skip to main content
Skip header Section
Computer systems that learn: classification and prediction methods from statistics, neural nets, machine learning, and expert systemsJanuary 1991
Publisher:
  • Morgan Kaufmann Publishers Inc.
  • 340 Pine Street, Sixth Floor
  • San Francisco
  • CA
  • United States
ISBN:978-1-55860-065-2
Published:01 January 1991
Pages:
223
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Qiu Z, Zhou Z, Niblett B, Johnston A, Schwartzentruber J, Zincir‐Heywood N and Heywood M (2024). Assessing the impact of bag‐of‐words versus word‐to‐vector embedding methods and dimension reduction on anomaly detection from log files, International Journal of Network Management, 34:1, Online publication date: 11-Jan-2024.
  2. Peng L, Zhang H, Hassan H, Chen Y and Yang B (2019). Accelerating data gravitation-based classification using GPU, The Journal of Supercomputing, 75:6, (2930-2949), Online publication date: 1-Jun-2019.
  3. Al-Hussaeni K, Fung B, Iqbal F, Liu J and Hung P (2018). Differentially private multidimensional data publishing, Knowledge and Information Systems, 56:3, (717-752), Online publication date: 1-Sep-2018.
  4. Shunin T, Zubkova N and Shershakov S Neural Approach to the Discovery Problem in Process Mining Analysis of Images, Social Networks and Texts, (261-273)
  5. Porebski S and Straszecka E (2018). Extracting easily interpreted diagnostic rules, Information Sciences: an International Journal, 426:C, (19-37), Online publication date: 1-Feb-2018.
  6. Chiu M and Ko L (2017). Develop a personalized intelligent music selection system based on heart rate variability and machine learning, Multimedia Tools and Applications, 76:14, (15607-15639), Online publication date: 1-Jul-2017.
  7. Daz-Bez J, Lopez M, Ochoa C and Prez-Lantero P (2017). Computing the coarseness with strips or boxes, Discrete Applied Mathematics, 224:C, (80-90), Online publication date: 19-Jun-2017.
  8. Peersman C, Schulze C, Rashid A, Brennan M and Fischer C (2016). iCOP, Digital Investigation: The International Journal of Digital Forensics & Incident Response, 18:C, (50-64), Online publication date: 1-Sep-2016.
  9. Darnstädt M, Ries C and Simon H Hierarchical Design of Fast Minimum Disagreement Algorithms Proceedings of the 26th International Conference on Algorithmic Learning Theory - Volume 9355, (134-148)
  10. Akkaş E, Akin L, Evren Çubukçu H and Artuner H (2015). Application of Decision Tree Algorithm for classification and identification of natural minerals using SEM-EDS, Computers & Geosciences, 80:C, (38-48), Online publication date: 1-Jul-2015.
  11. Bae J and Kim J (2015). A personal credit rating prediction model using data mining in smart ubiquitous environments, International Journal of Distributed Sensor Networks, 2015, (2-2), Online publication date: 1-Jan-2015.
  12. Peteiro-Barral D, Guijarro-BerdiñAs B, PéRez-SáNchez B and Fontenla-Romero O (2013). A comparative study of the scalability of a sensitivity-based learning algorithm for artificial neural networks, Expert Systems with Applications: An International Journal, 40:10, (3900-3905), Online publication date: 1-Aug-2013.
  13. ACM
    Cohn T and Lapata M (2013). An abstractive approach to sentence compression, ACM Transactions on Intelligent Systems and Technology, 4:3, (1-35), Online publication date: 1-Jun-2013.
  14. Peteiro-Barral D, BolóN-Canedo V, Alonso-Betanzos A, Guijarro-BerdiñAs B and SáNchez-MaroñO N (2013). Toward the scalability of neural networks through feature selection, Expert Systems with Applications: An International Journal, 40:8, (2807-2816), Online publication date: 1-Jun-2013.
  15. Ansari A, Biswas R and Aggarwal S (2013). Neutrosophic classifier, Applied Soft Computing, 13:1, (563-573), Online publication date: 1-Jan-2013.
  16. Benkhider S, Dahmri O and Drias H A memetic approach for the knowledge extraction Proceedings of the 19th international conference on Neural Information Processing - Volume Part I, (135-141)
  17. Bae J (2012). Predicting financial distress of the South Korean manufacturing industries, Expert Systems with Applications: An International Journal, 39:10, (9159-9165), Online publication date: 1-Aug-2012.
  18. Guijarro-Berdiñas B, Hernández-Pereira E and Peteiro-Barral D (2012). A mixture of experts for classifying sleep apneas, Expert Systems with Applications: An International Journal, 39:8, (7084-7092), Online publication date: 1-Jun-2012.
  19. Eckstein J and Goldberg N (2012). An Improved Branch-and-Bound Method for Maximum Monomial Agreement, INFORMS Journal on Computing, 24:2, (328-341), Online publication date: 1-Apr-2012.
  20. Pacheco J, Alfaro E, Casado S, Gámez M and García N (2012). A GRASP method for building classification trees, Expert Systems with Applications: An International Journal, 39:3, (3241-3248), Online publication date: 1-Feb-2012.
  21. Al-Obeidat F, Belacel N, Carretero J and Mahanti P (2011). An evolutionary framework using particle swarm optimization for classification method PROAFTN, Applied Soft Computing, 11:8, (4971-4980), Online publication date: 1-Dec-2011.
  22. Lin S and Chen S (2011). Parameter tuning, feature selection and weight assignment of features for case-based reasoning by artificial immune system, Applied Soft Computing, 11:8, (5042-5052), Online publication date: 1-Dec-2011.
  23. Peteiro-Barral D, Guijarro-Berdiñas B and Pérez-Sánchez B On the effectiveness of distributed learning on different class-probability distributions of data Proceedings of the 14th international conference on Advances in artificial intelligence: spanish association for artificial intelligence, (114-123)
  24. Bolón-Canedo V, Peteiro-Barral D, Alonso-Betanzos A, Guijarro-Berdiñas B and Sánchez-Maroño N Scalability analysis of ANN training algorithms with feature selection Proceedings of the 14th international conference on Advances in artificial intelligence: spanish association for artificial intelligence, (84-93)
  25. ACM
    Fujii Y, Yoshimura T and Ito T Filtering harmful sentences based on three-word co-occurrence Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, (64-72)
  26. Meurers D, Ziai R, Ott N and Kopp J Evaluating answers to reading comprehension questions in context Proceedings of the TextInfer 2011 Workshop on Textual Entailment, (1-9)
  27. Knauss E, Houmb S, Schneider K, Islam S and Jürjens J Supporting requirements engineers in recognising security issues Proceedings of the 17th international working conference on Requirements engineering: foundation for software quality, (4-18)
  28. Czarnowski I Distributed learning with data reduction Transactions on computational collective intelligence IV, (3-121)
  29. Guo N and Li T (2011). Construction of a neuron-fuzzy classification model based on feature-extraction approach, Expert Systems with Applications: An International Journal, 38:1, (682-691), Online publication date: 1-Jan-2011.
  30. He Q, Zhuang F, Li J and Shi Z Parallel implementation of classification algorithms based on MapReduce Proceedings of the 5th international conference on Rough set and knowledge technology, (655-662)
  31. Hu Y (2010). Analytic network process for pattern classification problems using genetic algorithms, Information Sciences: an International Journal, 180:13, (2528-2539), Online publication date: 1-Jul-2010.
  32. Feng Y and Lapata M Visual information in semantic representation Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, (91-99)
  33. ACM
    Maranzato R, Pereira A, Neubert M and do Lago A (2010). Fraud detection in reputation systems in e-markets using logistic regression and stepwise optimization, ACM SIGAPP Applied Computing Review, 11:1, (14-26), Online publication date: 1-Jun-2010.
  34. Hu Y (2010). Pattern classification by multi-layer perceptron using fuzzy integral-based activation function, Applied Soft Computing, 10:3, (813-819), Online publication date: 1-Jun-2010.
  35. ACM
    Maranzato R, Pereira A, do Lago A and Neubert M Fraud detection in reputation systems in e-markets using logistic regression Proceedings of the 2010 ACM Symposium on Applied Computing, (1454-1455)
  36. Bae J and Kim J (2010). Integration of heterogeneous models to predict consumer behavior, Expert Systems with Applications: An International Journal, 37:3, (1821-1826), Online publication date: 1-Mar-2010.
  37. Kim J, Won C and Bae J (2010). A knowledge integration model for the prediction of corporate dividends, Expert Systems with Applications: An International Journal, 37:2, (1344-1350), Online publication date: 1-Mar-2010.
  38. Haraguchi K, Hong S and Nagamochi H Multiclass visual classifier based on bipartite graph representation of decision tables Proceedings of the 4th international conference on Learning and intelligent optimization, (169-183)
  39. Jiuliang Z, Weiwei L, Feng Y, Jun L, Yao Z and Yunhui Y Research on surface quality evaluation system of steel strip based on computer vision Proceedings of the 3rd international conference on Intelligent information technology application, (32-35)
  40. Haraguchi K, Hong S and Nagamochi H Bipartite graph representation of multiple decision table classifiers Proceedings of the 5th international conference on Stochastic algorithms: foundations and applications, (46-60)
  41. ACM
    Anagnostopoulos T, Anagnostopoulos C, Hadjiefthymiades S, Kyriakakos M and Kalousis A Predicting the location of mobile users Proceedings of the 2009 international conference on Pervasive services, (65-72)
  42. Morita K, Atlam E, Fuketa M, Iwabu Y and Aoe J (2009). An automatic extraction method of word tendency judgement for specific subjects, International Journal of Computer Applications in Technology, 35:2/3/4, (281-295), Online publication date: 1-Jun-2009.
  43. Chatzis S and Varvarigou T (2009). Factor analysis latent subspace modeling and robust fuzzy clustering using t-distributions, IEEE Transactions on Fuzzy Systems, 17:3, (505-517), Online publication date: 1-Jun-2009.
  44. Zhao H, Sinha A and Ge W (2009). Effects of feature construction on classification performance, Expert Systems with Applications: An International Journal, 36:2, (2633-2644), Online publication date: 1-Mar-2009.
  45. Hu Y and Tsai J (2009). Evaluating classification performances of single-layer perceptron with a Choquet fuzzy integral-based neuron, Expert Systems with Applications: An International Journal, 36:2, (1793-1800), Online publication date: 1-Mar-2009.
  46. Delen D, Fuller C, McCann C and Ray D (2009). Analysis of healthcare coverage, Expert Systems with Applications: An International Journal, 36:2, (995-1003), Online publication date: 1-Mar-2009.
  47. Fuller C, Biros D and Wilson R (2009). Decision support for determining veracity via linguistic-based cues, Decision Support Systems, 46:3, (695-703), Online publication date: 1-Feb-2009.
  48. Hu Y (2008). Nonadditive grey single-layer perceptron with Choquet integral for pattern classification problems using genetic algorithms, Neurocomputing, 72:1-3, (331-340), Online publication date: 1-Dec-2008.
  49. Huang J, Ling C, Zhang H and Matwin S Proper model selection with significance test Proceedings of the 2008th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I, (536-547)
  50. Zhao H and Ram S (2008). Entity matching across heterogeneous data sources, Data & Knowledge Engineering, 66:3, (368-381), Online publication date: 1-Sep-2008.
  51. Zhao H (2008). Instance weighting versus threshold adjusting for cost-sensitive classification, Knowledge and Information Systems, 15:3, (321-334), Online publication date: 1-Jun-2008.
  52. Srinivasa K, Venugopal K and Patnaik L (2008). A soft computing approach for data mining based query processing using rough sets and genetic algorithms, International Journal of Hybrid Intelligent Systems, 5:1, (1-17), Online publication date: 1-Jan-2008.
  53. Arevian G and Panchev C Robust text classification using a hysteresis-driven extended SRN Proceedings of the 17th international conference on Artificial neural networks, (425-434)
  54. Han S and Ng W Privacy-preserving genetic algorithms for rule discovery Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery, (407-417)
  55. Aggarwal C (2007). Toward Exploratory Test-Instance-Centered Diagnosis in High-Dimensional Classification, IEEE Transactions on Knowledge and Data Engineering, 19:8, (1001-1015), Online publication date: 1-Aug-2007.
  56. Haraguchi K and Nagamochi H Extension of ICF classifiers to real world data sets Proceedings of the 20th international conference on Industrial, engineering, and other applications of applied intelligent systems, (776-785)
  57. Zhang X, Tian F and Huang H An Algorithm for Generating Classification Rules Based on Extended Function Dependency Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007, (645-652)
  58. Fung B, Wang K and Yu P (2007). Anonymizing Classification Data for Privacy Preservation, IEEE Transactions on Knowledge and Data Engineering, 19:5, (711-725), Online publication date: 1-May-2007.
  59. Zhao H (2007). A multi-objective genetic programming approach to developing Pareto optimal decision trees, Decision Support Systems, 43:3, (809-826), Online publication date: 1-Apr-2007.
  60. Pervouchine V and Leedham G (2007). Extraction and analysis of forensic document examiner features used for writer identification, Pattern Recognition, 40:3, (1004-1013), Online publication date: 1-Mar-2007.
  61. Lee K, Yoon W and Baek D (2006). A classification method using a hybrid genetic algorithm combined with an adaptive procedure for the pool of ellipsoids, Applied Intelligence, 25:3, (293-304), Online publication date: 1-Dec-2006.
  62. Chen G, Liu H, Yu L, Wei Q and Zhang X (2006). A new approach to classification based on association rule mining, Decision Support Systems, 42:2, (674-689), Online publication date: 1-Nov-2006.
  63. Bi Y, Mcclean S and Anderson T (2006). Combining rough decisions for intelligent text mining using Dempster's rule, Artificial Intelligence Review, 26:3, (191-209), Online publication date: 1-Nov-2006.
  64. Clarke J and Lapata M Models for sentence compression Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics, (377-384)
  65. De Falco I, Della Cioppa A and Tarantino E Automatic classification of handsegmented image parts with differential evolution Proceedings of the 2006 international conference on Applications of Evolutionary Computing, (403-414)
  66. Pervouchine V and Leedham G Extraction and analysis of document examiner features from vector skeletons of grapheme ‘th' Proceedings of the 7th international conference on Document Analysis Systems, (196-207)
  67. Hammami M, Chahir Y and Chen L (2006). WebGuard, IEEE Transactions on Knowledge and Data Engineering, 18:2, (272-284), Online publication date: 1-Feb-2006.
  68. Turini F, Baglioni M, Furletti B and Rinzivillo S Examples of integration of induction and deduction in knowledge discovery Reasoning, Action and Interaction in AI Theories and Systems, (307-326)
  69. Kumar N, Rao M, Krishna P and Bapi R Using sub-sequence information with kNN for classification of sequential data Proceedings of the Second international conference on Distributed Computing and Internet Technology, (536-546)
  70. Chen W, Tseng S and Wang C (2005). A novel manufacturing defect detection method using association rule mining techniques, Expert Systems with Applications: An International Journal, 29:4, (807-815), Online publication date: 1-Nov-2005.
  71. Ayara M, Timmis J, de Lemos R and Forrest S Immunising automated teller machines Proceedings of the 4th international conference on Artificial Immune Systems, (404-417)
  72. Lapata M and Barzilay R Automatic evaluation of text coherence Proceedings of the 19th international joint conference on Artificial intelligence, (1085-1090)
  73. Jiang W, Xu Y and Xu Y A novel data mining method based on ant colony algorithm Proceedings of the First international conference on Advanced Data Mining and Applications, (284-291)
  74. Jordan P and Walker M (2005). Learning content selection rules for generating object descriptions in dialogue, Journal of Artificial Intelligence Research, 24:1, (157-194), Online publication date: 1-Jul-2005.
  75. Barzilay R and Lapata M Modeling local coherence Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics, (141-148)
  76. Guan S and Zhu F (2005). A class decomposition approach for GA-based classifiers, Engineering Applications of Artificial Intelligence, 18:3, (271-278), Online publication date: 1-Apr-2005.
  77. Raggad B Intrusion detection and response system generator Proceedings of the 4th WSEAS international conference on Applications of electrical engineering, (210-216)
  78. Huang Z, Chen H, Hsu C, Chen W and Wu S (2004). Credit rating analysis with support vector machines and neural networks, Decision Support Systems, 37:4, (543-558), Online publication date: 1-Sep-2004.
  79. ACM
    Antonie M and Zaïane O An associative classifier based on positive and negative rules Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, (64-69)
  80. Maddouri M and Elloumi M (2004). Encoding of primary structures of biological macromolecules within a data mining perspective, Journal of Computer Science and Technology, 19:1, (78-88), Online publication date: 1-Jan-2004.
  81. Conruyt N and Grosser D (2003). Knowledge engineering in environmental sciences with IKBS, AI Communications, 16:4, (267-278), Online publication date: 1-Dec-2003.
  82. Lin C and Chen M VIPAS Proceedings of the 29th international conference on Very large data bases - Volume 29, (381-392)
  83. Han J, Ryu K, Chi K and Yeon Y Statistics based predictive geo-spatial data mining Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications, (370-381)
  84. Brockmann C and Lapata M Evaluating and combining approaches to selectional preference acquisition Proceedings of the tenth conference on European chapter of the Association for Computational Linguistics - Volume 1, (27-34)
  85. Yip A A hybrid case-based reasoning approach to business failure prediction Design and application of hybrid intelligent systems, (371-378)
  86. Rumantir G A hybrid statistical and feedforward network model for time-series forecasting with a limited amount of real data Design and application of hybrid intelligent systems, (32-41)
  87. Berthold M and Hand D References Intelligent data analysis, (475-500)
  88. Freitas A A survey of evolutionary algorithms for data mining and knowledge discovery Advances in evolutionary computing, (819-845)
  89. Koprinska I and Carrato S (2002). Hybrid Rule-Based/Neural Approach for Segmentation of MPEG Compressed Video, Multimedia Tools and Applications, 18:3, (187-212), Online publication date: 1-Dec-2002.
  90. Bylander T (2002). Estimating Generalization Error on Two-Class Datasets Using Out-of-Bag Estimates, Machine Language, 48:1-3, (287-297), Online publication date: 30-Sep-2002.
  91. Słowiński K, Stefanowski J and Siwiński D (2002). Application of Rule Induction and Rough Sets to Verification of Magnetic Resonance Diagnosis, Fundamenta Informaticae, 53:3-4, (345-363), Online publication date: 1-Aug-2002.
  92. van den Bosch A and Buchholz S Shallow parsing on the basis of words only Proceedings of the 40th Annual Meeting on Association for Computational Linguistics, (433-440)
  93. Słowiński K, Stefanowski J and Siwiński D (2002). Application of rule induction and rough sets to verification of magnetic resonance diagnosis, Fundamenta Informaticae, 53:3,4, (345-363), Online publication date: 30-May-2002.
  94. Tay F and Shen L (2002). A Modified Chi2 Algorithm for Discretization, IEEE Transactions on Knowledge and Data Engineering, 14:3, (666-670), Online publication date: 1-May-2002.
  95. Litman D and Pan S (2002). Designing and Evaluating an Adaptive Spoken Dialogue System, User Modeling and User-Adapted Interaction, 12:2-3, (111-137), Online publication date: 19-Mar-2002.
  96. ACM
    Ding Q, Ding Q and Perrizo W Decision tree classification of spatial data streams using Peano Count Trees Proceedings of the 2002 ACM symposium on Applied computing, (413-417)
  97. Sang E (2002). Memory-based shallow parsing, The Journal of Machine Learning Research, 2, (559-594), Online publication date: 1-Mar-2002.
  98. Guijarro-Berdiñas B, Alonso-Betanzos A and Fontenla-Romero O (2002). Intelligent analysis and pattern recognition in cardiotocographic signals using a tightly coupled hybrid system, Artificial Intelligence, 136:1, (1-27), Online publication date: 15-Feb-2002.
  99. Ganti V and Ramakrishnan R Mining and monitoring evolving data Handbook of massive data sets, (593-642)
  100. Evans R and Fisher D Industry Handbook of data mining and knowledge discovery, (874-881)
  101. Feldman R Text mining Handbook of data mining and knowledge discovery, (749-757)
  102. Jensen D Knowledge evaluation Handbook of data mining and knowledge discovery, (475-489)
  103. Walker M, Langkilde-Geary I, Hastie H, Wright J and Gorin A (2002). Automatically training a problematic dialogue predictor for a spoken dialogue system, Journal of Artificial Intelligence Research, 16:1, (293-319), Online publication date: 1-Jan-2002.
  104. Sayyad J and Lethbridge C Supporting Software Maintenance by Mining Software Update Records Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01)
  105. El Emam K and Laitenberger O (2001). Evaluating Capture-Recapture Models with Two Inspectors, IEEE Transactions on Software Engineering, 27:9, (851-864), Online publication date: 1-Sep-2001.
  106. El-Emam K, Goldenson D, McCurley J and Herbsleb J (2001). Modelling the Likelihood of Software Process Improvement, Empirical Software Engineering, 6:3, (207-229), Online publication date: 1-Sep-2001.
  107. Lapata M, Keller F and McDonald S Evaluating smoothing algorithms against plausibility judgements Proceedings of the 39th Annual Meeting on Association for Computational Linguistics, (354-361)
  108. Lapata M A corpus-based account of regular polysemy Proceedings of the second meeting of the North American Chapter of the Association for Computational Linguistics on Language technologies, (1-8)
  109. Mookerjee V (2001). Debiasing Training Data for Inductive Expert System Construction, IEEE Transactions on Knowledge and Data Engineering, 13:3, (497-512), Online publication date: 1-May-2001.
  110. Comas J, Dzeroski S, Gibert K, R.-Roda I and Sànchez‐Marrè M (2001). Knowledge discovery by means of inductive methods in wastewater treatment plant data, AI Communications, 14:1, (45-62), Online publication date: 1-Jan-2001.
  111. Singh S (2000). Updating a priori information in fuzzy pattern recognition to improve classification performance, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 9:3,4, (235-250), Online publication date: 1-Dec-2000.
  112. Shirabad J, Lethbridge T and Matwin S Supporting maintenance of legacy software with data mining techniques Proceedings of the 2000 conference of the Centre for Advanced Studies on Collaborative research
  113. Tjong Kim Sang E Text chunking by system combination Proceedings of the 2nd workshop on Learning language in logic and the 4th conference on Computational natural language learning - Volume 7, (151-153)
  114. van den Bosch A Using induced rules as complex features in memory-based language learning Proceedings of the 2nd workshop on Learning language in logic and the 4th conference on Computational natural language learning - Volume 7, (73-78)
  115. Lu H and Liu H Decision Tables Proceedings of the 26th International Conference on Very Large Data Bases, (373-384)
  116. ACM
    Iyengar V, Apte C and Zhang T Active learning using adaptive resampling Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, (91-98)
  117. Gehrke J, Ramakrishnan R and Ganti V (2000). RainForest—A Framework for Fast Decision Tree Construction of Large Datasets, Data Mining and Knowledge Discovery, 4:2-3, (127-162), Online publication date: 1-Jul-2000.
  118. Galindo J and Tamayo P (2000). Credit Risk Assessment Using Statistical and MachineLearning, Computational Economics, 15:1-2, (107-143), Online publication date: 1-Apr-2000.
  119. Jensen D and Cohen P (2000). Multiple Comparisons in Induction Algorithms, Machine Language, 38:3, (309-338), Online publication date: 1-Mar-2000.
  120. Jain A, Duin R and Mao J (2000). Statistical Pattern Recognition, IEEE Transactions on Pattern Analysis and Machine Intelligence, 22:1, (4-37), Online publication date: 1-Jan-2000.
  121. Bridges S, Hodges J, Wooley B, Karpovich D and Smith G (1999). Knowledge Discovery in an Oceanographic Database, Applied Intelligence, 11:2, (135-148), Online publication date: 1-Sep-1999.
  122. ACM
    Gehrke J, Loh W and Ramakrishnan R Classification and regression Tutorial notes of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, (1-73)
  123. Litman D, Walker M and Kearns M Automatic detection of poor speech recognition at the dialogue level Proceedings of the 37th annual meeting of the Association for Computational Linguistics on Computational Linguistics, (309-316)
  124. van den Bosch A and Daelemans W Memory-based morphological analysis Proceedings of the 37th annual meeting of the Association for Computational Linguistics on Computational Linguistics, (285-292)
  125. ACM
    Stranieri A and Zeleznikow J The evaluation of legal knowledge based systems Proceedings of the 7th international conference on Artificial intelligence and law, (18-24)
  126. Spangler W, May J and Vargas L (1999). Choosing data-mining methods for multiple classification, Journal of Management Information Systems, 16:1, (37-62), Online publication date: 1-Jun-1999.
  127. Gehrke J, Ramakrishnan R and Ganti V RainForest - A Framework for Fast Decision Tree Construction of Large Datasets Proceedings of the 24rd International Conference on Very Large Data Bases, (416-427)
  128. Hajime M, Takeo H and Manabu O Text segmentation with multiple surface linguistic cues Proceedings of the 36th Annual Meeting of the Association for Computational Linguistics and 17th International Conference on Computational Linguistics - Volume 2, (881-885)
  129. Meo R, Psaila G and Ceri S (1998). An Extension to SQL for Mining Association Rules, Data Mining and Knowledge Discovery, 2:2, (195-224), Online publication date: 1-Jun-1998.
  130. Vafaie H and De Jong K (1998). Feature Space Transformation Using Genetic Algorithms, IEEE Intelligent Systems, 13:2, (57-65), Online publication date: 1-Mar-1998.
  131. van den Bosch A, Weijters T and Daelemans W Modularity in inductively-learned word pronunciation systems Proceedings of the Joint Conferences on New Methods in Language Processing and Computational Natural Language Learning, (185-194)
  132. Liu Sheng O, Wei C and Hu P (1998). Neural Net Learning for Intelligent Patient-Image Retrieval, IEEE Intelligent Systems, 13:1, (49-57), Online publication date: 1-Jan-1998.
  133. Grzymala-Busse J (1997). Classification of Unseen Examples under Uncertainty, Fundamenta Informaticae, 30:3,4, (255-267), Online publication date: 1-Dec-1997.
  134. Hong S (1997). Use of Contextual Information for Feature Ranking and Discretization, IEEE Transactions on Knowledge and Data Engineering, 9:5, (718-730), Online publication date: 1-Sep-1997.
  135. Hong S (1997). R-MINI, IEEE Transactions on Knowledge and Data Engineering, 9:5, (709-717), Online publication date: 1-Sep-1997.
  136. Wehenkel L (1997). Machine-Learning Approaches to Power-System Security Assessment, IEEE Expert: Intelligent Systems and Their Applications, 12:5, (60-72), Online publication date: 1-Sep-1997.
  137. Chakrabarti S, Dom B, Agrawal R and Raghavan P Using Taxonomy, Discriminants, and Signatures for Navigating in Text Databases Proceedings of the 23rd International Conference on Very Large Data Bases, (446-455)
  138. Di Eugenio B, Moore J and Paolucci M Learning features that predict cue usage Proceedings of the 35th Annual Meeting of the Association for Computational Linguistics and Eighth Conference of the European Chapter of the Association for Computational Linguistics, (80-87)
  139. Debuse J and Rayward-Smith V (1997). Feature Subset Selection within a Simulated Annealing DataMining Algorithm, Journal of Intelligent Information Systems, 9:1, (57-81), Online publication date: 1-Jul-1997.
  140. ACM
    Wilkins D and Pillaipakkamnatt K The effectiveness of machine learning techniques for predicting time to case disposition Proceedings of the 6th international conference on Artificial intelligence and law, (106-113)
  141. ACM
    Zeleznikow J and Stranieri A Knowledge discovery in the Split Up project Proceedings of the 6th international conference on Artificial intelligence and law, (89-97)
  142. Apté C (1997). Data Mining, IEEE Computational Science & Engineering, 4:2, (6-9), Online publication date: 1-Apr-1997.
  143. Passonneau R and Litman D (1997). Discourse segmentation by human and automated means, Computational Linguistics, 23:1, (103-139), Online publication date: 1-Mar-1997.
  144. Wettschereck D, Aha D and Mohri T (1997). A Review and Empirical Evaluation of Feature Weighting Methods for aClass of Lazy Learning Algorithms, Artificial Intelligence Review, 11:1-5, (273-314), Online publication date: 1-Feb-1997.
  145. Maron O and Moore A (1997). The Racing Algorithm, Artificial Intelligence Review, 11:1-5, (193-225), Online publication date: 1-Feb-1997.
  146. Wu C, Chen H and Chen S (1997). Counter-Propagation Neural Networks for Molecular Sequence Classification, Applied Intelligence, 7:1, (27-38), Online publication date: 1-Jan-1997.
  147. Chen M, Han J and Yu P (1996). Data Mining, IEEE Transactions on Knowledge and Data Engineering, 8:6, (866-883), Online publication date: 1-Dec-1996.
  148. Meo R, Psaila G and Ceri S A New SQL-like Operator for Mining Association Rules Proceedings of the 22th International Conference on Very Large Data Bases, (122-133)
  149. Shafer J, Agrawal R and Mehta M SPRINT Proceedings of the 22th International Conference on Very Large Data Bases, (544-555)
  150. Agrawal R, Mehta M, Shafer J, Srikant R, Arning A and Bollinger T The Quest Data mining System Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, (244-249)
  151. Sasisekharan R, Seshadri V and Weiss S (1996). Data Mining and Forecasting in Large-Scale Telecommunication Networks, IEEE Expert: Intelligent Systems and Their Applications, 11:1, (37-43), Online publication date: 1-Feb-1996.
  152. Lovell B and Bradley A (1996). The Multiscale Classifier, IEEE Transactions on Pattern Analysis and Machine Intelligence, 18:2, (124-137), Online publication date: 1-Feb-1996.
  153. Gong L and Kulikowski C (1995). Composition of Image Analysis Processes Through Object-Centered Hierarchical Planning, IEEE Transactions on Pattern Analysis and Machine Intelligence, 17:10, (997-1009), Online publication date: 1-Oct-1995.
  154. Seshadri V, Weiss S and Sasisekharan R Feature extraction for massive data mining Proceedings of the First International Conference on Knowledge Discovery and Data Mining, (258-262)
  155. Japkowicz N, Myers C and Gluck M A novelty detection approach to classification Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1, (518-523)
  156. Litman D and Passonneau R Combining multiple knowledge sources for discourse segmentation Proceedings of the 33rd annual meeting on Association for Computational Linguistics, (108-115)
  157. Hansen J, Meservy R and Wood L (1995). Case-Based Reasoning, International Journal of Intelligent Systems in Accounting and Finance Management, 4:2, (137-146), Online publication date: 1-Jun-1995.
  158. ACM
    Goonatilake S Intelligent hybrid systems for financial decision making Proceedings of the 1995 ACM symposium on Applied computing, (471-476)
  159. Wong W and Chuah M (1994). A Hybrid Approach to Address Normalization, IEEE Expert: Intelligent Systems and Their Applications, 9:6, (38-45), Online publication date: 1-Dec-1994.
  160. Chen H, Buntin Rinde P, She L, Sutjahjo S, Sommer C and Neely D (1994). Expert Prediction, Symbolic Learning, and Neural Networks, IEEE Expert: Intelligent Systems and Their Applications, 9:6, (21-27), Online publication date: 1-Dec-1994.
  161. Chen H and Kim J (1994). GANNET, Journal of Management Information Systems, 11:3, (7-41), Online publication date: 1-Dec-1994.
  162. Michaelsen R and Swigger K (1994). Analysis of the Effectiveness of Machine Learning in Determining Decision Rules for Executive Compensation Planning, International Journal of Intelligent Systems in Accounting and Finance Management, 3:4, (263-278), Online publication date: 1-Dec-1994.
  163. Litman D Classifying cue phrases in text and speech using machine learning Proceedings of the Twelfth AAAI National Conference on Artificial Intelligence, (806-813)
  164. Thompson C and Mooney R Inductive learning for abductive diagnosis Proceedings of the Twelfth AAAI National Conference on Artificial Intelligence, (664-669)
  165. Hirsh H and Japkowicz N Bootstrapping training-data representations for inductive learning Proceedings of the Twelfth AAAI National Conference on Artificial Intelligence, (639-644)
  166. Apté C, Damerau F and Weiss S Towards language independent automated learning of text categorization models Proceedings of the 17th annual international ACM SIGIR conference on Research and development in information retrieval, (23-30)
  167. Sasisekharan R, Seshadri V and Weiss S Proactive network maintenance using machine learning Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, (453-462)
  168. ACM
    Mahoney D, Lu R and Wu S Construction of an artificial neural network for simple exponential smoothing in forecasting Proceedings of the 1994 ACM symposium on Applied computing, (308-312)
  169. ACM
    Tschichold-Gürman N Fuzzy RuleNet Proceedings of the 1994 ACM symposium on Applied computing, (145-149)
  170. Apté C, Damerau F and Weiss S Knowledge discovery for document classification Proceedings of the 2nd International Conference on Knowledge Discovery in Databases, (326-336)
Contributors
  • Rutgers University–New Brunswick

Recommendations

Kathleen M. Swigger

The authors' purpose was to “produce a practical guide to the application of classification learning systems.” More specifically, the authors try to develop a technique for evaluating and comparing machine learning algorithms. Having described how statistical methods are used to estimate true error rates, they demonstrate how to use these methods to compare three distinct machine learning techniques—statistical pattern recognition, neural networks, and tree induction methods—using the same data. They then compare the three methods with respect to their prediction accuracy, speed, and explanation facilities. These learning systems are then contrasted with expert systems using similar criteria. The book is extremely useful in that it documents the statistical methods used to compare and evaluate different treatments. It also discusses sampling techniques and shows how to match the appropriate sampling technique with a population size. For example, the authors suggest that with limited samples, one should run repeated tests, leaving out one sample for each run. They also provide information about how to determine whether the sample is representative of the larger population and whether it contains enough features. The most significant portion of the book is dedicated to describing the major machine learning algorithms and showing how each algorithm performs on the same set of data. Statistical pattern recognition methods (linear discriminant, quadratic discriminant, nearest neighbor, and Bayes), neural nets (back propagation using a varying number of hidden layers), and rule-based solution methods (ID3 and AQ15) are compared using sample data from an iris classification exercise and appendicitis and thyroid classification problems. Although the authors failed to discover any major differences among the machine learning algorithms, they provide interesting insights into how to evaluate different methods. The book provides a good introduction to machine learning research and shows how one can compare different machine learning algorithms. Unfortunately, it discusses only three machine learning algorithms, and one of these is basically a mathematical solution. It will be interesting to see whether a case-based reasoner or a genetic algorithm can achieve similar performance. The authors fail to emphasize that a particular machine learning algorithm represents a specific model of learning. Indeed, the basic reason for building a machine learning system is to test a specific theory of learning. For example, neural networks are designed to model a biological view of learning. Comparing the performance of different machine learning algorithms is only one way to compare the different models of learning.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.