Author of the publication

Feasible itemset distributions in data mining: theory and application.

, , and . PODS, page 284-295. ACM, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Text-based for Detection and Filtering of Commercial Segments in Broadcast News., and . LREC, European Language Resources Association, (2002)Distribution-Based Synthetic Database Generation Techniques for Itemset Mining., , and . IDEAS, page 307-316. IEEE Computer Society, (2005)On Testing Satisfiability of Tree Pattern Queries., , , and . VLDB, page 120-131. Morgan Kaufmann, (2004)Feasible itemset distributions in data mining: theory and application., , and . PODS, page 284-295. ACM, (2003)Preservation Of Patterns and Input-Output Privacy., , , and . ICDE, page 696-705. IEEE Computer Society, (2007)Why Waldo befriended the dummy? k-Anonymization of social networks with pseudo-nodes., , , , , and . Soc. Netw. Anal. Min., 3 (3): 381-399 (2013)Multi-Source Combined-Media Video Tracking for Summarization., , , and . ICPR (2), page 818-821. IEEE Computer Society, (2002)Indexing and Data Access Methods for Database Mining., , and . DMKD, (2002)On Testing Satisfiability of Tree Pattern Queries., , , and . VLDB, page 120-131. Morgan Kaufmann, (2004)Can Attackers Learn from Samples?. Secure Data Management, volume 3674 of Lecture Notes in Computer Science, page 104-123. Springer, (2005)