Author of the publication

Association against dissociation: some pragmatic considerations for frequent itemset generation under fixed and variable thresholds.

, and . SIGKDD Explor., 7 (2): 151-159 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Association against dissociation: some pragmatic considerations for frequent itemset generation under fixed and variable thresholds., and . SIGKDD Explor., 7 (2): 151-159 (2005)A Formal Methodology for Detecting Managerial Vulnerabilities and Threats in an Enterprise Information System., , and . J. Netw. Syst. Manag., 19 (3): 319-342 (2011)Design of a Data Model for Social Network Applications., , and . J. Database Manag., 18 (4): 51-79 (2007)Resolving authorization conflicts by ontology views for controlled access to a digital library., , , and . J. Knowl. Manag., 19 (1): 45-59 (2015)Design of a Data Model for Social Network Applications., , and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)Complex Queries on Web Graph representing a Social Network., , and . ICDIM, page 430-435. IEEE, (2006)Specification and validation of enterprise information security policies., , and . CUBE, page 801-808. ACM, (2012)Ingesting High-Velocity Streaming Graphs from Social Media Sources., , and . CoRR, (2019)Data Mining by Navigation - An Experience with Systems Biology., , , and . PReMI, volume 5909 of Lecture Notes in Computer Science, page 158-164. Springer, (2009)PROFORMA: Proactive Forensics with Message Analytics., , and . IEEE Secur. Priv., 15 (6): 33-41 (2017)