Publisher
Springer Science and Business Media LLC
Reference32 articles.
1. Agrawal R, Srikant R (1994) Fast algorithms for mining association rules in large databases. In Proceedings of the 20th International Conference on very large data bases (VLDB ’94). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, pp 487–499
2. Aranganathan A, Suriyakala CD (2019) An efficient secure detection and prevention of malevolent nodes with lightweight surprise check scheme using trusted mobile agents in mobile ad-hoc networks. J Ambient Intell Human Comput 10:3493–3503.
https://doi.org/10.1007/s12652-018-1069-8
3. Deng Z-H, Lv S-L (2014) Fast mining frequent itemsets using nodesets. Expert Syst Appl 41:4505–4512.
https://doi.org/10.1016/j.eswa.2014.01.025
4. Feng T, Chang Y (2011) Combinatorial constructions for optimal two-dimensional optical orthogonal codes with λ = 2. IEEE Trans Inf Theory 57(10):6796–6819.
https://doi.org/10.1109/TIT.2011.2165805
5. Garofalakis M, Gehrke J, Rastogi R (2002) Querying and mining data streams: you only get one look a tutorial. In: Proceedings of the 2002 ACM SIGMOD international conference on Management of data (SIGMOD '02). Association for Computing Machinery, New York, p 635.
https://doi.org/10.1145/564691.564794
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Advancing Fault Detection Efficiency in Wireless Power Transmission with Light GBM for Real-Time Detection Enhancement;International Research Journal of Multidisciplinary Technovation;2024-07-18
2. EchoSight: Blending Deep Learning and Computer Vision for Unparalleled Navigational Support for the Visually Impaired;2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS);2024-02-24
3. Database System Based on 3Dmax Big Data Mining Technology;ICST Transactions on Scalable Information Systems;2023-09-19
4. Quantum-Resistant Wireless Intrusion Detection System using Machine Learning Techniques;2023 7th International Conference On Computing, Communication, Control And Automation (ICCUBEA);2023-08-18
5. Enhanced Security Technique for Adhoc Transmission Using Hyper Elliptic Curve;2023 7th International Conference On Computing, Communication, Control And Automation (ICCUBEA);2023-08-18