Research Article | Open Access | Download PDF
Volume 3 | Issue 1 | Year 2013 | Article Id. IJPTT-V3I1P403 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I1P403Efficient Patterns Using Hidden Web Trajectory Concept
K.Kavitha, Dr. E.Ramaraj
Citation :
K.Kavitha, Dr. E.Ramaraj, "Efficient Patterns Using Hidden Web Trajectory Concept," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 1, pp. 7-11, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I1P403
Abstract
Keywords
GPS, Pattern Mining, Fake Objects, intersection patterns.
References
[1] Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi.-
Anonymity Preserving Pattern Discovery, Maurizio
[2] Longbing Cao, Li Lin, Chengqi Zhang -Domain Driven InDepth Pattern Discovery: A practical Methodology.
[3] Jimeng Sun Spiros Papadimitriou Christos Faloutsos -
Distributed Pattern Discovery in Multiple Streams.
[4] R.Cooley, B. Mobasheer, J. Srinivastava
- Web Mining: Information and pattern Discovery on the World
Wide Web.
[5] Usama Fayyad, Gregory Piatetsky-Shapiro, and Padhraic Smyth
- Knowledge Discovery and Data Mining in Databases.
[6] Despina Kopanaki, Nikos Pelekis, Aris Gkoulalas-Divanis,
Marios Vodas Yannis Theodoridis - A Framework for Mobility
Pattern Mining and Privacy-Aware Querying of Trajectory Data.
[7]Dummy-Based Schemes for Protecting Movement Trajectories,
www.iis.sinica.edu.tw/page/jise/2012/201203_06.html
[8] Quanquan Gu and Jiawei Han, Fosca Giannotti, Dino Pedreschi
- Data Mining Research Group.
[9] Mobility, Data Mining and
Privacy.
[10] Tun-Hao You Wen-Chih Peng Wang-Chien Lee, Protecting
Moving Trajectories with Dummies.
[11] Fosca Giannotti, Mobility Data Analysis and Mining:
Understanding Human Movement Patterns from Trajectory Data.
[12] Jae-Gil Lee, Jiawei Han Fellow Xiaolei Li, and Hong
Mining Discriminative Patterns for Classifying Trajectories on
Road Networks.