Return to search

Concurrent data mining with a large number of users.

Li Zhiheng. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2004. / Includes bibliographical references (leaves 77-79). / Abstracts in English and Chinese. / Abstract (English) --- p.i / Acknowledgement --- p.iii / Contents --- p.iv / List of Figures --- p.vii / List of Tables --- p.ix / List of Algorithms --- p.x / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Review of frequent itemset mining --- p.1 / Chapter 1.2 --- Data mining proxy serving for large numbers of users --- p.3 / Chapter 1.3 --- Privacy issues on proxy service --- p.4 / Chapter 1.4 --- Organization of the thesis --- p.6 / Chapter 2 --- Frequent itemsets mining --- p.7 / Chapter 2.1 --- Preliminaries --- p.7 / Chapter 2.2 --- Data mining queries --- p.8 / Chapter 2.3 --- A running example --- p.10 / Chapter 3 --- Data Mining Proxy --- p.13 / Chapter 3.1 --- Load data for mining --- p.14 / Chapter 3.2 --- An Overview --- p.16 / Chapter 3.3 --- Tree Operations --- p.16 / Chapter 3.4 --- Data Mining Usages and Observations --- p.18 / Chapter 4 --- Implementation of Proxy --- p.23 / Chapter 4.1 --- Problems in implementation --- p.23 / Chapter 4.2 --- A Coding Scheme --- p.24 / Chapter 4.3 --- On-disk/In-Memory Tree Representations and Mining --- p.27 / Chapter 4.4 --- Tree Operation Implementations --- p.29 / Chapter 4.4.1 --- Tree Projection Operation Implementations: πd2m( )and πm2m( ) --- p.31 / Chapter 4.4.2 --- Tree Merge Operation Implementations: --- p.33 / Chapter 4.4.3 --- Frequent Itemset/Sub-itemset Tree Building Request --- p.37 / Chapter 4.4.4 --- The Tree Projection Operation π and Frequent Super- itemset Tree Building Request --- p.39 / Chapter 5 --- Performance Studies --- p.45 / Chapter 5.1 --- Mining with Different Sizes of Trees in Main Memory --- p.47 / Chapter 5.2 --- Constructing Trees in Main Memory --- p.48 / Chapter 5.3 --- Query Patterns and Number of Queries --- p.50 / Chapter 5.4 --- Testing Sub-itemset Queries with Different Memory Sizes --- p.51 / Chapter 5.5 --- Replacement Strategies --- p.51 / Chapter 6 --- Privacy Preserving in Proxy Service --- p.61 / Chapter 6.1 --- Data Union Regardless Privacy Preserving --- p.61 / Chapter 6.2 --- Secure Data Union --- p.65 / Chapter 6.2.1 --- Secure Multi-party Computation --- p.65 / Chapter 6.2.2 --- Basic Methods of Privacy Preserving in Semi-honest Envi- ronment --- p.67 / Chapter 6.2.3 --- Privacy Preserving On Data Union --- p.70 / Chapter 6.3 --- Discussions --- p.73 / Chapter 7 --- Conclusion --- p.75 / Bibliography --- p.77

Identiferoai:union.ndltd.org:cuhk.edu.hk/oai:cuhk-dr:cuhk_324657
Date January 2004
ContributorsLi, Zhiheng., Chinese University of Hong Kong Graduate School. Division of Systems Engineering and Engineering Management.
Source SetsThe Chinese University of Hong Kong
LanguageEnglish, Chinese
Detected LanguageEnglish
TypeText, bibliography
Formatprint, x, 79 leaves : ill. ; 30 cm.
RightsUse of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Page generated in 0.0027 seconds