Author of the publication

Mining Preferred Traversal Paths with HITS.

, , and . WISM, volume 5854 of Lecture Notes in Computer Science, page 98-107. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining., , and . Adv. Eng. Informatics, 21 (3): 269-280 (2007)Isolated items discarding strategy for discovering high utility itemsets., , and . Data Knowl. Eng., 64 (1): 198-217 (2008)Efficient algorithms for incremental utility mining., , and . ICUIMC, page 212-217. ACM, (2008)A Cryptanalysis on a Generalized Threshold Cryptosystem., , and . IMECS, page 452-455. Newswood Limited, (2006)Novel Steganographic Schemes Based on Row-Major Mapping Relation., , , and . IIH-MSP, page 392-395. IEEE Computer Society, (2006)Assigning Keys in a Hierarchy., , , and . IIH-MSP, page 1363-1366. IEEE Computer Society, (2008)Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets., , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 551-560. Springer, (2005)SP&EPPF: A Novel Algorithm for Sequential Interval-based Pattern Mining., and . DMIN, page 343-349. CSREA Press, (2010)A new data structure for asynchronous periodic pattern mining., and . ICUIMC, page 426-431. ACM, (2009)Novel Algorithms for Privacy Preserving Utility Mining., , and . ISDA (1), page 291-296. IEEE Computer Society, (2008)