Author of the publication

Mining top-k frequent patterns in the presence of the memory constraint.

, , and . VLDB J., 17 (5): 1321-1344 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature-preserved sampling over streaming data., , and . ACM Trans. Knowl. Discov. Data, 2 (4): 15:1-15:45 (2009)Mining spatio-temporal chaining patterns in non-identity event databases., , and . Intell. Data Anal., 21 (S1): S71-S102 (2017)Toward Mining Stop-by Behaviors in Indoor Space., , and . ACM Trans. Spatial Algorithms Syst., 3 (2): 7:1-7:38 (2017)On Data Labeling for Clustering Categorical Data., , and . IEEE Trans. Knowl. Data Eng., 20 (11): 1458-1472 (2008)Return-of-Interest Conscious Truth Inference for Crowdsourcing Queries., , and . TAAI, page 60-65. IEEE, (2021)Toward Understanding the Mobile Social Properties: An Analysis on Instagram Photo-Sharing Network., , and . ASONAM, page 266-269. ACM, (2015)Transferring Knowledge from Text to Predict Disease Onset., , , , , and . MLHC, volume 56 of JMLR Workshop and Conference Proceedings, page 150-163. JMLR.org, (2016)Labeling Unclustered Categorical Data into Clusters Based on the Important Attribute Values., , and . ICDM, page 106-113. IEEE Computer Society, (2005)Interactive Unknowns Recommendation in E-Learning Systems., , , , and . ICDM, page 497-506. IEEE Computer Society, (2018)Efficient Gossiping Dissemination in Mobile Peer-to-Peer Environment Based on Neighborhood Detection., , , and . PAKDD Workshops, volume 8643 of Lecture Notes in Computer Science, page 156-167. Springer, (2014)