Found: 6
Select item for more details and to access through your institution.
Random-data perturbation techniques and privacy-preserving data mining.
- Published in:
- Knowledge & Information Systems, 2005, v. 7, n. 4, p. 387, doi. 10.1007/s10115-004-0173-6
- By:
- Publication type:
- Article
Reliable detection of episodes in event sequences.
- Published in:
- Knowledge & Information Systems, 2005, v. 7, n. 4, p. 415, doi. 10.1007/s10115-004-0174-5
- By:
- Publication type:
- Article
TSP: Mining top-kclosed sequential patterns.
- Published in:
- Knowledge & Information Systems, 2005, v. 7, n. 4, p. 438, doi. 10.1007/s10115-004-0175-4
- By:
- Publication type:
- Article
A high-performance distributed algorithm for mining association rules.
- Published in:
- Knowledge & Information Systems, 2005, v. 7, n. 4, p. 458, doi. 10.1007/s10115-004-0176-3
- By:
- Publication type:
- Article
On the use of hierarchical information in sequential mining-based XML document similarity computation.
- Published in:
- Knowledge & Information Systems, 2005, v. 7, n. 4, p. 476, doi. 10.1007/s10115-004-0156-7
- By:
- Publication type:
- Article
Efficient mining of sequential patterns with time constraints by delimited pattern growth.
- Published in:
- Knowledge & Information Systems, 2005, v. 7, n. 4, p. 499, doi. 10.1007/s10115-004-0182-5
- By:
- Publication type:
- Article