Skip to main content

and
  1. No Access

    Reference Work Entry In depth

    Query by Humming

    Yingyi Bu, Raymond Chi-Wing Wong, Ada Wai-Chee Fu in Encyclopedia of Database Systems (2018)

  2. No Access

    Chapter and Conference Paper

    Counting Edges and Triangles in Online Social Networks via Random Walk

    Online social network (OSN) analysis has attracted much attention in recent years. Edge and triangle counts are both fundamental properties in OSNs. However, for many OSNs, one can only access parts of the net...

    Yang Wu, Cheng Long, Ada Wai-Chee Fu, Zitong Chen in Web and Big Data (2017)

  3. No Access

    Living Reference Work Entry In depth

    Query by Humming

    Yingyi Bu, Raymond Chi-Wing Wong, Ada Wai-Chee Fu in Encyclopedia of Database Systems

  4. No Access

    Chapter and Conference Paper

    Mining N-most Interesting Itemsets

    Previous methods on mining association rules require users to input a minimum support threshold. However, there can be too many or too few resulting rules if the threshold is set inappropriately. It is difficu...

    Ada Wai-chee Fu, Renfrew Wang-wai Kwong, Jian Tang in Foundations of Intelligent Systems (2010)

  5. No Access

    Reference Work Entry In depth

    Query by Humming

    Yingyi Bu, Raymond Chi-Wing Wong, Ada Wai-Chee Fu in Encyclopedia of Database Systems (2009)

  6. Chapter and Conference Paper

    Workshop Organizers’ Message

    International Workshop on Privacy-Preserving Data Analysis (PPDA) 2009 took place at Brisbane, Australia on 21st April, 2009. There were two sessions for this workshop with 2 paper presentations in the first s...

    Raymond Chi-Wing Wong, Ada Wai-Chee Fu in Database Systems for Advanced Applications (2009)

  7. No Access

    Chapter

    Privacy-Preserving Data Stream Classification

    In a wide range of applications, multiple data streams need to be examined together in order to discover trends or patterns existing across several data streams. One common practice is to redirect all data str...

    Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Rong She, Jian Pei in Privacy-Preserving Data Mining (2008)

  8. No Access

    Chapter and Conference Paper

    Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures

    Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view of k-anonymity is clustering with a constr...

    Jiuyong Li, Raymond Chi-Wing Wong in Data Warehousing and Knowledge Discovery (2006)

  9. No Access

    Chapter and Conference Paper

    ISM: Item Selection for Marketing with Cross-Selling Considerations

    Many different algorithms are studied on association rules in the literature of data mining. Some researchers are now focusing on the application of association rules. In this paper, we will study one of the a...

    Raymond Chi-Wing Wong, Ada Wai-Chee Fu in Advances in Knowledge Discovery and Data Mining (2004)

  10. No Access

    Chapter and Conference Paper

    Mining Frequent Episodes for Relating Financial Events and Stock Trends

    It is expected that stock prices can be affected by the local and overseas political and economic events. We extract events from the financial news of Chinese local newspapers which are available on the web, t...

    Anny Ng, Ada Wai-chee Fu in Advances in Knowledge Discovery and Data Mining (2003)

  11. No Access

    Chapter and Conference Paper

    Discovering Temporal Patterns for Interval-based Events

    In many daily transactions, the time when an event takes place is known and stored in databases. Examples range from sales records, stock exchange, patient records, to scientific databases in geophysics and as...

    Po-shan Kam, Ada Wai-chee Fu in Data Warehousing and Knowledge Discovery (2000)