期刊文献+

数值型关联规则挖掘在客户关系管理中的应用

Application of Quantitative Association Rules in the Customer Relationship Management
在线阅读 下载PDF
导出
摘要 关联规则挖掘方法是数据挖掘领域的一个研究热点。主要探讨了数值型关联规则挖掘方法,介绍了数值型关联规则挖掘在客户关系管理中的应用。 Mining association rules in transaction databases has been studied popularly in data mining research. This paper discussed quantitative association rules, and described the application of quanti tative association rules in the customer relationship management.
作者 严仍荣
出处 《皖西学院学报》 2007年第5期29-31,共3页 Journal of West Anhui University
关键词 关联规则 客户关系管理 数据挖掘 association rules customer relationship management data mining
  • 相关文献

参考文献6

  • 1R Agrawal, T Imielinski, A Swami. Mining association rules between sets of items in large databases [ C ]. Proceedings of the ACM SIGMOD Conference on Management of Data. Washington D. C ,1993:207 -216.
  • 2Srikant R, Agrawal R. Mining quantitative association rules in large relation table [ C ]. Proceeding of the ACMSIGMOD Internatinal Conference on Management of Data, Montreal, Canada, 1996.
  • 3苑森淼,程晓青.数量关联规则发现中的聚类方法研究[J].计算机学报,2000,23(8):866-871. 被引量:26
  • 4Jiawei Han,Mieheline Kamber.数据挖掘概念与技术[M],北京:机械工业出版社,2006.
  • 5于枫,王敏,高翔.数值型关联规则挖掘在网络入侵检测系统中的应用研究[J].计算机应用与软件,2006,23(11):52-53. 被引量:3
  • 6[美]贝里·利诺夫.数据挖掘:客户关系管理的科学与技术[M].袁卫,等,译.北京:中国财政经济出版社,2004.

二级参考文献6

  • 11,Srikant R, Agrawal R. Mining quantitative association rules in large relational table. In: Proceedings of the ACMSIGMOD Conference on Management of Data, Montreal, Canada, 1996. 1-12
  • 22,Fukuda T, Morimoto Y, Morishita S et al. Mining optimized association rules for numeric attributes. In: Proceedings of the Fifteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Montreal, Canada, 1996. 182-191
  • 33,Fukuda T, Morimoto Y, Morishita S et al. Data mining using two-dimensional optimized association rules: Scheme, algorithms and visualization. In: Proceedings of the ACMSIGMOD International Conference on Management of Data, Montreal, Canada, 1996. 13-24
  • 4张汛来 张明杰.数据挖掘技术的几种实现方法[J].计算机科学,1998,10.
  • 5Lee W. A Data Mining Framework for Constructing Features and models for Intrusion Detection System Columbia University. 1999 [EB/OL],http://www. cs. columbia.edu/-wenke/.
  • 6Lee W. Data mining Approaches for Intrusion Detection, In: Proceedings of the 7th USENIX Security Symposium, San Antonio, 1998 [EB/OL], http://www. cs. columbia. edu/-wenke/.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部