Author of the publication

Incremental Mining of High Utility Patterns in One Phase by Absence and Legacy-Based Pruning.

, , , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

基于延迟特性的改进随机Petri网建模与分析 (Modeling and Analysis of Improved Stochastic Petri Net Based on Delay Characteristics)., , and . 计算机科学, 42 (3): 174-177 (2015)Parallel Eclat for Opportunistic Mining of Frequent Itemsets., , , , , and . DEXA (1), volume 9261 of Lecture Notes in Computer Science, page 401-415. Springer, (2015)Multi-stage residual life prediction of aero-engine based on real-time clustering and combined prediction model., , , , and . Reliab. Eng. Syst. Saf., (2022)Deputy Mechanism for OLAP over Imprecise Data and Composite Measure., , and . CIT, page 65-70. IEEE Computer Society, (2007)Mining frequent item sets by opportunistic projection., , , and . KDD, page 229-238. ACM, (2002)Multinomial Approach and Multiple-Bernoulli Approach for Information Retrieval Based on Language Modeling., , and . FSKD (1), volume 3613 of Lecture Notes in Computer Science, page 580-583. Springer, (2005)Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption., , , and . DaWaK, volume 9263 of Lecture Notes in Computer Science, page 70-81. Springer, (2015)Opportunistic mining of top-n high utility patterns., , , , and . Inf. Sci., (2018)Anonymizing bag-valued sparse data by semantic similarity-based clustering., and . Knowl. Inf. Syst., 35 (2): 435-461 (2013)Publishing Set-Valued Data Against Realistic Adversaries.. J. Comput. Sci. Technol., 27 (1): 24-36 (2012)