Database Reference
In-Depth Information
64. J. Hellerstein, S. Ma, and C.-S. Perng. Discovering Actionable Patterns in Event Data,
IBM
Systems Journal
, 41(3), pp. 475-493, 2002.
65. R. Ivancy, and I. Vajk. Frequent Pattern Mining in Web Log Data,
Acta Polytechnica
Hungarica
, 3(1), pp. 77-90, 2006.
66. P.-S. Kam, A. W.-C. Fu. Discovering Temporal Patterns for Interval-based Events,
Springer
,
Berlin, 2000.
67. K. Koperski, and J. Han. Discovery of Spatial Association Riles in Geographic Information
Databases,
Advances in Spatial Databases
, 1995.
68. K. Koperski, J. Adhikary, and J. Han. Spatial Data Mining: Progress and Challenges Sur-
vey Paper,
ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge
Discovery
, 1996.
69. R. Kosala, H. Blockeel. Web Mining Research: A Survey.
ACM SIGKDD Explorations
, 2000.
70. G. Kuramuchi and G. Karypis. Frequent Subgraph Discovery,
ICDM Conference
, 2001.
71. S. Le, J. Owens, R. Nussinov, J. Chen, B. Shapiro, and J. Maizel. RNA secondary struc-
tures: comparison and determination of frequently recurring substructures by consensus.
Bioinformatics
, 5(3), pp. 205-210, 1989.
72. A. R. Leach and V. J. Gillet.
An Introduction to Chemoinformatics
. Springer, 2003.
73. W. Lee, and S. Stolfo. Data Mining Approaches for Intrusion Detection.
Proceedings of the
7th USENIX Security Symposium
, 1998.
74. W. Lee, S. Stolfo, and P. Chan. Learning Patterns from Unix Execution Traces for Intrusion
Detection,
AAAI workshop on AI methods in Fraud and Risk Management
, 1997.
75. W. Lee, S. Stolfo, and K. Mok. A Data Mining Framework for Building Intrusion Detection
Models,
IEEE Symposium on Security and Privacy
, 1999.
76. Z. Li, Y. Zhou. PR-Miner: Automatically extracting implicit programming rules and detecting
violations in large software code,
ACM SIGSOFT Symposium on Foundations of Software
Engineering
, 2005.
77. W. Li, J. Han, and J. Pei. CMAR: Accurate and Efficient Classification based on Multiple
Association Rules,
ICDM Conference
, 2001.
78. Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A Tool for Finding Copy-Paste and
Related Bugs in Operating System Code,
Symposium on Operating Systems Design and
Implementation
, 2004.
79. Z. Li, Z. Chen, S. M. Srinivasan, Y. Zhou. C-Miner: Mining Block Correlations in Storage
Systems,
USENIX Conference on File and Storage System Technologies
, 2004.
80. T. Li, F. Liang, S. Ma, and W. Peng. An Integrated Framework on Mining Log Files for
Computing System Management.
ACM KDD Conference
, 2005.
81. X. Li, J. Han, and S. Kim. Motion-alert: Automatic Anomaly Detection in Massive Moving
Objects,
IEEE Conference in Intelligence and Security Informatics
, 2006.
82. X. Li, J. Han, S. Kim, and H. Gonzalez. ROAM: Rule- and Motif-based Anomaly Detection
in Massive Moving Object Data Sets,
SDM Conference
, 2007.
83. Y. Li, S. Chung, and J. Holt. Text document clustering based on frequent word meaning
sequences.
Data and Knowledge Engineering
, 64(1), pp. 381-404, 2008.
84. Z. Li, B. Ding, J. Han, R. Kays. Swarm: Mining Relaxed Temporal Object Moving Clusters,
VLDB Conference
, 2010.
85. D. Lin, and P. Pantel. DIRT@ SBT@ Discovery of Inference Rules from Text,
ACM KDD
Conference
, 2001.
86. J. Lin, E. Keogh, S. Lonardi, and B. Y.-C. Chiu. A Symbolic Representation of Time Series,
with Implications for Streaming Algorithms.
DMKD Workshop
, 2003.
87. B. Liu, W. Hsu, Y. Ma. Integrating Classification and Association Rule Mining,
ACM KDD
Conference
, 1998.
88. C. Liu, X. Yan, H. Lu, J. Han, and P. S. Yu. Mining Behavior Graphs for “backtrace” of
non-crashing bugs,
SDM Conference
, 2005.
89. H. Liu, J. Han, D. Xin, and Z. Shao. Mining frequent patterns on very high dimensional data:
a top-down row enumeration approach.
SDM Conference
, 2006.