基于数据挖掘的网络故障告警相关性研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
现代电信网络管理的主要任务是对网络进行实时监控,确保电信网络高效、可靠、经济和安全的运行。随着现代电信网络的规模越来越大,结构日益复杂,对电信网络的告警数据进行相关性分析尤其重要,因为从告警数据分析出的相关性知识,可以帮助网络管理人员及时定位故障,保证电信网络的正常运行。传统的相关性分析方法由于过多地依赖专家知识而难以适应网络复杂、多变的情况,采用数据挖掘的方法则可以弥补这方面的不足。随着网络规模的增大,告警数量的增加,如何从海量告警数据中发现电信网络中的告警相关性知识,帮助网络管理人员处理网络故障,是当前网络故障管理所面临的主要问题。
     本文将数据挖掘技术应用到网络故障告警相关性分析中,研究了频繁告警序列和非频繁告警序列关联规则的挖掘方法,取得了一定的成果。本文的具体工作与创新包括以下几个方面:
     1、告警序列模式(频繁告警序列)的挖掘
     研究了电信网络中告警序列模式的挖掘问题。序列模式挖掘是在关联规则挖掘的基础上发展起来的。目前序列模式挖掘方法大多基于WINEPI的算法框架,由于该算法需要多次遍历数据库,执行效率较低,因此本文基于FP-growth算法框架,提出一种基于FP-树的序列模式挖掘FSPM-FP算法。并且分别对其重要参数(最小支持度)和数据库发生变化的情况,提出了相应的增量式挖掘算法——SFSPM-FP和DFSPM-FP,并通过实验证明了算法的有效性。
     2、非频繁告警关联规则挖掘
     针对目前告警序列模式挖掘算法受到最小支持度的限制,仅能够得到高支持度、高置信度条件下频繁发生的告警关联规则的问题。本文结合实际电信网络告警的特征,提出了一种以高相关度、高置信度为条件,基于相关度统计的告警关联规则挖掘算法AARSC;同时为了适应告警数据动态增加的特点,提出了其改进算法——增量式挖掘算法UAARSC。实验表明AARSC和UAARSC算法可以同时发现频繁和非频繁发生告警序列间的关联规则,从而提高了告警关联规则的完整性和准确性。
     3、告警模式的可视化
     由于电信运营商经常会根据业务需求,对网络进行优化,为了有利于网管人员对设备进行维护,可以将当前网络中存在的告警以可视化的方式呈现给网管人员,他们根据可视化的结果,有效地发现故障的告警模式,进而预测告警,定位故障。本文提出一种基于谱图理论的ACASG算法。该算法基于谱图理论发现高维数据空间中潜在的低维映射结构;通过分析低维空间中点结构之间的相似性,实现告警模式挖掘的目的。实验结果表明,该算法不仅可以发现告警间的相关性,而且还可以通过分析谱图的变化,预测、定位网络故障。
The task of telecommunication networks management focuses on monitoring the status of network, which ensures the network to run realiablely and efficiently. As the modern telecom network becomes large scale and its construction goes complex, it is much more important to analysis the alram correlation. Because the result can help the network administrators locate the fault to ensure the network running smoothly. However, traditional alarm correlation analysis methods can hardly work well when networks are complex and changeful due to its relying on expert knowledge, the data mining method can overcome the shortage of traditional methods. With the development of telecommunication networks, it is key issue for network management to extract the alarm correlation rules from massive alarm data to help network administrator to handle the fault.
     In this thesis, we apply data mining technology to network fault alarm correlation analysis and study mining methods in frequently and non-frequently alarm sequence. The research and innovations are described in details as follows:
     1. Alarm sequence pattern mining (high-frequency alarm sequence) We research alarm sequence pattern mining in telecom network. Sequence pattern mining is developed based on association rules mining. Nowadays, most sequence pattern mining methods are based on WINEPI algorithm frame. But WINEPI algorithm needs to traversal the database for many times so that it is not very efficiently. In order to overcome this shortage, we proposed a sequence pattern mining FSPM-FP algorithm, which is based on FP-Tree, and then we proposed two increments mining algorithm which are SFSPM-FP algorithm based on the minimal support changed and DFSPM-FP algorithm based on the database changed. Experimental results demonstrate The validity of the algorithm.
     2. low-frequence alarm association rules mining
     Currently those algorithms to mine the alarm association rules are limited to the minimal support, so that they can only obtain the association rules among the frequently occurring alarm events based on high support and high confidence. In the thesis the alarm association rules mining algorithm AARSC is presented, which is used high correlativity and the high confidence. At the same time, we proposed its improved algorithm UAARSC to adapt the database increasing. Experimental result shows AARSC algorithm and UAARSC algorithm can discovery both high-frequency and low-frequency alarm association ruls so that it can make the rules are much more completly and correctly.
     3、Alarm pattern visualization
     Telecom network often changes as the service changes. Alarm visualization can help administrators maintain network devices, so that they can discovery the alarm pattern efficiently and locate and predict the alarm and fault. A new ACASG algorithm is introduced, which is based on spectral graph theory. The algorithms discover the underlying mapping structure lying on a low-dimensional structure based on spectral graph theory and mine alarm pattern by analyzing point construction similarity. Experimental results demonstrate that the algorithm not only discovered correlation among alarms but also acquire the fault in the telecommunications network based on the spectral graph transformation.
引文
[1] 陈清金.告警管理系统的关键技术研究.[博士论文]北京邮电大学 2004
    [2] R. Crank, P. Callahan, and L. Bemstein. Rule-Based Expert Systems for Network Management and Operations: an Introduction [J]. IEEE Network, 1988, 2(5): 7-21
    [3] Harrison, K. A., INCL, Hewlett-Packard (Bristol) Labs. Event Correlation in Telecommunication Network Management. 1994.9
    [4] M. Moiler, S. Tretter, and B. Fink. Intelligent Filtering in Network Management Systems [C]. In IFIP/IEEE International Symposium on Integrated Network Management, IV(ISINM'95), London: Chapman and Hall, 1995: 304-315
    [5] Simona Brugnoni, Guido Bruno, Roberto Manione, Enrico Montariolo, Elio Paschetta, and Luisella Sisto. An Expert System for Real Time Fault Diagnosis of the Italian Telecommunications Network [C]. In IFIP/IEEE International Symposium on Integrated Network Management, Ⅲ(ISINM'93), San Franciso, California, USA, 1993: 617-628
    [6] Kolodner, J. Case-Base Reasoning. San Mateo, CA: Morgan Kaufman, 1997
    [7] S. Slade. Case-Based Reasoning: a Research Paradigm [J]. A.I. Magazine, Vol. 12, No.1, 1991: 42-55
    [8] E. Simoudis. Using Case-Based Retrieval for Customer Technical Support [J]. IEEE Expert, October 1992, 7: 7-12
    [9] Lewis, L. A Case-Based Reasoning Approach to the Management of Faults in Communication Networks [C]. Proceeding IEEE Infocom'93, vol.3. San Francisco 1993: 114-120
    [10] Lewis, L. Implementing Policy in Enterprise Networks [J]. IEEE Communications Magazine, January 1996
    [11] Burns, L., Hellerstein, J. L., Ma, S., Perng, C. S., Rabenhorst, D. A., Taylor, D. J. Towards Discovery of Event Correlation Rules [C]. In IFIP/IEEE International Symposium on Integrated Network Management, Seattle, WA, USA 2001: 345-359
    [12]Malheiros Meira D, Marcos Silva Nogueira J. Modelling a Telecommunication Network for Fault Management Applications Network Operations and Management Symposium [C], NOMS 1998, 3: 723-732
    [13] G. Jakobson and M. D. Weissman Real-Time Telecommunication Network Management: Exterding Event Correlation with Temporal Constraints [C]. In IFIP/IEEE International Symposium onIntegrated Network Management, IV (ISINM'95): 290-301.
    [14]Jakobson G., Weissman M. Alarm Correlation [J]. IEEE Network, 1993, 7(6): 52-59
    [15] P. Frohlich, W. Nejdl, K. Jobmann, et al. Model-based Alarm Correlation in Cellular Phone Networks [C]. In: Proc of the Int'l Symp on Modelling Analysis and Simulation of Computer and Telecommunications Systems (MASCOTS'97), Haifa, Israel, 1997:197-204
    [16]Kliger S., S.Yemini, Y.Yemini et al. A Coding Approach to Event Correlations [C]. Proceedings of the 4th International Symposium on Integrated Network Management, 1995: 266-277
    [17] David Heekerman, Michael Wellman P. Real-World Application of Bayesian Networks [J]. Communications of ACM, 1995, 38(3): 24-26
    [18] Robert H. Deng, Aurel A. Lazar and Weiguo Wang. A Probabilistic Approach to Fault Diagnosis in Linear Lightwave Networks [J]. IEEE Journal on Selected Areas in Communications, 199311(9): 1438-1448
    [19]E. Aboelela and C. Douligeris. Fuzzy Temporal Reasoning Model for Event Correlation in Network Management [C]. 24th Conference on Local Computer Networks, LCN'99, Lowell, Massachusetts, USA, 1999:150-159
    [20]Denise W Guer, Lrfan Khan, Richard Ogier. An Artificial Intelligence Approach to Network Fault Management. http://www.sce.carleton.ca/netmanage/docs/ An_AI_Approach2.pdf
    [21] H. Wietgrefe, K. D Tuchs, e.al. Using Neural Networks for Alarm Correlation in Cellular Systems [M]. Neural Networks for Telecommunications ISBN 0-8058-2900-8 1997
    [22] 苏利敏,侯朝祯,戴忠健等.基于神经网络的告警关联[J].北京理工大学学报,2002(3):297-299
    [23] 王新苗,晏蒲柳,黄天锡.基于改进遗传神经网络模型的通信网络故障检测与告警相关性分析方法[J].电子科学学刊,2000,22(5):810-815
    [24] Marilly E., Aghasaryan A., Betge-Brezetz S. et al. Alarm Correlation for Complex Telecommunication Networks Using Neural Networks and Signal Processing [C]. IP Operations and Management, 2002 IEEE Workshop on 2002: 3-7
    [25] Mannila H, Toivonen H, Verkamo A I. Discovery of Frequent Episodes in Event Sequences [J]. Data Mining and Knowledge Discovery, 1997(1): 259-289
    [26] Hatonen K, Klemettinen M, Manila H, et al. Knowledge Discovery from Telecommunication Network Alarm Databases [C]. Twelfth International conference on Data Engineering, New Orlean, Louisiana, 1996: 115-122
    [27] Gary M Weiss, Haym Hirsh. Learning to Predict Rare Events in Events Sequences [C]. Proceeding 4th International Conference on Knowledge Discovery and Data Mining, AAAI press, 1998: 359-363
    [28] Gary M Weiss, John Eddy, Sholom Weiss. Intelligent Telecommunication Technologies. Knowledge-Based Intelligent Techniques in Industry, 1998: 249-275.
    [29] R. D. Gardner and D. A. Harle. Fault Resolution and Alarm Correlation in High-Speed Networks using Database Mining Techniques, ICSP1997, September 1997: 1423-1427
    [30] 郑庆国.基于数据挖掘的告警相关性分析[博士论文]北京航空航天大学 2003
    [31] 姚伟力.基于序列模式挖掘的告警相关性研究[博士论文]北京邮电大学 2004
    [32] 单莘.基于知识发现的告警相关性分析关键问题研究[博士论文]北京邮电大学 2006.5
    [1] Jakobson G., Weissman M. Alarm Correlation[J]. IEEE Network, 1993, 7(6): 52-59
    [2] Houck K, Calo S, Finkel A.. Towards a Practical Alarm Correlation System [J]. IFIP/IEEE International Symposium on Integrated Network Management, IV(ISINM'95), 1995: 226-237
    [3] Agrawal R, T. Imielinski, and A. Swami. Mining Association Rules between Sets of Items in Large Databases[C]. Proceedings of the 1993 ACM SIGMOD conference, Washington, D. C., May 1993: 207-216
    [4] 陈安,陈宁,周龙骧.数据挖掘技术及应用[M].科学出版社2006.3
    [5] Jianwei Han, Jian Pei. Mining Frequent Patterns by Pattern-Growth: Methodology and Implications [J]. ACM SIGKDD Explorations Newsletter, 2000. 2(2): 14-20
    [6] Rakesh Agrawal, Ramakrishnan Srikant. Fast Algorithm for Mining Association Rules[C]. Proceedings of 20th int. Conf. Very Large Data Bases(VLDB), Jorge B. Bocca, Matthias Jarke and Carlo Zaniolo, eds. Morgan Kauflnann Press, 1994: 487-499
    [7] A. Savasere, E. Omiecinski, S. Navathe. An Efficient Algorithm for Mining Association Rules in Large Databases[C]. Proceedings of 21th int'1 Conf. Very Large Data Bases. San Francisco: Morgan Kanfmann, 1995: 432-444
    [8] Jong Soo Park, Ming-Syan Chen, Philip S. Yu. An Effcctive Hash Based Algorithm for Mining Association Rules[C]. Proceedings of ACM SIGMOD International Conference on Management of Data. Michael J. Carey and Donovan A. Schneider eds. San Jose, California, 1995: 175-186
    [9] Cheung D, Han J, Ng V, Wong C. Maintenance of Discovered Association Rules in Large Databases: An Incremental Updating Technique[C]. In Proc. 12th Int. Conf. Data Engineering, New Orleans, Louisiana, Feb. 26-Mar. 1, 1996: 106-114.
    [10] Cheung D, Lee S, Kao B. A General Incremental Technique for Maintaining Discovered Association Rules[C]. In Proceedings 5th International Conference Database Systems for Advanced Applications. Melboume, Australia, 1997. 185-194
    [11] 冯玉才,冯剑琳.关联规则的增量式更新算法[J].软件学报,1998.9(4):301-306
    [12] Pei J, Han J, Mortazavi-Asl B, et al. PrefixSpan mining sequential patterns efficiently by prefix projected pattern growth[C]. ICDE 2001. Heidelbery, 2001. 215-226
    [13] J. Han, J. Pei, B. Mortazavi-Asl, et al. FreeSpan: Frequent pattern-projected sequential pattern mining[C]. In Proc. of the 6th Int. Conf. on Knowledge Discovery and Data Mining (KDD2000), 2000: 20-23
    [14] Jiawei Han,Micheline Kamber著,范明 孟小峰等译.数据挖掘概念与技术[M],北京:机械工业出版社,2001
    [15] 秦亮曦,史忠植.SFP-Max——基于排序FP-树的最大频繁模式挖掘算法[J].计算机研究与发展,2005.42(2):217-223
    [16] 颜跃进,李舟军,陈火旺.基于FP-Tree有效挖掘最大频繁项集[J].软件学报,2005.16(2):215-222
    [17] 宋余庆,朱玉全,孙志挥,陈耿.基于FP-Tree的最大频繁项目集挖掘及更新算法[J].软件学报,2003.Vol.14 No.9
    [18] 易彤,徐宝文,吴方君.一种基于FP树的挖掘关联规则的增量更新算法[J].计算机学报,2004.Vol.27 No.5
    [19] Rakesh Agrawal, Ramakrishnan Srikant. Fast Algorithm for Mining Association Rules[C]. Proceedings of 20th int. Conf. Very Large Data Bases(VLDB), Jorge B. Bocca, Matthias Jarke and Carlo Zaniolo, eds. Morgan Kaufmann Press, 1995: 487-499
    [20] K. Hatonen, M. Klemettinen, H. Mannila, P. Ronkainen. Knowledge Discovery from Telecommunication Network Alarm Databases [C]. Proceesing of the 12th International Conference on Data Engineer, (ICDE'96) New Orleans, Louisiana, Feb. 1996: 115-122
    [21] K. Hatonen, M. Klemettinen, H.Mannila, Portland, Oregon. TASA: Telecommunications Alarm Sequence Analyzer or How to enjoy faults in your network [A]. IEEE/IFIP 1996 Network Operations and Management symposium(NOMS'96) [C]., Kyoto, Japan, April 1996: 520-529
    [22] F. R. K. Chung. Spectral Graph Theory [M], Fresno: American Mathematical Society. 1997
    [23] 方开泰.实用多元统计分析[M].华东师范大学出版社 1989
    [1] 付松,吴宇红,刘炯.WLAN网管系统中的分布式故障管理[J].电子科技2005(3):32-35
    [2] Mika Klemettinen. A Knowledge Discovery Methodology for Telecommunication Network Alarm Databases. [Ph D dissertation]. Helsinki: University of Helsinki, Finland, 1999
    [3] ITU-T. Recommendation X.720: Information Technology-Open Systems Inter-Connection Systems Management: Log-control function. 1992.1
    [4] 夏海涛,詹志强.新一代网络管理技术[M].北京:北京邮电大学出版社,2003
    [5] Qingguo Zheng, Ke Xu. Weifeng Lv, Shilong Ma. Intelligent Scarch of Correlated Alarms from Database Containing Noise Data Network Operations and Management Symposium[C], 2002. NOMS 2002. 2002 IEEE/IFIP. 15-19 April 2002: 405-419
    [6] Fayyad U, Piatetsky-Shapiro, Smyth, Uthurusamy. Advances in Knowledge Discovery and Data Mining [M]. MIT Press. 1996
    [7] 李家春,李芝棠.入侵检测的规划识别模型研究[J].华中科技大学学报,2004(3):80-82
    [8] Vilalta Ricardo, Ma Sheng, and Hellerstein Joseph. Rule Induction of Computer Events[C]. Proceedings of the 12th IFIP/IEEE DSOM'2001 Nancy France, October, 2001: 225-235
    [9] Marilly E., Aghasaryan A., Betge-Brezetz S. et al. Alarm Correlation for Complex Telecommunication Networks Using Neural Networks and Signal Processing [J]. IP Operations and Management, 2002 IEEE Workshop on 2002: 3-7
    [10] 苏利敏,侯朝祯,戴忠健等.基于神经网络的告警关联[J].北京理工大学学报,2002(3):297-299
    [11] Gary M. Weiss and Haym Hirsh. Learning to Predict Rare Events in Categorical Time-Series Data[C]. Papers from the AAAI Workshop on Predicting the Future: AI Approaches to Time-Series Problems, Technical Report WS-98-07, 1998 AAAI Press, Menlo Park, CA: 83-90
    [12] Gary M. Weiss and Haym Hirsh. Learning to Predict Rare Events in Event Sequences[C]. Proceedings of the Fourth International Conference on Knowledge Discovery and. Data Mining (KDD-98), AAAI Press, Menlo Park, CA: 359-363
    [13] 王新苗,晏蒲柳,黄天锡.基于改进遗传神经网络模型的通信网络故障检测与告警相关性分析方法[J].电子科学学刊,2000,22(5):810-815
    [14] 单苹.基于知识发现的告警相关性分析关键问题研究[博士论文]北京邮电大学 2006.5
    [15] Lingping Wu, Dan Meng, Wen Gao, Jianfeng Zhan. A Proactive Fault-Detection Mechanism in Large-Scale Cluster Systems[C]. Regular paper, IEEE International Parallel & Distributed Processing Symposium (IPDPS 2006) Greece. April 2006: 1-10
    [16] 王保义,吴颖智,张建东,董斌,刘翠娟.基于模糊聚类的网络故障预报[J].计算机工程与应用 2006,42(23):115-117
    [17] 马琳茹,杨林,王建新,唐鑫.利用模糊聚类实现入侵检测告警关联图的重构[J].通信学报,2006,27(9):47-52
    [18] 孙朝晖,张德运,李庆海.网络故障管理中的自动告警关联[J].计算机工程2004,30(5):30-34
    [19] Srikant R, Agrawal. Mining Sequence Patterns: Generalization and Performance Improvements [A]. Proc 5th Int'1 Conf Extending Database Technology[C]. 1996: 3-17
    [20] 端义锋,胡谷雨,丁力.序列模式挖掘在网络告警分析中的应用[J].北京邮电大学学报,2004,27(12):157-161
    [21] Agrawal R, T. Imielinski, and A. Swami. Mining Association Rules between Sets of Items in Large Databases[C]. Proceedings of the 1993 ACM SIGMOD conference, Washington, D. C., May 1993: 207-216
    [22] Jianwei Han, Jian Pei. Mining Frequent Patterns by Pattern-Growth: Methodology and Implications [J]. ACM SIGKDD Explorations Newsletter, 2000. 2(2): 14-20
    [1] Srikant R, Agrawal. Mining Sequence Patterns: Generalization and Performance Improvements [A]. Proc 5th Int'1 Conf Extending Database Technology[C]. 1996: 3-17
    [2] 端义锋,胡谷雨,丁力.序列模式挖掘在网络告警分析中的应用[J].北京邮电大学学报2004,27(12):157-161
    [3] Agrawal R, T. Imielinski, and A. Swami. Mining Association Rules between Sets of Items in Large Databases[C]. Proceedings of the 1993 ACM SIGMOD conference, Washington, D. C., May 1993: 207-216
    [4] A. Savasere, E. Omiecinski, S. Navathe. An Efficient Algorithm for Mining Association Rules in Large Databases. Proceedings of 21th International Conference on Very Large Database [C]. Zurich, Switzerland, Sept. 1995: 432-444
    [5] Jong Soo Park, Ming-Syan Chen, Philip S. Yu. An Effcctive Hash Based Algorithm for Mining Association Rules[C]. Proceedings of ACM SIGMOD International Conference on Management of Data. Michael J. Carey and Donovan A. Schneider eds. San Jose, California, 1995: 175-186
    [6] Jianwei Han, Jian Pei. Mining Frequent Patterns by Pattern-Growth: Methodology and Implications [J]. ACM SIGKDD Explorations Newsletter, 2000. 2(2): 14-20
    [7] 单莘.基于知识发现的告警相关性分析关键问题研究[博士论文]北京邮电大学 2006.5
    [8] Mannila H, Toivonen H, Verkamo A I. Discovery of Frequent Episodes in Event Sequences [J]. Data Mining and Knowledge Discovery, 1997(1): P259-289
    [9] 刘康平,李增智.网络告警序列中的频繁情景规则挖掘算法[J].小型微型计算机系统,2003,24(5):891-894
    [10] Jiawei Han,Micheline Kamber著,范明,孟小峰等译.数据挖掘概念与技术[M],北京:机械工业出版社,2001
    [11] Cheung D. W. et al.. Maintenance of Discovered Association Rules in Large Databases: An Incremental Updating Technique[C]. In: Proceedings of the 1996 International Conference on Data Engineering, New Orleans, Louisiana, 1996: 106-114
    [12] Cheung D. W. et al.. A General Incremental Technique for Updating Discovered Association Rules[C]. In: Proceedings of the 1997 International Conference on Databases Systems for Advanced Application. Melbourne, 1997: 185-194
    [13] 冯玉才,冯剑琳.关联规则的增量式更新算法[J].软件学报,1998.9(4):301-306
    [14] 宋余庆,朱玉全,孙志挥,陈耿.基于FP-Tree的最大频繁项目集挖掘及更新算法[J].软件学报,2003,14(9):1586-1592
    [15] 宋余庆,朱玉全,孙志挥,杨鹤标.一种基于频繁模式树的约束最大频繁项目集挖掘及其更新算法[J].计算机研究与发展,2005,42(5):777-783
    [16] 吉根林,杨明,宋余庆,孙志挥.最大频繁项目集的快速更新[J].计算机学报,2005,28(1):128-135
    [1] Agrawal R, T.Imielinski, and A. Swami. Mining Association Rules between Sets of Items in Large Databases[C]. Proceedings of the 1993 ACM SIGMOD conference, Washington, D. C., Mav 1993: 207-216
    [2] K. Hatonen, M. Klemettinen, H. Mannila, P. Ronkainen. Knowledge discovery from telecommunication network alarm databases [C]. Proceesing of the 12th International Conference on Data Engineer, (ICDE'96) New Orleans, Louisiana, Feb. 1996: 115-122
    [3] K. Hatonen, M. Klemettinen, H. Mannila, Portland, Oregon. TASA: Telecommunications Alarm Sequence Analyzer or How to enjoy faults in your network [A]. IEEE/IFIP 1996 Network Operations and Management symposium(NOMS'96)[C]., Kyoto, Japan, April 1996: 520-529
    [4] Han J., Pei J., Yin Y.. Mining Frequent Patterns without Candidate Generation [C]. In: Proceedings of the 2000 ACM SIGMOD conference On Management of Data, Dallas, TX, 2000: 1-12
    [5] 吴安阳,赵卫东.基于多最小支持度的空间关联规则发现[J].计算机应用,2005,25(9):2171-2174
    [6] 易彤,徐宝文,吴方君.一种基于FP树的挖掘关联规则的增量更新算法[J].计算机学报,2004,27(5):703-710
    [7] 贺志,黄厚宽,田盛丰.一种优化规则的发现方法[J].计算机学报,2006,29(6):906-913
    [8] Edith Cohen, Mayur Datar, Shiniji Fujiwara, et al. Finding Interesting Associations without Support Pruning [J]. IEEE Transactions on Knowledge and Data Engineering, 2001, 13(1): 64-78
    [9] Hui Xiong, Pang-Ning Tan, Vipin Kumar. Mining Strong Affinity Association Patterns in Data Sets with Skewed Support Distribution[C]. In: Proceedings of the 3rd IEEE International Conference on Data Mining, Melbourne, Florida, 2003: 46-48
    [10] Gary M. Weiss and Haym Hirsh. Learning to Predict Rare Events in Categorical Time-Series Data[C]. Papers from the AAAI Workshop on Predicting the Future: AI Approaches to Time-Series Problems, Technical Report WS-98-07, 1998 AAAI Press, Menlo Park, CA: 83-90
    [11] Gary M. Weiss and Haym Hirsh. Learning to Predict Rare Events in Event Sequences[C]. Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), AAAI Press, Menlo Park, CA: 359-363
    [12] Gary M. Weiss, John Eddy, and Sholom Weiss. Intelligent Telecommunication Technologies, Knowledge-based Intelligent Techniques [M]. L. C. Jain, editor, 1998 CRC Press: 249-275
    [13] Gary M. Weiss and Haym Hirsh. Learning to Predict Extremely Rare Events[C]. Papers from the AAAI Workshop on Learning from Imbalanced Data Sets, Technical Report WS-00-05, 2000 AAAI Press, Menlo Park, CA: 64-68
    [14] Gary M. Weiss Predicting Telecommunication Equipment Failures from Sequences of Network Alarms[C]. In W. Kloesgen and J. Zytkow (eds.), Handbook of Knowledge Discovery and Data Mining, 2002 Oxford University Press: 891-896
    [15] Vilalta Ricardo, Ma Sheng, and Hellerstein Joseph. Rule Induction of Computer Events[C]. Proceedings of the 12th IFIP/IEEE DSOM'2001 Nancy France, October, 2001: 225-235
    [16]Antunes C, Oliveira A L. Inference of Sequential Association Rules Guided by Context Free Grammars[C]. Proc Int'Conf on Grammatical Inference. Amsterdam, Dec, 2002: 1-13
    [17]Antunes C, Oliveira A L. Sequential Pattern Mining with Approximated Constraints [A]. IADIS International Conference on Applied Computing[C]. Lisboa Portugal, 2003: 131-138.
    [18] Cheung D. W. et al. Maintenance of Discovered Association Rules in Large Databases: An Incremental Updating Technique[C]. In: Proceedings of the 1996 International Conference on Data Engineering, New Orleans, Louisiana, 1996: 106-114
    [19] Cheung D. W. et al. A General Incremental Technique for Updating DiscoveredAssociation Rules[C]. In: Proceedings of the 1997 International Conference on Databases Systems for Advanced Application. Melbourne, 1997: 185-194
    [20] 冯玉才,冯剑琳.关联规则的增量式更新算法[J].软件学报,1998.9(4):301-306
    [21] Richard A.Johnson Dean W.Wichern著陆璇,葛余博,赵衡秀,叶俊译.实用多元统计分析[M].清华大学出版社,2001
    [1] Agrawal R, T. Imielinski, and A. Swami. Mining Association Rules between Sets of Items in Large Databases [C]. Proceedings of the 1993 ACM SIGMOD conference, Washington, D.C., May 1993: 207-216
    [2] Hatonen K, Klemettinen M, Manila H, et al. Knowledge Discovery from Telecommunication Network Alarm Databases [C]. Twelfth International conference on Data Engineering, New Orlean, Louisiana, 1996: 115~122
    [3] Omiecinski E. R. Alternative interest measures for mining associations in databases [J]. IEEE Transactions on Knowledge and Data Engineering, 2003, 15(1): 57-69
    [4] Vilalta Ricardo, Ma Sheng, and Hellerstein Joseph. Rule Induction of Computer Events[C]. Proceedings of the 12th IFIP/IEEE DSOM'2001 Nancy France, October, 2001: 225-235
    [5] 宋余庆,朱玉全,孙志挥,杨鹤标.一种基于频繁模式树的约束最大频繁项目集挖掘及其更新算法[J].计算机研究与发展,2005,42(5):777-783
    [6] 韩筱卿,王建锋,钟玮等.计算机病毒分析与防范大全[M].北京:电子工业出版社,2006:85-92
    [7] T. F. Cox and M. A. A. Cox, Multidimensional Scaling [M]. Number 88 in Monographs on Statistics and Applied Probability. Chapman&Hall/CRC, 2nd edition, 2001
    [8] Tenenbaum J. B, de Silva V, Langford JC. A Global Geometric Framework for Nonlinear Dimensionalty Reduction [J]. Science, 2000, 290(12): 2319~2323
    [9] M. Balasubramanian, E. L. Schwartz. The lsomap Algorithm and Topological Stability [J]. Science, 2002, 295[5552]: 7
    [10] Richard A.Johnson Dean W.Wichern著,陆璇,葛余博,赵衡秀,叶俊译.实用多元统计分析[M].清华大学出版社 2001
    [11] 方开泰.实用多元统计分析[M].华东师范大学出版社,1989 359-374
    [12] 赵连伟.高维数据流形的低维嵌入及嵌入维数研究[J].软件学报2006,16(8):1423-1430
    [13] 罗四维,赵连伟 基于谱图理论的流行学习算法[J].计算机研究与发展,2006,43(7):1173-1179
    [14] 赵连伟.高维数据的低维流形结构研究[博士论文].北京交通大学2006
    [15] Wan, Q. and An, A. An Efficient Approach to Mining Indirect Associations [J]. Journal of Intelligent Information Systems, Kluwer Academic Publishers, 2006. 27(2): 135-158
    [16] Verbeek J, Vlassis N, Krose B. Procrustes analysis to coordinate mixtures of probabilistic principal component analyzers[R]. Technical report, Computer Science Institute, University of Amsterdam, The Netherlands, IASUVA-02-01, 2002

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700