Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes.
Dominik ZieglerBernd PrünsterAlexander MarsalekChristian KollmannPublished in: ICETE (2) (2018)
Keyphrases
- mobile computing devices
- wearable devices
- portable devices
- mobile devices
- hand held devices
- data mining
- knowledge discovery
- mobile phone
- mobile networks
- mining algorithm
- pattern mining
- sequential patterns
- remote server
- m learning
- mobile applications
- process model
- itemsets
- mobile learning
- mobile environments
- mobile terminals
- desktop computers
- text mining
- web mining
- frequent itemsets
- security policies
- data mining techniques
- wireless sensor networks
- e learning
- social networks