Author of the publication

Approximation of Probabilistic Maximal Frequent Itemset Mining Over Uncertain Sensed Data.

, , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Elephant Flow Detection with Cost-Sensitive in SDN., , , , and . EAI Endorsed Trans. Ubiquitous Environ., 2 (7): e3 (2015)Approximation of Probabilistic Maximal Frequent Itemset Mining Over Uncertain Sensed Data., , , , and . IEEE Access, (2020)An Effective Data Privacy Protection Algorithm Based on Differential Privacy in Edge Computing., , , , , , and . IEEE Access, (2019)WARank: Weighted Asymmetric Ranking for Approximate Nearest Neighbor Search., , , , and . CIT/IUCC/DASC/PICom, page 297-304. IEEE, (2015)Approximate Nearest Neighbor Search Based on Hierarchical Multi-Index Hashing., , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1791-1796. IEEE, (2018)Stacked Product Quantization for Nearest Neighbor Search on Large Datasets., , , and . Trustcom/BigDataSE/ISPA, page 1621-1627. IEEE, (2016)A Framework of Mobile Visual Search Based on the Weighted Matching of Dominant Descriptor., , , , , and . ACM Multimedia, page 1181-1184. ACM, (2014)Balancing reducer workload for skewed data using sampling-based partitioning., , , , , , and . Comput. Electr. Eng., 40 (2): 675-687 (2014)A protocol for detecting missing target tags in RFID systems., , , , and . J. Netw. Comput. Appl., (2019)Resource preprocessing and optimal task scheduling in cloud computing environments., , , , and . Concurr. Comput. Pract. Exp., 27 (13): 3461-3482 (2015)