| 1 |
S. Muthukrishnan, Data streams: algorithms and applications, Lightning Source Inc, Jan. 2005. |
미소장 |
| 2 |
G. Cormode and S. Muthukrishnan, “ What’s hot and what’s not: tracking most frequent items dynamically,” Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART sy- mposium on Principles of database systems, pp. 296-306, Jun. 2003. |
미소장 |
| 3 |
C. Jin, W. Qian, C. Sha, J.X. Yu, and A. Zhou, “Dynamically maintaining frequent items over a data stream,” Proceedings of the 2003 ACM CIKM International Conference on Information and Knowledge Management, pp. 287-294, Nov. 2003. |
미소장 |
| 4 |
G.S. Manku and R. Motwani, “Approximate frequency counts over data streams,” Proceedings of the 28th International Conference on Very Large Data Bases, pp. 346-357, Aug. 2002. |
미소장 |
| 5 |
E. Demaine, A. López-Ortiz, and J. Munro, “Frequency estimation of internet packet streams with limited spa- ce,” Proceedings of the 10th Annual European Symposium, pp. 348-360, Sep. 2002. |
미소장 |
| 6 |
A. Metwally, D. Agrawal, and A.E. Abbadi, “Efficient computation of frequent and top-k elements in data strea- ms,” Proceedings of the 10th Interna- tional Conference on Database Theor- y, pp. 398-412, Jan. 2005. |
미소장 |
| 7 |
Methods for mining frequent items in data streams: an overview  |
미소장 |
| 8 |
S. Pramod and O.P. Vyas, “Recent frequent itemsets mining over data streams,” Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, pp. 484-489, Oct. 2012. |
미소장 |
| 9 |
Towards a variable size sliding window model for frequent itemset mining over data streams  |
미소장 |
| 10 |
S. Oliveira and O. Zaïane, “Achieving privacy preservation when sharing data for clustering,” Proceedings of International Workshop on Secure Data Management in a Connected World, pp. 67-82, Aug. 2004. |
미소장 |
| 11 |
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen, “On private scalar product computation for privacy-pres- erving data mining,” In The 7th Ann- ual International Conference in Information Security and Cryptology, pp. 104-120, Dec. 2004. |
미소장 |
| 12 |
Privacy-Preserving Data Mining (PPDM) Method for Horizontally Partitioned Data  |
미소장 |
| 13 |
Privacy-preserving data mining  |
미소장 |
| 14 |
Privacy Preserving Decision Tree Learning Using Unrealized Data Sets  |
미소장 |
| 15 |
M.J. Fischer and S.L. Salzberg, “Finding a majority among n votes,” Research Report 252, Department of Computer Science, University of Yale, Oct. 1982. |
미소장 |