Recent years have witnessed increased interest in computing strongly correlated pairs in very large databases. Most pre-vious studies have been focused on static data sets. How-ever, in real-world applications, input data are often dy-namic and must continually be updated. With such large and growing data sets, new research efforts are expected to develop an incremental solution for correlation computing. Along this line, in this paper, we propose a CHECK-POINT algorithm that can efficiently incorporate new transactions for correlation computing as they become available. Specifi-cally, we set a checkpoint to establish a computation buffer, which can help us determine an upper bound for the corre-lation. This checkpoint bound can be exploite...
Databases contain information about which relationships do and do not hold among entities. To make t...
We study mining correlations from quantitative databases and show that this is a more effective appr...
In relational query processing, there are generally two choices for access paths when performing a p...
Given a set of data objects, correlation computing refers to the problem of efficiently finding grou...
Given a user-specified minimum correlation threshold and a market basket database with N items and T...
Recently, there has been considerable interest in efficiently computing strongly correlated pairs in...
Past attempts to mine transactional databases for strongly correlated item pairs have been beset by ...
The problem of finding highly correlated pairs is to output all item pairs whose (Pearson) correlati...
Large scale of short text records are now prevalent, such as news highlights, scientific paper citat...
Recently, there has been considerable interest in computing strongly correlated pairs in large datab...
This paper addresses some of the foundational issues associated with discovering the best few corre-...
We describe an automatic database design tool that exploits correlations between attributes when rec...
Abstract. Since the discovery of simple power attacks, the cryptographic research community has deve...
Repeated calculations lead to a sharp increase in the time of correlation-based feature selection. I...
It is known that optimization of join queries based on average selectivities is sub-optimal in highl...
Databases contain information about which relationships do and do not hold among entities. To make t...
We study mining correlations from quantitative databases and show that this is a more effective appr...
In relational query processing, there are generally two choices for access paths when performing a p...
Given a set of data objects, correlation computing refers to the problem of efficiently finding grou...
Given a user-specified minimum correlation threshold and a market basket database with N items and T...
Recently, there has been considerable interest in efficiently computing strongly correlated pairs in...
Past attempts to mine transactional databases for strongly correlated item pairs have been beset by ...
The problem of finding highly correlated pairs is to output all item pairs whose (Pearson) correlati...
Large scale of short text records are now prevalent, such as news highlights, scientific paper citat...
Recently, there has been considerable interest in computing strongly correlated pairs in large datab...
This paper addresses some of the foundational issues associated with discovering the best few corre-...
We describe an automatic database design tool that exploits correlations between attributes when rec...
Abstract. Since the discovery of simple power attacks, the cryptographic research community has deve...
Repeated calculations lead to a sharp increase in the time of correlation-based feature selection. I...
It is known that optimization of join queries based on average selectivities is sub-optimal in highl...
Databases contain information about which relationships do and do not hold among entities. To make t...
We study mining correlations from quantitative databases and show that this is a more effective appr...
In relational query processing, there are generally two choices for access paths when performing a p...