Mining Time Pattern Association Rules in Temporal Database
Mining Time Pattern Association Rules in Temporal Database
出处
《通讯和计算机(中英文版)》
2010年第3期50-56,共7页
Journal of Communication and Computer
参考文献10
-
1R. Agrawal, T. lmielinskk A. Swami, Mining associations between sets of items in massive databases. In: Proc. of the 1993 ACM-SIGMOD Int'l Conf. on Management of Data, 1993, pp. 207-216.
-
2R. Agrawal, H. Mannila, R. Srikant, H. Toivonen, A.I. Verkamo. Fast discovery of association rules, in: Advances in Knowledge Discovery and Data Mining, AAAI Press, 1996, pp. 307-328.
-
3K. Ali, S. Manganaris, R. Srikant, Partial classification using association rules, in: Proc. of the 3rd Int'l Conference on Knowledge Discovery in Databases and Data Mining, 1997, pp. 115-118.
-
4C.H. Lee, C.R. Lin, M.S. Chen, On mining general temporal association rules in a publication database, In ICDM01, 2001, pp. 337-344.
-
5Y. Li, P. Ning, X.S. Wang, S. Jajodia, Discovering calendar-based temporal association rules, Manuscript,2000, available online at: http://www.ise.gmu.edu/ pning/ tdm.ps.
-
6B. Ozden, S. Ramaswamy, Silberschatz, A cyclic association rules, in: Proc. of the 14th Int'l Conf on Data Engineering, 1998, pp. 412-421.
-
7T.D. Nguyen, An approach to mining time pattern association rules in temporal database in: The 2rid Asia Pacific International Conference on Information Science and Technology (APIC-IST), December, 20071 pp. 125-132.
-
8N.D. Nguyen, H.X. Nguyen, T.D. Nguyen, Mining cyclic association rules in temporal DB, The Journal Science Technology Development, Vietnam National University 7 (2004) 12-19.
-
9T.D. Nguyen, Algorithm for incremental data mining in temporal DB, Journal of Computer Science and Cybernetics 20 (2004), pp. 80-90.
-
10H.X. Nguyen, T.D. Nguyen, Mining association rules with transaction-weight in temporal database, in: Proc. of the First Symposium "Fundamental and Applied Information Technology Research" (FAIR) Ha Noi., 2003, pp. 137-147.
-
1闫登峰.使用加密工具备份你的数据[J].计算机与网络,2015,41(20):50-51.
-
2王爱胜.算法的另一维度[J].信息技术教育,2007(5):37-38.
-
3许华岚.商品防伪认证网络系统的设计与实现[J].福建电脑,2005,21(6):58-59.
-
4王鹏,陈婷,黄冰.基于FPGA的双卫星自恢复冗余授时系统的研究[J].通信技术,2011,44(10):99-101.
-
5陈洪波,李蓓蕾,陈真诚.基于ICA的脑电信号P300少次自动提取[J].电子学报,2012,40(6):1257-1262. 被引量:9
-
6专家系统、人工智能[J].电子科技文摘,2003,0(5):125-126.
-
7陈鹤文,周勇,燕雪峰.一种基于Prolog的时间约束业务流程验证方法[J].计算机科学,2016,43(6):173-178. 被引量:4
-
8数字钟[J].数码,2009(8):171-171.
-
9交叉融汇 综合创新——记首届国际组合、算法、概率与实验算法研讨会[J].国际学术动态,2008(1):32-33.
-
10柳迪.奥地利邮政投递员工 实行新工作时间模式[J].邮政研究,2012,28(5):19-19.