RIn-Close_CVC2: an even more efficient enumerative algorithm for biclustering of numerical datasets

10/17/2018
by   Rosana Veroneze, et al.
0

RIn-Close_CVC is an efficient (take polynomial time per bicluster), complete (find all maximal biclusters), correct (all biclusters attend the user-defined level of consistency) and non-redundant (all the obtained biclusters are maximal and the same bicluster is not enumerated more than once) enumerative algorithm for mining maximal biclusters with constant values on columns in numerical datasets. Despite RIn-Close_CVC has all these outstanding properties, it has a high computational cost in terms of memory usage because it must keep a symbol table in memory to prevent a maximal bicluster to be found more than once. In this paper, we propose a new version of RIn-Close_CVC, named RIn-Close_CVC2, that does not use a symbol table to prevent redundant biclusters, and keeps all these four properties. We also prove that these algorithms actually possess these properties. Experiments are carried out with synthetic and real-world datasets to compare RIn-Close_CVC and RIn-Close_CVC2 in terms of memory usage and runtime. The experimental results show that RIn-Close_CVC2 brings a large reduction in memory usage and, in average, significant runtime gain when compared to its predecessor.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/07/2020

New advances in enumerative biclustering algorithms with online partitioning

This paper further extends RIn-Close_CVC, a biclustering algorithm capab...
research
03/21/2022

An efficient heuristic approach combining maximal itemsets and area measure for compressing voluminous table constraints

Constraint Programming is a powerful paradigm to model and solve combina...
research
09/22/2020

Tabling Optimization for Contextual Abduction

Tabling for contextual abduction in logic programming has been introduce...
research
09/29/2020

RP-Rewriter: An Optimized Rewriter for Large Terms in ACL2

RP-Rewriter (Retain-Property) is a verified clause processor that can us...
research
07/17/2019

Efficient computation of the Jacobi symbol

The family of left-to-right GCD algorithms reduces input numbers by repe...
research
03/09/2023

Optimizing network robustness via Krylov subspaces

We consider the problem of attaining either the maximal increase or redu...
research
11/14/2011

Mining Biclusters of Similar Values with Triadic Concept Analysis

Biclustering numerical data became a popular data-mining task in the beg...

Please sign up or login with your details

Forgot password? Click here to reset