Author of the publication

Incremental Frequent Itemsets Mining with MapReduce.

, and . ADBIS, volume 10509 of Lecture Notes in Computer Science, page 247-261. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resolving Information Flow Conflicts in RBAC Systems., and . DBSec, volume 4127 of Lecture Notes in Computer Science, page 148-162. Springer, (2006)Alter-egos and Roles: Supporting Workflow Security in Cyberspaces., , , and . DBSec, volume 113 of IFIP Conference Proceedings, page 182-195. Chapman & Hall, (1997)An Object-Oriented Database Architecture for Providing Securty in Cyberspace., and . DBSec, volume 79 of IFIP Conference Proceedings, page 120-144. Chapman & Hall, (1996)Combining rules and constraints for employee timetabling., , and . Int. J. Intell. Syst., 12 (6): 419-439 (1997)Storage Allocation for Access Path Minimization in Network Structured Data Bases., , and . JCDKB, page 319-. Academic Press, (1978)Efficient and Private Approximations of Distributed Databases Calculations., , , and . CoRR, (2016)Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases., , and . DBSec, page 85-98. North-Holland, (1990)MLDStore - DNNs as Similitude Models for Sharing Big Data (Brief Announcement)., , and . CSCML, volume 11527 of Lecture Notes in Computer Science, page 93-96. Springer, (2019)Design and implementation of a query command language using transition networks., and . COMPSAC, page 313-318. IEEE, (1979)An Improved MapReduce Algorithm for Mining Closed Frequent Itemsets., and . SwSTE, page 77-83. IEEE, (2016)