<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">GARM: Generalized Association Rule Mining</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">T</forename><surname>Hamrouni</surname></persName>
							<email>tarek.hamrouni@fst.rnu.tn</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Department of Computer Science</orgName>
								<orgName type="department" key="dep2">Faculty of Sciences of Tunis</orgName>
								<address>
									<settlement>Tunis</settlement>
									<country key="TN">Tunisia</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution" key="instit1">CRIL-CNRS</orgName>
								<orgName type="institution" key="instit2">IUT de Lens</orgName>
								<address>
									<settlement>Lens</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">S</forename><forename type="middle">Ben</forename><surname>Yahia</surname></persName>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Department of Computer Science</orgName>
								<orgName type="department" key="dep2">Faculty of Sciences of Tunis</orgName>
								<address>
									<settlement>Tunis</settlement>
									<country key="TN">Tunisia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">E</forename><surname>Mephu Nguifo</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution" key="instit1">CRIL-CNRS</orgName>
								<orgName type="institution" key="instit2">IUT de Lens</orgName>
								<address>
									<settlement>Lens</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">GARM: Generalized Association Rule Mining</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">97E4F7377E930E9E8E3AA449B6F02A23</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T10:36+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Data mining</term>
					<term>disjunctive closed pattern</term>
					<term>frequent essential pattern</term>
					<term>disjunctive support</term>
					<term>equivalence class</term>
					<term>partially ordered structure</term>
					<term>generalized association rules</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>A thorough scrutiny of the literature dedicated to association rule mining highlights that a determined effort focused so far on mining the co-occurrence relations between items, i.e., conjunctive patterns. In this respect, disjunctive patterns presenting knowledge about complementary occurring items were neglected in the literature. Nevertheless, recently a growing number of works is shedding light on their importance for the sake of providing a richer knowledge for users. For this purpose, we propose in this paper a new tool, called GARM, aiming at building a partially ordered structure amongst some particular disjunctive patterns, namely the disjunctive closed ones. Starting from this structure, deriving generalized association rules, i.e., those offering conjunctive, disjunctive and negative connectors between items, becomes straightforward. Our experimental study put the focus on the mining performances as well as the quantitative aspect and proved the utility of the proposed approach.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction and Motivations</head><p>Association rule mining is a fundamental topic in Data mining <ref type="bibr" target="#b0">[1]</ref>. It has been extensively investigated since its inception. Its key idea consists in looking for causal relationships between sets of items, commonly called itemsets, where the presence of some items suggests that others follow from them. A typical example of a successful application of association rules is the market basket analysis, where the discovered rules can lead to important marketing and management strategic decisions. Recently, mining association rules was extended to various pattern classes like sequential patterns, graphs, etc. Nevertheless, the main moan that can be addressed to the contributions related to association rules is their focus on co-occurrences between items <ref type="bibr" target="#b1">[2]</ref>, probably as a heritage of the market basket analysis framework. Indeed, almost all related works neglect the other kinds of relations, like mutually exclusive occurrences <ref type="bibr" target="#b2">[3]</ref>, that can also bring information of worth interest for users.</p><p>In this paper, we propose a new tool, called GARM <ref type="foot" target="#foot_0">1</ref> , covering the whole process allowing the extraction of generalized association rules. These latter generalize classical rules -positive rules -to offer disjunctive and negative connectors between items, in addition to the conjunctive one <ref type="bibr" target="#b3">[4]</ref>. Our tool includes a first component making it possible extracting a concise representation of frequent patterns based on disjunctive patterns. Thanks to a second component, these latter will be partially structured w.r.t. set inclusion. Once the partially ordered structure obtained, generalized association rules can be easily derived thanks to the last component of our tool.</p><p>Noteworthily, extracting an exact concise representation of frequent patterns in the first component of the process makes it possible to exactly derive the different supports of each frequent pattern. This will make us able to compute the exact values of quality measures. Indeed, it was shown in <ref type="bibr" target="#b4">[5]</ref> that almost all interestingness measures for association rules are expressed depending on the support of the rule and those of its associated premise and conclusion. In addition, using disjunctive patterns -in particular closed and essential patterns <ref type="bibr" target="#b5">[6]</ref> -will provide an interesting starting point towards mining association rules conveying complementary occurrences between items, rather than co-occurrences. Indeed, these latter relationships -co-occurrences within literals<ref type="foot" target="#foot_2">2</ref> -were explored in-depth in the literature through association rules having conjunction of literals, called literalsets, in premise and conclusion. This leads to what is commonly known as positive and negative association rules. While disjunctive association rules only have recently begin to grasp the interest of researchers.</p><p>In general, generalized association rules are useful in many applications. In particular, disjunctive association rules -having disjunction of items either in premise or in conclusion -were considered for two main purposes: On the one hand, they were used as an intermediate step for defining some concise representations for frequent patterns <ref type="bibr" target="#b0">[1]</ref>. On the other hand, they were exploited to provide users with new forms of association rules <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. For example, the added-value of such association rules has been recently highlighted in <ref type="bibr" target="#b1">[2]</ref>. It is however important to note that generalized association rules can be considered as particular GUHA rules <ref type="bibr" target="#b8">[9]</ref>.</p><p>Note that we restrict ourselves in this work to disjunctive closed patterns whose smallest seeds, i.e. essential patterns, are frequent with respect to a minimum conjunctive support threshold. This is argued by the fact that we aim at retaining the spirit of association rule mining where this threshold, as well as the confidence-based one, is used to dramatically limit the number of extracted association rules. In addition, the use of a partially ordered structure will make it possible to select representative subsets of rules to be extracted. This nucleus of rules will be of paramount help for avoiding to overwhelm users by highly-sized rule lists.</p><p>The remainder of the paper is organized as follows. The next section discusses the related work. Section 3 recalls the key notions used throughout this paper. The structural properties of the disjunctive search space are explored in Section 4, followed by a detailed description of the GARM tool having for purpose to offer a complete process for the extraction of generalized association rules in Section 5. Experimental results focusing on the mining time as well as the quantitative aspect are reported and discussed in Section 6. Section 7 concludes the paper and points out future works.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related Work</head><p>Contributions related to association rule mining mainly concentrated on the classical rule form, namely that presenting conjunction of items in both premise and conclusion parts. In this respect, many concise representations for such rules were proposed in the literature <ref type="bibr" target="#b9">[10]</ref>. Recently, some works focused on introducing negative items. Nevertheless, the majority of items are not present in each transaction leading to explosive amounts of association rules with negation. Thus, existing approaches have tried to address this problem through the use of additional background information about the data, incorporating attribute correlations, and additional rule interestingness measures, etc. Here we will mainly detail the reduced number of related works on association rules relying on the disjunctive connector within items.</p><p>Some works <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref> were interested in using the disjunction connector within the association rule mining issue to define what is called generalized association rules. These rules grasped the interest of many researchers since they offer wealthier types of knowledge in many applications. In addition to the inclusive disjunction operator, i.e., the operator ∨, Nanavati et al. in <ref type="bibr" target="#b7">[8]</ref> were also interested in the exclusive disjunction operator, denoted ⊕. The authors hence proposed two kinds of rules which are the simple disjunctive rules and the generalized disjunctive ones. Simple disjunctive rules are those having either the premise or the conclusion (i.e., not simultaneously both) composed by a disjunction of items. This disjunction can be inclusive (the simultaneous occurrence of items is possible) or exclusive (two distinct items cannot occur together). On the other hand, generalized disjunctive rules are disjunctive rules whose premises or conclusions contain a conjunction of disjunctions. These disjunctions can either be inclusive or exclusive. In <ref type="bibr" target="#b6">[7]</ref>, the author mainly focuses on getting out association rules having conclusions containing mutually exclusive items, i.e., the presence of one of them leads to the absence of the others, what is expressed in <ref type="bibr" target="#b7">[8]</ref> using the operator ⊕. Other forms of generalized association rules were also described in <ref type="bibr" target="#b10">[11]</ref>. In <ref type="bibr" target="#b11">[12]</ref>, Shima et al. extract what they called disjunctive closed rules. In their work, a disjunctive closed rule simply stands for a clause under the disjunctive normal form (DNF) such that its disjuncts are constituted by frequent closed patterns. Elble et al. used disjunctive rules to handle numerical attributes by considering disjunctions between intervals <ref type="bibr" target="#b12">[13]</ref>. This latter work extends other ones taking also into account categorical attributes (see <ref type="bibr" target="#b12">[13]</ref> for references). Finally, it is worth noting that the disjunction connector has also been used to define some concise representations of frequent patterns through the so-called disjunctive rule (see for example <ref type="bibr" target="#b0">[1]</ref> for references).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Basic Concepts</head><p>In this section, we briefly sketch the key notions that will be of use throughout the paper. Example 1. We will consider in the remainder a context that consists of transactions (1, AB ), (2, ACD ), (3, CDE ), (4, DEF ), (5, ABCDE ), and (6, ABC )<ref type="foot" target="#foot_4">3</ref> . Definition 2. (SUPPORTS OF A PATTERN) Let K = (O, I, R) be a context and I be a pattern. We mainly distinguish three kinds of supports related to I:</p><formula xml:id="formula_0">Supp( ∧ I ) = | {o ∈ O | (∀ i ∈ I, (o, i) ∈ R)} | Supp( ∨ I ) = | {o ∈ O | (∃ i ∈ I, (o, i) ∈ R)} | Supp(I ) = | {o ∈ O | (∀ i ∈ I, (o, i) / ∈ R)} |</formula><p>Roughly speaking, the semantics of the aforementioned supports is as follows:</p><p>• Supp(∧ I ) is the number of objects containing all items of I.</p><p>• Supp(∨ I ) is the number of objects containing at least one item of I.</p><p>• Supp(I ) is the number of objects that do not contain any item of I.</p><p>Note also that Supp(∨ I ) and Supp(I ) are two complementary quantities w.r.t. |O| in the sense that:</p><formula xml:id="formula_1">Supp(∨ I ) + Supp(I ) = |O|.</formula><p>Example 2. Consider our running context. We have Supp(</p><formula xml:id="formula_2">∧ CDE) = | {3, 5} | = 2, Supp(∨ CDE) = | {2, 3, 4, 5, 6} | = 5 and Supp(CDE) = | {1} | = 1.</formula><p>Hereafter, Supp(∧ I ) will simply be denoted Supp(I ). In addition, if there is no risk of confusion, the conjunctive support will simply be called support. A pattern I is said to be frequent if Supp(I ) is greater than or equal to a minimum support threshold, denoted minsupp. Since the set of frequent patterns is an order ideal, the set of items I will be considered as only containing frequent items. Lemma 1 states that conjunctive supports can be derived starting from disjunctive ones.</p><p>Lemma 1. <ref type="bibr" target="#b13">[14]</ref> Let I ⊆ I. The following equalities hold:</p><formula xml:id="formula_3">Supp(I ) = ∅⊂I ⊆I ( − 1) |I |−1 Supp( ∨ I )</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Structural Properties of the Disjunctive Search Space</head><p>In this section, we will characterize disjunctive patterns through the associated equivalence classes induced by the following closure operator:</p><formula xml:id="formula_4">Definition 3. Let K = (O, I, R</formula><p>) be an extraction context. The disjunctive closure operator h is defined as follows <ref type="bibr" target="#b5">[6]</ref>:</p><formula xml:id="formula_5">h : P (I) → P (I) I → h(I ) = {i ∈ I | (∀ o ∈ O) ((o, i) ∈ R) ⇒ (∃ i 1 ∈ I )((o, i 1 ) ∈ R)}.</formula><p>The disjunctive closure h(I ) of a pattern I is equal to the maximal set of items which only appear in the transactions that contain at least an item of I. The closure operator h induces an equivalence relation on the power-set of I, which partitions it into so-called disjunctive equivalence classes. In each class, all the elements have the same disjunctive support. The smallest incomparable elements, w.r.t. set inclusion, of a disjunctive equivalence class are called essential patterns, while the disjunctive closed pattern is the largest one <ref type="bibr" target="#b5">[6]</ref>. These particular patterns are defined as follows. Example 3. Consider our running context. The pattern CDEF is disjunctively closed, while BE is not, since Supp(∨ BE ) = Supp(∨ BEF ). On the other hand, the pattern AC is essential, while DE is not, since Supp(∨ DE ) = Supp(∨ D ).</p><p>In the remainder, FEP K 4 denotes the set of frequent essential patterns associated to a given context K and a fixed minsupp value. The associated set of disjunctive closure will further be denoted EDCP K 5 . This latter set is hence equal to {h(I ) | I ∈ FEP K }. To establish the link with conjunctive equivalence class -gathering patterns having the same Galois closure <ref type="bibr" target="#b14">[15]</ref> -we notice that essential patterns (resp. disjunctive closed patterns) are equivalent to minimal generators aka free-sets (resp. closed patterns) (see <ref type="bibr" target="#b0">[1]</ref> for references). These latter patterns were at the basis of the main concise representations of association rules that were proposed in the literature <ref type="bibr" target="#b9">[10]</ref>. This clearly motivates the use of their correspondences within the disjunctive search space.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Detailed Description of the GARM Tool</head><p>As mentioned in the first section, the GARM tool is composed of three complementary components which are as follows: (i) Extracting an exact concise representation of frequent patterns based on disjunctive closed patterns and frequent essential ones. (ii) Building a partially ordered structure w.r.t. set inclusion within disjunctive closed patterns. Each one of these latter will be accompanied by its set of frequent essential patterns. (iii) Deriving generalized association rules from the built structure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Extracting a New Concise Representation based on Disjunctive Patterns</head><p>Our representation is based on the sets FEP K and EDCP K , as stated by Theorem 1.</p><p>Theorem 1. The set EDCP K ∪ FEP K is an exact concise representation of the set of frequent patterns FP K <ref type="bibr" target="#b15">[16]</ref>.</p><p>Example 4. Figure <ref type="figure" target="#fig_0">1</ref> (Left) lists the set of disjunctive closed patterns associated to the running context. For each closed pattern, its associated disjunctive support and frequent essential patterns, for minsupp = 1, are also given. This representation will be denoted DSSR K 6 . It is extracted thanks to an adaptation of our DCPR MINER 7 algorithm <ref type="bibr" target="#b16">[17]</ref>, what constitutes the first component of the 4 Stands for frequent essential patterns. 5 Stands for essential disjunctive closed patterns. 6 Stands for disjunctive search space-based representation. 7 DCPR MINER is the acronym of disjunctive closed pattern-based representation miner. GARM tool. Starting from DSSR K , the conjunctive and negative supports of frequent patterns can thus be deduced using disjunctive supports. This representation also allows the derivation of the support of each literalset whose positive variation is based on a frequent pattern. This is carried out using the following formula <ref type="bibr" target="#b3">[4]</ref>:</p><formula xml:id="formula_6">EDCP K Disj. Supp. F EP K B 3 B C 4 C F 1 F AB 4 A EF 3 E ABC 5 AC, BC BEF 5 BE DEF 4 D CDEF<label>5</label></formula><formula xml:id="formula_7">Supp(x 1 ∧ x 2 ∧ . . . ∧ x n ∧ y 1 ∧ y 2 ∧ . . . ∧ y m ) = S⊆{y1,...,ym} ( − 1) |S| Supp(x 1 ∧ x 2 ∧ . . . ∧ x n ∧ S), such</formula><p>that its positive variation, namely {x 1 , x 2 , . . ., x n , y 1 , y 2 , . . ., y m }, belongs to FP K .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Building the Partially Ordered Structure</head><p>In this section, we will propose a new algorithm, called POSB <ref type="foot" target="#foot_5">8</ref> , for partially sorting disjunctive closed patterns w.r.t. set inclusion. The POSB algorithm hence takes as input the representation DSSR K s.t. to each disjunctive closed pattern is associated its set of frequent essential patterns and disjunctive support. A node in the partially ordered structure will be associated to each disjunctive closed pattern. The pseudocode of POSB is shown by Algorithm 1. Our algorithm inherits two main optimizations used in the algorithm proposed by Valtchev et al. <ref type="bibr" target="#b17">[18]</ref>, namely the sorting of disjunctive closed patterns, and the use of a border. Indeed, the set of disjunctive closed patterns EDCP K is sorted w.r.t. the increasing pattern size. Since closures of equal size cannot be comparable, this sorting avoids unnecessary comparisons. In addition, it makes possible that the closure f under treatment be of the largest size w.r.t. already treated ones. Thus, it suffices to find its lower cover among the nodes inserted in the structure. This lower cover is composed by those closures which are immediately covered by f .</p><p>On the other hand, the border B is an anti-chain w.r.t. set inclusion containing maximal closures among those already treated. In fact, the Valtchev et al. algorithm constructs the Hasse diagram representing the subset-superset relationship among concepts in the Galois lattice. It begins at the top of the lattice and then recursively identifies the lower neighbors of each concept. Nevertheless, it is not directly adapted to our situation. Indeed, although the intersection of two disjunctive closed patterns is obviously B := B ∪ f ; End a disjunctive closed pattern, this latter does not necessarily belong to EDCP K . This is due to the fact that it could have all its essential patterns infrequent and, hence, has been already pruned. On its side, the proposed algorithm in <ref type="bibr" target="#b17">[18]</ref> relies on the fact that the intersection of two concepts was already treated and it suffices to locate the corresponding node within the Hasse diagram.</p><p>In Algorithm 1, disjunctive closed patterns are inserted one at time to a structure which is only partially finished to obtain at the end the entire one. Let f be the current disjunctive closed pattern to be inserted in the partially ordered structure. f will be compared to the elements of the border B. If an element b ∈ B is included in f , then it is an element of its lower cover. A link between the node representing b and that representing f will be constructed thanks to the LOWER COVER INSERTION procedure (cf. Algorithm 2). The element b will then be deleted from the border. If b is not included in f but their intersection is not empty, then the LOWER COVER MANAGEMENT procedure will identify the common immediate predecessors of b and f (cf. Algorithm 3). Finally, f will be added to the border. It is important to note that in the LOWER COVER MANAGE-MENT procedure, a prohibited list is associated to each disjunctive closed pattern to be inserted in the partially ordered structure. Indeed, when updating the precedence link between disjunctive closed patterns, a node can be visited more than once since it can be an immediate predecessor of many other nodes. This list will avoid such useless treatments by only allowing the visit of nodes that do not belong to it.</p><p>Example 5. The associated structure to our running context is given by Figure <ref type="figure" target="#fig_0">1</ref> (Right).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3">Deriving Generalized Association Rules</head><p>Once the partially ordered structure built, deriving (subsets) generalized association rules can be easily done. An association rule R: X ⇒ Y based on a pattern Z, denoted Z-based rule, is such that X = {x 1 , x 2 , . . . , x n } ⊆ I and Y = {y 1 , y 2 , . . . , y m } ⊆ I be two patterns, X ∩ Y = ∅, and X ∪ Y = Z. An association rule is usually considered as interesting w.r.t. two statistical measures, namely the support and the confidence. The formulae of these measures for an arbitrary rule are as follows:</p><p>Both kinds of rules -intra-node and inter-nodes -can be either exact or approximate.</p><p>Different forms of generalized association rules can be extracted starting from our representation (cf. <ref type="bibr" target="#b15">[16]</ref> for a detailed description). To limit the number of possible extracted rule forms, we mainly focus here on the following ones:</p><p>1. Form 1: disjunction of items in premise and conclusion</p><formula xml:id="formula_8">∨ X ⇒ ∨ Y : Supp(∨ X ⇒ ∨ Y ) = Supp(∨ X ∧ ∨ Y ) = Supp(∨ X ) + Supp(∨ Y ) -Supp((∨ X ) ∨ (∨ Y )) = Supp(∨ X ) + Supp(∨ Y ) -Supp(∨ Z), 2. Form 2: negation of items in premise and conclusion X ⇒ Y : Supp(X ⇒ Y ) = Supp(X ∧ Y ) = Supp((( ∨ X ) ∨ ( ∨ Y ))) = Supp(Z) = |O| -Supp(∨ Z), 3. Form 3: disjunction of items in premise and negation of items in conclusion ∨ X ⇒ Y : Supp(∨ X ⇒ Y ) = Supp(∨ X ∧ Y ) = Supp((∨ X ) ∨ (∨ Y )) -Supp(∨ Y ) = Supp(∨ Z) -Supp(∨ Y )</formula><p>, and, 4. Form 4: negation of items in premise and disjunction of items in conclusion</p><formula xml:id="formula_9">X ⇒ ∨ Y : Supp(X ⇒ ∨ Y ) = Supp(X ∧ ∨ Y ) = Supp((∨ X ) ∨ (∨ Y )) -Supp(∨ X ) = Supp(∨ Z) -Supp(∨ X ),</formula><p>where either X or Y is a frequent essential pattern or a disjunctive closed one, and Z = X ∪ Y is a disjunctive closed pattern (as described above). For each rule, the support of Z is known. It is the same for either X or Y since one of them is assumed to be a frequent essential pattern or a disjunctive closed pattern. For the sake of simplicity, we assume in the remainder that X is a frequent essential pattern or a disjunctive closed pattern. Since Y = Z\X, then Y does not necessarily belong to DSSR K and, may even not be a frequent pattern. Nevertheless, its disjunctive support is required to evaluate that of the associated rule. To this end, we bound the support of Y using a lower bound, denoted lb Supp, and an upper bound, denoted ub Supp, computed as follows:</p><formula xml:id="formula_10">• lb Supp(∨ Y ) = max{Supp(∨ e) | e ∈ FEP K and e ⊆ Y }, • ub Supp(∨ Y ) = min{Supp(∨ f ) | f ∈ EDCP K and Y ⊆ f }.</formula><p>In this respect, if Y is encompassed between a frequent essential pattern and its disjunctive closure, then lb Supp(∨ Y ) = ub Supp(∨ Y ). Hence, the support and confidence of the associated rule will be exactly computed. Otherwise, these latter measures will be bounded by a minimal and a maximal possible value using the bounds associated to Y . Such rules, further denoted approximated rules, are defined as follows: Definition 5. An association rule is said to be approximated if it has either its support or its confidence not exactly determined.</p><p>Then, only valid rules having minimum possible values of support and confidence greater than or equal to minsupp and minconf, respectively, will be retained. Note that an approximated rule is different from an approximate rule in the sense that the latter has its support and confidence exactly computed (with a confidence not equal to 1), what is not the case of the former. In this respect, approximated rules were shown to convey interesting knowledge in the case of positive rules (see for example <ref type="bibr" target="#b18">[19]</ref>).</p><p>Noteworthily, the bounds lb Supp(∨ Y ) and ub Supp(∨ Y ) always exist. Indeed, on the one hand, since the set of items I is pruned w.r.t. minsupp, then Y will be composed of frequent items even if it is infrequent. These items obviously belong to FEP K , what ensures the existence of the lower bound. On the other hand, Y is covered by at least a disjunctive closed pattern, namely Z, what ensures the existence of the upper bound. Example 6. Let minsupp = 1 and let minconf = 0.7. Consider the intra-node rule R 1 of Form 1 based on the disjunctive closed pattern ABCDEF and its frequent essential pattern BCE: ∨ BCE ⇒ ∨ ADF. Supp(R 1 ) = Supp(∨ BCE) + Supp(∨ ADF) -Supp(∨ ABCDEF) = Supp(∨ ADF) (since h(BCE ) = ABCDEF ). Since ADF / ∈ DSSR K , we need to evaluate its support. Since AD ⊆ ADF ⊆ h(AD ) = ABCDEF (cf. Figure <ref type="figure" target="#fig_0">1</ref> (Left)), then lb Supp(∨ ADF) = ub Supp(∨ ADF) = 6. Hence, Supp(R 1 ) = 6 and Conf (R 1 ) = 1. R 1 is hence a valid rule. Now, consider the inter-nodes rule R 2 of Form 1 based on ABCDEF and one of its immediate predecessors, namely ABC (cf. Figure <ref type="figure" target="#fig_0">1</ref> (Right)): ∨ ABC ⇒ ∨ DEF. In this case, DEF ∈ EDCP K . Hence, Supp(R 2 ) = Supp(∨ ABC) + Supp(∨ DEF) -Supp(∨ ABCDEF) = 5 + 4 -6 = 3, and Conf (R 2 ) = 0.6. Here, we took X = ABC. If we set Y = ABC, then the associated rule R 3 = ∨ DEF ⇒ ∨ ABC will have the same support than R 2 . Nevertheless, its confidence is equal to 0.75. Hence, R 3 is a valid rule while R 2 is not.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Experimental Results</head><p>Our experiments <ref type="foot" target="#foot_7">9</ref> focused on the mining time as well as the number of extracted valid rules w.r.t. their associated type, i.e., exact, approximate or approximated. They were carried out on a PC equipped with a Pentium (R) having 3GHz as clock frequency and 1.75GB of main memory, running the GNU/Linux distribution Fedora Core 7 (with 2GB of swap memory). The compiler gcc 4.1.2 is used to generate the executable code starting from our C++ implementation. In the proposed experiments, the minconf value is set to the relative minimum support value, i.e., minsupp</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>|O|</head><p>. Table <ref type="table" target="#tab_0">1</ref> presents the mining time in seconds of the three components of GARM. This table shows the efficiency of our tool towards extracting generalized associated rules. Indeed, even for low minsupp values, GARM remains very fast. In this respect, the time consumed by each component, w.r.t. the total time, closely depends on the context characteristics. Nevertheless, the second and third components are in general faster than the first one. On the other hand, Table <ref type="table" target="#tab_1">2</ref> highlights that the number of extracted rules closely depends on the context density. Indeed, the higher the value of this latter, the larger the associated equivalence classes are, and the greater the number of frequent essential patterns and closed ones is. This fact augments the number of rules even for high minsupp values for dense contexts. Interestingly enough, the number of exact and approximated rules for RETAIL and KOSARAK is equal to 0 for the tested minsupp values. This is due to the fact that for both contexts, each essential pattern is equal to its disjunctive closure what is not the case for the CONNECT and PUMSB contexts. Please note that the mining time and the number of extracted rules when minconf varies is omitted here, due to space limitations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusion and Perspectives</head><p>In this paper, we presented a complete tool, called GARM, allowing the extraction of generalized association rules. Our tool is composed of three components. The first consists in extracting a concise representation of frequent patterns based on disjunctive closed ones. The second component aimed at partially ordering these closure w.r.t. set inclusion. Once the structure built, extracting subsets of generalized association rules becomes a straightforward task thanks to the last component. Carried out experiments proved the effectiveness of the proposed tool. It is also important to mention that our GARM tool is easily adaptable to the case where the input is composed by conjunctive (closed) patterns instead of disjunctive ones.</p><p>Other avenues for future work mainly address the following points: First, a detailed comparison of our approach to the general GUHA approach <ref type="bibr" target="#b8">[9]</ref> will be carried out. Second, the relationships between the various rule forms will be studied. The purpose is to only retain a lossless subset of rules while being able to derive the remaining redundant ones. Adequate axiomatic systems need thus to be set up.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Definition 1 .</head><label>1</label><figDesc>An extraction context is a triplet K = (O, I, R) where O and I are, respectively, a finite set of objects (or transactions) and items (or attributes), and R ⊆ O × I is a binary relation between the objects and items. A couple (o, i) ∈ R denotes that the object o ∈ O contains the item i ∈ I.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Definition 4 .</head><label>4</label><figDesc>• A pattern I ⊆ I is a disjunctive closed pattern if I = h(I ) or, equivalently, Supp( ∨ I ) &lt; min{Supp(∨I ) | I ⊆ I s.t. I ⊂ I }. • A pattern I ⊆ I is an essential pattern if ∀ I ⊂ I, I h(I ) or, equivalently, Supp(∨ I ) &gt; max{Supp(∨I ) | I ⊆ I s.t. I ⊂ I}.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. (Left) The set EDCPK and the associated disjunctive support and frequent essential patterns for minsupp = 1. (Right) The equivalence classes partially ordered w.r.t. set inclusion.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Algorithm 1 :</head><label>1</label><figDesc>POSB Input: The set EDCP K of disjunctive closed patterns. Output: The disjunctive closed patterns ordered by set inclusion. Begin B := ∅ ; Foreach (f ∈ EDCP K ) do P rohibited List = ∅; Foreach (b ∈ B) do inter := b ∩ f ; If (inter = b) then LOWER COVER INSERTION(f , b); B := B\ b; Else If (inter = ∅) then LOWER COVER MANAGEMENT(f , b);</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>Mining time of generalized association rules on benchmark contexts.</figDesc><table><row><cell>Context</cell><cell cols="4">minsupp (%) Component 1 Component 2 Component 3 Total time</cell></row><row><cell>CONNECT</cell><cell>80.00</cell><cell>2.1530</cell><cell>0.0068</cell><cell>0.0380 2.1978</cell></row><row><cell></cell><cell>60.00</cell><cell>2.2807</cell><cell>0.0402</cell><cell>0.1618 2.4827</cell></row><row><cell></cell><cell>40.00</cell><cell>2.5571</cell><cell>1.0443</cell><cell>0.9813 4.5827</cell></row><row><cell>PUMSB</cell><cell>90.00</cell><cell>3.1875</cell><cell>0.0403</cell><cell>0.1015 3.3293</cell></row><row><cell></cell><cell>80.00</cell><cell>3.1581</cell><cell>2.9364</cell><cell>1.9693 8.0638</cell></row><row><cell></cell><cell>70.00</cell><cell>3.6630</cell><cell>19.5460</cell><cell>8.7276 31.9366</cell></row><row><cell>KOSARAK</cell><cell>0.90</cell><cell>12.4551</cell><cell>0.1645</cell><cell>0.2239 12.8435</cell></row><row><cell></cell><cell>0.70</cell><cell>16.2936</cell><cell>0.6825</cell><cell>0.3794 17.3555</cell></row><row><cell></cell><cell>0.50</cell><cell>26.4491</cell><cell>5.6164</cell><cell>0.8738 32.9393</cell></row><row><cell>RETAIL</cell><cell>2.00</cell><cell>0.8471</cell><cell>0.0039</cell><cell>0.0135 0.8645</cell></row><row><cell></cell><cell>1.00</cell><cell>1.0803</cell><cell>0.0113</cell><cell>0.0334 1.1250</cell></row><row><cell></cell><cell>0.50</cell><cell>2.3909</cell><cell>0.1127</cell><cell>0.1331 2.6367</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 .</head><label>2</label><figDesc>Number of extracted generalized association rules on benchmark contexts.</figDesc><table><row><cell>Context</cell><cell cols="5">minsupp (%) Exact Approximate Approximated Total number</cell></row><row><cell>CONNECT</cell><cell>80.00</cell><cell>620</cell><cell>316</cell><cell>152</cell><cell>1, 088</cell></row><row><cell></cell><cell cols="2">60.00 1, 533</cell><cell>1, 337</cell><cell>354</cell><cell>3, 224</cell></row><row><cell></cell><cell cols="2">40.00 3, 319</cell><cell>5, 813</cell><cell>3, 130</cell><cell>12, 262</cell></row><row><cell>PUMSB</cell><cell>90.00</cell><cell>566</cell><cell>1, 322</cell><cell>730</cell><cell>2, 618</cell></row><row><cell></cell><cell cols="2">80.00 4, 376</cell><cell>13, 426</cell><cell>5, 002</cell><cell>22, 804</cell></row><row><cell></cell><cell cols="2">70.00 9, 409</cell><cell>26, 747</cell><cell>14, 870</cell><cell>51, 026</cell></row><row><cell>KOSARAK</cell><cell>0.90</cell><cell>0</cell><cell>7, 586</cell><cell>0</cell><cell>7, 586</cell></row><row><cell></cell><cell>0.70</cell><cell>0</cell><cell>13, 046</cell><cell>0</cell><cell>13, 046</cell></row><row><cell></cell><cell>0.50</cell><cell>0</cell><cell>29, 648</cell><cell>0</cell><cell>29, 648</cell></row><row><cell>RETAIL</cell><cell>2.00</cell><cell>0</cell><cell>464</cell><cell>0</cell><cell>464</cell></row><row><cell></cell><cell>1.00</cell><cell>0</cell><cell>1, 160</cell><cell>0</cell><cell>1, 160</cell></row><row><cell></cell><cell>0.50</cell><cell>0</cell><cell>4, 622</cell><cell>0</cell><cell>4, 622</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">GARM is the acronym of generalized association rule miner. c Radim Belohlavek, Sergei O. Kuznetsov (Eds.): CLA</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2008" xml:id="foot_1">, pp. 145-156, ISBN 978-80-244-2111-7, Palacký University, Olomouc, 2008.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_2">A literal is an item or the negation of an item.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_3">Tarek Hamrouni, Sadok Ben Yahia, Engelbert Mephu Nguifo</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_4">We use a separator-free form for the sets, e.g., ABC stands for the set of items {A, B, C}.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_5">POSB is the acronym of partially ordered structure builder.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_6">GARM: Generalized Association Rule Mining</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="9" xml:id="foot_7">Test contexts are available at: http://fimi.cs.helsinki.fi/data.</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgments: We would like to thank anonymous reviewers for their helpful comments and suggestions. We are also grateful to Mrs. Nassima Ben Younes for fruitful discussions and help in the implementation of the tool. This work is supported by the French-Tunisian project CMCU-Utique 05G1412.</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm 2: LOWER COVER INSERTION</head><p>Input: A disjunctive closure f , and an element pred to be inserted in its lower cover. Output: The updated lower cover of f . Begin Foreach (l </p><p>A rule is said to be exact if its confidence is equal to 1. Otherwise, it is said to be approximate. In addition, it is said to be interesting or valid if its support and confidence values are greater than or equal to their respective minimum thresholds minsupp and minconf. It is clear that whenever we are able to evaluate Supp(X ⇒ Y ), the derivation of the confidence value will be straightforward.</p><p>Let us now adapt the association rule framework to our context. As shown in Subsection 5.1, the DSSR K representation allows deriving the disjunctive, conjunctive and negative supports of each set of positive and negative items whose positive variation is based on a frequent pattern. In the sequel, we present an overview of the process by which we retrieve generalized association rules and evaluate their associated supports through traversing the partially ordered structure. Rules can be classified according to the number of nodes required for their extraction. We then distinguish two cases:</p><p>1. An intra-node rule: it requires a unique node and highlight relationships between a frequent essential pattern and its disjunctive closure f (here Z = f ). 2. An inter-nodes rule: it is extracted using two nodes N 1 and N 2 s.t. the associated disjunctive closure of N 1 , denoted f 1 , is one of the immediate predecessors of that of N 2 , denoted f 2 . Let e 1 be a frequent essential pattern of f 1 . An inter-nodes rule describes relationships between either f 1 and f 2 or e 1 and f 2 (here Z = f 2 ).</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Association mining</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ceglar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename><surname>Roddick</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Generalizing the notion of confidence</title>
		<author>
			<persName><forename type="first">M</forename><surname>Steinbach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge and Information Systems</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="279" to="299" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Mining for mutually exclusive items in transaction databases</title>
		<author>
			<persName><forename type="first">G</forename><surname>Tzanis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Berberidis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Data Warehousing and Mining</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="45" to="59" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Discovering of frequent patterns in large data collections</title>
		<author>
			<persName><forename type="first">H</forename><surname>Toivonen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1996">1996</date>
			<pubPlace>Helsinki, Finland</pubPlace>
		</imprint>
		<respStmt>
			<orgName>University of Helsinki</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A unified view of objective interestingness measures</title>
		<author>
			<persName><forename type="first">C</forename><surname>Hébert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Crémilleux</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 5th International Conference Machine Learning and Data Mining in Pattern Recognition</title>
				<meeting>the 5th International Conference Machine Learning and Data Mining in Pattern Recognition</meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">4571</biblScope>
			<biblScope unit="page" from="533" to="547" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A new concise representation of frequent patterns through disjunctive search space</title>
		<author>
			<persName><forename type="first">T</forename><surname>Hamrouni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Denden</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ben Yahia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Mephu Nguifo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 5th International Conference on Concept Lattices and their Applications</title>
				<meeting>the 5th International Conference on Concept Lattices and their Applications</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="50" to="61" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Complementary occurrence and disjunctive rules for market basket analysis in data mining</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">D</forename><surname>Kim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2nd IASTED International Conference Information and Knowledge Sharing</title>
				<meeting>the 2nd IASTED International Conference Information and Knowledge Sharing</meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="155" to="157" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Mining generalised disjunctive association rules</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Nanavati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">P</forename><surname>Chitrapura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Joshi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Krishnapuram</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 10th International Conference on Information and Knowledge Management</title>
				<meeting>the 10th International Conference on Information and Knowledge Management</meeting>
		<imprint>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="482" to="489" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Mechanizing Hypothesis Formation: Mathematical Foundations for a General Theory</title>
		<author>
			<persName><forename type="first">P</forename><surname>Hájek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Havránek</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1978">1978</date>
			<publisher>Springer-Verlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Concise representations of association rules</title>
		<author>
			<persName><forename type="first">M</forename><surname>Kryszkiewicz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the ESF Exploratory Workshop on Pattern Detection and Discovery in Data Mining</title>
				<meeting>the ESF Exploratory Workshop on Pattern Detection and Discovery in Data Mining</meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">2447</biblScope>
			<biblScope unit="page" from="92" to="109" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">New forms of association rules</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">A</forename><surname>Grün</surname></persName>
		</author>
		<idno>TR 1998-15</idno>
		<imprint>
			<date type="published" when="1998">1998</date>
			<pubPlace>Burnaby, BC, Canada</pubPlace>
		</imprint>
		<respStmt>
			<orgName>School of Computing Science, Simon Fraser University</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Extracting disjunctive closed rules from MRSA data</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Shima</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Hirata</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Harao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yokoyama</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Matsuoka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Izumi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1st International Conference on Complex Medical Engineering</title>
				<meeting>the 1st International Conference on Complex Medical Engineering</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="321" to="325" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Optimized disjunctive association rules via sampling</title>
		<author>
			<persName><forename type="first">J</forename><surname>Elble</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Heeren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pitt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd IEEE International Conference on Data Mining</title>
				<meeting>the 3rd IEEE International Conference on Data Mining</meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="43" to="50" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Bonferroni-type inequalities with applications</title>
		<author>
			<persName><forename type="first">J</forename><surname>Galambos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Simonelli</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Formal Concept Analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ganter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wille</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Exploring the disjunctive search space towards discovering new exact concise representations for frequent patterns</title>
		<author>
			<persName><forename type="first">T</forename><surname>Hamrouni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Denden</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ben Yahia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Mephu Nguifo</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<pubPlace>Lens, France</pubPlace>
		</imprint>
		<respStmt>
			<orgName>CRIL-CNRS of Lens</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical report</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Efficient exploration of the disjunctive lattice towards extracting concise representations of frequent patterns</title>
		<author>
			<persName><forename type="first">I</forename><surname>Denden</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Hamrouni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ben Yahia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 9th African Conference on Research in Computer Science and Applied Mathematics</title>
				<meeting>the 9th African Conference on Research in Computer Science and Applied Mathematics</meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>in French</note>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A fast algorithm for building the Hasse diagram of a Galois lattice</title>
		<author>
			<persName><forename type="first">P</forename><surname>Valtchev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Missaoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Lebrun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Conference on Combinatorics, Computer Science and Applications</title>
				<meeting>the Conference on Combinatorics, Computer Science and Applications</meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="293" to="306" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Free-sets: A condensed representation of Boolean data for the approximation of frequency queries</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename><surname>Boulicaut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bykowski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Rigotti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data Mining and Knowledge Discovery volume</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="5" to="22" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
