Database Reference
In-Depth Information
64. J. Hellerstein, S. Ma, and C.-S. Perng. Discovering Actionable Patterns in Event Data, IBM
Systems Journal , 41(3), pp. 475-493, 2002.
65. R. Ivancy, and I. Vajk. Frequent Pattern Mining in Web Log Data, Acta Polytechnica
Hungarica , 3(1), pp. 77-90, 2006.
66. P.-S. Kam, A. W.-C. Fu. Discovering Temporal Patterns for Interval-based Events, Springer ,
Berlin, 2000.
67. K. Koperski, and J. Han. Discovery of Spatial Association Riles in Geographic Information
Databases, Advances in Spatial Databases , 1995.
68. K. Koperski, J. Adhikary, and J. Han. Spatial Data Mining: Progress and Challenges Sur-
vey Paper, ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge
Discovery , 1996.
69. R. Kosala, H. Blockeel. Web Mining Research: A Survey. ACM SIGKDD Explorations , 2000.
70. G. Kuramuchi and G. Karypis. Frequent Subgraph Discovery, ICDM Conference , 2001.
71. S. Le, J. Owens, R. Nussinov, J. Chen, B. Shapiro, and J. Maizel. RNA secondary struc-
tures: comparison and determination of frequently recurring substructures by consensus.
Bioinformatics , 5(3), pp. 205-210, 1989.
72. A. R. Leach and V. J. Gillet. An Introduction to Chemoinformatics . Springer, 2003.
73. W. Lee, and S. Stolfo. Data Mining Approaches for Intrusion Detection. Proceedings of the
7th USENIX Security Symposium , 1998.
74. W. Lee, S. Stolfo, and P. Chan. Learning Patterns from Unix Execution Traces for Intrusion
Detection, AAAI workshop on AI methods in Fraud and Risk Management , 1997.
75. W. Lee, S. Stolfo, and K. Mok. A Data Mining Framework for Building Intrusion Detection
Models, IEEE Symposium on Security and Privacy , 1999.
76. Z. Li, Y. Zhou. PR-Miner: Automatically extracting implicit programming rules and detecting
violations in large software code, ACM SIGSOFT Symposium on Foundations of Software
Engineering , 2005.
77. W. Li, J. Han, and J. Pei. CMAR: Accurate and Efficient Classification based on Multiple
Association Rules, ICDM Conference , 2001.
78. Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A Tool for Finding Copy-Paste and
Related Bugs in Operating System Code, Symposium on Operating Systems Design and
Implementation , 2004.
79. Z. Li, Z. Chen, S. M. Srinivasan, Y. Zhou. C-Miner: Mining Block Correlations in Storage
Systems, USENIX Conference on File and Storage System Technologies , 2004.
80. T. Li, F. Liang, S. Ma, and W. Peng. An Integrated Framework on Mining Log Files for
Computing System Management. ACM KDD Conference , 2005.
81. X. Li, J. Han, and S. Kim. Motion-alert: Automatic Anomaly Detection in Massive Moving
Objects, IEEE Conference in Intelligence and Security Informatics , 2006.
82. X. Li, J. Han, S. Kim, and H. Gonzalez. ROAM: Rule- and Motif-based Anomaly Detection
in Massive Moving Object Data Sets, SDM Conference , 2007.
83. Y. Li, S. Chung, and J. Holt. Text document clustering based on frequent word meaning
sequences. Data and Knowledge Engineering , 64(1), pp. 381-404, 2008.
84. Z. Li, B. Ding, J. Han, R. Kays. Swarm: Mining Relaxed Temporal Object Moving Clusters,
VLDB Conference , 2010.
85. D. Lin, and P. Pantel. DIRT@ SBT@ Discovery of Inference Rules from Text, ACM KDD
Conference , 2001.
86. J. Lin, E. Keogh, S. Lonardi, and B. Y.-C. Chiu. A Symbolic Representation of Time Series,
with Implications for Streaming Algorithms. DMKD Workshop , 2003.
87. B. Liu, W. Hsu, Y. Ma. Integrating Classification and Association Rule Mining, ACM KDD
Conference , 1998.
88. C. Liu, X. Yan, H. Lu, J. Han, and P. S. Yu. Mining Behavior Graphs for “backtrace” of
non-crashing bugs, SDM Conference , 2005.
89. H. Liu, J. Han, D. Xin, and Z. Shao. Mining frequent patterns on very high dimensional data:
a top-down row enumeration approach. SDM Conference , 2006.
Search WWH ::




Custom Search