[1]T. S. Chen, Y. S. Chou and T. C. Chen, “Mining User Movement Behavior Patterns in a Mobile Service Environment.” IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, Vol. 42, pp.87-101, 2012.
[2]T. M. T. Do and D. Gatica-Pereza, “Where and what: Using smartphones to predict next locations and applications in daily life.” Pervasive and Mobile Computing, Vol. 12, pp. 79-91, 2014.
[3]S. J. Evangeline1, K. M. Subramanianl, and K. Venkatachalam, “Efficiently Mining the Frequent Patterns in Mobile Commerce Environment.” International Journal of Innovation and Scientific Research, Vol. 5, No. 1, pp. 30-39, 2014.
[4]P. Fournier-Viger, C. W. Wu, S. Zida, and V. S. Tseng, “FHM: faster high-utility itemset mining using estimated utility co-occurrence pruning.” Lecture Notes in Computer Science, Vol. 8502, pp. 83-92, 2014.
[5]J. Han, J. Pei, and Y. Yin, “Mining frequent patterns without candidate generation.” Proceedings of ACM SIGMOD International Conference on Management of Data, pp. 1-12, 2000.
[6]G. C. Lana, T. P. Hongb, and V. S. Tseng, “Applying the maximum utility measure in high utility sequential pattern mining.” Expert Systems with Applications, Vol. 41, No. 11, pp. 5071-5081, 2014.
[7]K. C. Lu, C. W. Hsu, and D. L. Yang, “A Novel Approach for Efficient and Effective Mining of Mobile User Behaviors.” Proceedings of the 4th International Conference on Multimedia and Ubiquitous Engineering, pp. 1-6, 2010.
[8]Y. Liu, W. K. Liao, and A. Choudhary, “A fast high utility itemsets mining algorithm.” Proceedings of the 1st international workshop on Utility-based data mining, pp. 90-99, 2005.
[9]K. C. Lin, I-En Liao, and Z. S. Chen, “An improved frequent pattern growth method for mining association rules.” Expert Systems with Applications, Vol. 38, No. 5, pp. 5154–5161, 2011.
[10]H. C. Lu, W. C. Lee, and V. S. Tseng, “A framework for personal mobile commerce pattern mining and prediction.” Knowledge and Data Engineering, Vol. 24, No. 5, pp. 769-782, 2012.
[11]M. Liu and J. Qu, “Mining high utility itemsets without candidate generation.” Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 55-64, 2012.
[12]Y. S. Lee, S. J. Yen and C. H. Wang, “Mining browsing and purchasing behaviors of web users.” Proceedings of IEEE International Conference on Machine Learning and Cybernetics, Vol. 5, pp. 2647-2652, 2010.
[13]C. H. Mooney and J. F. Roddick, “Sequential pattern mining--approaches and algorithms.” ACM Computing Surveys (CSUR), Vol. 45, No. 2, pp. 1-39, 2013.
[14]S. Nagalakshmi and R. Sumathi, “An efficient mobile commerce explorer for mobile user's behavior pattern mining and prediction.” Proceeding of the 2014 International Conference on Information Communication and Embedded Systems, pp. 1-7, 2014.
[15]J. Pei, J. Han, and B. Mortazavi-Asl, “Prefixspan: Mining sequential patterns efficiently by prefix-projected pattern growth.” Proceedings of the 17th International Conference on Data Engineering, pp. 215–224, 2001.
[16]B. E. Shie, H. F. Hsiao, and V. S. Tseng, “Efficient algorithms for discovering high utility user behavior patterns in mobile commerce environments.” Knowledge and Information Systems, Vol.37, No.2, pp. 363-387, 2013.
[17]B. E. Shie, P. S. Yu, V. S. Tseng, “Mining interesting user behavior patterns in mobile commerce environments.” Applied Intelligence, Vol.38, No.3, pp. 418-435, 2013.
[18]V. S. Tseng and K. W. Lin, “Efficient mining and prediction of user behavior patterns in mobile web systems.” Information and software technology, Vol. 48, No. 6, pp. 357–369, 2006.
[19]V. S. Tseng, B. E. Shie, C. W. Wu, and P. S. Yu, “Efficient algorithms for mining high utility itemsets from transactional databases.” IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 8, pp. 1772-1786, 2013.
[20]L. Vu and G. Alaghband, “A fast algorithm combining fp-tree and tid-list for frequent pattern mining.” Proceedings of IEEE Conference on Information and Knowledge Engineering, pp. 472-477, 2011.
[21]J. Z. Wang, J. L. Huang, and Y. C. Chen, “On efficiently mining high utility sequential patterns.” Knowledge and Information Systems, Vol.49, pp. 1-31, 2016.
[22]C. H. Yun and M. S. Chen, “Mining mobile sequential patterns in a mobile commerce environment.” IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, Vol. 37, No. 2, pp. 278-295, 2007.
[23]H. Yao, H. J. Hamilton, and C. J. Butz, “A Foundational Approach to Mining Itemset Utilities from Databases.” Proceedings of the 4th SIAM International Conference on Data Mining, pp. 482-486, 2004.
[24]J. Yan, Y. Qiao, J. Yang, and S. Gao, “Mining Individual Mobile User Behavior on Location and Interests.” Proceeding of IEEE International Conference on Data Mining Workshop, pp. 1262-1269, 2015.
[25]J. Yang, Y. Qiao, X. Zhang, H. He, F. Liu and G. Cheng, “Characterizing User Behavior in Mobile Internet.” IEEE Transactions on Emerging Topics in Computing, Vol. 3, pp.95-106, 2015.
[26]J. Yin, Z. Zheng, and L. Cao, “Uspan: an efficient algorithm for mining high utility sequential patterns.” Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 660-668, 2012.
[27]M. J. Zaki, “SPADE: An efficient algorithm for mining frequent sequences.” Machine Learning, Vol. 42, No. 1, pp. 31-60, 2001.
[28]S. Zida, P. Fournier-Viger, C. W. Wu, J. C. W. Lin, and V. S. Tseng, “Efficient mining of high-utility sequential rules.” Machine Learning and Data Mining in Pattern Recognition, Vol. 9166, pp. 157-171, 2015.
[29]吳彥欽, 張嘉惠, “非簡單瀏覽路徑之探勘與應用” 中央大學資訊工程研究所碩士論文, 2001.