{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:38Z","timestamp":1738777238883,"version":"3.37.0"},"reference-count":18,"publisher":"Academy Publisher","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.2.252-258","type":"journal-article","created":{"date-parts":[[2014,2,12]],"date-time":"2014-02-12T14:33:48Z","timestamp":1392215628000},"source":"Crossref","is-referenced-by-count":2,"title":["Sequential Pattern Mining for Uncertain Data Streams using Sequential Sketch"],"prefix":"10.4304","volume":"9","author":[{"given":"Jingyu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Ping","family":"Chen","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,2,5]]},"reference":[{"key":"ref1","first-page":"1663","article-title":"Mining of frequent items from streams of uncertain data","volume-title":"Proc IEEE Computer Society","author":"Leung","year":"2009","unstructured":"[1] Carson Kai-Sang Leung, and Boyu Hao, \"Mining of frequent items from streams of uncertain data\", In Proc IEEE Computer Society, 2009, pp. 1663-1670."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.7.2.507-513"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2011.03.002"},{"key":"ref4","first-page":"414","volume-title":"Granular Approach for Protein Sequence Analysis","author":"Xie","year":"2012","unstructured":"[4] Ying Xie, Jonathan Fisher, Vijay V. Raghavan, Tom Johnsten, and Can Akkoc, \"Granular Approach for Protein Sequence Analysis\",Rough Sets and Current Trends in Computing, 2012, pp. 414-421."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.9.1017-1024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335372"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68125-0_61"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2011.03.002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2133803.2184450"},{"key":"ref10","first-page":"159","article-title":"PODS: a new model and processing algorithms for uncertain data streams","volume-title":"Proceedings of the 2010 international conference on Management of data","author":"Tran","year":"2010","unstructured":"[13] Thanh T.L. Tran, Liping Peng, Boduo Li, Yanlei Diao, and Anna Liu, \"PODS: a new model and processing algorithms for uncertain data streams\", In Proceedings of the 2010 international conference on Management of data, Indiana, USA, pp. 159-170, 2010."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.79"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.208"},{"key":"ref13","first-page":"20","article-title":"The Space Complexity of Approximating the Frequency Moments","volume-title":"ACM Symposium on Theory of Computing","author":"Alon","year":"1996","unstructured":"[16] Noga Alon, Yossi Matias, and Mario Szegedy, \"The Space Complexity of Approximating the Frequency Moments\", ACM Symposium on Theory of Computing, 1996, pp. 20\u201329."},{"key":"ref14","first-page":"296","article-title":"What's hot and what's not: Tracking most frequent items dynamically","volume-title":"Proceedings of the 22nd ACM symposium on Principles of database systems","author":"Cormode","year":"2003","unstructured":"[18] Graham Cormode, and S. Muthukrishnan, \"What's hot and what's not: Tracking most frequent items dynamically\", In Proceedings of the 22nd ACM symposium on Principles of database systems, 2003, pp. 296-306."},{"key":"ref15","first-page":"807","article-title":"Sketch-based Streaming PCA Algorithm for Network-wide Traffic Anomaly Detection","volume-title":"Proc of IEEE 30th International Conference on Distributed Computing Systems","author":"Liu","year":"2010","unstructured":"[21] Yang Liu, Linfeng Zhang, and Yong Guan, \"Sketch-based Streaming PCA Algorithm for Network-wide Traffic Anomaly Detection\", In Proc of IEEE 30th International Conference on Distributed Computing Systems, 2010, pp. 807-816."},{"key":"ref16","first-page":"1","article-title":"Evaluation of Anomaly Detection Based on Sketch and PCA","volume-title":"Proceedings of IEEE Global Telecommunications Conference Globecom","author":"Kanda","year":"2010","unstructured":"[22] Yoshiki Kanda, Kensuke Fukuda, and Toshiharu Sugawara, \"Evaluation of Anomaly Detection Based on Sketch and PCA\", In Proceedings of IEEE Global Telecommunications Conference Globecom, 2010, pp. 1-5."},{"key":"ref17","first-page":"35","article-title":"Granulation of knowledge by tools of rough mereology","volume-title":"IEEE International Conference on Granular Computing","author":"Polkowski","year":"2010","unstructured":"[23] Lech Polkowski, and Piotr Artiemjew, \"Granulation of knowledge by tools of rough mereology\", In IEEE International Conference on Granular Computing, 2010, pp.35\u201336."},{"key":"ref18","first-page":"287","volume-title":"Representation and Evaluation of Granular Systems","author":"Szczuka","year":"2012","unstructured":"[24] Szczuka, Marcin, and Dominik \u015al\u0119zak. \"Representation and Evaluation of Granular Systems.\" Intelligent Decision Technologies, 2012, pp. 287-296"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:04:41Z","timestamp":1738775081000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,5]]},"references-count":18,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2014,2,5]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.2.252-258","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,2,5]]}}}