Knowledge Graph and Semantic Computing: Knowledge Graph Empowers the Digital Economy
7th China Conference, CCKS 2022, Qinhuangdao, China, August 24–27, 2022, Revised Selected Papers
Article
To address user cold-start challenge in multimedia recommender systems, we proposed a new model named USBE in this paper. The model doesn’t take the new user’s personal and social information as the necessary ...
Article
In order to improve the management efficiency of software vulnerability classification, reduce the risk of system being attacked and destroyed, and save the cost for vulnerability repair, this paper proposes a...
Chapter and Conference Paper
Identifying the most influential spreaders in complex networks is vital for optimally using the network structure and accelerating information diffusion. In most previous methods, the edges are treated equally...
Book and Conference Proceedings
7th China Conference, CCKS 2022, Qinhuangdao, China, August 24–27, 2022, Revised Selected Papers
Article
Massive studies focus on the prediction of main pollutants, to improve air quality by revealing the evolution of pollutants. However, existing prediction methods mostly emphasize the fitting analysis of time s...
Chapter and Conference Paper
The mining of software community structure is of great significance in identifying software design pattern, software maintenance, software security and optimizing software structure. To improve the accuracy of...
Article
How to mine many interesting subgraphs in uncertain graph has become an important research field in data mining. In this paper, a novel algorithm Uncertain Maximal Frequent Subgraph Mining Algorithm Based on A...
Chapter and Conference Paper
Non-cooperative target tracking is a key technology for complex space missions such as on-orbit service. To improve the tracking performance during the unknown maneuvering phase of the target, two methods incl...
Article
Sequence clustering has become an important topic that experts in data mining are currently investigating. However, clustering quality is typically significantly affected by both the selection of initial cent...
Article
Most of the existing clustering algorithms are affected seriously by noise data and high cost of time. In this paper, on the basis of CURE algorithm, a representative points clustering algorithm based on densi...
Article
In this letter, a phase change random access memory (PCRAM) chip based on Ti0.4Sb2Te3 alloy material was fabricated in a 40-nm 4-metal level complementary metal-oxide semiconductor (CMOS) technology. The phase ch...
Article
Mining frequent patterns with periodic wildcard gaps is a critical data mining problem to deal with complex real-world problems. This problem can be described as follows: given a subject sequence, a pre-specif...
Chapter and Conference Paper
At present, the existing incremental mining algorithms of sequential patterns can not make full use of the mining information in original database, the updated database is scanned many times and the projected ...
Chapter and Conference Paper
Most existing frequent itemset mining algorithms based on bit-sequence will generate many candidate itemsets. In this paper, we present FIM-BS for mining frequent itemset. First we adopt bit-sequence to compre...
Chapter and Conference Paper
Hierarchical K-means clustering is one of important clustering task in data mining. In order to address the problem that the time complexity of the existing HK algorithms is high and most of algorithms are sen...
Chapter and Conference Paper
Clustering high-dimensional data stream is a difficult and important issue. In this paper, we propose MStream, a new clustering algorithm based on matrix over high dimensional data stream. MStream algorithm in...
Chapter and Conference Paper
Faults analysis is a hot topic in the field software security. In this paper, the concepts of the improved Euclidian distance and the feature attribute set are defined. A novel algorithm MOFASIED for mining ou...
Chapter and Conference Paper
Software fault feature analysis has been the important part of software security property analysis and modeling. In this paper, a software fault feature clustering algorithm based on sequence pattern (SFFCSP) ...
Chapter and Conference Paper
Due to streaming data are infinite in length and fast changing with time, it is very significant to limit the memory usage in the process of mining data streams. Maximal frequent itemset is a subset of frequen...
Chapter and Conference Paper
We present a novel clustering-based indexing load shedding technique for sliding window joins (CILS). When the details of the distribution of streams are unknown, to obtain the statistics of data, we dynamical...