Maximal frequent pattern mining usually adopts a global pattern growth way, and a maximal frequent pattern can be obtained unless most of its subsets are checked to be frequent. An algorithm for mining maximal frequen...
详细信息
The distributed, heterogeneous and anonymous attribute of P2 P networks make the node information sharing facing security problems. In order to prevent malicious and false service of nodes, and improve the retrieval e...
详细信息
The distributed, heterogeneous and anonymous attribute of P2 P networks make the node information sharing facing security problems. In order to prevent malicious and false service of nodes, and improve the retrieval efficiency, the primary node selection algorithm based on trust mechanism is proposed in this paper. Firstly, the network topology based on virtual community is described, and the function of primary node is discussed. Secondly, the primary node is selected according to direct trust value and recommendation trust value of each node in the virtual community. Finally, resource retrieval algorithm is designed according to the selected trust primary node, and the algorithm is experimentally verified. In some certain extent, the results show that the method is able to reduce the fraud of primary node and improve the retrieval efficiency.
Traditionally, analysis of dynamic network has been focused only on a single snapshot or integrated network obtained over a period of time. However, the temporal feature in dynamic network has been ignored. In this pa...
详细信息
Many researchers are devoted to find frequent pattern in static network. Due to these frequent patterns are usually defined as frequent existence patterns which satisfy given support threshold in network. However, the...
详细信息
If the software system is abstracted as a software network, its quality largely depends on the topology structure. A tiny fraction key function nodes play a critical role in improving the stability, reliability and ro...
详细信息
Certain characteristics of software are often hidden in its structure and can only be discovered when the software is executed dynamically. So mining important patterns from dynamic call graph of software plays an imp...
详细信息
The problems of AGMA (Automatic Graph Mining Algorithm) are improved and a novel algorithm, namely CRMA (Clustering Re-clustering Merging Algorithm) is proposed which can realize more reasonable community division for...
详细信息
The characteristics of the MicroBlog data are analyzed firstly. Then WeiBo graph is constructed through tweets forwarded path and user influence ranking calculation method which according to the classic PageRank is gi...
详细信息
The algorithm of this paper inserts pseudo items which are converted from item interval to obtain equal extended sequence database;it defines item-interval constraints, which are relative to the item weight, to prune ...
详细信息
ISBN:
(纸本)9781510803084
The algorithm of this paper inserts pseudo items which are converted from item interval to obtain equal extended sequence database;it defines item-interval constraints, which are relative to the item weight, to prune the mining patterns. Through doing this, the algorithm avoids mining the patterns which users are not interested in and shortens the running time. It adopts histogram statistic pattern to get the standardization description to item interval of the mining patterns, making the mining sequences include the item interval information which is valuable to user decision.
With regard to the community mining in weighted signed networks and weighted social networks containing only positive links, the AGMA algorithm has some imperfections in the second clustering of vertices. So some impr...
详细信息
暂无评论