CROW 发表于 2025-3-25 04:32:46

H. Korb,A. Borowski,E. R. de Vivieing. One of the major drawbacks of traditional algorithms is that they work only for items with single frequency per transaction. Proposed algorithm works with multiple frequency of an item per transaction. Proposed algorithm scans base database only once. The proposed algorithm took lesser time to

LOPE 发表于 2025-3-25 08:13:59

http://reply.papertrans.cn/31/3084/308357/308357_22.png

钱财 发表于 2025-3-25 13:47:40

http://reply.papertrans.cn/31/3084/308357/308357_23.png

FLIT 发表于 2025-3-25 16:15:36

http://reply.papertrans.cn/31/3084/308357/308357_24.png

混乱生活 发表于 2025-3-26 00:03:34

http://reply.papertrans.cn/31/3084/308357/308357_25.png

Guileless 发表于 2025-3-26 01:20:46

http://reply.papertrans.cn/31/3084/308357/308357_26.png

大包裹 发表于 2025-3-26 06:21:52

Discovery of Multi-frequent Patterns Using Directed Graph,find candidate itemsets. It uses directed graph for candidate itemsets generation. We conducted experiments on two datasets, Mushroom and Chess. Experimental results showed that proposed algorithm can quickly discover maximal frequent itemsets and effectively mine potential association rules.

abnegate 发表于 2025-3-26 10:36:26

http://reply.papertrans.cn/31/3084/308357/308357_28.png

诱惑 发表于 2025-3-26 15:29:20

Conference proceedings 2016 scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Appli

骚扰 发表于 2025-3-26 18:40:33

Prevention Guidelines of SQL Injection Database Attacks: An Experimental Analysis, one type of such an attacks that inoculate a destructive SQL code to misuse database of an application. In this paper, we did experimental analysis on web-database applications as well as purely database applications and presented prevention guidelines of SQL injection attacks.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Emerging Research in Computing, Information, Communication and Applications; ERCICA 2015, Volume N. R. Shetty,N.H. Prasad,N. Nalini Confer