Author of the publication

A false negative approach to mining frequent itemsets from high speed transactional data streams.

, , , , and . Inf. Sci., 176 (14): 1986-2015 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RDF pattern matching using sortable views., , , , , and . CIKM, page 315-324. ACM, (2012)Evaluation of RDF queries via equivalence., , , , and . Frontiers Comput. Sci., 7 (1): 20-33 (2013)HilAnchor: Location Privacy Protection in the Presence of Users' Preferences., , and . J. Comput. Sci. Technol., 27 (2): 413-427 (2012)Efficient Computation of k-Medians over Data Streams Under Memory Constraints., , , , , and . J. Comput. Sci. Technol., 21 (2): 284-296 (2006)Location Privacy Protection in the Presence of Users' Preferences., , , , and . WAIM, volume 6897 of Lecture Notes in Computer Science, page 340-352. Springer, (2011)Attention Based Subgraph Classification for Link Prediction by Network Re-weighting., , , , , and . CIKM, page 3171-3175. ACM, (2021)Dynamic Network Embedding by Time-Relaxed Temporal Random Walk., , , and . ICONIP (1), volume 13108 of Lecture Notes in Computer Science, page 426-437. Springer, (2021)False-Negative Frequent Items Mining from Data Streams with Bursting., , , , and . DASFAA, volume 3453 of Lecture Notes in Computer Science, page 422-434. Springer, (2005)A false negative approach to mining frequent itemsets from high speed transactional data streams., , , , and . Inf. Sci., 176 (14): 1986-2015 (2006)Approximate K-Median of Location Streams with Redundancy and Inconsistency., , , , , and . Int. J. Softw. Informatics, 4 (2): 165-182 (2010)