共 50 条
- [22] Mining User-generated Path Traversal Patterns in an Information Network 2013 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 1, 2013, : 284 - 289
- [24] Mining Weighted-Frequent Traversal Patterns using Graph Topology INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (10): : 20 - 26
- [25] Efficient Mining of Utility-Based Web Path Traversal Patterns 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 2215 - 2218
- [26] Perfect Hashing as an Almost Perfect Subtype Test ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 30 (06):
- [30] Mining user access patterns with traversal constraint for predicting web page requests Knowledge and Information Systems, 2006, 10 : 515 - 528