Author of the publication

A More Efficient Algorithm to Mine Skyline Frequent-Utility Patterns.

, , , , , , and . ICGEC, volume 536 of Advances in Intelligent Systems and Computing, page 127-135. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A ranking measure for top-k moving object trajectories search., and . GIR, page 27-34. ACM, (2013)UP-Hist Tree: An Efficient Data Structure for Mining High Utility Patterns from Transaction Databases., and . IDEAS, page 56-61. ACM, (2015)EcoTop: An Economic Model for Dynamic Processing of Top-k Queries in Mobile-P2P Networks., , , , and . DASFAA (2), volume 6588 of Lecture Notes in Computer Science, page 251-265. Springer, (2011)Efficient Reverse k Nearest Neighbor evaluation for hierarchical index., , and . CoRR, (2015)Efficient Enforcement of Privacy for Moving Object Trajectories., , and . ICISS, volume 8303 of Lecture Notes in Computer Science, page 360-374. Springer, (2013)Opaqueness Characteristic of a Context Honeypot System., , , , , and . Inf. Secur. J. A Glob. Perspect., 19 (3): 142-152 (2010)THUE: Discovering Top-K High Utility Episodes., , , , and . CoRR, (2021)High-utility itemset mining for subadditive monotone utility functions., , and . CoRR, (2018)Hate is the New Infodemic: A Topic-aware Modeling of Hate Speech Diffusion on Twitter., , , , , , and . ICDE, page 504-515. IEEE, (2021)Malafide Intension and its mapping to Privacy Policy Purposes for Masquerading., , and . IDEAS, page 311-312. IEEE Computer Society, (2006)