Li Zhiheng. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2004. / Includes bibliographical references (leaves 77-79). / Abstracts in English and Chinese. / Abstract (English) --- p.i / Acknowledgement --- p.iii / Contents --- p.iv / List of Figures --- p.vii / List of Tables --- p.ix / List of Algorithms --- p.x / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Review of frequent itemset mining --- p.1 / Chapter 1.2 --- Data mining proxy serving for large numbers of users --- p.3 / Chapter 1.3 --- Privacy issues on proxy service --- p.4 / Chapter 1.4 --- Organization of the thesis --- p.6 / Chapter 2 --- Frequent itemsets mining --- p.7 / Chapter 2.1 --- Preliminaries --- p.7 / Chapter 2.2 --- Data mining queries --- p.8 / Chapter 2.3 --- A running example --- p.10 / Chapter 3 --- Data Mining Proxy --- p.13 / Chapter 3.1 --- Load data for mining --- p.14 / Chapter 3.2 --- An Overview --- p.16 / Chapter 3.3 --- Tree Operations --- p.16 / Chapter 3.4 --- Data Mining Usages and Observations --- p.18 / Chapter 4 --- Implementation of Proxy --- p.23 / Chapter 4.1 --- Problems in implementation --- p.23 / Chapter 4.2 --- A Coding Scheme --- p.24 / Chapter 4.3 --- On-disk/In-Memory Tree Representations and Mining --- p.27 / Chapter 4.4 --- Tree Operation Implementations --- p.29 / Chapter 4.4.1 --- Tree Projection Operation Implementations: πd2m( )and πm2m( ) --- p.31 / Chapter 4.4.2 --- Tree Merge Operation Implementations: --- p.33 / Chapter 4.4.3 --- Frequent Itemset/Sub-itemset Tree Building Request --- p.37 / Chapter 4.4.4 --- The Tree Projection Operation π and Frequent Super- itemset Tree Building Request --- p.39 / Chapter 5 --- Performance Studies --- p.45 / Chapter 5.1 --- Mining with Different Sizes of Trees in Main Memory --- p.47 / Chapter 5.2 --- Constructing Trees in Main Memory --- p.48 / Chapter 5.3 --- Query Patterns and Number of Queries --- p.50 / Chapter 5.4 --- Testing Sub-itemset Queries with Different Memory Sizes --- p.51 / Chapter 5.5 --- Replacement Strategies --- p.51 / Chapter 6 --- Privacy Preserving in Proxy Service --- p.61 / Chapter 6.1 --- Data Union Regardless Privacy Preserving --- p.61 / Chapter 6.2 --- Secure Data Union --- p.65 / Chapter 6.2.1 --- Secure Multi-party Computation --- p.65 / Chapter 6.2.2 --- Basic Methods of Privacy Preserving in Semi-honest Envi- ronment --- p.67 / Chapter 6.2.3 --- Privacy Preserving On Data Union --- p.70 / Chapter 6.3 --- Discussions --- p.73 / Chapter 7 --- Conclusion --- p.75 / Bibliography --- p.77
Identifer | oai:union.ndltd.org:cuhk.edu.hk/oai:cuhk-dr:cuhk_324657 |
Date | January 2004 |
Contributors | Li, Zhiheng., Chinese University of Hong Kong Graduate School. Division of Systems Engineering and Engineering Management. |
Source Sets | The Chinese University of Hong Kong |
Language | English, Chinese |
Detected Language | English |
Type | Text, bibliography |
Format | print, x, 79 leaves : ill. ; 30 cm. |
Rights | Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) |
Page generated in 0.0016 seconds