Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleOctober 2019
Characteristics of Local Intrinsic Dimensionality (LID) in Subspaces: Local Neighbourhood Analysis
AbstractThe local intrinsic dimensionality (LID) model enables assessment of the complexity of the local neighbourhood around a specific query object of interest. In this paper, we study variations in the LID of a query, with respect to different ...
- research-articleJanuary 2017
An efficient dynamic superset bit-vector approach for mining frequent closed itemsets and their lattice structure
Expert Systems with Applications: An International Journal (EXWA), Volume 67, Issue CPages 252–271https://doi.org/10.1016/j.eswa.2016.09.023Efficient approach to mine frequent closed itemsets and their lattice structure.We propose a new memory efficient dynamic superset bit-vector (DSBV) structure.New candidate pruning techniques are developed.DSBV establishes hierarchical subset-superset ...
- articleMay 2014
An efficient approach for mining cross-level closed itemsets and minimal association rules using closed itemset lattices
Expert Systems with Applications: An International Journal (EXWA), Volume 41, Issue 6Pages 2914–2938https://doi.org/10.1016/j.eswa.2013.09.052Multilevel knowledge in transactional databases plays a significant role in our real-life market basket analysis. Many researchers have mined the hierarchical association rules and thus proposed various approaches. However, some of the existing ...
- ArticleAugust 2013
Group Trip Planning Queries in Spatial Databases
Location-based social networks grow at a remarkable pace. Current location-aware mobile devices enable us to access these networks from anywhere and to connect to friends via social networks in a seamless manner. These networks allow people to interact ...
- research-articleMarch 2010
Privacy preserving group nearest neighbor queries
EDBT '10: Proceedings of the 13th International Conference on Extending Database TechnologyPages 489–500https://doi.org/10.1145/1739041.1739100User privacy in location-based services has attracted great interest in the research community. We introduce a novel framework based on a decentralized architecture for privacy preserving group nearest neighbor queries. A group nearest neighbor (GNN) ...
- ArticleSeptember 2007
Safeguarding location privacy in wireless ad-hoc networks
We present a novel algorithm that safeguards the location privacy of users accessing location-based services via mobile devices. Our technique exploits the capability of mobile devices to form wireless ad-hoc networks in order to hide a user's identity ...