<--- Back to Details
First PageDocument Content
Search algorithms / Formal sciences / Information science / TKS / Science / Hash table / Algorithm / Information / Data mining / Association rule learning / Data management
Date: 2014-01-13 11:26:24
Search algorithms
Formal sciences
Information science
TKS
Science
Hash table
Algorithm
Information
Data mining
Association rule learning
Data management

TKS: Efficient Mining of Top-K Sequential Patterns

Add to Reading List

Source URL: www.philippe-fournier-viger.com

Download Document from Source Website

File Size: 670,69 KB

Share Document on Facebook

Similar Documents

Algebra / Linear algebra / Mathematics / Matrices / Numerical linear algebra / Unitary matrix / Matrix / Rotational symmetry / Four-vector / Permutation matrix / Eigenvalue perturbation / Singular value decomposition

CS378, MA375T, PHY341 Homework 1 Homework 1 Introduction to Quantum Information Science

DocID: 1xVZC - View Document

Algebra / Quantum mechanics / Physics / Quantum information science / Quantum states / Linear algebra / Quantum computing / 0I / Quantum circuit / Eigenvalues and eigenvectors / Qubit / Eigenvalue perturbation

CS378, MA375T, PHY341 Homework 2 Homework 2 Introduction to Quantum Information Science

DocID: 1xVYW - View Document

Health / Medicine / Global health / Epidemiology / Biological weapons / Tropical diseases / Zoonoses / Ebola virus disease / World Health Organization / Pandemic / Public health / Infection

GOV200X – The Politics of Plague Worcester Polytechnic Institute Social Science and Policy Studies Department Sample Syllabus Course Information Professor Patricia Stapleton

DocID: 1xVN2 - View Document

Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

DocID: 1xVHD - View Document

Security engineering / Cyberwarfare / Computing / Nadia Heninger / Transport Layer Security / Cryptography / E-commerce / Secure communication / Heninger / Alex Halderman / Association for Computing Machinery / DROWN attack

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

DocID: 1xVEY - View Document