暂无分享,去创建一个
[1] Thomas W. Reps,et al. Identifying modules via concept analysis , 1997, 1997 Proceedings International Conference on Software Maintenance.
[2] Marianne Huchard,et al. ARES, Adding a class and REStructuring Inheritance Hierarchy , 1995, BDA.
[3] Gunter Saake,et al. Merging inheritance hierarchies for database integration , 1998, Proceedings. 3rd IFCIS International Conference on Cooperative Information Systems (Cat. No.98EX122).
[4] Ingo Schmitt,et al. Restructuring Object-Oriented Database Schemata by Concept Analysis , 1998, FMLDO.
[5] Shyam Varan Nath,et al. Crime Pattern Detection Using Data Mining , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.
[6] Damminda Alahakoon,et al. Mining Multi-modal Crime Patterns at Different Levels of Granularity Using Hierarchical Clustering , 2008, 2008 International Conference on Computational Intelligence for Modelling Control & Automation.
[7] Ickjai Lee,et al. Mining top-k and bottom-k correlative crime patterns through graph representations , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.
[8] Joseph Gil,et al. Revealing class structure with concept lattices , 2003, 10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings..
[9] Arie van Deursen,et al. Identifying objects using cluster and concept analysis , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[10] Yifei Sun,et al. Spatial monitoring of geographic patterns: an application to crime analysis , 2001 .
[11] Houari A. Sahraoui,et al. A Concept Formation Based Approach to Object Identification in Procedural Code , 1999, Automated Software Engineering.