributes (aka items). With no loss of generality we will further use such a pattern language. The closure operator then simply intersects the object descriptions of the support set of the entry pattern.</p><p>The set of frequent support closed patterns, i.e. the support-closed elements with support greater than or equal to some threshold minsupp represents then all the equivalence classes corresponding to frequent supports. Such a class has also minimal elements, called generators. When the patterns belong to 2 X , the min-max basis of implication rules <ref type="bibr" target="#b17">[10]</ref> that represents all the implications t → t that hold on O, i.e. such that ext(t) ⊆ ext(t ), is defined as follows:</p><formula xml:id="formula_0">m = {g → f \g | f is a closed pattern , g is a generator f = g, ext(t) = ext(f )}</formula><p>We define hereunder closure operators and also interior operators that will be further used to restrict the support sets to be abstract support sets. In what follows all ordered sets are finite, and in particular any topped meet-semilattice (resp. pointed joinsemilattice) is a lattice. Definition 1 Let U be an ordered set and f : U → U a self map such that for any x, y ∈ U , f is monotone, i.e. x ≤ y implies f (x) ≤ f (y) and idempotent, i.e. f (f (x)) = f (x), then:</p><p>-</p><formula xml:id="formula_1">If f is extensive, i.e. f (x) ≥ x, f is called a closure operator -If f is intensive, i.e. f (x) ≤ x,</formula><p>f is called a dual closure operator, an interior operator, or also a projection.</p><p>In the first case, an element such that x = f (x) is called a closed element.</p><p>Ranges of interior operators on lattices are called abstractions and are characterized by the following Proposition:</p><formula xml:id="formula_2">Proposition 1 (see [2]) A subset A of X = 2 O is the range p[X]</formula><p>of some interior operator p on X, if and only if for any elements x, y in A, their join x ∪ y also belongs to A and A contains the empty set. The interior operator is related to its range as follows:</p><p>p(x) = sup {a∈A|a≤x} a.</p><p>Let then p be the interior operator associated to some abstraction A, p(x) is the greatest element of A included in x. Closed pattern analysis has been recently extended to abstract closed pattern analysis by noticing that applying an interior operator on the extensional space 2 O we obtain again closure operators on the pattern language 2 I [11,2]:</p><p>Proposition 2 Let X = 2 O and L = 2 I , p be an interior operator on 2 O , and A = p[X] be the associated abstraction, we have that</p><formula xml:id="formula_3">(int, p • ext) is a Galois connection on (A, L), i.e.: f = int • p • ext is a closure operator on L,</formula><p>The abstract support set of pattern q is defined as p • ext(q). There is then a unique abstract support closed pattern, i.e. a most specific pattern among all patterns sharing the same abstract support set, which is obtained as f (q) = int • p • ext(q). f (q) is then called an abstract closed pattern. This leads to the definition of abstract concepts organized in a concept lattice:</p><p>Corollary 1 <ref type="bibr" target="#b9">[2]</ref>. The set of (abstract support set, abstract closed pattern) pairs (e = ext(c), c = int(e)), ordered following A, is a lattice called an abstract concept lattice.</p><p>Note that, as p is monotone, whenever ext(q) ⊆ ext(w), i.e. q → w is valid we also have ext</p><formula xml:id="formula_4">A (p) = p • ext(q) ⊆ ext A (w) = p • ext(w), i.e. the abstract implication 2 A q → 2 A w is also valid.</formula><p>This way we obtain abstract min-max basis with the same definition as in section 3.1 except that ext A replaces ext and therefore abstract implications relate minimal elements (i.e. A-generators) to maximal element (the abstract closed pattern, or A-closed pattern) of the same abstract equivalence class. We have then the following definition: Definition 2 The abstract min-max basis m A of valid abstract implications is defined as</p><formula xml:id="formula_5">m A = {2 A g → 2 A f \g | f is an A-closed pattern, g is a A-generator , f = g, ext A (g) = ext A (f )}</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Graph abstractions</head><p>These ideas has been applied to attributed graphs by defining graph abstractions <ref type="bibr" target="#b8">[1]</ref>. The set of objects O is then the set of vertices of a graph G = (O, E) and each vertex o is labelled by an attribute pattern d(o) ∈ 2 I .</p><p>A graph abstraction is an abstraction of 2 O defined through a characteristic property P (x, e) which expresses some minimal connectivity requirement of the vertex x within the subgraph G e induced by some vertex subset e:</p><p>Lemma 1 Let P be such that -P (x, e) implies x ∈ e and e ⊆ e and P (x, e) implies P (x, e ), and let q be a mapping defined by q(e) = {x ∈ e|P (x, e)}, then the mapping p defined by p(e) = fixedpoint(q, e) is an interior operator on 2 O p(e) represents the greatest vertex subset of e inducing a subgraph whose vertices all satisfy the associated characteristic property. We give hereunder examples of graph abstractions, defined through their characteristic property and exemplified in Figure <ref type="figure" target="#fig_1">2</ref>.</p><p>1. degree ≥ k. 2. k-club ≥ s: x has to belong to at least one k-club of size at least s in G e . This is a relaxation of the notion of clique <ref type="bibr" target="#b19">[12]</ref>: a k-club is a subset c of vertices such that there is a path of length ≤ k between any pair of vertices in G c . A triangle, a 3-clique, is a 1-club of size 3 (Figure <ref type="figure" target="#fig_1">2</ref>-a). Figure <ref type="figure" target="#fig_1">2</ref>-b represents a 2-club of size 6 and therefore a 2-club≥ 6 abstract group. 3. nearStar(k, d): x has to have degree at least k or there must be a path of length at most d between x and some y with degree at least k. For instance, the simplest nearStar(8, 1) abstract group is a central node connected with 8 nodes. Such an abstraction is useful when we want the abstraction to preserve hubs <ref type="bibr" target="#b20">[13]</ref>(i.e high degree vertices) together with their (low degree) neighbors (see Figure <ref type="figure" target="#fig_3">2-c</ref>). 4. cc ≥ s: x has to belong to a connected component of size at least s in G e (see Figure <ref type="figure" target="#fig_3">2-d</ref>). 5. k-cliqueGroup ≥ s: x has to belong to a k-clique group of size at least s. A kclique group is a union of k-vertex cliques that can be reached from each other through a series of adjacent k-vertex cliques (where adjacency means sharing k -1 nodes). Maximal k-clique groups are denoted as k-cliques communities and formalize the idea of community in complex networks <ref type="bibr" target="#b21">[14]</ref>.</p><p>Finally, it is interesting to note that we can combine two (or more) abstractions A 1 and A 2 in two ways, defining a new composite abstraction either stronger or weaker than both A 1 and A 2 . For instance, we may want to consider an abstract subgraph where vertices both have a degree larger than some k and belong to a connected component exceeding a minimal size s. On the contrary, we may want an abstract subgraph such that at least one of the two characteristic properties is satisfied by all the vertices. This would be the case for instance, if we want to keep both vertices that have a degree larger than, say 10, and vertices in a star, i.e connected to a hub which degree is at least 50. The following lemma states that we can freely combine abstractions in both directions.</p><p>high degree vertices) together with their (low degree) neighbors (see Figure <ref type="figure" target="#fig_3">2-c</ref>). 4. cc s: x has to belong to a connected component of size at least s in Ge (see Figure <ref type="figure" target="#fig_3">2-d</ref>). 5. k-cliqueGroup s: x has to belong to a k-clique group of size at least s. A k-clique group is a union of k-cliques (cliques of size k) that can be reached from each other through a series of adjacent k-cliques (where adjacency means sharing k -1 nodes). Maximal k-cliques groups are denoted as k-cliques communities and formalize the idea of community in complex networks <ref type="bibr" target="#b17">[10]</ref>. Finally, it is interesting to note that we can combine two (or more) abstractions A1 and A2 in two ways, defining a new composite abstraction either stronger or weaker than both A1 and A2. For instance, we may want to consider an abstract subgraph where vertices both have a degree larger than some k and belong to a connected component exceeding a minimal size s. On the contrary, we may want an abstract subgraph such that at least one of the two characteristic properties is satisfied by all the vertices. This would be the case for instance, if we want to keep both vertices that have a degree larger than, say 10, and vertices in a star, i.e connected to a hub which degree is at least 50. The following lemma states that we can freely combine abstractions in both directions. Finally note that requiring a frequency property also corresponds to an abstraction whose characteristic property is Pm(x, e) = |e| minsupp, and that can be therefore combined to any abstraction, therefore defining frequent abstract closed patterns.</p><formula xml:id="formula_6">⇥ (a) ⇥ (b) ⇥ ⇥ (c) ⇥ ⇥ (d)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Graph-based closed patterns computation and analysis</head><p>When we have defined abstractions and corresponding projections, graph-based abstract closed patterns are also de facto defined. Using and abstract closures int p ext(t). All top-down generate and clos algorithms, like LCM <ref type="bibr" target="#b23">[16]</ref> can then be adapted to direct computatio of abstract closed patterns 4 . In the experiments in the next section w have used an indirect approach: we first compute frequent closed pa terns and corresponding generators using the CORON software[15 Starting from the closed patterns t and their supports, we then com pute the abstract closed patterns int p ext(t). Finally we consid for each abstract closed pattern tA the generators of all the closed pa terns that have produced tA and select the minimal elements amon them in order to obtain the corresponding abstract generators 5 . Fro abstract generators and abstract closed terms, computing the min max implication rule basis is straightforward. On one hand, the in direct approach needs prior computation of the (non abstract) close patterns, and this can be much more costly than the direct compu tation of abstract closed patterns. On the other hand, once this fir computation is performed, we can apply as many abstract comput tions we need, varying graph abstractions and their parameters, an this can be cost-saving when investigating some new large attribute graph (see Section 4.3). We describe hereunder a generic algorithm, relying on the abstra tion characteristic property, to compute the projection of some subs of the set of objects O: // Given e ✓ O and a characteristic property P u false e 0 e While u = false u true For all vertex x in e 0</p><p>If P (x, e 0 ) is false u false e 0 e 0 {x} endIf endFor endWhile // As u = false, P (x, e 0 ) is true for all x in e 0 // e 0 = p(e 0 ) is the abstraction of e with respect to P This generic algorithm is in O(n 2 ⇤ d) where d is the cost of com puting P (x, e 0 ). In the graph abstraction case, computing P (x, e requires to update the induced subgraph G e 0 when some vertex is r moved from e 0 . Furthermore, the cost d depends on the characterist property and will be small as far as the property needs to consid only close neighbors of x. For instance, considering the degree abstraction, first, there is no need to access neighbors of x, and fu thermore, rather than explicitly updating G e 0 when some x is r moved from e 0 it is more efficient to decrease the degree of the ve tices connected to x in e 0 . Another example is the cc s graph ab straction, in which computing the abstraction of some e comes dow to compute the connected components of Ge and remove the sma ones with no need to iterate the process.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Experiments</head><p>We consider here some preliminary experiments in three datasets. I all three experiments, the data is described as a graph G = (O, E 4 Work in progress 5 Recall that each closed pattern that produces an abstract closed pattern t represents an equivalence class of patterns that will be included in the cla of t A in the new equivalence relation relying on abstract supports. Lemma 2 Let P 1 and P 2 two characteristic properties of abstractions defined on the same object set O, and let P 1 ∧ P 2 and P 1 ∨ P 2 be defined as follows:</p><p>-P 1 ∧ P 2 (x, e) = P 1 (x, e) ∧ P 2 (x, e) -P 1 ∨ P 2 (x, e) = P 1 (x, e) ∨ P 2 (x, e)</p><p>Both P 1 ∧ P 2 and P 1 ∨ P 2 are characteristic properties of abstractions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Experiments</head><p>Some experiments on the two datasets described in Section 2 have been performed and presented in <ref type="bibr" target="#b8">[1]</ref>. We discuss here some new details and experiments on the DBLP dataset. The experiment consisted in applying a degree ≥ k abstraction with increasing k-values and we focussed in abstract patterns obtained with k = 16 which corresponds to a very strong abstraction: in an abstract support set each author is required to have 16 co-authors within the abstract support set. We obtained few abstract closed patterns and in particular the abstract closed pattern VLDBJ, ICDE, SIGMOD, VLDB and the related abstract implication 2 VLDBJ → 2 ICDE, SIGMOD, VLDB. Both the abstract closed pattern and its abstract generator VLDBJ have an abstract support set of 38 among the 1276 VLDBJ authors in the dataset. The implication states that a dense group of co-authors that have published in the Very Large Database Journal also have published in several database conferences. We present Figure <ref type="figure" target="#fig_4">3</ref> the corresponding subgraph. Such a very dense co-authoring subgraph within the VLDBJ subgraph is somewhat unexpected. We made then some investigations in the DBLP repository, focussing of these authors, and found an article whose abstract begins as follows:</p><p>A group of senior database researchers gathers every few years to assess the state of database research ... with the following reference: In some sense the explanation of the pattern we discovered is straightforward. However, the whole purpose of pattern mining is to find unexpected patterns, hidden within large datasets, and interpret them in order to acquire some new knowledge. It is exactly what happens here: we were not aware of these regular meetings of senior database researchers, and we learned something new, though, of course, this knowledge is clearly widely known within the database community.</p><p>When considering a weaker abstraction, namely here a degree ≥ 4 abstraction, we obtain more abstract closed patterns sometimes made of several connected components. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Local closed patterns in attributed networks</head><p>In <ref type="bibr" target="#b12">[5]</ref> we introduced locality in the closure framework with as main motivation investigating local patterns in attributed graphs. We first summarize here main definitions and results. For that purpose we have to consider pre-confluences and confluences which are structures weaker than lattices investigated in <ref type="bibr" target="#b8">[1,</ref><ref type="bibr" target="#b12">5]</ref>. Confluences, in particular, are close to but different from confluent families as defined in <ref type="bibr" target="#b14">[7]</ref>. We further denote by E x the up sets {y ∈ E|y ≥ x} of an ordered set E, by E x its down sets {y ∈ E|y ≤ x}, and by min(E) the set of its minimal elements. First note that partial orders considered here are all finite. We first define a preconfluence as an ordered structures that generalize the lattice structure: Definition 3 F is a pre-confluence if and only if for any m ∈ min(F ),</p><formula xml:id="formula_7">F m = {x ∈ F | x ≥ m} is a lattice.</formula><p>A consequence of this definition is that a (finite) lattice is a pre-confluence with a minimum. The structure has a partial join operator: Lemma 3 For any x, y ∈ F m their least upper bound does not depend on m:</p><formula xml:id="formula_8">1. x ∨ F y is the least element of F x ∩ F y</formula><p>This means that a pre-confluence is a union of lattices in which joins coincide. A particular case is which of a pre-confluence included in a host lattice and which is join preserving: Definition 4 Let T be a lattice and F ⊆ T be a pre-confluence with as join ∨ F = ∨ T , F is called a confluence of T .</p><p>An abstraction of T , as defined above is a confluence of T with ⊥ T as minimum. We have then the following property when considering 2 O as the host lattice: Proposition 3 Let X = 2 O be a lattice, F ⊆ X is a confluence of X if and only if for any x, y ∈ F m with m ∈ min(F ), we have that x ∪ y belongs to F .</p><p>A confluence, is then associated to a set of interior operators: Proposition 4 Let F be a confluence of a lattice X, and m ∈ min(F ),</p><formula xml:id="formula_9">-p m : X m → X m , such that p m (x) = ∨ q∈F m ∩Xx q, is an interior operator and p m [X m ] = F m .</formula><p>We are concerned here with extensional confluences, i.e. confluences of X = 2 O [5] that generalize extensional abstractions as graph abstractions. In this case, let x be an element of X greater than or equal to some minimal element m of F , then p m (x) returns the greatest subset of x in F that includes m. In the example that follows we define a graph confluence by only considering vertex subsets inducing connected subgraphs of some graph G = (O, E). Example 1. Let G = (O, E) be a graph (displayed at the bottom of Figure <ref type="figure" target="#fig_6">5</ref>) whose vertex set is O = {1, 2, 3, 4}. Let F ⊆ 2 O be the set of vertex subsets inducing connected subgraphs of G. We call them connected vertex subsets. F is a confluence whose set of minimal elements is min(F ) = {{1}, {2}, {3}, {4}}, i.e. the set of singletons of 2 O . The union of two connected vertex subsets that each contains a given vertex s obviously also is a connected vertex subsets and therefore F is a confluence of 2 O . In what follows, by abuse of notation we write p s and F s rather than p {s} and F {s} .The interior operator p s projects then any vertex subset e containing vertex s on the connected component of the subgraph G e induced by e that contains s. The up set F s is then the set of connected vertex subsets containing s and the union of all these F s represents the whole set of connected subgraphs of G. The subset F 1+3 = F 1 ∪ F 3 representing connected vertex subsets containing vertices 1 or 3 also is a confluence. Figure <ref type="figure" target="#fig_6">5</ref> displays the diagram of F 1+3 . 2</p><p>The support set e of a pattern q may then be projected, through interior operators, on various smaller local support sets {e i } corresponding, in the graph confluence case, to the connected components of the pattern subgraph. These interior operators are associated to local closure operators <ref type="bibr" target="#b12">[5]</ref>:</p><p>Proposition 5 Let F be a confluence of X = 2 O , m a minimal element of F and L int(m) be the down set of the pattern lattice L whose elements q are such that q ≥ int(m), then</p><formula xml:id="formula_10">f m = int • p m • ext is a closure operator on L int(m)</formula><p>In the graph confluence case, let e = ext(q), p s (e) is the connected component of the pattern subgraph G e to which belongs the vertex s. Obviously p s (e) = p v (e) for any vertex v in the same connected component. Therefore f s (q) is a local closed pattern w.r.t. any vertex in this connected component, i.e. the most specific pattern shared by the vertices in the connected component.</p><p>Now an important result is that that the set of local support sets is a pre-confluence:</p><formula xml:id="formula_11">Theorem 1. The mapping h : F → F : h(e) = p m • ext • int(e) for m ≤ e is a closure operator on F and E = h[F ] is a pre-confluence.</formula><p>h(e) is therefore the local support set of int(e) that contains m ≤ e. h[F ] is a pre-confluence isomorphic to the set P of local concept pairs defined as follows: To summarize we have defined local concepts as (local support set, local closed patterns) pairs and shown they were organized in a structure with possibly several minimal elements, therefore generalizing the concept lattice definition. In the simple graph confluence exemplified above the local support sets simply are the connected components of the pattern subgraphs. We will now extend graph confluences by intersecting this simple graph confluence with abstractions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Cc-confluences</head><p>We remark now that we can freely intersect confluences:</p><formula xml:id="formula_12">Proposition 6 Let F 1 and F 2 be confluences of X, then F 1 ∩ F 2 is a confluence</formula><p>And as abstractions of X are confluences of X with the bottom element of X as their unique minimal element, the above proposition means we can freely intersect abstractions with confluences to build smaller confluences. Many confluences can then be derived from a graph confluence by intersecting it with some abstractions. We call this family of confluences the cc-confluences. For instance, considering A as the kclique abstraction, we obtain the cc-confluence of connected subgraphs of G made of k-cliques. Note that cc-confluences have an important property: rather than considering the minimal elements of F when defining local closure operators we can consider vertices. This is because given a vertex subset v in some pattern subgraph, all minimal elements containing v belong to the same connected component as v, and therefore the local support sets are the same. This is computationally important as this means that when considering local support sets we only need to consider each vertex in the support set and associate it to the connected component to which it belongs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Local implications</head><p>Inclusion of local support sets define local implication rules 2 m q → 2 m w where m is a minimal element of F A in the support set of q. Note that, as the local support set of pattern q is obtained by applying an interior operator, which is monotone, to the support set of q, we have that whenever 2q → 2w is valid and m ⊆ ext A (w), we also have that 2 m q → 2 m w is valid, i.e. we may infer the latter local rule from the former abstract rule.</p><p>We search now for a basis B of valid local implication rules from which we may infer any local implication rules. We will consider a basis B m for a given minimal element m of F and obtain the whole basis B = ∪B m by joining these bases. Consider a given abstract closed pattern c whose abstract support set has a connected component that contains m, and let l = f m (c) be the corresponding local closed pattern, with respect to the cc-confluence F A . We have then that the implication rule 2 m c → 2 m l holds. We select then a basis B m of informative (l = c) and irredundant ( there is no other rule 2 m c → 2 m l with c less specific than c in the rule set) ones. From B m we may infer all local implication rules associated to m by applying standard axioms in the same way as in the case of the min-max basis in the standard closed or abstract framework. The basis B = ∪B m represents the local knowledge deriving from the reduction of the extensional space from abstraction A to cc-confluence F A .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Experiments on cc-confluences</head><p>To shortly examplifiy local implications and local concepts we come back to our experiments on the DBLP dataset in Section 3.3 and specifically the abstract closed pattern DMKD, IDArev, with respect to the degree ≥ 4 abstraction, whose abstract support set is represented in red on Figure <ref type="figure">4</ref>. When considering the connected component on the left of FIgure <ref type="figure">4</ref>, we obtain the local implication DMKD,IDArev → 268924 DMgroup stating that in the connected component of the abstract subgraph to which belongs the author 268924, each author has also published in some data mining conference belonging to DMgroup. Now, when considering the Teenage Friends attributed graph displayed Figure <ref type="figure" target="#fig_0">1</ref>, clearly the friendship relations are organized in 3-cliques, therefore any stronger abstraction will be poorly informative. However, as mentioned in Section 1, when considering the 3-clique abstract graph associated to the empty pattern the unique connected component could be separated in several (overlapping) communities (displayed in various colors). We discuss and exemplify in the next section how to apply the local closure strategy to discover such subcommunities in an attributed graph.</p><p>In what follows, we will consider a family T ⊆ 2 O of vertex subsets, and consider T as the vertex set of a graph G T = (T, E T ) derived from G. The simple graph confluence F of 2 T is then the new extensional space and we will search for the corresponding local closed patterns. The local support sets are afterwards transformed into support sets in 2 O . Let u : 2 T → 2 O be such that u(e T ) = ∪ t∈e T t. u(e T ) is called the flattening of e T . We consider then the two maps ext T and int T defined as follows:</p><formula xml:id="formula_13">-ext T : L → 2 T with ext T (q) = {t|t ⊆ ext(q)} -int T : 2 T → L with int T (e T ) = int • u(e T )</formula><p>ext T (q) represents the support set of q in T when considering that q occurs in t whenever q occurs in all elements of t (seen as a subset of O). Conversely int T (e T ) represents the greatest pattern in L whose support set in T includes e T , i.e. whose support set in O contains, as subsets, the elements of e T . Now, consider as T the family of k-cliques of G and that (t 1 , t 2 ) ∈ E T whenever t 1 and t 2 share k − 1 vertices in G. A k-community in G <ref type="bibr" target="#b15">[8]</ref> is a vertex subset that results from the flattening (in the sens defined above) of some connected component of G T . The local closed patterns w.r.t. F are then most specific patterns occurring in k-communities of pattern subgraphs of G. This way we obtain a local concept pre-confluence, and associated local implications, whose local support sets are these k-communities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Experiments on derived cc-confluences</head><p>Coming back to our Teenage Friendship attributed graph, we have applied this strategy and built the derived graph G T where T is the set of 3-cliques of the original attributed graph. We display Figures <ref type="figure" target="#fig_9">6 and 7</ref> the local concept pre-confluence of 3-communities which size is greater than or equal to 4 members<ref type="foot" target="#foot_6">9</ref> . The minimal 3-communities are the lowest ones on both Figures. Each element of the pre-confluence represents a (3community, local closed pattern) pair but may be associated to several non redundant local implications. This happens for one 3-community displayed on the right at the bottom of Figure <ref type="figure" target="#fig_8">6</ref> and associated to two local implications each represented in a square. Each square displays in red the 3-community, and in red+green+blue the abstract support set of the abstract closed pattern forming the left part of the implication. In Figure <ref type="figure" target="#fig_9">7</ref> we have a unique maximal 3-community on the top, and a hierarchy of sub-communities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Implementation</head><p>In our experiments we use the CORON software <ref type="bibr" target="#b22">[15]</ref> to compute frequent closed patterns, according to some frequency threshold, then apply a set of PYTHON functions  In a work in progress, we consider a more efficient computation of abstract and local closed patterns and related implications. The corresponding algorithm uses a divide and conquer strategy similar to that proposed in <ref type="bibr" target="#b14">[7]</ref>, and therefore allows to directly apply the frequency constraints at the abstract and local level.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusion</head><p>In the present article we are interested in addressing problems in which the extensional space, made of the vertex subsets of an attributed network, is constrained according to connectivity properties. We have first considered abstract vertex subsets in which a constraint have to be satisfied by each vertex in the subgraph they induce, as for instance a minimum degree constraint. The extensional space is in this case a particular lattice called an abstraction. We have then shown, benefiting from previous work in FCA, how abstract support closed patterns, i.e. maximal patterns among those sharing the same abstract support set, could be obtained using a closure operator. This led to define a wide class of abstract concept lattices, whose elements are (abstract support set, abstract closed pattern) pairs, each corresponding to a particular abstraction. We obtain this way a global information on how the graph topology is related to the patterns support sets. We have then considered a way to extract local knowledge from an attributed network. For that purpose, using a recent extension of FCA to local extensional spaces, called confluences, we have related each pattern to various local support sets, corresponding to connected components in subgraphs induced by abstract vertex subsets. We obtain this way a set of local concepts, organized in a generalization of the lattice structure called a pre-confluence. Furthermore we have defined both abstract implications and local implications rules representing knowledge which is valid at the abstract and local levels, i.e., regarding the latter, in the vicinity of particular vertices. Finally we have applied these ideas to define the pre-confluence of 3-communities in a social network. These 3-communities are in fact sub-communities as each is a 3-community in some subnetwork induced by an attribute pattern. Overall, what we propose here is a new way, brought by recent developments in Formal Concept Analysis, to explore social networks as attributed graphs. Future works concerns, on the extensional side, applying these ideas to attributed directed graphs or multiplex networks. We also consider to use abstract and local extensional constraints while extending the pattern language to a</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The original friendship graph of a group of West Scotland pupils. The pupils and edges forming 3-communities of size at least 4 are colored. Empty vertices do not belong to the 3-clique abstraction of the graph.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 .</head><label>2</label><figDesc>Figure 2. Graph abstractions corresponding to various vertex characteristic properties. In each graph plain circles and plain lines form the abstract subgraph, crosses and dotted lines represent the vertices and edges out of the abstract subgraph. (a) x has to belong to a triangle, (b)x has to belong to a 2-clan of size at least 6, (c) x has to be connected to a vertex y such that the degree of y is at least 6, (d) x has to belong to a connected component whose size is at least 3.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Lemma 2</head><label>2</label><figDesc>Let P1 and P2 two characteristic properties of abstractions defined on the same object set O, and let P1 ^P2 and P1 _ P2 be defined as follows: • P1 ^P2(x, e) = P1(x, e) ^P2(x, e) • P1 _ P2(x, e) = P1(x, e) _ P2(x, e) Both P1 ^P2 and P1 _ P2 are characteristic properties of abstractions.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 2 .</head><label>2</label><figDesc>Fig.2. Graph abstractions corresponding to various vertex characteristic properties. In each graph plain circles and plain lines form the abstract subgraph, crosses and dotted lines represent the vertices and edges out of the abstract subgraph. (a) x has to belong to a triangle, (b) x has to belong to a 2-club of size at least 6, (c) x has to be connected to a vertex y such that the degree of y is at least 6, (d) x has to belong to a connected component whose size is at least 3.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. The subgraph obtained when applying the degree ≥ 16 abstraction to the VLDBJ subgraph in the DBLP co-authoring experiment.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 4 Fig. 4 .</head><label>44</label><figDesc>Fig. 4. The DMKD,IDArev pattern subgraph in the DBLP co-authoring experiment. The red vertices and edges represent the subgraph induced by the degree ≥ 4 abstract support set.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. A square graph (in the bottom of the figure) and the Hass diagram of the confluence F 1+3 of connected vertex subsets that contain vertices 1 or 3.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Definition 5</head><label>5</label><figDesc>The set of local concept pairs P = {(e, l) | e = p m • ext(l), l = int(e), m ≤ e} is called a local concept pre-confluence.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. The pre-confluence of size ≥ 4 3-communities of the Teenage Friendship graph(part-I)</figDesc><graphic coords="15,308.66,133.97,154.96,241.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. The pre-confluence of size ≥ 4 3-communities of the Teenage Friendship graph(part-II)</figDesc><graphic coords="15,264.75,555.30,77.20,60.06" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_0">In data mining the extension of a pattern in a set of objects is also called its support set.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_1">http://www.stats.ox.ac.uk/ ˜snijders/siena/s50_data.htm</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_2">http://www.stats.ox.ac.uk/ ˜snijders/siena/s50_data.htm</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_3">Conferences: KDD, ICDM, ECML/PKDD, PAKDD, SIAM DM, AAAI, ICML, IJCAI, IDA, DASFAA, VLDB, CIKM, SIGMOD, PODS, ICDE, EDBT, ICDT, SAC ? Journals: IEEE TKDE, DAMI, IEEE Int. Sys., SIGKDD Exp., Comm. ACM, IDA J., KAIS, SADM, PVLDB, VLDB J., ACM TKDD</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_4">http://webdocs.cs.ualberta.ca/ ˜zaiane/htmldocs/ConfRanking. html. DB = {VLDB, SIGMOD, PODS, ICDE, ICDT, EDBT, DASFAA, CIKM}; DM= {SIGKDD Explorations, ICDM, PAKDD, ECML/PKDD, SDM}; AI= {IJCAI, AAAI, ICML, ECML/PKDD};</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_5">We recall that in a lattice any pair of elements (x, y) has a greatest lower bound x ∧ y (or meet) and a least upper bound (or join) x ∨ y</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="9" xml:id="foot_6">Formally, this means that we also apply to the derived graph an abstraction to avoid connected components corresponding to 3-communities smaller than 4 members.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="10" xml:id="foot_7">The corresponding software is to be found in https://lipn.univ-paris13.fr/ ˜santini/ .</note>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>wider class of pattern languages. First, as in <ref type="bibr" target="#b23">[16,</ref><ref type="bibr" target="#b18">11,</ref><ref type="bibr" target="#b24">17]</ref> by building a meet-semilattice adatpted to the mining problem and using interior operators to reduce it to a tractable language. This has been in particular successfully applied to graph mining <ref type="bibr" target="#b25">[18]</ref>.Then, as in <ref type="bibr" target="#b13">[6,</ref><ref type="bibr" target="#b14">7]</ref> by considering confluent languages allowing to consider connectivity within the pattern language.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Entrepôts de contenu autour de XML et des services Web</title>
	</analytic>
	<monogr>
		<title level="j">EDA</title>
		<imprint>
			<biblScope unit="page" from="1" to="2" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A Framework for Distributed XML Data Management</title>
		<author>
			<persName><forename type="first">Serge</forename><surname>Abiteboul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ioana</forename><surname>Manolescu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">EDBT</title>
		<imprint>
			<biblScope unit="page" from="1049" to="1058" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
	<note>Emanuel Taropa</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Querying and Updating Probabilistic Information in XML</title>
		<author>
			<persName><forename type="first">Serge</forename><surname>Abiteboul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Pierre</forename><surname>Senellart</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">EDBT</title>
		<imprint>
			<biblScope unit="volume">2006</biblScope>
			<biblScope unit="page" from="1059" to="1068" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Zdonik: The Lowell database research self-assessment</title>
		<author>
			<persName><forename type="first">Karl</forename><surname>Schnaitter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Serge</forename><surname>Abiteboul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tova</forename><surname>Milo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Serge</forename><surname>Abiteboul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rakesh</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Philip</forename><forename type="middle">A</forename><surname>Bernstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><forename type="middle">J</forename><surname>Carey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Stefano</forename><surname>Ceri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">Bruce</forename><surname>Croft</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><forename type="middle">J</forename><surname>Dewitt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><forename type="middle">J</forename><surname>Franklin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hector</forename><surname>Garcia-Molina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dieter</forename><surname>Gawlick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jim</forename><surname>Gray</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Laura</forename><forename type="middle">M</forename><surname>Haas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alon</forename><forename type="middle">Y</forename><surname>Halevy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Joseph</forename><forename type="middle">M</forename><surname>Hellerstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yannis</forename><forename type="middle">E</forename><surname>Ioannidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Martin</forename><forename type="middle">L</forename><surname>Kersten</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><forename type="middle">J</forename><surname>Pazzani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><surname>Lesk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><surname>Maier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jeffrey</forename><forename type="middle">F</forename><surname>Naughton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hans-Jörg</forename><surname>Schek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Timos</forename><forename type="middle">K</forename><surname>Sellis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Avi</forename><surname>Silberschatz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><surname>Stonebraker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Richard</forename><forename type="middle">T</forename><surname>Snodgrass</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jeffrey</forename><forename type="middle">D</forename><surname>Ullman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gerhard</forename><surname>Weikum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jennifer</forename><surname>Widom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Stanley</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SIGMOD Conference 2006</title>
				<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="volume">48</biblScope>
			<biblScope unit="page" from="111" to="118" />
		</imprint>
	</monogr>
	<note>Neoklis Polyzotis: COLT: continuous on-line tuning</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Digital library information-technology infrastructures</title>
		<author>
			<persName><forename type="first">E</forename><surname>Yannis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><surname>Ioannidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Serge</forename><surname>Maier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Peter</forename><surname>Abiteboul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Susan</forename><forename type="middle">B</forename><surname>Buneman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Edward</forename><forename type="middle">A</forename><surname>Davidson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alon</forename><forename type="middle">Y</forename><surname>Fox</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Craig</forename><forename type="middle">A</forename><surname>Halevy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Fausto</forename><surname>Knoblock</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hans-Jörg</forename><surname>Rabitti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gerhard</forename><surname>Schek</surname></persName>
		</author>
		<author>
			<persName><surname>Weikum</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. on Digital Libraries</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="266" to="274" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">In memory of Seymour Ginsburg 1928 -2004</title>
		<author>
			<persName><forename type="first">Serge</forename><surname>Abiteboul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Richard</forename><surname>Hull</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Victor</forename><surname>Vianu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sheila</forename><forename type="middle">A</forename><surname>Greibach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><forename type="middle">A</forename><surname>Harrison</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ellis</forename><surname>Horowitz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Daniel</forename><forename type="middle">J</forename><surname>Rosenkrantz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jeffrey</forename><forename type="middle">D</forename><surname>Ullman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Moshe</forename><forename type="middle">Y</forename><surname>Vardi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIGMOD Record</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="5" to="12" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Exchanging intensional XML data</title>
		<author>
			<persName><forename type="first">Tova</forename><surname>Milo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Serge</forename><surname>Abiteboul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bernd</forename><surname>Amann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Omar</forename><surname>Benjelloun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Frederic</forename><forename type="middle">Dang</forename><surname>Ngoc</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Database Syst</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="40" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Tova Milo: Active XML and Data Activation</title>
		<author>
			<persName><forename type="first">Serge</forename><surname>Abiteboul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Susan</forename><forename type="middle">B</forename><surname>Davidson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Abstract State Machines</title>
		<imprint>
			<biblScope unit="page" from="11" to="16" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Graph abstraction for closed pattern mining in attributed network</title>
		<author>
			<persName><forename type="first">H</forename><surname>Soldano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Santini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">European Conference in Artificial Intelligence (ECAI)</title>
				<editor>
			<persName><forename type="first">T</forename><surname>Schaub</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Friedrich</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>O'sullivan</surname></persName>
		</editor>
		<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">263</biblScope>
			<biblScope unit="page" from="849" to="854" />
		</imprint>
	</monogr>
	<note>Frontiers in Artificial Intelligence and Applications</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Abstract Concept Lattices</title>
		<author>
			<persName><forename type="first">H</forename><surname>Soldano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Ventos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Formal Concept Analysis (ICFCA)</title>
				<editor>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Jäschke</surname></persName>
		</editor>
		<meeting><address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">6628</biblScope>
			<biblScope unit="page" from="235" to="250" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Finding collections of k-clique percolated components in attributed graphs</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">N</forename><surname>Mougel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Rigotti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Gandrillon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">PAKDD(2), Advances in Knowledge Discovery and Data Mining -16th Pacific-Asia Conference, PAKDD 2012</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting><address><addrLine>Kuala Lumpur, Malaysia</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012-06-01">May 29 -June 1, 2012. 2012</date>
			<biblScope unit="volume">7302</biblScope>
			<biblScope unit="page" from="181" to="192" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Mining attribute-structure correlated patterns in large attributed graphs</title>
		<author>
			<persName><forename type="first">A</forename><surname>Silva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Meira</surname><genName>Jr</genName></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Zaki</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proc. VLDB Endow</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="466" to="477" />
			<date type="published" when="2012-01">January 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Extensional confluences and local closure operators</title>
		<author>
			<persName><forename type="first">H</forename><surname>Soldano</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Formal Concept Analysis -13th International Conference, ICFCA 2015</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">J</forename><surname>Baixeries</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Sacarea</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Ojeda-Aciego</surname></persName>
		</editor>
		<meeting><address><addrLine>Nerja, Spain</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">June 23-26, 2015. 9113. 2015</date>
			<biblScope unit="page" from="128" to="144" />
		</imprint>
	</monogr>
	<note>Proceedings.</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Closed patterns and abstraction beyond lattices</title>
		<author>
			<persName><forename type="first">H</forename><surname>Soldano</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Formal Concept Analysis 12th International Conference, ICFCA 2014</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">C</forename><forename type="middle">V</forename><surname>Glodeanu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Kaytoue</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Sacarea</surname></persName>
		</editor>
		<meeting><address><addrLine>Cluj-Napoca, Romania</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">June 10-13. 2014</date>
			<biblScope unit="volume">8478</biblScope>
			<biblScope unit="page" from="203" to="218" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Listing closed sets of strongly accessible set systems with applications to data mining</title>
		<author>
			<persName><forename type="first">M</forename><surname>Boley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Horváth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Poigné</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wrobel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theor. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">411</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="691" to="700" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Uncovering the overlapping community structure of complex networks in nature and society</title>
		<author>
			<persName><forename type="first">G</forename><surname>Palla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Derenyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Farkas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Vicsek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Nature</title>
		<imprint>
			<biblScope unit="volume">435</biblScope>
			<biblScope unit="page" from="814" to="818" />
			<date type="published" when="2005-06">7043. Jun 2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Mining Graph Topological Patterns: Finding Co-variations among Vertex Descriptors</title>
		<author>
			<persName><forename type="first">Bechara</forename><surname>Prado</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Plantevit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Robardet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Boulicaut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Knowledge and Data Engineering</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="2090" to="2104" />
			<date type="published" when="2013-09">September 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Generating a condensed representation for association rules</title>
		<author>
			<persName><forename type="first">N</forename><surname>Pasquier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Taouil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Bastide</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Stumme</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Lakhal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal Intelligent Information Systems (JIIS)</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="29" to="60" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Zoom: a nested Galois lattices-based system for conceptual clustering</title>
		<author>
			<persName><forename type="first">N</forename><surname>Pernelle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Rousset</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Soldano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Ventos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. of Experimental and Theoretical Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="157" to="187" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Novel approaches for analyzing biological networks</title>
		<author>
			<persName><forename type="first">B</forename><surname>Balasundaram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Butenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Trukhanov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Combinatorial Optimization</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="23" to="39" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Emergence of scaling in random networks</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Barabàsi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Albert</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science</title>
		<imprint>
			<biblScope unit="volume">286</biblScope>
			<biblScope unit="issue">5439</biblScope>
			<biblScope unit="page" from="509" to="512" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Uncovering the overlapping community structure of complex networks in nature and society</title>
		<author>
			<persName><forename type="first">G</forename><surname>Palla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Derenyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Farkas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Vicsek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Nature</title>
		<imprint>
			<biblScope unit="volume">435</biblScope>
			<biblScope unit="page" from="814" to="818" />
			<date type="published" when="2005-06">7043. Jun 2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Coron: A framework for levelwise itemset mining algorithms</title>
		<author>
			<persName><forename type="first">L</forename><surname>Szathmary</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Third International Conference on Formal Concept Analysis (ICFCA&apos;05)</title>
		<title level="s">Supplementary Proceedings</title>
		<editor>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Godin</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><forename type="middle">M</forename><surname>Nguifo</surname></persName>
		</editor>
		<meeting><address><addrLine>Lens, France</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="110" to="113" />
		</imprint>
	</monogr>
	<note>Supplementary Proceedings</note>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Pattern structures and their projections</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICCS-01</title>
				<imprint>
			<date type="published" when="2001">2001</date>
			<biblScope unit="volume">2120</biblScope>
			<biblScope unit="page" from="129" to="142" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">An introduction to logical information systems</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ferré</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Ridoux</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing and Management</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="383" to="419" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Learning closed sets of labeled graphs for chemical applications</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">V</forename><surname>Samokhin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ILP</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">S</forename><surname>Kramer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Pfahringer</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="volume">3625</biblScope>
			<biblScope unit="page" from="190" to="208" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
