Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2001
DOI: 10.1145/502512.502533
|View full text |Cite
|
Sign up to set email alerts
|

Molecular feature mining in HIV data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
156
0

Year Published

2004
2004
2017
2017

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 171 publications
(156 citation statements)
references
References 20 publications
0
156
0
Order By: Relevance
“…Given the wide range of graph mining applications (e.g. detecting anomalies in network [12], Internet links analysis [13,14], graph query indexing [8,12,13,14], and medicine [15,16]), great deal of research works have been done on graphs. An interesting matter as to graph mining is graph containment problem.…”
Section: Introductionmentioning
confidence: 99%
“…Given the wide range of graph mining applications (e.g. detecting anomalies in network [12], Internet links analysis [13,14], graph query indexing [8,12,13,14], and medicine [15,16]), great deal of research works have been done on graphs. An interesting matter as to graph mining is graph containment problem.…”
Section: Introductionmentioning
confidence: 99%
“…However, the vast majority transfers techniques developed originally for frequent item set mining. 1 Examples include MolFea [10], FSG [11], MoSS/MoFa [1], gSpan [14], CloseGraph [15], FFSM [8], and Gaston [12]. A related approach is used in Subdue [4].…”
Section: Introductionmentioning
confidence: 99%
“…Such graphs arise naturally in a number of different application domains including network intrusion [33,28], semantic web [3], behavioral modeling [43,36], VLSI reverse engineering [46], link analysis [24,27,26,38], chemical compound classification [8,29,14,9], and macromolecule analysis [39]. Moreover, they can be used to effectively model the structural and relational characteristics of a variety of datasets arising in other areas such as physical sciences (e.g., chemistry, fluid dynamics, astronomy, structural mechanics, and ecosystem modeling), life sciences (e.g., genomics, proteomics, pharmacogenomics, and health informatics), and home-land defense (e.g., information assurance, network intrusion, infrastructure protection, and terrorist-threat prediction/identification).…”
Section: Introductionmentioning
confidence: 99%