Author of the publication

Efficient Pruning of Probabilistic Automata.

, and . SSPR/SPR, volume 5342 of Lecture Notes in Computer Science, page 65-75. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraint-based discovery and inductive queries: Application to association rule mining, and . Pattern Detection and Discovery, Springer, (2002)Using Constraints during Frequent Set Mining: a Generic Approach., and . BDA, (2000)Constraint-Based Discovery and Inductive Queries: Application to Association Rule Mining., and . Pattern Detection and Discovery, volume 2447 of Lecture Notes in Computer Science, page 110-124. Springer, (2002)Constraint-based Data Mining., and . Data Mining and Knowledge Discovery Handbook, Springer, (2010)Towards the Tractable Discovery of Association Rules with Negations., , and . FQAS, volume 7 of Advances in Soft Computing, page 425-434. Physica-Verlag Heidelberg New York, A Springer-Verlag Company, (2000)Using Condensed Representations for Interactive Association Rule Mining., and . PKDD, volume 2431 of Lecture Notes in Computer Science, page 225-236. Springer, (2002)Detection d'anomalies contextuelles dans un graphe attribué., , and . EGC, volume E-38 of RNTI, page 387-394. Editions RNTI, (2022)A model for managing collections of patterns., , and . SAC, page 860-865. ACM, (2007)Suspicious: a Resilient Semi-Supervised Framework for Graph Fraud Detection., , , and . ICTAI, page 212-220. IEEE, (2023)Mining Free Itemsets under Constraints., and . IDEAS, page 322-329. IEEE Computer Society, (2001)