期刊文献+

时间约束序列模式的有效生成候选项的方法

Fast generation of candidate-sequences for time constraint sequential pattern mining
下载PDF
导出
摘要 针对序列模式的几个经典的算法的缺点,提出了一种基于时间约束序列模式的快速产生候选项的方法(TFEGC)。此算法不但避免了频繁的扫描数据库,还考虑了时间限制因素,避免了无用的候选序列的产生,提高了算法运行的时间效率。 The paper has several key algorithms reviewed briefly,puts forward their faults,and propose a new approach,called Fast Generation of Candidate-sequences for Time constraint Sequential Pattern Mining(TFEGC),this algorithm doesn't need to scan the database frequently,and adds the time limit factor to the algorithm,avoids generating the candidate sequences which are not useful,improves the efficiency of the algorithm's running time.
出处 《微型机与应用》 2011年第10期69-72,共4页 Microcomputer & Its Applications
关键词 序列模式挖掘 时间约束 候选项 快速产生 sequential pattern time constraint candidate fast generation
  • 相关文献

参考文献6

  • 1SRIKANT R,AGRAWAL R.Mining sequential patterns: generalizations and performance improvements[C ].Proc.of Int 'l Conf.on Extending Database Technology, 1996 : 3-17. 被引量:1
  • 2PEI J, HAN J, Mortazavi-Asl B ,et al.Prefixspan: mining sequential patterns efficiently by prefix-projected pattern growth[C].Proc.of Int.Conf.on Data Eng. (ICDE' 01),2001 : 215-224. 被引量:1
  • 3Liao Weicheng, Yang Donlin, Wu Jungpin, et al. Fast and effective generation of candidate-sequences for sequential pattern mining[C].2009 Fifth International Joint Conference on INC ,IMS and IDC ,2009:2006-2009. 被引量:1
  • 4赵畅,杨冬青,唐世渭.Web日志序列模式挖掘[J].计算机应用,2000,20(9):13-16. 被引量:6
  • 5连一峰,戴英侠,王航.基于模式挖掘的用户行为异常检测[J].计算机学报,2002,25(3):325-330. 被引量:85
  • 6吉根林,帅克,孙志挥.数据挖掘技术及其应用[J].南京师大学报(自然科学版),2000,23(2):25-27. 被引量:78

二级参考文献11

  • 1[1]Lee Wenke, Stolfo S J. Data mining approaches for intrusion detection. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998 被引量:1
  • 2[2]Lee Wenke, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models. In: Proc the 1999 IEEE Symposium on Security and Privacy, Berkely, California, 1999. 120-132 被引量:1
  • 3[3]Lee Wenke. A data mining framework for constructing features and models for intrusion detection systems[Ph D dissertation]. Columbia University, 1999 被引量:1
  • 4[4]Paxson Vern. Bro: A system for detecting network intruders in real-time. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998 被引量:1
  • 5[5]Agrawal Rakesh, Srikant Ramakrishnan. Fast algorithms for mining association rules. In: Proc the 20th International Conference on Very Large Databases, Santiago, Chile, 1994 被引量:1
  • 6[6]Agrawal Rakesh, Srikant Ramakrishnan. Mining sequential patterns. IBM Almaden Research Center, San Jose, California:Research Report RJ 9910, 1994 被引量:1
  • 7[7]Chen M, Han J, Yu P. Data mining: An overview from database perspective. IEEE Trans Knowledge and Data Engineeing, 1996,8(6):866-883 被引量:1
  • 8Zaiane R,ProceedingsofAdvancesinDigitalLibrariesConference(ADL′ 98),1998年,19页 被引量:1
  • 9张汛来,计算机科学,1998年,10卷,专刊,156页 被引量:1
  • 10王珊,数据仓库技术与联机分析处理,1998年 被引量:1

共引文献164

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部