Database Systems for Advanced Applications

Similar documents
Mixtions Pin Yin Homepage

<D2BDC1C6BDA1BFB5CDB6C8DAD7CAB8DFB7E5C2DBCCB3B2CEBBE1C3FBB5A52E786C7378>

穨423.PDF

UDC Empirical Researches on Pricing of Corporate Bonds with Macro Factors 厦门大学博硕士论文摘要库

Microsoft Word - 刘 慧 板.doc

Value Chain ~ (E-Business RD / Pre-Sales / Consultant) APS, Advanc

Microsoft PowerPoint - Aqua-Sim.pptx

2/80 2

Improved Preimage Attacks on AES-like Hash Functions: Applications to Whirlpool and Grøstl

* CUSUM EWMA PCA TS79 A DOI /j. issn X Incipient Fault Detection in Papermaking Wa

~ ~

a b

48 東華漢學 第20期 2014年12月 後 卿 由三軍將佐取代 此後 中大夫 極可能回歸原本職司 由 於重要性已然不再 故而此後便不見 中大夫 記載於 左傳 及 國 語 關鍵詞 左傳 中大夫 里克 丕鄭 卿

untitled

和文タイトル

國家圖書館典藏電子全文

PowerPoint Presentation


荨荨 % [3] [4] 86%( [6] 27 ) Excel [7] 27 [8] 2 [9] K2 [2] ; Google group+ 5 Gmail [2] 2 fxljwcy 3E [22] 2 2 fxljzrh 2D [23] 3 2 fxzphjf 3D 35

國立中山大學學位論文典藏.PDF

Vol. 22 No. 4 JOURNAL OF HARBIN UNIVERSITY OF SCIENCE AND TECHNOLOGY Aug GPS,,, : km, 2. 51, , ; ; ; ; DOI: 10.

南華大學數位論文

Abstract Today, the structures of domestic bus industry have been changed greatly. Many manufacturers enter into the field because of its lower thresh


Microsoft PowerPoint - Performance Analysis of Video Streaming over LTE using.pptx

2 3. 1,,,.,., CAD,,,. : 1) :, 1,,. ; 2) :,, ; 3) :,; 4) : Fig. 1 Flowchart of generation and application of 3D2digital2building 2 :.. 3 : 1) :,

Shanghai International Studies University THE STUDY AND PRACTICE OF SITUATIONAL LANGUAGE TEACHING OF ADVERB AT BEGINNING AND INTERMEDIATE LEVEL A Thes

ti2 guan4 bo1 bo5 huai4 zheng4 hong1 xi2 luo2 ren4

Fig. 1 Frame calculation model 1 mm Table 1 Joints displacement mm

Microsoft Word - chnInfoPaper6

2008 Nankai Business Review 61

A VALIDATION STUDY OF THE ACHIEVEMENT TEST OF TEACHING CHINESE AS THE SECOND LANGUAGE by Chen Wei A Thesis Submitted to the Graduate School and Colleg

% GIS / / Fig. 1 Characteristics of flood disaster variation in suburbs of Shang


Microsoft Word tb 赵宏宇s-高校教改纵横.doc

成 大 中 文 學 報 第 五 十 二 期 Re-examination of the Core Value in Yi Jing Studies of Xun Shuang: Constructing the Confucius Meaning via Phenomenon and Number


附件1:

m m m ~ mm

厦 门 大 学 学 位 论 文 原 创 性 声 明 本 人 呈 交 的 学 位 论 文 是 本 人 在 导 师 指 导 下, 独 立 完 成 的 研 究 成 果 本 人 在 论 文 写 作 中 参 考 其 他 个 人 或 集 体 已 经 发 表 的 研 究 成 果, 均 在 文 中 以 适 当 方

ENGG1410-F Tutorial 6

% % % % % % ~

XML SOAP DOM B2B B/S B2B B2B XML SOAP

报 告 1: 郑 斌 教 授, 美 国 俄 克 拉 荷 马 大 学 医 学 图 像 特 征 分 析 与 癌 症 风 险 评 估 方 法 摘 要 : 准 确 的 评 估 癌 症 近 期 发 病 风 险 和 预 后 或 者 治 疗 效 果 是 发 展 和 建 立 精 准 医 学 的 一 个 重 要 前

Dan Buettner / /

Microsoft Word 谢雯雯.doc

untitled


<4D F736F F D D DBACEC0F25FD0A3B6D4B8E55F2DB6FED0A32D2D2DC8A5B5F4CDBCD6D0B5C4BBD8B3B5B7FBBAC52E646F63>

Stock Transfer Service Inc. Page No. 1 CENTURY PEAK METALS HOLDINGS CORPORATION (CPM) List of Top 100 Stockholders As of 12/31/2015 Rank Sth. No. Name

Construction of Chinese pediatric standard database A Dissertation Submitted for the Master s Degree Candidate:linan Adviser:Prof. Han Xinmin Nanjing

Olav Lundström MicroSCADA Pro Marketing & Sales 2005 ABB - 1-1MRS755673

4 115,,. : p { ( x ( t), y ( t) ) x R m, y R n, t = 1,2,, p} (1),, x ( t), y ( t),,: F : R m R n.,m, n, u.,, Sigmoid. :,f Sigmoid,f ( x) = ^y k ( t) =

SVM OA 1 SVM MLP Tab 1 1 Drug feature data quantization table

豐佳燕.PDF

(CIP) : /. :, (/ ) ISBN T S H CI P (2006) CH IJIASH EN GXIAN G YINSHI WEN H U A Y U CHENGY U 1

by industrial structure evolution from 1952 to 2007 and its influence effect was first acceleration and then deceleration second the effects of indust

(CIP) : /. :, (/ ) ISBN T S H CI P (2006) XIANGPIAOWANLI JIUW ENH UA YU CH ENGYU

Revit Revit Revit BIM BIM 7-9 3D 1 BIM BIM 6 Revit 0 4D 1 2 Revit Revit 2. 1 Revit Revit Revit Revit 2 2 Autodesk Revit Aut

UDC The Design and Implementation of a Specialized Search Engine Based on Robot Technology 厦门大学博硕士论文摘要库

Microsoft Word 定版


Microsoft Word - TIP006SCH Uni-edit Writing Tip - Presentperfecttenseandpasttenseinyourintroduction readytopublish

McGraw-Hill School Education Group Physics : Principles and Problems G S 24

現代學術之建立 陳平 美學十五講 淩繼堯 美學 論集 徐複觀 書店出版社 的方位 陳寶生 宣傳 敦煌文藝出版社 論集續篇 徐複觀 書店出版社 莊子哲學 王博 道家 的天方學 沙宗平 伊斯蘭教 周易 經傳十

RESEARCH ON HIGHER EDUCATION Number 4, 2013(General Serial No.78) CONTENTS Colleges and Universities Forum Three-Year Blueprint of Undergraduate Cours

清 华 大 学

WTO

http / /yxxy. cbpt. cnki. net / % % %

08陈会广

[1-3] (Smile) [4] 808 nm (CW) W 1 50% 1 W 1 W Fig.1 Thermal design of semiconductor laser vertical stack ; Ansys 20 bar ; bar 2 25 Fig

Microsoft PowerPoint SSBSE .ppt [Modo de Compatibilidade]

IP TCP/IP PC OS µclinux MPEG4 Blackfin DSP MPEG4 IP UDP Winsock I/O DirectShow Filter DirectShow MPEG4 µclinux TCP/IP IP COM, DirectShow I

Microsoft Word - 专论综述1.doc

Microsoft Word - 林文晟3.doc

University of Science and Technology of China A dissertation for master s degree Research of e-learning style for public servants under the context of

Microsoft PowerPoint Zhang Guohua.ppt [Compatibility Mode]

1 引言

Microsoft PowerPoint - NCBA_Cattlemens_College_Darrh_B

中国媒体发展研究报告


C doc

Microsoft Word - Chord_chart_-_Song_of_Spiritual_Warfare_CN.docx

Microsoft Word - 01李惠玲ok.doc

% % 34

Shanghai International Studies University A STUDY ON SYNERGY BUYING PRACTICE IN ABC COMPANY A Thesis Submitted to the Graduate School and MBA Center I

~ 10 2 P Y i t = my i t W Y i t 1000 PY i t Y t i W Y i t t i m Y i t t i 15 ~ 49 1 Y Y Y 15 ~ j j t j t = j P i t i = 15 P n i t n Y

Abstract There arouses a fever pursuing the position of being a civil servant in China recently and the phenomenon of thousands of people running to a

THE APPLICATION OF ISOTOPE RATIO ANALYSIS BY INDUCTIVELY COUPLED PLASMA MASS SPECTROMETER A Dissertation Presented By Chaoyong YANG Supervisor: Prof.D

PowerPoint 演示文稿

X UDC A Post-Evaluation Research on SINOPEC Refinery Reconstruction and Expanding Project MBA 厦门大学博硕士论文摘要库

致 谢 本 论 文 能 得 以 完 成, 首 先 要 感 谢 我 的 导 师 胡 曙 中 教 授 正 是 他 的 悉 心 指 导 和 关 怀 下, 我 才 能 够 最 终 选 定 了 研 究 方 向, 确 定 了 论 文 题 目, 并 逐 步 深 化 了 对 研 究 课 题 的 认 识, 从 而 一

be invested on the desilting of water sources and to paved canals with cement mortar while drinking water project can focus on the improvement of wate

Microsoft Word - 刘藤升答辩修改论文.doc

<4D F736F F D20B5DAC8FDB7BDBE57C9CFD6A7B8B6D6AEB7A8C2C98696EE7DCCBDBEBF2E646F63>

/3 CAD JPG GIS CAD GIS GIS 1 a CAD CAD CAD GIS GIS ArcGIS 9. x 10 1 b 1112 CAD GIS 1 c R2VArcscan CAD MapGIS CAD 1 d CAD U


诗 经 简介 诗经 是中国第一部诗歌总集 它汇集了从西周初年到春秋中期 五百多年间的诗歌三百零五篇 诗经 在先秦叫做 诗 或者取诗的 数目整数叫 诗三百 本来只是一本诗集 从汉代起 儒家学者把 诗 当作经典 尊称为 诗经 列入 五经 之中 它原来的文学性质就 变成了同政治 道德等密切相连的教化人的教

Microsoft PowerPoint ARIS_Platform_en.ppt

1-34

Transcription:

Christian S. Jensen Ee-Peng Lim De-Nian Yang Wang-Chien Lee Vincent S. Tseng Vana Kalogeraki Jen-Wei Huang Chih-Ya Shen (Eds.) LNCS 12683 Database Systems for Advanced Applications 26th International Conference, DASFAA 2021 Taipei, Taiwan, April 11 14, 2021 Proceedings, Part III

Contents Part III Recommendation Gated Sequential Recommendation System with Social and Textual Information Under Dynamic Contexts............................ 3 Haoyu Geng, Shuodian Yu, and Xiaofeng Gao SRecGAN: Pairwise Adversarial Training for Sequential Recommendation................................ 20 Guangben Lu, Ziheng Zhao, Xiaofeng Gao, and Guihai Chen SSRGAN: A Generative Adversarial Network for Streaming Sequential Recommendation.......................................... 36 Yao Lv, Jiajie Xu, Rui Zhou, Junhua Fang, and Chengfei Liu Topological Interpretable Multi-scale Sequential Recommendation........ 53 Tao Yuan, Shuzi Niu, and Huiyuan Li SANS: Setwise Attentional Neural Similarity Method for Few-Shot Recommendation................................. 69 Zhenghao Zhang, Tun Lu, Dongsheng Li, Peng Zhang, Hansu Gu, and Ning Gu Semi-supervised Factorization Machines for Review-Aware Recommendation.......................................... 85 Junheng Huang, Fangyuan Luo, and Jun Wu DCAN: Deep Co-Attention Network by Modeling User Preference and News Lifecycle for News Recommendation..................... 100 Lingkang Meng, Chongyang Shi, Shufeng Hao, and Xiangrui Su Considering Interaction Sequence of Historical Items for Conversational Recommender System....................................... 115 Xintao Tian, Yongjing Hao, Pengpeng Zhao, Deqing Wang, Yanchi Liu, and Victor S. Sheng Knowledge-Aware Hypergraph Neural Network for Recommender Systems.................................... 132 Binghao Liu, Pengpeng Zhao, Fuzhen Zhuang, Xuefeng Xian, Yanchi Liu, and Victor S. Sheng Personalized Dynamic Knowledge-Aware Recommendation with Hybrid Explanations..................................... 148 Hao Sun, Zijian Wu, Yue Cui, Liwei Deng, Yan Zhao, and Kai Zheng

xx Contents Part III Graph Attention Collaborative Similarity Embedding for Recommender System.................................... 165 Jinbo Song, Chao Chang, Fei Sun, Zhenyang Chen, Guoyong Hu, and Peng Jiang Learning Disentangled User Representation Based on Controllable VAE for Recommendation.................................... 179 Yunyi Li, Pengpeng Zhao, Deqing Wang, Xuefeng Xian, Yanchi Liu, and Victor S. Sheng DFCN: An Effective Feature Interactions Learning Model for Recommender Systems...................................... 195 Wei Yang and Tianyu Hu Tell Me Where to Go Next: Improving POI Recommendation via Conversation........................................... 211 Changheng Li, Yongjing Hao, Pengpeng Zhao, Fuzhen Zhuang, Yanchi Liu, and Victor S. Sheng MISS: A Multi-user Identification Network for Shared-Account Session-Aware Recommendation................................ 228 Xinyu Wen, Zhaohui Peng, Shanshan Huang, Senzhang Wang, and Philip S. Yu VizGRank: A Context-Aware Visualization Recommendation Method Based on Inherent Relations Between Visualizations.................. 244 Qianfeng Gao, Zhenying He, Yinan Jing, Kai Zhang, and X. Sean Wang Deep User Representation Construction Model for Collaborative Filtering... 262 Daomin Ji, Zhenglong Xiang, and Yuanxiang Li DiCGAN: A Dilated Convolutional Generative Adversarial Network for Recommender Systems.................................... 279 Zhiqiang Guo, Chaoyang Wang, Jianjun Li, Guohui Li, and Peng Pan RE-KGR: Relation-Enhanced Knowledge Graph Reasoning for Recommendation.......................................... 297 Ming He, Hanyu Zhang, and Han Wen LGCCF: A Linear Graph Convolutional Collaborative Filtering with Social Influence................................................ 306 Ming He, Han Wen, and Hanyu Zhang Sirius: Sequential Recommendation with Feature Augmented Graph Neural Networks........................................... 315 Xinzhou Dong, Beihong Jin, Wei Zhuo, Beibei Li, and Taofeng Xue

Contents Part III xxi Combining Meta-path Instances into Layer-Wise Graphs for Recommendation........................................ 321 Mingda Qian, Bo Li, Xiaoyan Gu, Zhuo Wang, Feifei Dai, and Weiping Wang GCAN: A Group-Wise Collaborative Adversarial Networks for Item Recommendation.......................................... 330 Xuehan Sun, Tianyao Shi, Xiaofeng Gao, Xiang Li, and Guihai Chen Emerging Applications PEEP: A Parallel Execution Engine for Permissioned Blockchain Systems... 341 Zhihao Chen, Xiaodong Qi, Xiaofan Du, Zhao Zhang, and Cheqing Jin URIM: Utility-Oriented Role-Centric Incentive Mechanism Design for Blockchain-Based Crowdsensing............................. 358 Zheng Xu, Chaofan Liu, Peng Zhang, Tun Lu, and Ning Gu PAS: Enable Partial Consensus in the Blockchain.................... 375 Zihuan Xu, Siyuan Han, and Lei Chen Redesigning the Sorting Engine for Persistent Memory................ 393 Yifan Hua, Kaixin Huang, Shengan Zheng, and Linpeng Huang ImputeRNN: Imputing Missing Values in Electronic Medical Records...... 413 Jiawei Ouyang, Yuhao Zhang, Xiangrui Cai, Ying Zhang, and Xiaojie Yuan Susceptible Temporal Patterns Discovery for Electronic Health Records via Adversarial Attack....................................... 429 Rui Zhang, Wei Zhang, Ning Liu, and Jianyong Wang A Decision Support System for Heart Failure Risk Prediction Based on Weighted Naive Bayes.................................... 445 Kehui Song, Shenglong Yu, Haiwei Zhang, Ying Zhang, Xiangrui Cai, and Xiaojie Yuan Inheritance-Guided Hierarchical Assignment for Clinical Automatic Diagnosis................................................ 461 Yichao Du, Pengfei Luo, Xudong Hong, Tong Xu, Zhe Zhang, Chao Ren, Yi Zheng, and Enhong Chen BPTree: An Optimized Index with Batch Persistence on Optane DC PM.... 478 Chenchen Huang, Huiqi Hu, and Aoying Zhou An Improved Dummy Generation Approach for Enhancing User Location Privacy....................................... 487 Shadaab Siddiqie, Anirban Mondal, and P. Krishna Reddy

xxii Contents Part III Industrial Papers LinkLouvain: Link-Aware A/B Testing and Its Application on Online Marketing Campaign........................................ 499 Tianchi Cai, Daxi Cheng, Chen Liang, Ziqi Liu, Lihong Gu, Huizhi Xie, Zhiqiang Zhang, Xiaodong Zeng, and Jinjie Gu An Enhanced Convolutional Inference Model with Distillation for Retrieval-Based QA......................................... 511 Shuangyong Song, Chao Wang, Xiao Pu, Zehui Wang, and Huan Chen Familia: A Configurable Topic Modeling Framework for Industrial Text Engineering........................................... 516 Di Jiang, Yuanfeng Song, Rongzhong Lian, Siqi Bao, Jinhua Peng, Huang He, Hua Wu, Chen Zhang, and Lei Chen Generating Personalized Titles Incorporating Advertisement Profile........ 529 Jingbing Wang, Zhuolin Hao, Minping Zhou, Jiaze Chen, Hao Zhou, Zhenqiao Song, Jinghao Wang, Jiandong Yang, and Shiguang Ni Parasitic Network: Zero-Shot Relation Extraction for Knowledge Graph Populating.......................................... 541 Shengbin Jia, E. Shijia, Ling Ding, Xiaojun Chen, LingLing Yao, and Yang Xiang Graph Attention Networks for New Product Sales Forecasting in E-Commerce............................................ 553 Chuanyu Xu, Xiuchong Wang, Binbin Hu, Da Zhou, Yu Dong, Chengfu Huo, and Weijun Ren Transportation Recommendation with Fairness Consideration............ 566 Ding Zhou, Hao Liu, Tong Xu, Le Zhang, Rui Zha, and Hui Xiong Constraint-Adaptive Rule Mining in Large Databases................. 579 Meng Li, Ya-Lin Zhang, Qitao Shi, Xinxing Yang, Qing Cui, Longfei Li, and Jun Zhou Demo Papers FedTopK: Top-K Queries Optimization over Federated RDF Systems...... 595 Ningchao Ge, Zheng Qin, Peng Peng, and Lei Zou Shopping Around: CoSurvey Helps You Make a Wise Choice........... 600 Qinhui Chen, Liping Hua, Junjie Wei, Hui Zhao, and Gang Zhao IntRoute: An Integer Programming Based Approach for Best Bus Route Discovery........................................... 604 Chang-Wei Sung, Xinghao Yang, Chung-Shou Liao, and Wei Liu

Contents Part III xxiii NRCP-Miner: Towards the Discovery of Non-redundant Co-location Patterns................................................. 608 Xuguang Bao, Jinjie Lu, Tianlong Gu, Liang Chang, and Lizhen Wang ARCA: A Tool for Area Calculation Based on GPS Data.............. 612 Sujing Song, Jie Sun, and Jianqiu Xu LSTM Based Sentiment Analysis for Cryptocurrency Prediction.......... 617 Xin Huang, Wenbin Zhang, Xuejiao Tang, Mingli Zhang, Jayachander Surbiryala, Vasileios Iosifidis, Zhen Liu, and Ji Zhang SQL-Middleware: Enabling the Blockchain with SQL................. 622 Xing Tong, Haibo Tang, Nan Jiang, Wei Fan, Yichen Gao, Sijia Deng, Zhao Zhang, Cheqing Jin, Yingjie Yang, and Gang Qin Loupe: A Visualization Tool for High-Level Execution Plans in SystemDS............................................. 627 Zhizhen Xu, Zihao Chen, and Chen Xu Ph.D Consortium Algorithm Fairness Through Data Inclusion, Participation, and Reciprocity............................................ 633 Olalekan J. Akintande Performance Issues in Scheduling of Real-Time Transactions............ 638 Sarvesh Pandey and Udai Shanker Semantic Integration of Heterogeneous and Complex Spreadsheet Tables.... 643 Sara Bonfitto Abstract Model for Multi-model Data............................ 647 Pavel Čontoš User Preference Translation Model for Next Top-k Items Recommendation with Social Relations........................................ 652 Hao-Shang Ma and Jen-Wei Huang Tutorials Multi-model Data, Query Languages and Processing Paradigms.......... 659 Qingsong Guo, Jiaheng Lu, Chao Zhang, and Shuxun Zhang Lightweight Deep Learning with Model Compression................. 662 U. Kang

xxiv Contents Part III Discovering Communities over Large Graphs: Algorithms, Applications, and Opportunities.......................................... 664 Chaokun Wang, Junchao Zhu, Zhuo Wang, Yunkai Lou, Gaoyang Guo, and Binbin Wang AI Governance: Advanced Urban Computing on Informatics Forecasting and Route Planning......................................... 667 Hsun-Ping Hsieh and Fandel Lin Author Index... 671

FedTopK: Top-K Queries Optimization over Federated RDF Systems Ningchao Ge 1, Zheng Qin 1(B), Peng Peng 1,andLeiZou 2 1 Hunan University, Changsha, China {ningchaoge,zqin,hnu16pp}@hnu.edu.cn 2 Peking University, Beijing, China zoulei@pku.edu.cn Abstract. Recently, how to evaluate SPARQL queries over federated RDF systems has become a hot research topic. However, most existing studies mainly focus on implementing and optimizing the basic queries over federated SPARQL systems, and few of them discuss top-k queries. To remedy this defect, this demo designs a system named FedTopK that can support top-k queries over federated RDF systems. FedTopK employs a cost-based optimal query plan generation algorithm and a query plan execution optimization strategy to minimize the top-k query cost. In addition, FedTopK uses a query decomposition optimization scheme which allow merge triple patterns with the same multi-sources into one subquery to reduce the remote access times. Experimental studies over real federated RDF datasets show that the demo is efficient. 1 Introduction In recent years, Resource Description F ramework (RDF ) has been widely used in many applications. Many data providers publish their datasets using the RDF model at their own sites, and provide the SPARQL interfaces to support users to submit SPARQL queries. In this paper, an autonomous site with a SPARQL interface is called an RDF source. To integrate multiple RDF sources, federated RDF systems have been proposed [2 4]. Right now, practitioners are showing a growing interest in top-k queries, which impose an order on the result set and limit the number of results. Top-k queries can be expressed in SPARQL by including the ORDER BY and LIMIT clauses. However, existing federated RDF systems can only support to alter the sequence of solution mappings after the full evaluation of the graph pattern in the WHERE clause. Therefore, this paper implement a federated RDF system, named FedTopK, which optimize evaluation of top-k queries over federated RDF systems. In summary, FedTopK has the following unique features: FedTopK have an incremental query execution strategy in accordance with the characteristics of top-k queries, which can greatly improve the query efficiency by terminating the execution as soon as the requested number of final results has been obtained. c Springer Nature Switzerland AG 2021 C. S. Jensen et al. (Eds.): DASFAA 2021, LNCS 12683, pp. 595 599, 2021. https://doi.org/10.1007/978-3-030-73200-4_42

596 N. Ge et al. FedTopK can minimize query cost by a cost-based optimal query plan generation algorithm, which can optimize the join order of subqueries. FedTopK can reduce the remote access times effectively by a query decomposition scheme, which allows merge triple patterns with the same multi-sources into one subquery. 2 System Architecture and Key Techniques Figure 1 shows the system architecture of our proposed federated RDF system FedTopK. It consists of a control site and some RDF sources. We assume that queries are submitted to the control site. The control site decomposes the query into several subqueries on relevant sources and generate a query plan. Then, the decomposed subqueries are sent to their relevant sources and executed. Last, matches of subqueries are returned to the control site and joined to form complete matches according to the query plan. In summary, there are three steps during the query processing of FedTopK: query decomposition and source selection, cost-based query plan generation and query execution. Fig. 1. Scheme for query processing in FedTopK Query Decomposition and Source Selection. When an user submit a top-k query Q online, the query Q is decomposed into a set of subqueries, Q = {q 1 @S 1,q 2 @S 2,..., q n @S n }, where S i is the set of relevant sources for q i. FedTopK can merge triple patterns with the same multi-sources into one subquery by maintaining the triple patterns merge conditions from RDF sources offline. It can reduce the communication overhead effectively by reducing the number of subqueries. For example, Fig. 2 shows an example query decomposition and source selection result.

FedTopK: Top-K Queries Optimization over Federated RDF Systems 597 Fig. 2. Example query decomposition and source selection result Fig. 3. Example query plan Cost-Based Optimal Query Plan Generation. A query plan represent a join order of subqueries Q = {q 1 @S 1,q 2 @S 2,..., q n @S n }. Different query plans have different query costs. FedTopK designs a cost model to calculate the query cost and join cost of subqueries in accordance with the statistics data maintained from RDF sources offline. On this basic, the optimal query plan can be obtained by a optimal query plan generation algorithm. For example, Fig. 3 shows an example query plan for the query decomposition and source selection result, and we assume this query plan is the optimal one. Query Execution. The query plan determines the execution order and execution mode (serial and parallel) of subqueries. For query plan in Fig. 3, subquery q 2 @{dbpedia} is executed firstly. Then, subqueries q 1 @{swdfood} and q 5 @{gnames, dbpedia, swdfood, nyt} can be executed in parallel, and so on. Among that, we propose an optimization in accordance with the characteristics of top-k query. During query execution, when a subquery containing the top-k constraint is executed, its results are sorted and incrementally used to generate the final results in order. The execution can stops as soon as the requested number of final results has been obtained. 3 Demonstration In this demo, we use two famous comprehensive RDF benchmark suites, LargeRDFBench [5] and WatDiv [1], to show the demonstration of FedTopK. The federated RDF system FedTopK can efficiently support both SPARQL basic queries and top-k queries. More demonstrations can be referred with http://47. 111.92.242:8080/FedTopK/Demo/index.html.

598 N. Ge et al. Fig. 4. Query page of FedTopK Fig. 5. Query result page of FedTopK Figure 4 and Fig. 5 demonstrate the two main pages of FedTopK. Users can enter a SPARQL top-k query or select a query statement from the query sample list in Fig. 4. In the top of Fig. 5, FedTopK shows the detail query process including current SPARQL query statement, the set of subqueries after query decomposition, the optimal query plan and the value of query performance indicators. Finally, the query results can be found in the bottom of Fig. 5. 4 Conclusion FedTopK is a federated RDF system that can support top-k SPARQL queries. It can improve query performance by a cost-based optimal query plan generation algorithm and a query plan execution optimization strategy. It also reduces the remote requests by a query decomposition optimization.

FedTopK: Top-K Queries Optimization over Federated RDF Systems 599 Acknowledgment. This work was supported by the National Natural Science Foundation of China under Grant (No. U20A20174, 61772191), Science and Technology Key Projects of Hunan Province (2019WK2072, 2018TP3001, 2018TP2023,), ChangSha Science and Technology Project (kq2006029), National Key Research and Development Program of China under grant 2019YFB1406401 and Key Research and Development Program of Hubei Province (No. 2020BAB026). References 1. Aluç, G., Hartig, O., Özsu, M.T., Daudjee, K.: Diversified stress testing of RDF data management systems. In: Mika, P., et al. (eds.) ISWC 2014. LNCS, vol. 8796, pp. 197 212. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11964-9 13 2. Montoya, G., Skaf-Molli, H., Hose, K.: The Odyssey approach for optimizing federated SPARQL queries. In: d Amato, C., et al. (eds.) ISWC 2017. LNCS, vol. 10587, pp. 471 489. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68288-4 28 3. Peng, P., Ge, Q., Zou, L., Özsu, M.T., Xu, Z., Zhao, D.: Optimizing multi-query evaluation in federated RDF systems. TKDE (2019) 4. Quilitz, B., Leser, U.: Querying distributed RDF data sources with SPARQL. In: Bechhofer, S., Hauswirth, M., Hoffmann, J., Koubarakis, M. (eds.) ESWC 2008. LNCS, vol. 5021, pp. 524 538. Springer, Heidelberg (2008). https://doi.org/10.1007/ 978-3-540-68234-9 39 5. Saleem, M., Hasnain, A., Ngomo, A.N.: LargeRDFBench: a billion triples benchmark for SPARQL endpoint federation. J. Web Semant. 48, 85 125 (2018)

Shopping Around: CoSurvey Helps You Make a Wise Choice Qinhui Chen 1, Liping Hua 1, Junjie Wei 1, Hui Zhao 1,2(B), and Gang Zhao 3 1 Software Engineering Institute, East China Normal University, Shanghai, China 2 Shanghai Key Laboratory of Trustworthy Computing, Shanghai, China hzhao@sei.ecnu.edu.cn 3 Microsoft, Beijing, China gang.zhao@microsoft.com Abstract. When shopping online, customers usually compare commodities with each other before making their purchase decision. In addition to the product price, they also concern the word-of-mouth. However, marketing strategies from various e-commerce platforms, along with the diverse online commodities, make it difficult for customers to distinguish the most cost-effective products. Present cross-platform commodity comparison applications merely focus on product prices, without jointly concerning the reviews. In this demonstration, we developed a webbased application, CoSurvey, which matches commodities from various e-commerce platforms and analyzes product comment sentiment on the base of the proposed Attention-BiLSTM-CNN Model. The model uses an attention-based Bi-LSTM network to learn sentence sequence information, uses a CNN to learn sentence structure information, and uses a multilayer perceptron (MLP) to learn meta-information. The metainformation in the comment sentiment analysis task includes comment s like number, reviewer level, additional image, deliver time, and sentence length. Besides the keyword query, CoSurvey provides customers a survey of cross-platform products price changing trends and comment sentiment evolutions. The high concurrency requirements and load balance are also concerned. Keywords: Sentiment analysis Entity resolution E-commerce Multiple neural network Attention mechanism 1 Introduction With the permeation of online shopping, customers usually shop around on different e-commerce platforms. Besides the price and the brand, product reviews play a decisive role in the final purchase decision making as they can reflect on customer s preferences for the product. However, the inconsistency of crossplatform product descriptions, along with massive product reviews, bring about overwhelming information overload. During shopping festivals such as Singles Day (11.11) and Black Friday, this situation aggravates further. c Springer Nature Switzerland AG 2021 C. S. Jensen et al. (Eds.): DASFAA 2021, LNCS 12683, pp. 600 603, 2021. https://doi.org/10.1007/978-3-030-73200-4_43

Shopping Around: CoSurvey Helps You Make a Wise Choice 601 Although there exist some cross-platform commodity comparison applications, such as Kelkoo 1, and Goggle Product Search 2, these applications only focus on the price comparison and overlook the product review analysis jointly. Therefore, we develop CoSurvey, which surveys the product information from different e-commerce platforms to help the customer make a wise shopping decision. The application meets two challenges: (1) Product matching, which aims to align the same product of different e-commerce platforms; (2) Product review sentiment analysis, which concerns not only comment text but also its valuable meta information, such as when the review is delivered, how many consumers agree with the review, etc. Since different platforms have different comment meta information, we normalize them by extracting comments like number, reviewer level, additional image, deliver time, and sentence length. Our implementations can be summarized as follows: We propose and train a deep fusion neural network - Attention-BiLSTM-CNN model which takes both comment and its meta-information to classify the sentiment polarity. The experimental results demonstrate that our model s precision achieves 94.48%, recall is 94.29%, F1 value is 94.38%. We also train Attention-BiLSTM-CNN model to calculate the product pairs match possibility. The blocking strategy[2] is applied to decrease complexity. The system concerns high concurrency. Linux Virtual Server and multi-nginx servers are employed to implement the load balance. 2 CoSurvey System Overview and Key Techniques As shown in Fig. 1, CoSurvey system consists of five layers: data layer, NLP layer, business layer, gateway layer, and visual layer. NLP layer provides key techniques for product matching and review sentiment analysis task, which mainly includes: Data Pre-Process. Data pre-processing steps include filtering out missing values, normalizing comment meta information and product names, etc. Sentiment Classification. The Attention-BiLSTM-CNN model is applied to predict product review sentiment. The model will be detailed in Sect. 2.1. Product Matching. An Attention-BiLSTM-CNN model is trained to match products from different platforms. The input of the model is a pair of product descriptions from different platforms. The output is the possibility of whether the descriptions identify the same product. The blocking strategy is used to divide the whole dataset into several subsets by the product brand. The best-matched pairs are stored in the database. CoSurvey crawls different platforms commodity information and stores them in MongoDB. Elasticsearch 3 and Redis 4 are used to moderate database pressure. CoSurvey meets high concurrency requirements. We employ multiple LVS and Nginx servers in Openresty 5 to implement the load balance. CoSurvey also pro- 1 https://www.kelkoo.co.uk/. 2 https://shopping.google.com/?nord=1. 3 https://www.elastic.co/cn/elasticsearch/. 4 https://redis.io/. 5 http://openresty.org/cn/.

602 Q. Chen et al. Fig. 1. The framework of CoSurvey Fig. 2. Attention-BiLSTM-CNN model architecture vides customers an interactive web-based interface to browse all commodities or search for a specific commodity using keywords or product characteristics. For both query modes, CoSurvey presents all the selling links of the commodity and gives out a detail comparison of its review and price. According to these comparisons, customers can obtain the latent relationship between promotion and product feedback. 2.1 Attention-BiLSTM-CNN Model Model Structure. The model consists word embedding layer, sentence representation encoder (SRE), comment meta information encoder (CMIE), sentencemeta information fusion layer, and output layer, as is shown in Fig. 2. The word embeddings are initialized by ERNIE [6] model, which has demonstrated outperform BERT in Chinese corpus. The word embedding was finetuned during the training process. In SRE, we fuse CNN and BiLSTM via attention mechanism [3] to fully utilize sentence structural and sequential information. Specifically, Bi-LSTM output R and CNN output C are used to calculate the attention result H = softmax( KT Q d V ) (where K, V = C, Q = R). C is also fed into an sqrt-pooling layer to obtain the pooling result C pooling.incmie, we obtain high-dimensional meta-information representation E through MLP. Then, the fusion layer concatenates the outputs of SRE and CMIE, forming a fusing representation V HCE =[H; C pooling ; E]. Finally, V HCE is fed into a fully-connected layer with softmax to obtain the sentiment polarity. Experiments. We compare our model to CNN [1] model, LSTM [4] model, and AT-LSTM [5] model. The experiment results show that our model reaches 94.48% in precision and outperforms other models by 1.65%. We also perform an ablation study, which shows that meta-information makes an improvement by 0.4% in precision in the sentiment classification task. 3 System Demonstration We provide customers a highly interactive demonstration of our system. Figure 3 shows the main scenarios of the demo. (1) Customers can shop around commodities from different e-commerce platforms and search for products using

Shopping Around: CoSurvey Helps You Make a Wise Choice 603 keywords or product characteristics. (2) Customers can overview the price, the comment number, and the feedback rate distribution of the products. (3) Customers can browse the detailed comparison information for a specific product, like the current lowest price, the word cloud, and the price trends of this product. (4) Customers can view the product sentiment evolution of the product, where the static surveyed emotion, the dynamic emotional tendency, and the supported or inconsistent feedback rates are presented. Fig. 3. System Demonstration 4 Conclusion In this demonstration, we develop a distributed application called CoSurvey to survey the product information across different e-commerce platforms. We apply Attention-BiLSTM-CNN Model to implement both the sentiment analysis task and the product matching task. CoSurvey provides cross-platform product information survey service to help customers make a wise purchase decision. The application also provides operators insightful feedback to improve the production and the marketing strategy. Acknowledgements. This work is supported by National Key Research and Development Program (2019YFB2102600). References 1. Johnson, R., Zhang, T.: Effective use of word order for text categorization with convolutional neural networks. In: NAACL, pp. 103 112 (2015) 2. O Hare, K., Jurek-Loughrey, A., de Campos, C.: An unsupervised blocking technique for more efficient record linkage. Data Knowl. Eng. 122, 181 195 (2019) 3. Vaswani, A., et al.: Attention is all you need. In: NIPS, pp. 5998 6008 (2017) 4. Wang, X., Liu, Y., Sun, C.J., Wang, B., Wang, X.: Predicting polarities of tweets by composing word embeddings with long short-term memory. In: IJCNLP, pp. 1343 1353 (2015) 5. Wang, Y., Huang, M., Zhu, X., Zhao, L.: Attention-based LSTM for aspect-level sentiment classification. In: EMNLP, pp. 606 615 (2016) 6. Zhang, Z., Han, X., Liu, Z., Jiang, X., Sun, M., Liu, Q.: ERNIE: enhanced language representation with informative entities. In: ACL, pp. 1441 1451 (2019)

IntRoute: An Integer Programming Based Approach for Best Bus Route Discovery Chang-Wei Sung 1, Xinghao Yang 2(B), Chung-Shou Liao 1,andWeiLiu 2 1 Department of Industrial Engineering, National Tsing Hua University, Hsinchu, Taiwan sung103034036@gapp.nthu.edu.tw, csliao@ie.nthu.edu.tw 2 School of Computer Science, University of Technology Sydney, Ultimo, Australia xinghao.yang@student.uts.edu.au, wei.liu@uts.edu.au Abstract. An efficient data-driven public transportation system can improve urban potency. In this research, we propose IntRoute, an Integer Programming (IP) based approach to optimize bus route planning. Specifically, IntRoute first contracts bus stops via clustering and then derives a new bus route via a mixed integer linear program (ILP). This two-phase strategy brings three major merits, i.e., a single bus route without any transfer, the minimal total time consuming, and an efficient optimization algorithm for large-scale problems. Experimental results show that our IntRoute significantly reduces the traditional commuting time in Sydney from 31.53 min down to 18.06 min on average. 1 Introduction In this study, we consider an important data-driven public transportation problem: finding the best bus route that minimizes passengers overall commuting time. Given a bus transportation system as well as the requests of specific passengers who commute from different starting locations to a fixed destination, the goal of the problem is designing a new bus route to satisfy the passengers demand without any transfer. Previous studies on bus transfer problems were mostly not data-driven [2] due to data skewness problems [3]. In this work, we proposed a new integerprogramming based method, which we call IntRoute, to find the route that minimizes the total time cost of the targeted passengers. Specifically, our IntRoute contains two main phases, i.e., the contraction of bus stops via K-means clustering and the derivation of new bus route via a mixed integer linear programming (ILP). The major contributions of this research are listed below. We design a single bus route in which all passengers with an identical destination are delivered without any transfers. We present a two-phase framework to minimize the total time expense of the specific passengers. We develop a genetic algorithm (GA) to solve the integer linear programming (ILP) for large-scale instances. c Springer Nature Switzerland AG 2021 C. S. Jensen et al. (Eds.): DASFAA 2021, LNCS 12683, pp. 604 607, 2021. https://doi.org/10.1007/978-3-030-73200-4_44

An Integer Programming Based Approach for Best Bus Route Discovery 605 Fig. 1. The framework of the IntRoute. Fig. 2. Graph transformation. 2 Methodology The main framework of our two-phase IntRoute method are shown in Fig. 1. Phase 1: Contraction of Bus Stops. In the first phase of IntRoute, we contract multiple requests into a super node by using clustering approaches and determine a pickup bus stop for all the requests inside the super node. In each super node, passengers are asked to walk to the pickup bus stop and wait for buses. The walking time is counted into the total commuting time. We employ K-means clustering, as it consumes the least walking time compared with hierarchical clustering and density-peaks clustering. Then we exploit silhouette method and elbow method to determine the number of pickup stops, i.e., the cluster number n. Both methods indicate the best clustering number should be n = 20. Therefore, this phase finds 20 pickup stations that minimizes the passengers total walking time. Phase 2: Design of One Alternate Route. In the real-world transportation network, an arbitrary node pair (i, j) may be connected (Fig. 2 left). To solve the problem via mathematical IP model, we introduce the multi-level graph G (Fig. 2 right), where each level represents a possible sub-route from one stop to the next one. The red paths in G and G are equal. The graph G indicates the order of visiting the pick-up stops directly by the levels. Modelling via Integer Programming. We denote the node set as N = {1, 2,..., n} {S, T }, where S and T represents the source and destination, respectively. The arc set is A = {(i, j) i N, j N, and i j}. The travel time from node i to node j is denoted as c ij,andr i is the number of passengers who want to go to the destination. x l ij {0, 1} represents a binary variable, indicating whether the bus goes from node i to node j at level l on G. yijk l {0, 1} represents a binary variable which denotes if request k travels through arc (i, j) at level l. vk l {0, 1} represents a binary variable, indicating if request k is served at the level l. Formally, the IP model is formulated as: min yijk l c ijr k, s.t. l k (i,j) A (i,j) A xl ij =1,for l =0, 1,...,n (1) (j,i) A xl ji = (i,k) A xl+1 ik, i; l (2)

606 C.-W. Sung et al. (S,i) A x0 Si = (i,j) A x1 ij (3) (i,j) A xn 1 ij = (j,t ) A xn jt (4) i l xl ij 1,for j =1, 2,...,n,T (5) vk l v(l+1) k, k, l (6) k vl k = l, for l =1, 2,...,n (7) x l ij vl i,for (i, j) A, l =1, 2,...,n (8) yijk l (xl ij + vl k )/2, (i, j) A, k, l (9) yijk l (xl ij + vl k ) 1, (i, j) A, k, l (10) x l ij {0, 1}; vl k {0, 1}; yl ijk {0, 1} (11) where (1) ensures that each level is exactly passed once. (2) (4) ensure that flow conservation of the graph. (5) ensures that each node can be entered at most once. (6) ensures that request k must be served at level l + 1 if it is served at level l. (7) ensures that l requests are on the bus when the bus is serving level l. (8) ensures that if arc (i, j) is picked at level l, request i should be served at level l. (9) and (10) ensure that the request k is served at level l on the arc (i, j) if both x l ij and vl k are equal to one. (11) showsxl ij, vl k,andyl ijk are all binaries. Optimization via Genetic Algorithm. We design a genetic algorithm (GA) to solve this IP problem. Specifically, the chromosome represents possible sequence of the node set {1, 2,...,n}, and the population is a set of chromo- Algorithm 1: Genetic Algorithm for Solving the IP Problem Input: T = 1000, R c =0.1, R m =0.05 Output: The chromosome with the best fitness function 1 Initialize the population with size M = 500; 2 for i =1to T do 3 Select new population P i from P i 1; 4 for individual p P i do 5 offspring Crossover(p, R c); 6 offspring Mutate(offspring,R m); 7 p offspring; 8 end 9 end 10 return The best chromosome. somes. As shown in Algorithm 1, a new chromosome can be generated by the crossover between two parent bus routes with a probability of crossover rate R c. The mutation is defined as the position exchange between two randomly selected near-by bus stoops with a probability of R m. There are two steps in our GA: (1) the randomly population initialization with a given size M, and (2) the population evolution for T generations by crossover and mutation according to a fitness function. We adopt a 2- OPT technique to avoid the cross sub-paths. Besides, we propose a decomposition technique that clusters the optimal route into three subroute via k-means. We concatenate the clusters in a reverse order, i.e., from the destination node to the start node. This strategy greatly reduces the travel time.

An Integer Programming Based Approach for Best Bus Route Discovery 607 Table 1. Routing time before optimization Bus route C C 2153142, 2155252, 2148445, 33.62 min 31.53 min 2153226, 2121125, 2074117, 212225, 211220, 211118, 2137134, 212746, 2150145, 2145561, 2150302, 2190145, 2135206, 213447, 203833, 200721, 201635, CBD Table 2. Commute time Fig. 3. Bus route without transfer Methods Time Original route 31.53 Greedy algorithm [1] 53.41 GA 31.27 GA + 2-OPT 33.62 GA + decomposition 18.06 Fig. 4. Bus routes after optimization 3 Experiments and Analysis Data. The experiment is performed based on publicly available real-world commuting data, retrieved from the card-based transit payment system 1 in Sydney, Australia, including approximately three million trips. Results. The routing time before optimization are listed in Table 1, where routes are represented by the IDs of the bus stops. Here C denotes the time cost without transfer and without optimization (also demoed in Fig. 3), and C denotes that of the original commute with transfers. The new route after our optimization is shown in Fig. 4, while the time costs of the bus routes optimized by different methods are listed in Table 2. Conclusions. Our IntRoute method greatly reduces the time expense for passengers from 31.53 min to 18.06 min on average, saving about 43% of commute time. In future, we plan to investigate more optimization methods for further improving our solutions. References 1. Li, L., Fu, Z.: The school bus routing problem: a case study. J. Oper. Res. Soc. 53(5), 552 558 (2002). https://doi.org/10.1057/palgrave.jors.2601341 2. Liu, J., Mao, J., Du, Y.T., Zhao, L., Zhang, Z.: Dynamic bus route adjustment based on hot bus stop pair extraction. In: Li, G., Yang, J., Gama, J., Natwichai, J., Tong, Y. (eds.) DASFAA 2019. LNCS, vol. 11448, pp. 562 566. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-18590-9 87 3. Liu, W., Chawla, S.: A quadratic mean based supervised learning model for managing data skewness. In: Proceedings of SIAM SDM Conference (2011) 1 https://opendata.transport.nsw.gov.au/dataset/opal-tap-on-and-tap-off.

NRCP-Miner: Towards the Discovery of Non-redundant Co-location Patterns Xuguang Bao 1, Jinjie Lu 1, Tianlong Gu 1, Liang Chang 1(B), and Lizhen Wang 2 1 Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China changl@guet.edu.cn 2 Yunnan University, Kunming 650091, China Abstract. Co-location pattern mining, which refers to discovering neighboring spatial features in geographic space, is an interesting and important task in spatial data mining. However, in practice, the usefulness of prevalent (interesting) colocation patterns generated by traditional frameworks is strongly limited by their huge amount, which may affect the user s following decisions. To address this issue, in this demonstration, we present a novel schema, named NRCP-Miner, aiming at the redundancy reduction for prevalent co-location patterns, i.e., discovering non-redundant co-location patterns by utilizing the spatial distribution information of co-location instances. NRCP-Miner can effectively remove the redundant patterns contained in prevalent co-location patterns, thus furtherly assists the user to make the following decisions. We evaluated the efficiency of NRCP-Miner compared with related state-of-the-art approaches. Keywords: Spatial data mining Co-location pattern mining Prevalent co-location patterns Redundancy reduction Decision-making system 1 Introduction The explosive growth of the spatial data results in significant demand for spatial data mining. Co-location pattern mining, as an important spatial data mining task, has been extensively studied for discovering neighboring relationships of spatial features. A spatial co-location pattern commonly demonstrates neighboring relationships of spatial features. Spatial co-location patterns may yield important insights in many applications, including Earth Science, public health, biology, transportation, etc. To measure how interesting a co-location pattern is, the PI (Participation Index) value proposed by Huang et al. [1] is commonly used. Given a user-specified minimum prevalence threshold min_prev, for a co-location pattern c, if PI(c) min_prev satisfies, c is called a prevalent co-location pattern (PCP). As a PCP is a set of spatial features, given a spatial dataset containing m spatial features, the number of generated PCPs can reach as much as 2 m. Furthermore, the PI measure satisfies the anti-monotonicity property [1], i.e., if a PCP c is prevalent, all its subsets are also prevalent. However, most of its subsets are redundant by considering their prevalences or PI values, which Springer Nature Switzerland AG 2021 C. S. Jensen et al. (Eds.): DASFAA 2021, LNCS 12683, pp. 608 611, 2021. https://doi.org/10.1007/978-3-030-73200-4_45

NRCP-Miner: Towards the Discovery of Non-redundant Co-location Patterns 609 may affect the decisions of the user. Thus, it is crucial to reduce the number of PCPs by redundancy reduction. To reduce the number of PCPs, two classic condensed representations have been proposed maximal co-location patterns [2] (MCPs) and closed co-location patterns [3] (CCPs), respectively. However, MCPs are considered as a lossy representation because they ignore the PI values of co-location patterns. Although CCPs are lossless representations considering both prevalences and PI values of co-location patterns, they contain redundancies. Thus, Wang et al. [4] proposed an algorithm called RRClosed to select non-redundant co-location patterns from CCPs. Later, they introduced a new lossless and non-redundant representation called SPI-closed (Super Participation Index-closed) co-location patterns (SCPs), and proposed a method called SPI-Miner [5] to efficiently discover SCPs. In this demonstration, we present a novel and efficient system, named NRCP-Miner, to discover SCPs. Instead of RRClosed or SPI-Miner, we adopt a clique-based approach [6] to discover PCPs, and then furtherly select SCPs. Because the clique-based approach constructs a hash structure that can be stored permanently and is independent of the prevalence threshold, our proposed system performs more efficiently than RRClosed and SPI-Miner, especially when the system needs to be executed multiple times. Besides, as SCPs are subsets of PCPs, our proposed NRCP-Miner can be applied to domains of PCPs. For example, the mobile service provider may be interested in mobile service SCPs frequently requested by geographical neighboring users. Botanists may be interested in SCPs consisting of symbiotic plant species. 2 SystemOverview NRCP-Miner undergoes six steps to generate SCPs, as shown in Fig. 1. Step 1: Materialization of the inputted spatial data. This step first gathers all neighboring relationships of each instance by considering a user-given distance threshold min_dist, and then groups the neighboring relationships as a neighbor list. Step 2: Generation of complete cliques. This step aims to generate complete cliques using the neighbor list. As the enumeration of maximal cliques is considered as an NP-hard problem, we adopt a linear method [6] to generate complete cliques. Step 3: Compression of the complete cliques. As the calculation of the PI value of a co-location c is only based on the instances participating in c, thus, the complete cliques can be compressed into a hash structure. Step 4: Generation of PCPs. Given the instance hash, the PI value of any co-location pattern can be efficiently calculated by considering the user-specified prevalence threshold min_prev. Step 5: Selection of CCPs. As the CCPs are subsets of PCPs, thus, all CCPs can be selected from PCPs by the definition of CCPs, i.e., removing the PCP whose PI value equals the PI value of one of its supersets. Step 6: Generation of SCPs. To generate the SCPs from CCPs, we adopt the latter part of the RRClosed method [4], which generates SCPs from CCPs by designing a NET structure and a lemma for pruning.

610 X. Bao et al. Spatial data set Distance threshold (min_dist) Prevalence threshold (min_prev) Materialization Neighbor list Generation Complete cliques Compression SCPs Generation Selection Generation CCPs PCPs Instance hash Fig. 1. System description 3 Demonstration Scenarios NRCP-Miner is well encapsulated with a friendly interface, what the user faces is only a simple user interface. In this demonstration, we use part of the data set from points of interests (POI data) in Beijing to show the demonstration and efficiency of NRCP-Miner. The selected POI data set contains 5,000 POIs (spatial instances). Demonstration. Figure 2 shows the main interface of NRCP-Miner. Figure 2(a) gives the original spatial instances read from a file or a database, each instance is represented as <feature name, location <x, y>>. The detailed distribution of instances described in Fig. 2(a) is drawn in Fig. 2(b). The parameters with their specified values are listed in Fig. 2(c). Figure 2(d) shows the generated SCPs based on the settings in Fig. 2(c) from the spatial data shown in Fig. 2(a), as well as the number of per-size SCPs and removed CCPs. Fig. 2. Demonstration of NRCP-Miner

NRCP-Miner: Towards the Discovery of Non-redundant Co-location Patterns 611 Efficiency Evaluations. We evaluated the efficiency of NRCP-Miner from two aspects: the compression ratio to CCPs and the running time compared with RRClosed and SPI- Miner. As shown in Fig. 2(d), NRCP-Miner removes 56.3% of PCPs, and 25% of CCPs, and also runs faster than RRClosed and SPI-Miner with the change of the prevalence threshold min_prev, as shown in Fig. 3, this is because the hash structure generated by NRCP-Miner is independent of min_prev, while the other algorithms have to restart their mining processes with the change of min_prev. Running Time(s) 30 20 10 0 RRClosed SPI-Miner NRCP-Miner 0.1 0.3 0.5 0.7 0.9 min_prev Fig. 3. Efficiency comparison with related literature 4 Conclusion This demonstration presents a novel and efficient system called NRCP-Miner to discover a newly proposed lossless condensed representation of prevalent co-locations SPI-closed co-locations. Unlike similar approaches mainly focusing on pruning strategies for reducing the number of candidates by using the prevalence threshold, NRCP-Miner gets rid of the constraint of the prevalence threshold. Thus, it can effectively assist the user to find a satisfying prevalence threshold within much less time, and furtherly can well support the decision-making of the user. Acknowledgements. This work was supported in part by grants (No. 62006057, No. U1811264, No. U1711263, No. 61966009, No. 61762027) from the National Natural Science Foundation of China, in part by National Science Foundation of Guangxi Province (No. 2019GXNSFBA245059), in part by the Key Research and Development Program of Guangxi (No. AD19245011). References 1. Huang, Y., Shekhar, S., Xiong, H.: Discovering co-location patterns from spatial data sets: a general approach. IEEE Trans. Knowl. Data Eng 16(12), 1472 1485 (2004) 2. Wang, L., Zhou, L., Lu, J., et al.: An order-clique-based approach for mining maximal colocations. Inf. Sci. 179(2009), 3370 3382 (2009) 3. Yoo, J.S., Bow, M.: Mining top-k closed co-location patterns. In: IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, pp. 100 105 (2011) 4. Wang, L., Bao, X., Zhou, L.: Redundancy reduction for prevalent co-location patterns. IEEE Trans. Knowl. Data Eng. 30(1), 142 155 (2018) 5. Wang, L., Bao, X., Chen, H., Cao, L.: Effective lossless condensed representation and discovery of spatial co-location patterns. Inf. Sci. 436 437, 197 213 (2018) 6. Bao, X., Wang, L.: A clique-based approach for co-location pattern mining. Inf. Sci. 490, 244 264 (2019)