Mafia / spam mine patterns from transactional databases mafia/spam從事務(wù)數(shù)據(jù)庫中挖掘模式。
In other words, it is a transactional database, but only at the 換句話說,它是一個事務(wù)性的數(shù)據(jù)庫,但僅僅處于
The maximum forward path method can transform the data into transactional databases, which are appropriated for mining 運(yùn)用最大向前引用方法對用戶會話進(jìn)行分割,得到用戶的事務(wù)數(shù)據(jù)庫。
transactional database systems in general are not very good at generating summary tables from log tables, because in this case row locking is almost useless 傳統(tǒng)的數(shù)據(jù)庫一般地在從日志表中生成摘要表這方面的表現(xiàn)不怎么好,因?yàn)樵谶@種情況下,行記錄鎖幾乎沒用。
16 zaki m j, hsiao c j . charm : an efficient algorithm for closedassociation rule mining . technical report 99-10, computerscience dept ., rensselaer polytechnic institute, oct ., 1999.17 burdick d, calimlim m, gehrke j . mafia : a maximalfrequent itemset algorithm for transactional databases 接著,我們在多分辨分析和shannon取樣定理的啟發(fā)下,設(shè)計出了一種高效的自適應(yīng)在線獲取近似關(guān)聯(lián)規(guī)則的取樣算法:多尺度取樣算法multi-scalingsampling,ms。