期刊文献+

不确定数据的频繁模式挖掘

Frequent Pattern Mining from Uncertain Data
下载PDF
导出
摘要 不确定数据中的频繁模式挖掘是一个重要的研究内容,它也是很多研究工作的基础.确定数据中的许多经典的频繁模式挖掘算法都可以扩展到不确定数据中,这些算法需要把确定数据中的支持度改为期望支持度,来实现对不确定数据中频繁模式的挖掘. Mining frequent patterns in uncertain data is a very important research field. And it is the base of many other research works. Many classical algorithms of mining frequent patterns from certain data can be extended to the uncertain datasets. However,the support in certain data must be changed. In uncertain data,the expected support is used to mine frequent patterns instead of support.
作者 陈凤娟
出处 《白城师范学院学报》 2016年第5期59-62,共4页 Journal of Baicheng Normal University
关键词 不确定数据 频繁模式 期望支持度 uncertain data frequent pattern expected support
  • 相关文献

参考文献6

  • 1汪金苗,张龙波,邓齐志,王凤英,王勇.不确定数据频繁项集挖掘方法综述[J].计算机工程与应用,2011,47(20):121-125. 被引量:19
  • 2周傲英,金澈清,王国仁,李建中.不确定性数据管理技术研究综述[J].计算机学报,2009,32(1):1-16. 被引量:185
  • 3Chui C,Kao B,Hung E.Mining frequent itemsets from uncertain data. 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2007) . 2007
  • 4Charu C. Aggarwal,Philip S. Yu.A Survey of Uncertain Data Algorithms and Applications. IEEE Transactions on Knowledge and Data Engineering . 2009
  • 5Leung C K,Mateo M A F,Brajczuk D A.A tree-based approach for frequent pattern mining from uncertain data. 12th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2008) . 2008
  • 6王爽,杨广明,朱志良.基于不确定数据的频繁项查询算法[J].东北大学学报(自然科学版),2011,32(3):344-347. 被引量:10

二级参考文献125

  • 1金澈清,钱卫宁,周傲英.流数据分析与管理综述[J].软件学报,2004,15(8):1172-1181. 被引量:161
  • 2谷峪,于戈,张天成.RFID复杂事件处理技术[J].计算机科学与探索,2007,1(3):255-267. 被引量:54
  • 3Deshpande A, Guestrin C, Madden S, Hellerstein J M, Hong W. Model-driven data acquisition in sensor networks// Proceedings of the 30th International Conference on Very Large Data Bases. Toronto, 2004:588-599
  • 4Madhavan J, Cohen S, Xin D, Halevy A, Jeffery S, Ko D, Yu C. Web-scale data integration: You can afford to pay as you go//Proceedings of the 33rd Biennial Conference on Innovative Data Systems Research. Asilomar, 2007:342-350
  • 5Liu Ling. From data privacy to location privacy: Models and algorithms (tutorial)//Proceedings of the 33rd International Conference on Very Large Data bases. Vienna, 2007: 1429- 1430
  • 6Samarati P, Sweeney L. Generalizing data to provide anonymity when disclosing information (abstract)//Proeeedings of the 17th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. Seattle, 1998:188
  • 7Cavallo R, Pittarelli M. The theory of probabilistic databases//Proceedings of the 13th International Conference on Very Large Data Bases. Brighton, 1987:71-81
  • 8Barbara D, Garcia-Molina H, Porter D. The management of probabilistic data. IEEE Transactions on Knowledge and Data Engineering, 1992, 4(5): 487-502
  • 9Fuhr N, Rolleke T. A probabilistic relational algebra for the integration of information retrieval and database systems. ACM Transactions on Information Systems, 1997, 15(1): 32-66
  • 10Zimanyi E. Query evaluation in probabilistic databases. Theoretical Computer Science, 1997, 171(1-2): 179-219

共引文献202

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部