期刊文献+

反频繁集挖掘可计算复杂性问题研究

Study of Computational Complexity on Inverse Frequent Set Mining
下载PDF
导出
摘要 频繁集挖掘是总结二进制数据的重要技术,但如何找到一个二进制数据集与频繁集挖掘结果相一致却十分困难。文中从可计算复杂度的观点研究了频繁集的隐私保持。特别分析了反频繁挖掘问题的可计算复杂度。给出了决定是否存在与一个已知频繁集兼容的数据集是一个NP难度问题;当原始数据集d由6个集合组成时计算与已知频繁集兼容的数据集的数量是一个P类完全问题。 Frequent set mining is a well known technique to summartize binary data. However, it is difficult to find a binary data set that is compatible with frequent set mining results. The paper studies the frequent sets preserve privacy from the viewpoint of computational complexity, and specially analyzes the computational complexity of inverse frequent set mining. The paper forwards that deciding whether there is a data set compatible with the given frequent sets is NP- hard and computing the number of data sets compatible with the given frequent sets is P- hard even in the case when the original data set d consists of six sets.
出处 《计算机技术与发展》 2006年第4期25-27,共3页 Computer Technology and Development
基金 湖北省自然科学基金资助项目(2004ADA023)
关键词 反频繁集挖掘 隐私保持 投影 inverse frequent set mining preserve privacy projection
  • 相关文献

参考文献10

  • 1Mannila H.Local and global methods in data mining:Basic techniques and open problems[A].In:Widmayer P,Triguero F,Morales R,et al.Automata,Languages and Programming,volume 2380 of Lecture Notes in Computer Science[C].[s.l.]:Springer-Verlag,2002.57-68.
  • 2Evfimievski A,Srikant R,Agrawal R,et al.Privacy preserving mining of association rules[A].In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining[C].Edmonton,Alberta,Canada:ACM Press,2002.217-228.
  • 3Oliverira S R M,Zaī O R.Privacy prescrving frequent iternset mining[A].In:Clifton C,Estivill-Castro V.IEEE ICDM Workshop on Privacy,Security,and Data Mining.volume 14of Conferences in Research and Practice in Information Technology[C].Maebashi City,Japan:[s.n.],2002.43-54.
  • 4Gouka K,Zaki M J.Efficiently mining maximal frequent itemsets[A].In:Cercone N,Lin T Y,Wu X.Proceedings of the 2001 IEEE International Conference on Data Mining[C].Washington,DC:IEEE Computer society,2001.163-170.
  • 5Gunopulos D,Khardon R,Mannila H,et al.Discovering all most specific sentences[J].ACM Transactions on Database Systems,2003,28(2):140-174.
  • 6Calders T,Goethals B.Minimal k-free representations of frequent sets[A].In:Lavrac N,Gamgerger D,Todorovski L,et al.Knowledge Discovery in Databases:PKDD 2003,volume 2838 of Lecture Notes in Artifical Intelligence[C].[s.l.]:Springer-Verlag,2003.
  • 7Garey M R,Johnson D S.Computers and Intractability:A Guide to the Theory of NP-Completeness[Z].New YorkSan Francisco:W.H.Freeman and Company,1979.
  • 8Knuth D E.Sorting and Searching,volume 3 of The Art of Computer Programming (2nd ed)[M].Reading,Massachusetts:Addison-Wesley Publishing CO.,1998.
  • 9J ukan S.Extremal Combinatorics:With Applications in Computer Science[A].EATCS Texts in Theoretical Computer Science[C].Berlin:Springer-Verlag,2001.
  • 10Gali Z.Efficient algorithms for finding maximum matchings in graphs[J].ACM Computing Surveys,1986,18(1):23-38.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部