Skip to main content
Log in

Peer-to-peer usage analysis in dynamic databases

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the rapid growth of Internet and computer techniques, the huge number of information is thus available to be analyzed for modeling user behaviors. Peer-to-peer architecture provides the large-scale community behaviors for information exchanging and sharing. Usage behaviors can be defined as the sequential order as the requests or downloads performed on each node in P2P system. Sequential pattern mining (SPM) can be used to discover usage behaviors to facilitate efficient decision-making. In the past, the fast updated sequential pattern (FUSP)-tree structure was proposed for handling sequence insertion and sequence deletion without candidate generation. Transaction modification is, however, also an important issue in real-world applications. In this paper, a maintenance (FUSP-TREE-MOD) algorithm to efficient update FUSP-trees for sequence modification in dynamic databases is proposed. The proposed approach can thus enhance behaviors modeling in dynamic P2P system for extracting sequential patterns or relationships occurring in a large number of nodes. Experimental results indicate that the proposed algorithm outperforms batch approaches in maintaining discovered sequential patterns.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Agrawal R, Imielinski T, Swami A (1993) Database mining: a performance perspective. IEEE Trans Knowl Data Eng 5:914–925

    Article  Google Scholar 

  2. Agrawal R, Srikant R (1994) “Fast algorithms for mining association rules in large databases,” The International Conference on Very Large Data Bases, pp. 487–499

  3. Nath B, Bhattacharyya DK, Ghosh A (2013) “Incremental association rule mining: a survey,” WIREs Data Mining Knowledge Discovery, vol. 3

  4. Masseglia F, Poncelet P, Teisseire M (2006) “Peer-to-peer usage analysis: a distributed mining approach,” Advanced Information Networking and Applications, 2006. AINA 2006. 20th International Conference on, pp. 993–998

  5. Srivastava J, Cooley R, Deshpande M, Tan PN (2000) Web usage mining: discovery and applications of usage patterns from web data. ACM SIGKDD Explor Newsl 1:12–23

    Article  Google Scholar 

  6. Wang W, Xu T, Gao Y, Lu S (2009) Probabilistic seeking prediction in p2p vod systems. Lect Notes Artif Intell 5866:676–685

    Google Scholar 

  7. Zaïane OR (2001) “Web usage mining for a betterweb-based learning environment,” The International Conference on Advanced Technology for Education, pp. 60–64

  8. Agrawal R, Srikant R (1995) “Mining sequential patterns,” The International Conference on Data Engineering, pp. 3–14

  9. Lin MY, Lee SY (1998) “Incremental update on sequential patterns in large databases,” IEEE International Conference on Tools with Artificial Intelligence, pp. 24–31

  10. Cheung DWL, Han J, Ng V, Wong CY (1996) “Maintenance of discovered association rules in large databases: An incremental updating technique,” International Conference on Data Engineering, pp. 106–114

  11. Lin CW, Hong TP, Lu WH, Lin WY (2008) “An incremental fusp-tree maintenance algorithm,” The International Conference on Intelligent Systems Design and Applications, pp. 445–449

  12. Han J, Pei J, Yin Y, Mao R (2004) Mining frequent patterns without candidate generation: a frequent-pattern tree approach. Data Min Knowl Disc 8:53–87

    Article  MathSciNet  Google Scholar 

  13. Hong TP, Lin CW, Wu YL (2008) Incrementally fast updated frequent pattern trees. Expert Syst Appl 34:2424–2435

    Article  Google Scholar 

  14. Cheng H, Yan X, Han J (2004) “Incspan: Incremental mining of sequential patterns in large database,” ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 527–532

  15. Lee G, Chen YC, Hung KC (2013) Ptree: mining sequential patterns efficiently in multiple data streams environment. J Inform Sci Eng 29:1151–1169

    Google Scholar 

  16. Ren JM, Jang JR (2012) Discovering time-constrained sequential patterns for music genre classification. IEEE Trans Audio, Speech, Lang Process 20:1134–1144

    Article  Google Scholar 

  17. Huang Z, Shyu ML, Tien JM, Vigoda MM, Birnbach DJ (2013) Prediction of uterine contractions using knowledge-assisted sequential pattern analysis. IEEE Trans Biomed Eng 60:1290–1297

    Article  Google Scholar 

  18. Mooney CH, Roddick JF (2013) Sequential pattern mining – approaches and algorithms. ACM Comput Surv 45:1–39

    Article  Google Scholar 

  19. Chanh Truc T, Bay V, Tzung Pei H, Chun Wei L, Bac L (2012) “An enhanced fufp-tree maintenance approach for transaction deletion,” The International Conference on Innovations in Bio-Inspired Computing and Applications pp. 45–50

  20. Le B, Tran CT, Hong TP, Vo B (2013) A space-time trade off for fufp-trees maintenance. In: Selamat A, Nguyen N, Haron H (eds) Intelligent information and database systems, vol 7803. Springer, Berlin, pp 206–214

    Chapter  Google Scholar 

  21. Zheng Z, Kohavi R, Mason L (2001) “Real world performance of association rule algorithms,” ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 401–406

  22. Agrawal R, Srikant R (1994) Quest synthetic data generator. Available: http://www.Almaden.ibm.com/cs/quest/syndata.html

Download references

Acknowledgment

This research was partially supported by the Shenzhen Peacock Project, China, under grant KQC201109020055A, by the Natural Scientific Research Innovation Foundation in Harbin Institute of Technology under grant HIT.NSRIF.2014100, and by the Shenzhen Strategic Emerging Industries Program under grant ZDSY20120613125016389.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chun-Wei Lin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, CW., Gan, W., Hong, TP. et al. Peer-to-peer usage analysis in dynamic databases. Peer-to-Peer Netw. Appl. 8, 851–862 (2015). https://doi.org/10.1007/s12083-014-0290-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-014-0290-2

Keywords

Navigation