2013
DOI: 10.1007/s10462-012-9376-5
|View full text |Cite
|
Sign up to set email alerts
|

An analytical review of XML association rules mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(7 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…In Figure 1, a cloud computing communication between network topology model of multi-layer database index node under the environment of mutual equivalence, a model called the structure of P2P network. But the combination of complex network, it is vulnerable to malicious attacks and input error, disk failure, network overload behavior leads to the collapse of the system [4], cause the index performance is not good, need to optimize the topology structure design, construction of multi topology routing index detection protocol. If cloud computing environment of multi-tier database index topology for node set is…”
Section: Topology Routing Detection Protocolmentioning
confidence: 99%
“…In Figure 1, a cloud computing communication between network topology model of multi-layer database index node under the environment of mutual equivalence, a model called the structure of P2P network. But the combination of complex network, it is vulnerable to malicious attacks and input error, disk failure, network overload behavior leads to the collapse of the system [4], cause the index performance is not good, need to optimize the topology structure design, construction of multi topology routing index detection protocol. If cloud computing environment of multi-tier database index topology for node set is…”
Section: Topology Routing Detection Protocolmentioning
confidence: 99%
“…Takama et al [2] have proposed Association Rule Mining based adaptive search engine that uses RDF documents to observe users' information retrieval behavior and retrieve rules from the patterns. Moradi et al [4] have presented analysis on XML-adopted and XML-specific association rule mining. They further classified the mining techniques as semantic based, apriori based etc.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In the traditional methods, the intrusion detection methods of blockchain embedded architecture protocol network mainly include spectral feature detection method, wavelet detection method and correlation matching detection method, etc. Combined with signal processing method, the intrusion detection of transmitted information is realized [2]. Traditionally, a neighborhood intrusion detection algorithm based on Hilbert transform is adopted, which collects network traffic in the transmission channel of the blockchain embedded architecture protocol network, builds an intrusion information flow model of the blockchain embedded architecture protocol network, and adopts the joint time-frequency analysis method to detect the neighborhood intrusion feature information by adaptive convolution filtering.…”
Section: Introductionmentioning
confidence: 99%