2HENZINGER M R, RAGHAVAN P, RAJAGOPALAN S. Computing on Data Streams [ M]//External Memory Algorithms. Boston: American Mathematical Society, 1999 : 107 - 118.
3DORA Y C. Ming Alarming Incidents from Data streams [ C ]//Proceedings of the 24th ACM SIGMOD International Conference on Management of Data. Paris,2004:919 - 920.
4DENG X W, JOSEPH V R, SUDJIANTO A, et al. Active Learning through Sequential Design, With Applications to Detection of Money Laundering[ J ]. Journal of the American Statistical Association, 2009,104 (487) : 969 - 981.
5BALVERS R, WU Y R. Optimal Transaction Filters undet Transitory Trading Opportunities: Theory and empirical illus tration [ J ]. Journal of Financial Markets, 2010,13 ( 1 ) : 129 - 156.
6YANG Q F, FENG B, SONG P. Study on Anti - Money Laundering Service System of Online Payment based on U- nion- Bank mode [ C ]//International Conference on Wireless Communications. Shanghai,2007:4991 - 4994.
7JIANG N, GRUENWALD L E. Research Issues in Data Stream Association Rule Mining [ J ]. ACM SIGMOD Re- cord,2006,35( 1 ) : 14 - 19.
9BABOOCH B, BABUS. Models and Issues in Data Stream Systems [ C ]//Proceeding of the 21 st ACM SIGMOD - SI- GACT - SIGART Symposium on Principles of database System(PODS2002). Madison, ACM Press, 2002 : 1 - 16.
10GOLAB L, OZSU M T. Issues in Data Stream Management [J]. ACM SIGMOD Record, 2003,32(2):5 -14.