相似文献/References:
[1]李锡娟 刘锋 闫娜娜 徐杰 耿波.PrefixSpan算法与CloSpan算法的分析与研究[J].计算机技术与发展,2008,(01):70.
LI Xi-juan,LIU Feng,YAN Na-na,et al.Research and Analysis Between Algorithm of PrefixSpan and CloSpan[J].,2008,(05):70.
[2]孟宪苹 宋菲 李俊.基于序列模式挖掘的入侵检测系统的研究[J].计算机技术与发展,2008,(03):154.
MENG Xian-ping,SONG Fei,LI Jun.Research of Intrusion Detection System Based on Sequential Pattern Mining[J].,2008,(05):154.
[3]叶和平 尚敏.一种面向入侵检测的数据挖掘算法研究[J].计算机技术与发展,2008,(11):149.
YE He-ping,SHANG Min.Study on an Intrusion Detection Oriented Data Mining Algorithm[J].,2008,(05):149.
[4]夏明波 王晓川 孙永强 金士尧.序列模式挖掘算法研究[J].计算机技术与发展,2006,(04):4.
XIA Ming-bo,WANG Xiao-chuan,SUN Yong-qiang,et al.Research on Sequential Pattern Mining Algorithms[J].,2006,(05):4.
[5]卢博礼 张小平 王翰虎.基于矩阵算法的序列模式挖掘研究[J].计算机技术与发展,2011,(01):120.
LU Bo-li,ZHANG Xiao-ping,WANG Han-hu.Research on Sequential Pattern Mining Based on Algorithm of Matrix[J].,2011,(05):120.
[6]夏达,李士进.水质时间序列模式挖掘[J].计算机技术与发展,2018,28(05):149.[doi:10.3969/j.issn.1673-629X.2018.05.034]
XIA Da,LI Shijin.Pattern Mining for Water Quality Time Series[J].,2018,28(05):149.[doi:10.3969/j.issn.1673-629X.2018.05.034]