Author of the publication

A New Association Rules Mining Algorithms Based on Directed Itemsets Graph.

, and . RSFDGrC, volume 2639 of Lecture Notes in Computer Science, page 660-663. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A flexible QoS-aware Web service composition method by multi-objective optimization in cloud manufacturing., , , and . Comput. Ind. Eng., (2016)Optimal versioning in two-dimensional information product differentiation under different customer distributions., , and . Comput. Ind. Eng., 66 (4): 962-975 (2013)Intertemporal mixed bundling strategy of information products with network externality., , , and . Comput. Ind. Eng., (2017)An Efficiently Algorithm Based on Itemsets-Lattice and Bitmap Index for Finding Frequent Itemsets., and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 420-429. Springer, (2005)Adaptive Simulated Annealing for Standard Cell Placement., , , and . ICNC (3), volume 3612 of Lecture Notes in Computer Science, page 943-947. Springer, (2005)A Novel Type of Niching Methods Based on Steady-State Genetic Algorithm., and . ICNC (3), volume 3612 of Lecture Notes in Computer Science, page 37-47. Springer, (2005)Form invariance of schema and exact schema theorem., and . Sci. China Ser. F Inf. Sci., 46 (6): 475-484 (2003)Competitive Entry of Information Goods Under Quality Uncertainty., , , and . Manag. Sci., 68 (4): 2869-2888 (2022)An Exploration of the Dynamics Between Social Media and Box Office Performance., , , , , and . Inf. Syst. Frontiers, 26 (2): 591-608 (April 2024)Outsourcing Information Security: The Role of Information Leakage in Outsourcing Decisions., , , , and . CONF-IRM, page 26. (2018)