Results 41 to 50 of about 2,346 (201)

Mining Frequent Graph Patterns with Differential Privacy [PDF]

open access: yes, 2013
Discovering frequent graph patterns in a graph database offers valuable information in a variety of applications. However, if the graph dataset contains sensitive data of individuals such as mobile phone-call graphs and web-click graphs, releasing ...
Geweke J.   +5 more
core   +1 more source

Pruning Strategy on Adaptive Rule Model by Sorting Utility Items

open access: yesIEEE Access, 2022
The adaptive Rule Model is an association rule development that formulates a minimum threshold value according to the data characteristics. The formulation process is based on item frequency and utility for other considerations, which requires high ...
Erna Hikmawati   +2 more
doaj   +1 more source

Towards trajectory anonymization: a generalization-based approach [PDF]

open access: yes, 2009
Trajectory datasets are becoming popular due to the massive usage of GPS and locationbased services. In this paper, we address privacy issues regarding the identification of individuals in static trajectory datasets.
Atzori, Maurizio   +5 more
core   +2 more sources

Closed High Utility Pattern Mining over Data Stream Based on Projection in the Window

open access: yesTaiyuan Ligong Daxue xuebao, 2022
A fast and effective algorithm EFIM_Closed_DS was proposed to mine closed and high utility itemsets in the data stream environment. The algorithm is based on the projection technology in the window, and the database projection technology and transaction ...
Muhang LI   +4 more
doaj   +1 more source

Maximizing Welfare in Social Networks under a Utility Driven Influence Diffusion Model

open access: yes, 2019
Motivated by applications such as viral marketing, the problem of influence maximization (IM) has been extensively studied in the literature. The goal is to select a small number of users to adopt an item such that it results in a large cascade of ...
Abramowitz B.   +6 more
core   +1 more source

An Efficient Approach for Mining High Average-Utility Itemsets in Incremental Database

open access: yesEngineering Proceedings
Traditional high-utility itemset (HUI) mining methods tend to overestimate utility for long itemsets, leading to biased results. High average-utility itemset (HAUI) mining addresses this problem by normalizing utility with itemset length.
Ye-In Chang   +2 more
doaj   +1 more source

Improved Genetic Algorithm for High-Utility Itemset Mining

open access: yesIEEE Access, 2019
High-utility itemset mining (HUIM) is an important research topic in the data mining field. Typically, traditional HUIM algorithms must handle the exponential problem of huge search space when the database size or number of distinct items is very large ...
Qiang Zhang   +3 more
doaj   +1 more source

Parallel Mining Algorithm for the Enumeration Space of Closed High Utility Itemsets

open access: yesJournal of Harbin University of Science and Technology
To address the issues of result redundancy and time overhead in high-dimensional data environments, a closed high utility itemset mining algorithm, SpCHUIM (Closed High Utility Itemsets Mining on Spark), is proposed.
LI Chengyan, SUN Anqi, LIU Songlin
doaj   +1 more source

Proof Learning in PVS With Utility Pattern Mining

open access: yesIEEE Access, 2020
Interactive theorem provers (ITPs) are software tools that allow human users to write and verify formal proofs. In recent years, an emerging research area in ITPs is proof mining, which consists of identifying interesting proof patterns that can be used ...
M. Saqib Nawaz   +2 more
doaj   +1 more source

Mining actionable combined patterns satisfied both utility and frequency criteria [PDF]

open access: yes, 2016
University of Technology Sydney. Faculty of Engineering and Information Technology.In recent years, the importance of identifying actionable patterns has become increasingly recognized so that decision-support actions can be inspired by the resultant ...
Shao, Jingyu
core  

Home - About - Disclaimer - Privacy