• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: pattern ]" (41)
  1. 11. Performance Analysis of Siding Window based Stream High Utility Pattern Mining Methods
    Heungmo Ryang, Unil Yun, Vol. 17, No. 6, pp. 53-60, Dec. 2016
    10.7472/jksii.2016.17.6.53
    Keywords: Pattern mining, High utility pattern mining, sliding window model, resource-limited environments
  2. 12. Effects of SNS user's Personality on Usage patterns and SNS commitment: A case study of Facebook
    Yena Choi, HaSung Hwang, Vol. 17, No. 3, pp. 95-106, Jun. 2016
    10.7472/jksii.2016.17.3.95
    Keywords: SNS, Facebook, The Big Five Personality Model, Usage Patterns, Commitment
  3. 13. Performance Analysis of Top-K High Utility Pattern Mining Methods
  4. 14. Clustering Algorithm using the DFP-Tree based on the MapReduce
  5. 15. A Smartphone Addiction and Disease Prevention System Through the Collection and Analysis of Smartphone Usage Patterns
  6. 16. Analysis and Performance Evaluation of Pattern Condensing Techniques used in Representative Pattern Mining
  7. 17. A Weighted Frequent Graph Pattern Mining Approach considering Length-Decreasing Support Constraints
    Unil Yun, Gangin Lee, Vol. 15, No. 6, pp. 125-132, Dec. 2014
    10.7472/jksii.2014.15.6.125
    Keywords: Length-decreasing support constraint, weighted frequent pattern mining, graph pattern, Data Mining, Frequent pattern mining
  8. 18. Analysis and Evaluation of Frequent Pattern Mining Technique based on Landmark Window
    Gwangbum Pyun, Unil Yun, Vol. 15, No. 3, pp. 101-108, Jun. 2014
    10.7472/jksii.2014.15.3.101
    Keywords: Landmark Window, Frequent pattern mining, Online mining, Performance Evaluation, scalability
  9. 19. Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern
    Hee Yeon Min, Jin Hyung Park, Dong Hoon Lee, In Seok Kim, Vol. 15, No. 1, pp. 157-170, Feb. 2014
    10.7472/jksii.2014.15.1.157
    Keywords: Outlier Detection, User Input Pattern, E-finance Transaction Pattern
  10. 20. Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
    10.7472/jksii.2013.14.6.125
    Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis