共 130 条
[41]
FALOUTSOS C, 1994, SIGMOD, P419, DOI DOI 10.1145/191839.191925
[42]
Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580
[43]
Fu AWC, 2006, LECT NOTES ARTIF INT, V4093, P31
[44]
Fu T.chung., 2001, Notes KDD2001 Workshop on Temporal Data Mining, P27
[45]
Gavrilov M., 2000, Proceedings. KDD-2000. Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, P487, DOI 10.1145/347090.347189
[47]
Geurts P., 2001, P 5 EUR C PRINC DAT, P115, DOI [DOI 10.1007/3-540-44794-6_10, 10.1007/3-540-44794-610, DOI 10.1007/3-540-44794-610]
[49]
Goodwin L., 2000, P 2000 ACM S APPL CO, V1, P46, DOI DOI 10.1145/335603.335680