skip to main content
Skip header Section
Data Mining: Concepts and TechniquesNovember 2005
Publisher:
  • Morgan Kaufmann Publishers Inc.
  • 340 Pine Street, Sixth Floor
  • San Francisco
  • CA
  • United States
ISBN:978-1-55860-901-3
Published:01 November 2005
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Esme E (2024). Enhancing classification accuracy through feature extraction: a comparative study of discretization and clustering approaches on sensor-based datasets, Knowledge and Information Systems, 66:1, (339-356), Online publication date: 1-Jan-2024.
  2. ACM
    Guo S, Li D, Huang L, Lv S, Chen R, Li H, Li X and Jiang H (2023). Estimating Uncertainty in Labeled Changes by SZZ Tools on Just-In-Time Defect Prediction, ACM Transactions on Software Engineering and Methodology, 0:0
  3. ACM
    Ribarska S and Georgieva O Unsupervised Analysis of Alzheimer Disease Medical Data Proceedings of the 2023 6th International Conference on Computational Intelligence and Intelligent Systems, (32-38)
  4. ACM
    Rehyani Hamedani M, Ryu J and Kim S ELTRA: An Embedding Method based on Learning-to-Rank to Preserve Asymmetric Information in Directed Graphs Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, (2116-2125)
  5. ACM
    Reyhani Hamedani M, Ryu J and Kim S GELTOR: A Graph Embedding Method based on Listwise Learning to Rank Proceedings of the ACM Web Conference 2023, (6-16)
  6. Nigdeli S, Yücel M and Bekdaş G (2023). A hybrid artificial intelligence model for design of reinforced concrete columns, Neural Computing and Applications, 35:10, (7867-7875), Online publication date: 1-Apr-2023.
  7. Göktepe Körpeoğlu S and Göktepe Yıldız S (2023). Comparative analysis of algorithms with data mining methods for examining attitudes towards STEM fields, Education and Information Technologies, 28:3, (2791-2826), Online publication date: 1-Mar-2023.
  8. Nadeem M, Banka H, Venugopal R and Anwer F (2022). Artificial Intelligence for Modelling the Wet Agglomeration Process of Fine Materials: A Survey, SN Computer Science, 3:6, Online publication date: 6-Oct-2022.
  9. Semerci A, Özgören A and İçen D (2022). Thoughts on women entrepreneurship: an application of market basket analysis with google trends data, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 26:19, (10035-10047), Online publication date: 1-Oct-2022.
  10. ACM
    Harrag F and Djahli M (2022). Arabic Fake News Detection: A Fact Checking Based Deep Learning Approach, ACM Transactions on Asian and Low-Resource Language Information Processing, 21:4, (1-34), Online publication date: 31-Jul-2022.
  11. Narayan S and Sathiyamoorthy E. (2023). Early Prediction of Heart Diseases using Naive Bayes Classification Algorithm and Laplace Smoothing Technique, International Journal of Grid and High Performance Computing, 14:1, (1-14), Online publication date: 29-Jun-2022.
  12. Lavacca F, Eramo V, Cianfrani A, Listanti M and Valente F Perspectives on AI-based Algorithms Applied to C-RAN Functional Splitting and Advanced Antenna System Problem NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, (1-5)
  13. Nguyen N, Nguyen Q, Pham H, Le T, Nguyen T, Cassi D, Scotognella F, Alfieri R, Bellingeri M and Murari A (2022). Predicting the Robustness of Large Real-World Social Networks Using a Machine Learning Model, Complexity, 2022, Online publication date: 1-Jan-2022.
  14. ACM
    Park J, Dutt N and Lim S (2021). An Interpretable Machine Learning Model Enhanced Integrated CPU-GPU DVFS Governor, ACM Transactions on Embedded Computing Systems, 20:6, (1-28), Online publication date: 30-Nov-2021.
  15. ACM
    Kim W AI-BigData Convergence (ABC): an R&D Vision The 23rd International Conference on Information Integration and Web Intelligence, (1-2)
  16. ACM
    Rehyani Hamedani M and Kim S AdaSim Proceedings of the 30th ACM International Conference on Information & Knowledge Management, (1528-1537)
  17. Atsa'am D and Wario R (2021). Classifier Selection for the Prediction of Dominant Transmission Mode of Coronavirus Within Localities, International Journal of E-Health and Medical Communications, 12:6, (1-12), Online publication date: 17-Sep-2021.
  18. Gao P, Zhao D, Yang J and Han K (2021). Evaluation of Physical Fitness of Pupils Based on Bayesian and Fuzzy Recognition Coupling Method, Wireless Personal Communications: An International Journal, 119:4, (3037-3051), Online publication date: 1-Aug-2021.
  19. ACM
    Guo Z, Liu S, Liu J, Li Y, Chen L, Lu H and Zhou Y (2021). How Far Have We Progressed in Identifying Self-admitted Technical Debts? A Comprehensive Empirical Study, ACM Transactions on Software Engineering and Methodology, 30:4, (1-56), Online publication date: 1-Jul-2021.
  20. ACM
    Shafieinejad M, Kerschbaum F and Ilyas I PCOR: Private Contextual Outlier Release via Differentially Private Search Proceedings of the 2021 International Conference on Management of Data, (1571-1583)
  21. Sim H and Chen H (2021). Hierarchical Factor Analysis Methodology for Intelligent Manufacturing, Complexity, 2021, Online publication date: 1-Jan-2021.
  22. Ordonez C A Comparison of Data Science Systems Big Data Analytics, (3-11)
  23. ACM
    Kosmatos E Privacy-preserving model, architecture and solution for on-the-fly anonymization of 5G data streams Proceedings of the 24th Pan-Hellenic Conference on Informatics, (399-402)
  24. Coradini A and Szabo A A Comparative Analysis Between Crisp and Fuzzy Data Clustering Approaches for Traditional and Bioinspired Algorithms Intelligent Data Engineering and Automated Learning – IDEAL 2020, (298-308)
  25. ACM
    Francis J, M B and George S (2020). A Unified Tensor Framework for Clustering and Simultaneous Reconstruction of Incomplete Imaging Data, ACM Transactions on Multimedia Computing, Communications, and Applications, 16:3, (1-24), Online publication date: 4-Sep-2020.
  26. ACM
    Fletcher S and Islam M (2019). Decision Tree Classification with Differential Privacy, ACM Computing Surveys, 52:4, (1-33), Online publication date: 31-Jul-2020.
  27. Freitas R and Salgado L Educators in the Loop: Using Scenario Simulation as a Tool to Understand and Investigate Predictive Models of Student Dropout Risk in Distance Learning Artificial Intelligence in HCI, (255-272)
  28. ACM
    Chen B and Jiang Z Studying the use of Java logging utilities in the wild Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (397-408)
  29. Swetapadma A, Yadav A and Abdelaziz A (2019). Intelligent schemes for fault classification in mutually coupled series-compensated parallel transmission lines, Neural Computing and Applications, 32:11, (6939-6956), Online publication date: 1-Jun-2020.
  30. Moslehi F, Haeri A and Martínez-Álvarez F (2019). A novel hybrid GA–PSO framework for mining quantitative association rules, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:6, (4645-4666), Online publication date: 1-Mar-2020.
  31. Belabed I, Talibi Alaoui M, El Miloud J and Belabed A Association Rules Algorithms for Data Mining Process Based on Multi Agent System Machine Learning for Networking, (431-443)
  32. Saccá D, Serra E and Rullo A (2022). Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications, Data Mining and Knowledge Discovery, 33:6, (1736-1774), Online publication date: 1-Nov-2019.
  33. Wu C, Chen Y and Tang K (2019). Cost-sensitive decision tree with multiple resource constraints, Applied Intelligence, 49:10, (3765-3782), Online publication date: 1-Oct-2019.
  34. Dong D, Ye Z, Cao Y, Xie S, Wang F and Ming W An Improved Association Rule Mining Algorithm Based on Ant Lion Optimizer Algorithm and FP-Growth 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), (458-463)
  35. Albert S and Czibula G ProteinA: An Approach for Analyzing and Visualizing Protein Conformational Transitions Using Fuzzy and Hard Clustering Techniques Knowledge Science, Engineering and Management, (249-261)
  36. ACM
    Lu Y, Xu J and Chen M Using Text Mining to Analyze the Financial Patents Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, (1-7)
  37. Ai Z, Zhang K, Wang S, Li C, Zhang X and Li S A Novel Partition Method for Busy Urban Area Based on Spatial-Temporal Information Computational Science – ICCS 2019, (234-246)
  38. ACM
    Omarbekova A, Saukhanova Z, Zakirova A, Abduraimova B and Saukhanova M KPI estimation for the university faculty Proceedings of the 5th International Conference on Engineering and MIS, (1-4)
  39. ACM
    Nagaraja A and Uma B Intrusion detection using dimensionality reduced soft matrix Proceedings of the 5th International Conference on Engineering and MIS, (1-7)
  40. Borozanov V, Hacks S and Silva N Using Machine Learning Techniques for Evaluating the Similarity of Enterprise Architecture Models Advanced Information Systems Engineering, (563-578)
  41. Tian F, Wu F, Fei X, Shah N, Zheng Q and Wang Y (2019). Improving generalization ability of instance transfer-based imbalanced sentiment classification of turn-level interactive Chinese texts, Service Oriented Computing and Applications, 13:2, (155-167), Online publication date: 1-Jun-2019.
  42. Yu Q, Luo Y, Chen C and Chen S (2019). Trajectory similarity clustering based on multi-feature distance measurement, Applied Intelligence, 49:6, (2315-2338), Online publication date: 1-Jun-2019.
  43. Malar B, Nadarajan R and Gowri Thangam J (2019). A hybrid isotonic separation training algorithm with correlation-based isotonic feature selection for binary classification, Knowledge and Information Systems, 59:3, (651-683), Online publication date: 1-Jun-2019.
  44. de Almeida Filho F, Martins A, Vinuto T, Monteiro J, de Sousa Í, de Castro Machado J and Rocha L Prevalence of bad smells in PL/SQL projects Proceedings of the 27th International Conference on Program Comprehension, (116-121)
  45. ACM
    Park S, Cha B and Kim J Enhancing Red Tide Image Recognition using Hierarchical Learning Approach based on Semantic Feature Proceedings of the 2019 2nd International Conference on Electronics, Communications and Control Engineering, (25-28)
  46. ACM
    Hamedani M and Kim S Pairwise normalization in SimRank variants Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (534-541)
  47. Costaguta R, Santana-Mansilla P, Lescano G and Missio D (2021). Mining Associations Between Collaborative Skills and Group Roles in Collaborative E-Learning Environments, Journal of Information Technology Research, 12:2, (159-174), Online publication date: 1-Apr-2019.
  48. Nobahari V, Jalali M and Seyyed Mahdavi S (2019). ISoTrustSeq, Journal of Intelligent Information Systems, 52:2, (239-268), Online publication date: 1-Apr-2019.
  49. ACM
    Altakrori M, Iqbal F, Fung B, Ding S and Tubaishat A (2018). Arabic Authorship Attribution, ACM Transactions on Asian and Low-Resource Language Information Processing, 18:1, (1-51), Online publication date: 31-Mar-2019.
  50. ACM
    Lee D, Dev H, Hu H, Elmeleegy H and Parameswaran A Avoiding drill-down fallacies with VisPilot Proceedings of the 24th International Conference on Intelligent User Interfaces, (186-196)
  51. Mashtalir S, Stolbovyi M and Yakovlev S (2019). Clustering Video Sequences by the Method of Harmonic k-Means, Cybernetics and Systems Analysis, 55:2, (200-206), Online publication date: 1-Mar-2019.
  52. (2019). An ensemble clustering method for intrusion detection, International Journal of Intelligent Engineering Informatics, 7:2-3, (112-140), Online publication date: 1-Jan-2019.
  53. Zhukova N and Andriyanova N (2019). Cognitive Monitoring of Distributed Objects, Automatic Documentation and Mathematical Linguistics, 53:1, (32-43), Online publication date: 1-Jan-2019.
  54. Ren J, Zheng Z, Liu Q, Wei Z, Yan H and Chen J (2019). A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
  55. Gupta Y and Saini A (2019). A new swarm-based efficient data clustering approach using KHM and fuzzy logic, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:1, (145-162), Online publication date: 1-Jan-2019.
  56. Soltani S, Martin P and Elgazzar K (2018). A hybrid approach to automatic IaaS service selection, Journal of Cloud Computing: Advances, Systems and Applications, 7:1, (1-18), Online publication date: 1-Dec-2018.
  57. Manikandan G, Bala Krishnan R, Rajesh Kumar N, Narasimhan D, Srinivasan A and Raajan N (2018). Steganographic approach to enhancing secure data communication using contours and clustering, Multimedia Tools and Applications, 77:24, (32257-32273), Online publication date: 1-Dec-2018.
  58. ACM
    Slavova S and Georgieva O Information Retrieval from School Data Proceedings of the 2018 International Conference on Computational Intelligence and Intelligent Systems, (5-9)
  59. Weng C and Huang T (2018). Observation of sales trends by mining emerging patterns in dynamic markets, Applied Intelligence, 48:11, (4515-4529), Online publication date: 1-Nov-2018.
  60. Chen Z, Khoa L, Teoh E, Nazir A, Karuppiah E and Lam K (2018). Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection, Knowledge and Information Systems, 57:2, (245-285), Online publication date: 1-Nov-2018.
  61. ACM
    Kumar K, Srinivasan R and Singh E An efficient approach for dimensionality reduction and classification of high dimensional text documents Proceedings of the First International Conference on Data Science, E-learning and Information Systems, (1-5)
  62. Ferretti S (2018). Clustering of Musical Pieces Through Complex Networks, IEEE MultiMedia, 25:4, (57-67), Online publication date: 1-Oct-2018.
  63. Pattaranantakul M, He R, Song Q, Zhang Z and Meddahi A (2018). NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures, IEEE Communications Surveys & Tutorials, 20:4, (3330-3368), Online publication date: 1-Oct-2018.
  64. Javidi M and Zarisfi Kermani F (2018). Utilizing the advantages of both global and local search strategies for finding a small subset of features in a two-stage method, Applied Intelligence, 48:10, (3502-3522), Online publication date: 1-Oct-2018.
  65. Rodrigues F and Trindade A (2018). Load forecasting through functional clustering and ensemble learning, Knowledge and Information Systems, 57:1, (229-244), Online publication date: 1-Oct-2018.
  66. ACM
    Aburas A, Mehtab M and Mehtab Y Cricket World Cup Predictions Using KNN Intelligent Bigdata Approach Proceedings of the 2018 International Conference on Computing and Big Data, (18-22)
  67. Peng Z, Wang T, Lu W, Huang H, Du X, Zhao F and Tung A (2018). Mining frequent subgraphs from tremendous amount of small graphs using MapReduce, Knowledge and Information Systems, 56:3, (663-690), Online publication date: 1-Sep-2018.
  68. ACM
    Carminati M, Polino M, Continella A, Lanzi A, Maggi F and Zanero S (2018). Security Evaluation of a Banking Fraud Analysis System, ACM Transactions on Privacy and Security, 21:3, (1-31), Online publication date: 31-Aug-2018.
  69. Serra E, Sharma A, Joaristi M and Korzh O Unknown landscape identification with CNN transfer learning Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (813-820)
  70. El Houby E (2018). Framework of Computer Aided Diagnosis Systems for Cancer Classification Based on Medical Images, Journal of Medical Systems, 42:8, (1-11), Online publication date: 1-Aug-2018.
  71. Yuvaraj R, Rajendra Acharya U and Hagiwara Y (2018). A novel Parkinson's Disease Diagnosis Index using higher-order spectra features in EEG signals, Neural Computing and Applications, 30:4, (1225-1235), Online publication date: 1-Aug-2018.
  72. ACM
    Wang C and Chakrabarti K Efficient Attribute Recommendation with Probabilistic Guarantee Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (2387-2396)
  73. Wankhade K, Jondhale K and Thool V (2018). A hybrid approach for classification of rare class data, Knowledge and Information Systems, 56:1, (197-221), Online publication date: 1-Jul-2018.
  74. Kamatkar S, Tayade A, Viloria A and Hernández-Chacín A Application of Classification Technique of Data Mining for Employee Management System Data Mining and Big Data, (434-444)
  75. ACM
    Yang M, Liu X, Kroeger W, Sim A and Wu K Identifying Anomalous File Transfer Events in LCLS Workflow Proceedings of the 1st International Workshop on Autonomous Infrastructure for Science, (1-4)
  76. Wang S, Chen T and Hassan A (2018). Understanding the factors for fast answers in technical Q&A websites, Empirical Software Engineering, 23:3, (1552-1593), Online publication date: 1-Jun-2018.
  77. Mai S, Amer-Yahia S, Chouakria A, Nguyen K and Nguyen A Scalable Active Constrained Clustering for Temporal Data Database Systems for Advanced Applications, (566-582)
  78. ACM
    Pandove D, Goel S and Rani R (2018). Systematic Review of Clustering High-Dimensional and Large Datasets, ACM Transactions on Knowledge Discovery from Data, 12:2, (1-68), Online publication date: 30-Apr-2018.
  79. Zhang Y, Lo D, Xia X and Sun J (2018). Combined classifier for cross-project defect prediction, Frontiers of Computer Science: Selected Publications from Chinese Universities, 12:2, (280-296), Online publication date: 1-Apr-2018.
  80. Xu X, Zhong M and Guo C (2018). A Hyperplane Clustering Algorithm for Estimating the Mixing Matrix in Sparse Component Analysis, Neural Processing Letters, 47:2, (475-490), Online publication date: 1-Apr-2018.
  81. Bigdeli E, Mohammadi M, Raahemi B and Matwin S (2018). Incremental anomaly detection using two-layer cluster-based structure, Information Sciences: an International Journal, 429:C, (315-331), Online publication date: 1-Mar-2018.
  82. Siering M, Deokar A and Janze C (2018). Disentangling consumer recommendations, Decision Support Systems, 107:C, (52-63), Online publication date: 1-Mar-2018.
  83. Yu D, Liu G, Guo M and Liu X (2018). An improved K-medoids algorithm based on step increasing and optimizing medoids, Expert Systems with Applications: An International Journal, 92:C, (464-473), Online publication date: 1-Feb-2018.
  84. Hernndez-Garca R, Ramos-Czar J, Guil N, Garca-Reyes E and Sahli H (2018). Improving Bag-of-Visual-Words model using visual n-grams for human action classification, Expert Systems with Applications: An International Journal, 92:C, (182-191), Online publication date: 1-Feb-2018.
  85. Oliveira R, Papa J, Pereira A and Tavares J (2018). Computational methods for pigmented skin lesion classification in images, Neural Computing and Applications, 29:3, (613-636), Online publication date: 1-Feb-2018.
  86. ACM
    Chen C, Tsai M and Shih Y Early Prediction of Ventilator Weaning with Decision Tree Analysis Proceedings of the 2018 8th International Conference on Bioscience, Biochemistry and Bioinformatics, (99-103)
  87. Agarwal R (2018). Ordering Policy and Inventory Classification Using Temporal Association Rule Mining, International Journal of Productivity Management and Assessment Technologies, 6:1, (37-49), Online publication date: 1-Jan-2018.
  88. Yu X, Tian Z, Qiu J, Jiang F and Wang D (2018). A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
  89. ACM
    Lam Q, Nguyen L and Nguyen H A Novel Approach for Classifying EEG Signal with Multi-Layer Neural Network Proceedings of the 3rd International Conference on Robotics and Artificial Intelligence, (79-83)
  90. Adnan M and Islam M (2017). Forest PA, Expert Systems with Applications: An International Journal, 89:C, (389-403), Online publication date: 15-Dec-2017.
  91. Wang Y and Liu S (2017). Minimum-cost deployment of adjustable readers to provide complete coverage of tags in RFID systems, Journal of Systems and Software, 134:C, (228-241), Online publication date: 1-Dec-2017.
  92. Fletcher S and Verma B Removing Bias from Diverse Data Clusters for Ensemble Classification Neural Information Processing, (140-149)
  93. Wang M, Min F, Zhang Z and Wu Y (2017). Active learning through density clustering, Expert Systems with Applications: An International Journal, 85:C, (305-317), Online publication date: 1-Nov-2017.
  94. Tian G, Huang J, Peng M, Zhu J and Zhang Y (2017). Dynamic sampling of text streams and its application in text analysis, Knowledge and Information Systems, 53:2, (507-531), Online publication date: 1-Nov-2017.
  95. Kousias K, Midoglu C, Alay O, Lutu A, Argyriou A and Riegler M The same, only different: Contrasting mobile operator behavior from crowdsourced dataset 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (1-6)
  96. Doganer A and Calik S (2017). A New Approach Using Hidden Markov Model and Bayesian Method for Estimate of Word Types in Text Mining, International Journal of Knowledge and Systems Science, 8:4, (17-29), Online publication date: 1-Oct-2017.
  97. Varshney D, Kumar S and Gupta V (2017). Predicting information diffusion probabilities in social networks, Knowledge-Based Systems, 133:C, (66-76), Online publication date: 1-Oct-2017.
  98. Chen W, Xie C, Shang P and Peng Q (2017). Visual analysis of user-driven association rule mining, Journal of Visual Languages and Computing, 42:C, (76-85), Online publication date: 1-Oct-2017.
  99. Acharya U, Fujita H, Sudarshan V, Lih Oh S, Muhammad A, Koh J, Hong Tan J, Chua C, Poo Chua K and San Tan R (2017). Application of empirical mode decomposition (EMD) for automated identification of congestive heart failure using heart rate signals, Neural Computing and Applications, 28:10, (3073-3094), Online publication date: 1-Oct-2017.
  100. Genovez P, Ebecken N, Freitas C, Bentz C and Freitas R (2017). Intelligent hybrid system for dark spot detection using SAR data, Expert Systems with Applications: An International Journal, 81:C, (384-397), Online publication date: 15-Sep-2017.
  101. Shatnawi A, Seriai A and Sahraoui H (2017). Recovering software product line architecture of a family of object-oriented product variants, Journal of Systems and Software, 131:C, (325-346), Online publication date: 1-Sep-2017.
  102. Shatnawi A, Seriai A, Sahraoui H and Alshara Z (2017). Reverse engineering reusable software components from object-oriented APIs, Journal of Systems and Software, 131:C, (442-460), Online publication date: 1-Sep-2017.
  103. Baralis E, Cagliero L, Cerquitelli T, Garza P and Pulvirenti F (2017). Discovering profitable stocks for intraday trading, Information Sciences: an International Journal, 405:C, (91-106), Online publication date: 1-Sep-2017.
  104. Ucar E and Ozhan E (2017). The Analysis of Firewall Policy Through Machine Learning and Data Mining, Wireless Personal Communications: An International Journal, 96:2, (2891-2909), Online publication date: 1-Sep-2017.
  105. J A and V M (2017). Automatic classification of thyroid histopathology images using multi-classifier system, Multimedia Tools and Applications, 76:18, (18711-18730), Online publication date: 1-Sep-2017.
  106. Eyal Salman H (2017). Identification multi-level frequent usage patterns from APIs, Journal of Systems and Software, 130:C, (42-56), Online publication date: 1-Aug-2017.
  107. Liu X and Xue J (2017). A Cluster Splitting Technique by Hopfield Networks and P Systems on Simplices, Neural Processing Letters, 46:1, (171-194), Online publication date: 1-Aug-2017.
  108. Fletcher S and Islam M (2017). Differentially private random decision forests using smooth sensitivity, Expert Systems with Applications: An International Journal, 78:C, (16-31), Online publication date: 15-Jul-2017.
  109. Fazio P, De Rango F and Tropea M (2017). Prediction and QoS Enhancement in New Generation Cellular Networks With Mobile Hosts: A Survey on Different Protocols and Conventional/Unconventional Approaches, IEEE Communications Surveys & Tutorials, 19:3, (1822-1841), Online publication date: 1-Jul-2017.
  110. Niu H, Keivanloo I and Zou Y (2017). API usage pattern recommendation for software development, Journal of Systems and Software, 129:C, (127-139), Online publication date: 1-Jul-2017.
  111. Onan A, Korukolu S and Bulut H (2017). A hybrid ensemble pruning approach based on consensus clustering and multi-objective evolutionary algorithm for sentiment classification, Information Processing and Management: an International Journal, 53:4, (814-833), Online publication date: 1-Jul-2017.
  112. Yang X, Lo D, Xia X and Sun J (2017). TLEL, Information and Software Technology, 87:C, (206-220), Online publication date: 1-Jul-2017.
  113. Martnez-Ballesteros M, Garca-Heredia J, Nepomuceno-Chamorro I and Riquelme-Santos J (2017). Machine learning techniques to discover genes with potential prognosis role in Alzheimers disease using different biological sources, Information Fusion, 36:C, (114-129), Online publication date: 1-Jul-2017.
  114. Anand R and Dinakaran M (2017). Handling stakeholder conflict by agile requirement prioritization using Apriori technique, Computers and Electrical Engineering, 61:C, (126-136), Online publication date: 1-Jul-2017.
  115. Vani B, Shimabukuro M and Galera Monico J (2017). Visual exploration and analysis of ionospheric scintillation monitoring data, Computers & Geosciences, 104:C, (125-134), Online publication date: 1-Jul-2017.
  116. Sabitha A, Mehrotra D and Bansal A (2017). An ensemble approach in converging contents of LMS and KMS, Education and Information Technologies, 22:4, (1673-1694), Online publication date: 1-Jul-2017.
  117. Singh A (2017). Mining of Social Media data of University students, Education and Information Technologies, 22:4, (1515-1526), Online publication date: 1-Jul-2017.
  118. ACM
    Liu H and Du H Stock Sequence Pattern Mining Method Based on SWI-GSP Algorithm Proceedings of the 2017 International Conference on Data Mining, Communications and Information Technology, (1-5)
  119. Abdalla A, Ströele V, Veiga W, Simões L, Campos F, Braga R and David J R.ECOS Proceedings of the Joint 5th International Workshop on Software Engineering for Systems-of-Systems and 11th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems, (48-54)
  120. Chen B and Jiang Z Characterizing and detecting anti-patterns in the logging code Proceedings of the 39th International Conference on Software Engineering, (71-81)
  121. Kabir M, Xu S, Kang B and Zhao Z (2017). A new multiple seeds based genetic algorithm for discovering a set of interesting Boolean association rules, Expert Systems with Applications: An International Journal, 74:C, (55-69), Online publication date: 15-May-2017.
  122. D'Anca A, Palazzo C, Elia D, Fiore S, Bistinas I, Böttcher K, Bennett V and Aloisio G On the Use of In-Memory Analytics Workflows to Compute eScience Indicators from Large Climate Datasets Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, (1035-1043)
  123. Hamami D, Baghdad A and Shankland C (2017). Decision Support based on Bio-PEPA Modeling and Decision Tree Induction, International Journal of Information Systems in the Service Sector, 9:2, (71-101), Online publication date: 1-Apr-2017.
  124. Yang S, Wu F, Tang S, Gao X, Yang B and Chen G (2017). On Designing Data Quality-Aware Truth Estimation and Surplus Sharing Method for Mobile Crowdsensing, IEEE Journal on Selected Areas in Communications, 35:4, (832-847), Online publication date: 1-Apr-2017.
  125. Khalifa M, Díaz Redondo R, Vilas A and Rodríguez S (2017). Identifying urban crowds using geo-located Social media data, Journal of Intelligent Information Systems, 48:2, (287-308), Online publication date: 1-Apr-2017.
  126. ACM
    Elsayed H and Syed L An automatic early risk classification of hard coronary heart diseases using framingham scoring model Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, (1-8)
  127. ACM
    Hasan A, Meziane F, Aspin R and Jalab H MRI brain scan classification using novel 3-D statistical features Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, (1-5)
  128. Lee K, Lee S, Lee K and Lee S (2017). Density and Frequency-Aware Cluster Identification for Spatio-Temporal Sequence Data, Wireless Personal Communications: An International Journal, 93:1, (47-65), Online publication date: 1-Mar-2017.
  129. ACM
    Cabauatan R and Gerardo B Predicting Classification of Telecommunication Subscribers Based on Polytomous Logistic Regression Usage Model Proceedings of the 9th International Conference on Machine Learning and Computing, (258-267)
  130. Pham C, Wang L, Tak B, Baset S, Tang C, Kalbarczyk Z and Iyer R (2017). Failure Diagnosis for Distributed Systems Using Targeted Fault Injection, IEEE Transactions on Parallel and Distributed Systems, 28:2, (503-516), Online publication date: 1-Feb-2017.
  131. Chang V (2017). A cybernetics Social Cloud, Journal of Systems and Software, 124:C, (195-211), Online publication date: 1-Feb-2017.
  132. ACM
    Zheng H, He J, Zhang Y and Shi Y A fuzzy decision tree approach based on data distribution construction Proceedings of the Australasian Computer Science Week Multiconference, (1-10)
  133. Acharya U, Fujita H, Adam M, Lih O, Sudarshan V, Hong T, Koh J, Hagiwara Y, Chua C, Poo C and San T (2017). Automated characterization and classification of coronary artery disease and myocardial infarction by decomposition of ECG signals, Information Sciences: an International Journal, 377:C, (17-29), Online publication date: 20-Jan-2017.
  134. (2017). Improving ATM coverage area using density based clustering algorithm and voronoi diagrams, Information Sciences: an International Journal, 376:C, (1-20), Online publication date: 10-Jan-2017.
  135. Dubey V and Saxena A (2017). A Cosine-Similarity Mutual-Information Approach for Feature Selection on High Dimensional Datasets, Journal of Information Technology Research, 10:1, (15-28), Online publication date: 1-Jan-2017.
  136. Tiwari P, Kumar S, Kumar V and Mishra B (2017). Implementation of n-gram Methodology for Rotten Tomatoes Review Dataset Sentiment Analysis, International Journal of Knowledge Discovery in Bioinformatics, 7:1, (30-41), Online publication date: 1-Jan-2017.
  137. Rada R and Wimmer H (2017). Decision Trees and Financial Variables, International Journal of Decision Support System Technology, 9:1, (1-15), Online publication date: 1-Jan-2017.
  138. Sun X, Liu X, Li B, Li B, Lo D, Liao L and Shi X (2017). Clustering Classes in Packages for Program Comprehension, Scientific Programming, 2017, Online publication date: 1-Jan-2017.
  139. Neto C, Peixoto H, Abelha V, Abelha A and Machado J (2017). Knowledge Discovery from Surgical Waiting lists, Procedia Computer Science, 121:C, (1104-1111), Online publication date: 1-Jan-2017.
  140. Poulis G, Loukides G, Skiadopoulos S and Gkoulalas-Divanis A (2017). Anonymizing datasets with demographics and diagnosis codes in the presence of utility constraints, Journal of Biomedical Informatics, 65:C, (76-96), Online publication date: 1-Jan-2017.
  141. Sasikala S, Appavu alias Balamurugan S and Geetha S (2017). A novel adaptive feature selector for supervised classification, Information Processing Letters, 117:C, (25-34), Online publication date: 1-Jan-2017.
  142. Nagarajan V and Maluk Mohamed M (2017). A prediction-based dynamic replication strategy for data-intensive applications, Computers and Electrical Engineering, 57:C, (281-293), Online publication date: 1-Jan-2017.
  143. García-Saiz D, Zorrilla M and Bosque J (2017). A clustering-based knowledge discovery process for data centre infrastructure management, The Journal of Supercomputing, 73:1, (215-226), Online publication date: 1-Jan-2017.
  144. Luna J, Castro C and Romero C (2017). MDM tool, Computer Applications in Engineering Education, 25:1, (90-102), Online publication date: 1-Jan-2017.
  145. ACM
    Li Y, Huang Q, Liu S and Liu P Load pattern analysis of key accounts based on two-step clustering Proceedings of the 1st International Conference on Intelligent Information Processing, (1-6)
  146. Beg A, Islam M and Estivill-Castro V (2016). Genetic algorithm with healthy population and multiple streams sharing information for clustering, Knowledge-Based Systems, 114:C, (61-78), Online publication date: 15-Dec-2016.
  147. Chen M, Li L, Wang B, Cheng J, Pan L and Chen X (2016). Effectively clustering by finding density backbone based-on kNN, Pattern Recognition, 60:C, (486-498), Online publication date: 1-Dec-2016.
  148. Houari R, Bounceur A, Kechadi M, Tari A and Euler R (2016). Dimensionality reduction in data mining, Expert Systems with Applications: An International Journal, 64:C, (247-260), Online publication date: 1-Dec-2016.
  149. Acharya U, Raghavendra U, Fujita H, Hagiwara Y, Koh J, Jen Hong T, Sudarshan V, Vijayananthan A, Yeong C, Gudigar A and Ng K (2016). Automated characterization of fatty liver disease and cirrhosis using curvelet transform and entropy features extracted from ultrasound images, Computers in Biology and Medicine, 79:C, (250-258), Online publication date: 1-Dec-2016.
  150. Leema N, Nehemiah H and Kannan A (2016). Neural network classifier optimization using Differential Evolution with Global Information and Back Propagation algorithm for clinical datasets, Applied Soft Computing, 49:C, (834-844), Online publication date: 1-Dec-2016.
  151. Almuhaideb S and Menai M (2016). Impact of preprocessing on medical data classification, Frontiers of Computer Science: Selected Publications from Chinese Universities, 10:6, (1082-1102), Online publication date: 1-Dec-2016.
  152. Lee M, Chen G, Hung J, Lin K and Wang J (2016). Data mining in emotion color with affective computing, Multimedia Tools and Applications, 75:23, (15185-15198), Online publication date: 1-Dec-2016.
  153. Lin K (2016). Privacy-preserving kernel k-means clustering outsourcing with random transformation, Knowledge and Information Systems, 49:3, (885-908), Online publication date: 1-Dec-2016.
  154. Ltifi H, Benmohamed E, Kolski C and Ben Ayed M (2016). Enhanced visual data mining process for dynamic decision-making, Knowledge-Based Systems, 112:C, (166-181), Online publication date: 15-Nov-2016.
  155. (2016). A multiobjective weighted voting ensemble classifier based on differential evolution algorithm for text sentiment classification, Expert Systems with Applications: An International Journal, 62:C, (1-16), Online publication date: 15-Nov-2016.
  156. Bashir S, Qamar U and Khan F (2016). A Multicriteria Weighted Vote-Based Classifier Ensemble for Heart Disease Prediction, Computational Intelligence, 32:4, (615-645), Online publication date: 1-Nov-2016.
  157. Boran F, Akay D and Yager R (2016). An overview of methods for linguistic summarization with fuzzy sets, Expert Systems with Applications: An International Journal, 61:C, (356-377), Online publication date: 1-Nov-2016.
  158. Adnan M and Islam M (2016). Optimizing the number of trees in a decision forest to discover a subforest with high ensemble accuracy using a genetic algorithm, Knowledge-Based Systems, 110:C, (86-97), Online publication date: 15-Oct-2016.
  159. Chen Z and Chen C (2016). SCIFNET, Knowledge-Based Systems, 110:C, (30-48), Online publication date: 15-Oct-2016.
  160. Madraky A, Othman Z and Hamdan A (2016). Hair-oriented data model for spatio-temporal data representation, Expert Systems with Applications: An International Journal, 59:C, (119-144), Online publication date: 15-Oct-2016.
  161. ACM
    Jiang Y, Perng C, Sailer A, Silva-Lepe I, Zhou Y and Li T (2016). CSM, ACM Transactions on Intelligent Systems and Technology, 8:1, (1-25), Online publication date: 3-Oct-2016.
  162. ACM
    Wang T, Wang Z, Zhang D, Gu T, Ni H, Jia J, Zhou X and Lv J (2016). Recognizing Parkinsonian Gait Pattern by Exploiting Fine-Grained Movement Function Features, ACM Transactions on Intelligent Systems and Technology, 8:1, (1-22), Online publication date: 3-Oct-2016.
  163. Jdidou Y and Khaldi M (2016). Increasing the Profitability of Students in MOOCs using Recommendation Systems, International Journal of Knowledge Society Research, 7:4, (75-85), Online publication date: 1-Oct-2016.
  164. Khan F, Qamar U and Bashir S (2016). Senti-CS, Expert Systems: The Journal of Knowledge Engineering, 33:5, (489-500), Online publication date: 1-Oct-2016.
  165. Xia X, Lo D, Pan S, Nagappan N and Wang X (2016). HYDRA, IEEE Transactions on Software Engineering, 42:10, (977-998), Online publication date: 1-Oct-2016.
  166. Sang Y, Shen H, Tian H and Zhang Z (2016). Achieving Probabilistic Anonymity in a Linear and Hybrid Randomization Model, IEEE Transactions on Information Forensics and Security, 11:10, (2187-2202), Online publication date: 1-Oct-2016.
  167. Iftene A and Alexandra-Mihaela B (2016). Using Semantic Resources in Image Retrieval, Procedia Computer Science, 96:C, (436-445), Online publication date: 1-Oct-2016.
  168. Ali F, Kwak K and Kim Y (2016). Opinion mining based on fuzzy domain ontology and Support Vector Machine, Applied Soft Computing, 47:C, (235-250), Online publication date: 1-Oct-2016.
  169. Golsefid S and Fazel Zarandi M (2016). Dual-centers type-2 fuzzy clustering framework and its verification and validation indices, Applied Soft Computing, 47:C, (600-613), Online publication date: 1-Oct-2016.
  170. Lei J, Jiang T, Wu K, Du H, Zhu G and Wang Z (2016). Robust K-means algorithm with automatically splitting and merging clusters and its applications for surveillance data, Multimedia Tools and Applications, 75:19, (12043-12059), Online publication date: 1-Oct-2016.
  171. Wu C, Chen Y, Liu Y and Yang X (2016). Decision tree induction with a constrained number of leaf nodes, Applied Intelligence, 45:3, (673-685), Online publication date: 1-Oct-2016.
  172. ACM
    Lei H, Xie C, Shang P, Zhang F, Chen W and Peng Q Visual Analysis of User-Driven Association Rule Mining Proceedings of the 9th International Symposium on Visual Information Communication and Interaction, (96-103)
  173. Onan A, Korukoğlu S and Bulut H (2016). Ensemble of keyword extraction methods and classifiers in text classification, Expert Systems with Applications: An International Journal, 57:C, (232-247), Online publication date: 15-Sep-2016.
  174. Khader N, Lashier A and Yoon S (2016). Pharmacy robotic dispensing and planogram analysis using association rule mining with prescription data, Expert Systems with Applications: An International Journal, 57:C, (296-310), Online publication date: 15-Sep-2016.
  175. ACM
    Xia X, Shihab E, Kamei Y, Lo D and Wang X Predicting Crashing Releases of Mobile Applications Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, (1-10)
  176. ACM
    Sun Y, Wang Q and Li M Understanding the Contribution of Non-source Documents in Improving Missing Link Recovery Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, (1-10)
  177. ACM
    Thung F Automatic prediction of bug fixing effort measured by code churn size Proceedings of the 5th International Workshop on Software Mining, (18-23)
  178. Apiletti D, Baralis E, Cerquitelli T, Garza P, Giordano D, Mellia M and Venturini L (2016). SeLINA, IEEE Transactions on Network and Service Management, 13:3, (696-710), Online publication date: 1-Sep-2016.
  179. Acharya U, Chowriappa P, Fujita H, Bhat S, Dua S, Koh J, Eugene L, Kongmebhol P and Ng K (2016). Thyroid lesion classification in 242 patient population using Gabor transform features from high resolution ultrasound images, Knowledge-Based Systems, 107:C, (235-245), Online publication date: 1-Sep-2016.
  180. Acharya U, Fujita H, Sudarshan V, Mookiah M, Koh J, Tan J, Hagiwara Y, Chua C, Junnarkar S, Vijayananthan A and Ng K (2016). An integrated index for identification of fatty liver disease using radon transform and discrete cosine transform features in ultrasound images, Information Fusion, 31:C, (43-53), Online publication date: 1-Sep-2016.
  181. Raghavendra U, Rajendra Acharya U, Fujita H, Gudigar A, Tan J and Chokkadi S (2016). Application of Gabor wavelet and Locality Sensitive Discriminant Analysis for automated identification of breast cancer using digitized mammogram images, Applied Soft Computing, 46:C, (151-161), Online publication date: 1-Sep-2016.
  182. Bishnu P and Bhattacherjee V (2016). Software cost estimation based on modified K-Modes clustering Algorithm, Natural Computing: an international journal, 15:3, (415-422), Online publication date: 1-Sep-2016.
  183. Park J, Lee M, Kim J, Hwang S and Kim S (2016). Cost-aware triage ranking algorithms for bug reporting systems, Knowledge and Information Systems, 48:3, (679-705), Online publication date: 1-Sep-2016.
  184. Helal N, Ismail R, Badr N and Mostafa M (2016). A novel social network mining approach for customer segmentation and viral marketing, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 6:5, (177-189), Online publication date: 1-Sep-2016.
  185. ACM
    Arulselvi A, SendhilKumar S and Mahalakshmi G Provenance based Trust computation for Recommendation in Social Network Proceedings of the International Conference on Informatics and Analytics, (1-7)
  186. ACM
    Sumathi G, Sendhilkumar S and Mahalakshmi G Hybrid Recommendation System using Particle Swarm Optimization and User Access Based Ranking Proceedings of the International Conference on Informatics and Analytics, (1-9)
  187. ACM
    Reena and Kumar R Effect of Randomization for Privacy Preservation on Classification Tasks Proceedings of the International Conference on Informatics and Analytics, (1-5)
  188. ACM
    Tayal K and Ravi V Particle Swarm Optimization Trained Class Association Rule Mining Proceedings of the International Conference on Informatics and Analytics, (1-8)
  189. Samarah S (2016). Vector-based data prediction model for wireless sensor networks, International Journal of High Performance Computing and Networking, 9:4, (310-315), Online publication date: 1-Aug-2016.
  190. Zhang W, Xiao F, Li B and Zhang S (2016). Using SVD on Clusters to Improve Precision of Interdocument Similarity Measure, Computational Intelligence and Neuroscience, 2016, (1), Online publication date: 1-Aug-2016.
  191. Siddiqa A, Hashem I, Yaqoob I, Marjani M, Shamshirband S, Gani A and Nasaruddin F (2016). A survey of big data management, Journal of Network and Computer Applications, 71:C, (151-166), Online publication date: 1-Aug-2016.
  192. Chernogorov F, Chernov S, Brigatti K and Ristaniemi T (2016). Sequence-based detection of sleeping cell failures in mobile networks, Wireless Networks, 22:6, (2029-2048), Online publication date: 1-Aug-2016.
  193. Nekkaa M and Boughaci D (2016). Hybrid Harmony Search Combined with Stochastic Local Search for Feature Selection, Neural Processing Letters, 44:1, (199-220), Online publication date: 1-Aug-2016.
  194. Fumarola F, Lanotte P, Ceci M and Malerba D (2016). CloFAST, Knowledge and Information Systems, 48:2, (429-463), Online publication date: 1-Aug-2016.
  195. Geler Z, Kurbalija V, Radovanović M and Ivanović M (2016). Comparison of different weighting schemes for the kNN classifier on time-series data, Knowledge and Information Systems, 48:2, (331-378), Online publication date: 1-Aug-2016.
  196. Yu J, Huang Q and Yian C (2016). DroidScreening, Security and Communication Networks, 9:11, (1435-1449), Online publication date: 25-Jul-2016.
  197. ACM
    Wang Y, Liu X and Hsu C (2016). UPDATE, ACM Transactions on Embedded Computing Systems, 15:3, (1-26), Online publication date: 21-Jul-2016.
  198. ACM
    Saleiro P, Gomes L and Soares C Sentiment Aggregate Functions for Political Opinion Polling using Microblog Streams Proceedings of the Ninth International C* Conference on Computer Science & Software Engineering, (44-50)
  199. ACM
    B. Le T, Lo D, Le Goues C and Grunske L A learning-to-rank based fault localization approach using likely invariants Proceedings of the 25th International Symposium on Software Testing and Analysis, (177-188)
  200. Weng C (2016). Discovering highly expected utility itemsets for revenue prediction, Knowledge-Based Systems, 104:C, (39-51), Online publication date: 15-Jul-2016.
  201. ACM
    Gras B, Brun A and Boyer A Identifying Grey Sheep Users in Collaborative Filtering Proceedings of the 2016 Conference on User Modeling Adaptation and Personalization, (17-26)
  202. ACM
    Reyhani Hamedani M and Kim S SimCC-AT Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, (1005-1008)
  203. Klepac G (2016). Customer Profiling in Complex Analytical Environments Using Swarm Intelligence Algorithms, International Journal of Swarm Intelligence Research, 7:3, (43-70), Online publication date: 1-Jul-2016.
  204. Hasan A and Meziane F (2016). Automated screening of MRI brain scanning using grey level statistics, Computers and Electrical Engineering, 53:C, (276-291), Online publication date: 1-Jul-2016.
  205. Silva L, Santos A, Bravo R, Silva A, Muchaluat-Saade D and Conci A (2016). Hybrid analysis for indicating patients with breast cancer using temperature time series, Computer Methods and Programs in Biomedicine, 130:C, (142-153), Online publication date: 1-Jul-2016.
  206. Küçükkülahlı E, Erdoğmuş P and Polat K (2016). Histogram-based automatic segmentation of images, Neural Computing and Applications, 27:5, (1445-1450), Online publication date: 1-Jul-2016.
  207. Cotta C, Fernández-Leiva A, Vega F, Chávez F, Merelo J, Castillo P, Camacho D and R-Moreno M Application Areas of Ephemeral Computing Transactions on Computational Collective Intelligence XXIV - Volume 9770, (153-167)
  208. References Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  209. Appendixes Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  210. Toward A Unified System for Text Management and Analysis Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  211. Joint Analysis of Text and Structured Data Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  212. Opinion Mining and Sentiment Analysis Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  213. Text Summarization Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  214. Text Categorization Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  215. Text Clustering Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  216. Word Association Mining Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  217. Overview of Text Data Analysis Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  218. Web Search Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  219. Search Engine Evaluation Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  220. Search Engine Implementation Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  221. Feedback Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  222. Retrieval Models Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  223. MeTA : A Unified Toolkit for Text Data Management and Analysis Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  224. Background Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  225. Introduction Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  226. Preface Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
  227. Moltaji A, Runions A and Samavati F A Subdivision Framework for Partition of Unity Parametrics Proceedings of the 42nd Graphics Interface Conference, (21-31)
  228. Chen Z, Lin T, Tang N and Xia X (2016). A Parallel Genetic Algorithm Based Feature Selection and Parameter Optimization for Support Vector Machine, Scientific Programming, 2016, (1), Online publication date: 1-Jun-2016.
  229. Yi X, Paulet R, Bertino E and Xu G (2016). Private Cell Retrieval From Data Warehouses, IEEE Transactions on Information Forensics and Security, 11:6, (1346-1361), Online publication date: 1-Jun-2016.
  230. Perovšek M, Kranjc J, Erjavec T, Cestnik B and Lavrač N (2016). TextFlows, Science of Computer Programming, 121:C, (128-152), Online publication date: 1-Jun-2016.
  231. Hodge V, O'Keefe S and Austin J (2016). Hadoop neural network for parallel and distributed feature selection, Neural Networks, 78:C, (24-35), Online publication date: 1-Jun-2016.
  232. Malhotra K, Navathe S, Chau D, Hadjipanayis C and Sun J (2016). Constraint based temporal event sequence mining for Glioblastoma survival prediction, Journal of Biomedical Informatics, 61:C, (267-275), Online publication date: 1-Jun-2016.
  233. Fernández A, Elkano M, Galar M, Sanz J, Alshomrani S, Bustince H and Herrera F (2016). Enhancing evolutionary fuzzy systems for multi-class problems, International Journal of Approximate Reasoning, 73:C, (108-122), Online publication date: 1-Jun-2016.
  234. Li J (2016). Assessing spatial predictive models in the environmental sciences, Environmental Modelling & Software, 80:C, (1-8), Online publication date: 1-Jun-2016.
  235. Xiao H, Xiao Z and Wang Y (2016). Ensemble classification based on supervised clustering for credit scoring, Applied Soft Computing, 43:C, (73-86), Online publication date: 1-Jun-2016.
  236. Hsu C and Huang W (2016). Integrated dimensionality reduction technique for mixed-type data involving categorical values, Applied Soft Computing, 43:C, (199-209), Online publication date: 1-Jun-2016.
  237. Gupta A and Kohli S (2016). An MCDM approach towards handling outliers in web data, Artificial Intelligence Review, 46:1, (59-82), Online publication date: 1-Jun-2016.
  238. Sorato D, Goularte F, Nassar S and Fileto R Analysis of Methods and Tools for Relevant Words Recognition in Microblogs Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (345-352)
  239. Ordonez C and García-García J Managing big data analytics workflows with a database system Proceedings of the 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, (649-655)
  240. ACM
    Cheung S, Chen W, Liu Y and Xu C CUSTODES Proceedings of the 38th International Conference on Software Engineering, (464-475)
  241. ACM
    Lin Q, Lou J, Zhang H and Zhang D iDice Proceedings of the 38th International Conference on Software Engineering, (214-224)
  242. ACM
    Hatem Y, Rady S, Ismail R and Bahnasy K Automatic Content Description and Annotation of Sport Images using Classification Techniques Proceedings of the 10th International Conference on Informatics and Systems, (88-94)
  243. ACM
    Mitra B, Sural S, Vaidya J and Atluri V (2016). A Survey of Role Mining, ACM Computing Surveys, 48:4, (1-37), Online publication date: 2-May-2016.
  244. Iqbal M and Hayat M (2016). "iSS-Hyb-mRMR", Computer Methods and Programs in Biomedicine, 128:C, (1-11), Online publication date: 1-May-2016.
  245. Moharana U and Sarmah S (2016). Determination of optimal order-up to level quantities for dependent spare parts using data mining, Computers and Industrial Engineering, 95:C, (27-40), Online publication date: 1-May-2016.
  246. Peker M (2016). A decision support system to improve medical diagnosis using a combination of k-medoids clustering based attribute weighting and SVM, Journal of Medical Systems, 40:5, (1-16), Online publication date: 1-May-2016.
  247. ACM
    Hamedani M An efficient and effective link-based similarity measure in social and information networks Proceedings of the 31st Annual ACM Symposium on Applied Computing, (908-909)
  248. ACM
    Tomasini C, Emmendorfer L, Borges E and Machado K A methodology for selecting the most suitable cluster validation internal indices Proceedings of the 31st Annual ACM Symposium on Applied Computing, (901-903)
  249. ACM
    Hamedani M and Kim S SimRank and its variants in academic literature data Proceedings of the 31st Annual ACM Symposium on Applied Computing, (1102-1107)
  250. Kasemsap K (2016). The Fundamentals of Business Intelligence, International Journal of Organizational and Collective Intelligence, 6:2, (12-25), Online publication date: 1-Apr-2016.
  251. Liu J, Luo Y and Ju Z (2016). An Interactive Astronaut-Robot System with Gesture Control, Computational Intelligence and Neuroscience, 2016, Online publication date: 1-Apr-2016.
  252. Lutu A, Bagnulo M, Pelsser C, Maennel O and Cid-Sueiro J (2016). The BGP visibility toolkit, IEEE/ACM Transactions on Networking, 24:2, (1237-1250), Online publication date: 1-Apr-2016.
  253. Nancy Jane Y, Khanna Nehemiah H and Arputharaj K (2016). A Q-backpropagated time delay neural network for diagnosing severity of gait disturbances in Parkinson's disease, Journal of Biomedical Informatics, 60:C, (169-176), Online publication date: 1-Apr-2016.
  254. Siuly , Yin X, Hadjiloucas S and Zhang Y (2016). Classification of THz pulse signals using two-dimensional cross-correlation feature extraction and non-linear classifiers, Computer Methods and Programs in Biomedicine, 127:C, (64-82), Online publication date: 1-Apr-2016.
  255. ACM
    Rathi S, Soni R and Kushwah V A New Algorithm for Privacy Preservation in Utility Mining Using Genetic Algorithm Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-6)
  256. ACM
    Eknath V and Dhananjay G Emerging opportunities in Domain Specific Search Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-4)
  257. ACM
    Mishra D and Soni D An Integrated Method for Outlier Detection with Analytical Study of Distance Based and Angle Based Approaches Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-5)
  258. AlShawi A (2016). Applying Data Mining Techniques to Improve Information Security in the Cloud, Scientific Programming, 2016, (7), Online publication date: 1-Mar-2016.
  259. Kuang L, Liao Z, Feng W, He H and Zhang B (2016). Multimedia services quality prediction based on the association mining between context and QoS properties, Signal Processing, 120:C, (767-776), Online publication date: 1-Mar-2016.
  260. Tian F, Wu F, Chao K, Zheng Q, Shah N, Lan T and Yue J (2016). A topic sentence-based instance transfer method for imbalanced sentiment classification of Chinese product reviews, Electronic Commerce Research and Applications, 16:C, (66-76), Online publication date: 1-Mar-2016.
  261. Gorzałczany M and Rudziński F (2016). A multi-objective genetic optimization for fast, fuzzy rule-based credit classification with balanced accuracy and interpretability, Applied Soft Computing, 40:C, (206-220), Online publication date: 1-Mar-2016.
  262. ACM
    Esfahani N, Yuan E, Canavera K and Malek S (2016). Inferring Software Component Interaction Dependencies for Adaptation Support, ACM Transactions on Autonomous and Adaptive Systems, 10:4, (1-32), Online publication date: 3-Feb-2016.
  263. Barak A and Gelbard R (2016). Classification by clustering using an extended saliency measure, Expert Systems: The Journal of Knowledge Engineering, 33:1, (46-59), Online publication date: 1-Feb-2016.
  264. Tang M, Tahboub R, Aref W, Atallah M, Malluhi Q, Ouzzani M and Silva Y (2016). Similarity Group-by Operators for Multi-Dimensional Relational Data, IEEE Transactions on Knowledge and Data Engineering, 28:2, (510-523), Online publication date: 1-Feb-2016.
  265. Khan F, Qamar U and Bashir S (2016). SentiMI, Applied Soft Computing, 39:C, (140-153), Online publication date: 1-Feb-2016.
  266. Faria E, Gonçalves I, Carvalho A and Gama J (2016). Novelty detection in data streams, Artificial Intelligence Review, 45:2, (235-269), Online publication date: 1-Feb-2016.
  267. ACM
    Li J, Le T, Liu L, Liu J, Jin Z, Sun B and Ma S (2015). From Observational Studies to Causal Rule Mining, ACM Transactions on Intelligent Systems and Technology, 7:2, (1-27), Online publication date: 22-Jan-2016.
  268. Xiao W, Yang Y, Wang H, Li T and Xing H (2016). Semi-supervised hierarchical clustering ensemble and its application, Neurocomputing, 173:P3, (1362-1376), Online publication date: 15-Jan-2016.
  269. Kumar D and Arora S (2016). A Hybrid Approach Using Maximum Entropy and Bayesian Learning for Detecting Delinquency in Financial Industry, International Journal of Knowledge-Based Organizations, 6:1, (60-73), Online publication date: 1-Jan-2016.
  270. Samarah S (2016). Vector-based data prediction model for wireless sensor networks, International Journal of High Performance Computing and Networking, 9:4, (310-315), Online publication date: 1-Jan-2016.
  271. Liang Z, Sun J, Lin Q, Du Z, Chen J and Ming Z (2016). A novel multiple rule sets data classification algorithm based on ant colony algorithm, Applied Soft Computing, 38:C, (1000-1011), Online publication date: 1-Jan-2016.
  272. Weng C (2016). Identifying association rules of specific later-marketed products, Applied Soft Computing, 38:C, (518-529), Online publication date: 1-Jan-2016.
  273. Vijayalakshmi R, Nandagopal D, Dasari N, Cocks B, Dahal N and Thilaga M (2015). Minimum connected component - A novel approach to detection of cognitive load induced changes in functional brain networks, Neurocomputing, 170:C, (15-31), Online publication date: 25-Dec-2015.
  274. Singh M Information Exploration in E-Commerce Databases Proceedings of the 4th International Conference on Big Data Analytics - Volume 9498, (41-56)
  275. Liu T, Lin Z, Ong M, Koh Z, Pek P, Yeo Y, Oh B, Ho A and Liu N (2015). Manifold ranking based scoring system with its application to cardiac arrest prediction, Computers in Biology and Medicine, 67:C, (74-82), Online publication date: 1-Dec-2015.
  276. Barthelot F, Goc M and Pascual E Influence of Seasons on Human Behavior in Smart Environments Proceedings of the 7th International Work-Conference on Ambient Assisted Living. ICT-based Solutions in Real Life Situations - Volume 9455, (146-151)
  277. ACM
    von Rüden L, Hermanns M, Behrisch M, Keim D, Mohr B and Wolf F Separating the wheat from the chaff Proceedings of the 2nd Workshop on Visual Performance Analysis, (1-8)
  278. Ansari Z, Sattar S, Babu A and Azeem M (2015). Mountain density-based fuzzy approach for discovering web usage clusters from web log data, Fuzzy Sets and Systems, 279:C, (40-63), Online publication date: 15-Nov-2015.
  279. Kabir M, Xu S, Kang B and Zhao Z A New Evolutionary Algorithm for Extracting a Reduced Set of Interesting Association Rules Proceeings, Part II, of the 22nd International Conference on Neural Information Processing - Volume 9490, (133-142)
  280. Kabir M, Xu S, Kang B and Zhao Z Discovery of Interesting Association Rules Using Genetic Algorithm with Adaptive Mutation Proceeings, Part II, of the 22nd International Conference on Neural Information Processing - Volume 9490, (96-105)
  281. Martínez-Usó A, Hernández-Orallo J, Ramírez-Quintana M and Plumed F Pentaho + R Proceedings of the 16th Conference of the Spanish Association for Artificial Intelligence on Advances in Artificial Intelligence - Volume 9422, (234-244)
  282. Shambour Q and Lu J (2015). An effective recommender system by unifying user and item trust information for B2B applications, Journal of Computer and System Sciences, 81:7, (1110-1126), Online publication date: 1-Nov-2015.
  283. Lin K and Chung S (2015). A fast and resource efficient mining algorithm for discovering frequent patterns in distributed computing environments, Future Generation Computer Systems, 52:C, (49-58), Online publication date: 1-Nov-2015.
  284. Ahmad S, Kabir M and Hayat M (2015). Identification of Heat Shock Protein families and J-protein types by incorporating Dipeptide Composition into Chou's general PseAAC, Computer Methods and Programs in Biomedicine, 122:2, (165-174), Online publication date: 1-Nov-2015.
  285. Czibula G, Czibula I, Sîrbu A and Mircea I (2015). A novel approach to adaptive relational association rule mining, Applied Soft Computing, 36:C, (519-533), Online publication date: 1-Nov-2015.
  286. Lee J, Yeh W and Chuang M (2015). Web page classification based on a simplified swarm optimization, Applied Mathematics and Computation, 270:C, (13-24), Online publication date: 1-Nov-2015.
  287. Zhu J, Jiang W, Liu A, Liu G and Zhao L Time-Dependent Popular Routes Based Trajectory Outlier Detection Proceedings, Part I, of the 16th International Conference on Web Information Systems Engineering --- WISE 2015 - Volume 9418, (16-30)
  288. ACM
    Arnold S, Löser A and Kilias T Resolving Common Analytical Tasks in Text Databases Proceedings of the ACM Eighteenth International Workshop on Data Warehousing and OLAP, (75-84)
  289. ACM
    Kim Y, Park Y, Lee J, Choi I, Kim D and Yu H Discovery of Prostate Specific Antigen Pattern to Predict Castration Resistant Prostate Cancer of Androgen Deprivation Therapy Proceedings of the ACM Ninth International Workshop on Data and Text Mining in Biomedical Informatics, (13-13)
  290. ACM
    Gandhi S, Oates T, Boedihardjo A, Chen C, Lin J, Senin P, Frankenstein S and Wang X A Generative Model For Time Series Discretization Based On Multiple Normal Distributions Proceedings of the 8th Workshop on Ph.D. Workshop in Information and Knowledge Management, (19-25)
  291. ACM
    Chae D, Kim S, Cho S and Kim Y DAAV Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, (1819-1822)
  292. ACM
    Beecks C, Uysal M, Hermanns J and Seidl T Gradient-based Signatures for Efficient Similarity Search in Large-scale Multimedia Databases Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, (1241-1250)
  293. ACM
    Vakeel K and Dey S Improving tweet clustering using bigrams formed from word associations Proceedings of the 2015 Conference on research in adaptive and convergent systems, (108-113)
  294. ACM
    Kang B, Yerima S, McLaughlin K and Sezer S PageRank in malware categorization Proceedings of the 2015 Conference on research in adaptive and convergent systems, (291-295)
  295. Armin M, Visser H, Chetty G, Dumas C, Conlan D, Grimpen F and Salvado O Visibility Map Proceedings of the 18th International Conference on Medical Image Computing and Computer-Assisted Intervention -- MICCAI 2015 - Volume 9349, (396-404)
  296. Klepac G (2015). Particle Swarm Optimization Algorithm as a Tool for Profile Optimization, International Journal of Natural Computing Research, 5:4, (1-23), Online publication date: 1-Oct-2015.
  297. Kalegele K, Sasai K, Takahashi H, Kitagata G and Kinoshita T (2015). Four Decades of Data Mining in Network and Systems Management, IEEE Transactions on Knowledge and Data Engineering, 27:10, (2700-2716), Online publication date: 1-Oct-2015.
  298. Sun X, Li B, Leung H, Li B and Li Y (2015). MSR4SM, Information and Software Technology, 66:C, (1-12), Online publication date: 1-Oct-2015.
  299. Jabez Christopher J, Khanna Nehemiah H and Kannan A (2015). A clinical decision support system for diagnosis of Allergic Rhinitis based on intradermal skin tests, Computers in Biology and Medicine, 65:C, (76-84), Online publication date: 1-Oct-2015.
  300. (2015). An improved data stream algorithm for clustering, Computational Geometry: Theory and Applications, 48:9, (635-645), Online publication date: 1-Oct-2015.
  301. Alweshah M and Abdullah S (2015). Hybridizing firefly algorithms with a probabilistic neural network for solving classification problems, Applied Soft Computing, 35:C, (513-524), Online publication date: 1-Oct-2015.
  302. ACM
    Le Goc M, Barthelot F and Pascual E Seasonality of Human Behavior in Smart Buildings Proceedings of the 16th International Conference on Engineering Applications of Neural Networks (INNS), (1-10)
  303. ACM
    Maleki E, Sadrhosseini H and Ghiami A Investigation of Artificial Neural Networks Capability to Predict Viscosity of Lubricants Used in Journal Bearings Proceedings of the The International Conference on Engineering & MIS 2015, (1-7)
  304. ACM
    Maleki N and Maleki E Modeling of Cathode Pt /C Electrocatalyst Degradation and Performance of a PEMFC using Artificial Neural Network Proceedings of the The International Conference on Engineering & MIS 2015, (1-8)
  305. ACM
    George P and Vinod P Machine learning approach for filtering spam emails Proceedings of the 8th International Conference on Security of Information and Networks, (271-274)
  306. Yiyong Feng and Palomar D (2015). Normalization of Linear Support Vector Machines, IEEE Transactions on Signal Processing, 63:17, (4673-4688), Online publication date: 1-Sep-2015.
  307. Castan-Puga M, Flores-Parra J, Castro J, Gaxiola-Pacheco C and Palafox-Maestre L (2015). Building Java Intelligent Applications Data Mining for Java Type-2 Fuzzy Inference Systems, Procedia Computer Science, 51:C, (2719-2728), Online publication date: 1-Sep-2015.
  308. ACM
    Tekieh M and Raahemi B Importance of Data Mining in Healthcare Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (1057-1062)
  309. ACM
    Yang H and Yang C (2015). Using Health-Consumer-Contributed Data to Detect Adverse Drug Reactions by Association Mining with Temporal Analysis, ACM Transactions on Intelligent Systems and Technology, 6:4, (1-27), Online publication date: 13-Aug-2015.
  310. ACM
    Jakhmola S and Pradhan T A Computational Approach of Data Smoothening and Prediction of Diabetes Dataset Proceedings of the Third International Symposium on Women in Computing and Informatics, (744-748)
  311. ACM
    Bhangale U and Durbha S High performance SIFT features clustering of VHR satellite images for disaster management Proceedings of the Third International Symposium on Women in Computing and Informatics, (324-329)
  312. ACM
    Basu Roy S, Teredesai A, Zolfaghar K, Liu R, Hazel D, Newman S and Marinez A Dynamic Hierarchical Classification for Patient Risk-of-Readmission Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1691-1700)
  313. Yanbo Wu , Hong Shen and Sheng Q (2015). A Cloud-Friendly RFID Trajectory Clustering Algorithm in Uncertain Environments, IEEE Transactions on Parallel and Distributed Systems, 26:8, (2075-2088), Online publication date: 1-Aug-2015.
  314. Dólera Tormo G, Gómez Mármol F and Martínez Pérez G (2015). Dynamic and flexible selection of a reputation mechanism for heterogeneous environments, Future Generation Computer Systems, 49:C, (113-124), Online publication date: 1-Aug-2015.
  315. Purwar A and Singh S (2015). Hybrid prediction model with missing value imputation for medical data, Expert Systems with Applications: An International Journal, 42:13, (5621-5631), Online publication date: 1-Aug-2015.
  316. Carvalho J, Santoro F and Revoredo K (2015). A method to infer the need to update situations in business process adaptation, Computers in Industry, 71:C, (128-143), Online publication date: 1-Aug-2015.
  317. (2015). Evaluating machine learning and statistical prediction techniques for landslide susceptibility modeling, Computers & Geosciences, 81:C, (1-11), Online publication date: 1-Aug-2015.
  318. Song K, Feng S, Gao W, Wang D, Yu G and Wong K Personalized sentiment classification based on latent individuality of microblog users Proceedings of the 24th International Conference on Artificial Intelligence, (2277-2283)
  319. Alzahrani N, Alsulim R, Alaseem N and Badr G Data Analysis for Courses Registration Proceedings of the 11th International Conference on Machine Learning and Data Mining in Pattern Recognition - Volume 9166, (357-367)
  320. De Jesus Silva L, Claro D and Lopes D (2015). Semantic-based clustering of web services, Journal of Web Engineering, 14:3-4, (325-345), Online publication date: 1-Jul-2015.
  321. Raghu Vamsi Krishna T, Barnwal R and Ghosh S (2015). CAT, Vehicular Communications, 2:3, (150-157), Online publication date: 1-Jul-2015.
  322. ACM
    Mauder M, Ntoutsi E, Kröger P and Grupe G Data mining for isotopic mapping of bioarchaeological finds in a central european alpine passage Proceedings of the 27th International Conference on Scientific and Statistical Database Management, (1-6)
  323. Ge W, Hu W, He C and Zong S Emerging Pragmatic Patterns in Large-Scale RDF Data Revised Selected Papers of the Second International Conference on Cloud Computing and Big Data - Volume 9106, (247-260)
  324. ACM
    Goldsmith J, Mattei N and Sloan R (2015). Who is watching you eat?, AI Matters, 1:4, (13-22), Online publication date: 16-Jun-2015.
  325. ACM
    Feldkamp N, Bergmann S and Strassburger S Knowledge Discovery in Manufacturing Simulations Proceedings of the 3rd ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, (3-12)
  326. Dabbagh M, Hamdaoui B, Guizani M and Rayes A (2015). Software-defined networking security: pros and cons, IEEE Communications Magazine, 53:6, (73-79), Online publication date: 1-Jun-2015.
  327. Rajendra Acharya U, Vidya K, Ghista D, Lim W, Molinari F and Sankaranarayanan M (2015). Computer-aided diagnosis of diabetic subjects by heart rate variability signals using discrete wavelet transform method, Knowledge-Based Systems, 81:C, (56-64), Online publication date: 1-Jun-2015.
  328. ACM
    Zhou X, Chen L, Zhang Y, Cao L, Huang G and Wang C Online Video Recommendation in Sharing Community Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (1645-1656)
  329. Vieira P and Lino N Multimedia Content Recommendation in Digital Convergence Environments Proceedings of the annual conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective - Volume 1, (103-110)
  330. Faria F, Pereira A and Merschmann L Prediction of Artists' Rankings by Regression Proceedings of the annual conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective - Volume 1, (95-102)
  331. Le T, Linares-Vásquez M, Lo D and Poshyvanyk D RCLinker Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension, (36-47)
  332. Mora-López L and Mora J (2015). An adaptive algorithm for clustering cumulative probability distribution functions using the Kolmogorov-Smirnov two-sample test, Expert Systems with Applications: An International Journal, 42:8, (4016-4021), Online publication date: 15-May-2015.
  333. Atanassov K (2015). Intuitionistic fuzzy logics as tools for evaluation of Data Mining processes, Knowledge-Based Systems, 80:C, (122-130), Online publication date: 1-May-2015.
  334. (2015). ELBlocker, Information and Software Technology, 61:C, (93-106), Online publication date: 1-May-2015.
  335. Ghazarian S and Nematbakhsh M (2015). Enhancing memory-based collaborative filtering for group recommender systems, Expert Systems with Applications: An International Journal, 42:7, (3801-3812), Online publication date: 1-May-2015.
  336. Nassiri-Mofakham F, Ali Nematbakhsh M, Baraani-Dastjerdi A, Ghasem-Aghaee N and Kowalczyk R (2015). Bidding strategy for agents in multi-attribute combinatorial double auction, Expert Systems with Applications: An International Journal, 42:6, (3268-3295), Online publication date: 15-Apr-2015.
  337. ACM
    Xuan X, Lo D, Xia X and Tian Y Evaluating defect prediction approaches using a massive set of metrics Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1644-1647)
  338. ACM
    Li S, Kao Y, Zhang Z, Chuang Y and Yen D (2015). A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means, ACM Transactions on Management Information Systems, 6:1, (1-30), Online publication date: 3-Apr-2015.
  339. Djenouri Y, Bendjoudi A, Mehdi M, Nouali-Taboudjemat N and Habbas Z (2015). GPU-based bees swarm optimization for association rules mining, The Journal of Supercomputing, 71:4, (1318-1344), Online publication date: 1-Apr-2015.
  340. Wang Y and Chuang C (2015). Efficient eNB deployment strategy for heterogeneous cells in 4G LTE systems, Computer Networks: The International Journal of Computer and Telecommunications Networking, 79:C, (297-312), Online publication date: 14-Mar-2015.
  341. Hao Liu , Yuezhi Zhou and Yaoxue Zhang (2015). Estimating users' home and work locations leveraging large-scale crowd-sourced smartphone data, IEEE Communications Magazine, 53:3, (71-79), Online publication date: 1-Mar-2015.
  342. Fu X, Secci S, Huang D and Jana R (2015). Mobile cloud computing [Guest Edotorial], IEEE Communications Magazine, 53:3, (61-62), Online publication date: 1-Mar-2015.
  343. Patel J, Shah S, Thakkar P and Kotecha K (2015). Predicting stock market index using fusion of machine learning techniques, Expert Systems with Applications: An International Journal, 42:4, (2162-2172), Online publication date: 1-Mar-2015.
  344. Kim D, Yan P and Zhang J (2015). Detecting fake anti-virus software distribution webpages, Computers and Security, 49:C, (95-106), Online publication date: 1-Mar-2015.
  345. Palacios A, Palacios J, Sánchez L and Alcalá-Fdez J (2015). Genetic learning of the membership functions for mining fuzzy association rules from low quality data, Information Sciences: an International Journal, 295:C, (358-378), Online publication date: 20-Feb-2015.
  346. Dreżewski R, Sepielak J and Filipkowski W (2015). The application of social network analysis algorithms in a system supporting money laundering detection, Information Sciences: an International Journal, 295:C, (18-32), Online publication date: 20-Feb-2015.
  347. ACM
    Chawla I and Singh S An Automated approach for Bug Categorization using Fuzzy Logic Proceedings of the 8th India Software Engineering Conference, (90-99)
  348. Moro S, Cortez P and Rita P (2015). Business intelligence in banking, Expert Systems with Applications: An International Journal, 42:3, (1314-1324), Online publication date: 15-Feb-2015.
  349. Chemchem A and Drias H (2015). From data mining to knowledge mining, Expert Systems with Applications: An International Journal, 42:3, (1436-1445), Online publication date: 15-Feb-2015.
  350. Bhattacharyya M and Bandyopadhyay S (2015). Finding quasi core with simulated stacked neural networks, Information Sciences: an International Journal, 294:C, (1-14), Online publication date: 10-Feb-2015.
  351. ACM
    Saeed I, Young J and Yalamanchili S A portable benchmark suite for highly parallel data intensive query processing Proceedings of the 2nd Workshop on Parallel Programming for Analytics Applications, (31-38)
  352. Acharya U, Faust O, Molinari F, Sree S, Junnarkar S and Sudarshan V (2015). Ultrasound-based tissue characterization and classification of fatty liver disease, Knowledge-Based Systems, 75:C, (66-77), Online publication date: 1-Feb-2015.
  353. Kundu A, Jain V, Kumar S and Chandra C (2015). A journey from normative to behavioral operations in supply chain management, Expert Systems with Applications: An International Journal, 42:2, (796-809), Online publication date: 1-Feb-2015.
  354. Wang J, Lin Y and Hou S (2015). A data mining approach for training evaluation in simulation-based training, Computers and Industrial Engineering, 80:C, (171-180), Online publication date: 1-Feb-2015.
  355. Lee S (2015). Analyzing negative SNS behaviors of elementary and middle school students in Korea, Computers in Human Behavior, 43:C, (15-27), Online publication date: 1-Feb-2015.
  356. Shin Y, Myers S, Gupta M and Radivojac P (2015). A link graph-based approach to identify forum spam, Security and Communication Networks, 8:2, (176-188), Online publication date: 25-Jan-2015.
  357. ACM
    Bonnin G and Jannach D (2014). Automated Generation of Music Playlists: Survey and Experiments, ACM Computing Surveys, 47:2, (1-35), Online publication date: 8-Jan-2015.
  358. Spruit M and Pachidi S (2015). The Performance Mining Method, International Journal of Business Intelligence Research, 6:1, (11-29), Online publication date: 1-Jan-2015.
  359. Li C and Liu Y (2016). SRDA, International Journal of Distributed Sensor Networks, 2015, (162-162), Online publication date: 1-Jan-2015.
  360. El Salhi S, Coenen F, Dixon C and Khan M (2015). Predicting "springback" using 3D surface representation techniques, Expert Systems with Applications: An International Journal, 42:1, (79-93), Online publication date: 1-Jan-2015.
  361. Patel J, Shah S, Thakkar P and Kotecha K (2015). Predicting stock and stock price index movement using Trend Deterministic Data Preparation and machine learning techniques, Expert Systems with Applications: An International Journal, 42:1, (259-268), Online publication date: 1-Jan-2015.
  362. Liao H, Chen K and Liu D (2015). Virtual friend recommendations in virtual worlds, Decision Support Systems, 69:C, (59-69), Online publication date: 1-Jan-2015.
  363. Nasir S, Mahmood T, Shaikh M and Shaikh Z (2015). Fault-tolerant context development and requirement validation in ERP systems, Computer Standards & Interfaces, 37:C, (9-19), Online publication date: 1-Jan-2015.
  364. Yang Z, Guo Y, Li C and Shao Y (2015). Local k-proximal plane clustering, Neural Computing and Applications, 26:1, (199-211), Online publication date: 1-Jan-2015.
  365. ACM
    Barowy D, Gochev D and Berger E (2014). CheckCell, ACM SIGPLAN Notices, 49:10, (507-523), Online publication date: 31-Dec-2015.
  366. Alshamiri A, Surampudi B and Singh A A Novel ELM K-Means Algorithm for Clustering Swarm, Evolutionary, and Memetic Computing, (212-222)
  367. Lee J, Jang H and Kim J RpStacks Proceedings of the 47th Annual IEEE/ACM International Symposium on Microarchitecture, (255-267)
  368. Kalbasi A, Krishnamurthy D, Rolia J and Singhal S Simulation by example for complex systems Proceedings of the 2014 Winter Simulation Conference, (974-985)
  369. ACM
    Le N and Anh D Extracting rules from neural networks for time series prediction Proceedings of the 5th Symposium on Information and Communication Technology, (218-225)
  370. Li L, Ma M, Lei P, Leng M and Chen X (2014). S2R&R2S, Journal of Information Science, 40:6, (723-735), Online publication date: 1-Dec-2014.
  371. (2014). A high performing metaheuristic for multi-objective flowshop scheduling problem, Computers and Operations Research, 52:PB, (149-156), Online publication date: 1-Dec-2014.
  372. Pérez-Castillo R, Caivano D and Piattini M (2014). Ontology-based similarity applied to business process clustering, Journal of Software: Evolution and Process, 26:12, (1128-1149), Online publication date: 1-Dec-2014.
  373. ACM
    Mass J, Srirama S, Flores H and Chang C Proximal and social-aware device-to-device communication via audio detection on cloud Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, (143-150)
  374. ACM
    Mohan A and Visakh R Weighted Frequent Pattern Mining using RDD, the Basic Spark Abstraction Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, (1-5)
  375. ACM
    Uday B and Visakh R A Dynamic System for Intrusion Detection Accomplished with Enhanced SVM through Apt Integration of Data Mining Techniques with Improved Heuristic Rules Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, (1-6)
  376. ACM
    Priya C and Philip M Network Intrusion Detection Via Pair wise Angular Distance Computation Supported By Genetic Algorithm Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, (1-5)
  377. ACM
    Yu H and Ren F Search Result Diversification via Filling Up Multiple Knapsacks Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, (609-618)
  378. Wong D, Chao L, Zeng X, Vai M and Lam H (2014). Time series for blind biosignal classification model, Computers in Biology and Medicine, 54:C, (32-36), Online publication date: 1-Nov-2014.
  379. Almeida V, Borba J, Pereira H, Pereira T, Correia C, Pêgo M and Cardoso J (2014). Cardiovascular risk analysis by means of pulse morphology and clustering methodologies, Computer Methods and Programs in Biomedicine, 117:2, (257-266), Online publication date: 1-Nov-2014.
  380. Kao H and Chen B (2014). Efficiency classification by hybrid Bayesian networks-The dynamic multidimensional models, Applied Soft Computing, 24:C, (842-850), Online publication date: 1-Nov-2014.
  381. Wang X, Liu X and Zhang L (2014). A rapid fuzzy rule clustering method based on granular computing, Applied Soft Computing, 24:C, (534-542), Online publication date: 1-Nov-2014.
  382. Fazzolari M, Alcalá R and Herrera F (2014). A multi-objective evolutionary method for learning granularities based on fuzzy discretization to improve the accuracy-complexity trade-off of fuzzy rule-based classification systems, Applied Soft Computing, 24:C, (470-481), Online publication date: 1-Nov-2014.
  383. Lakshmi Praba V and Vasantha T (2014). Efficient hyperlink analysis using robust Proportionate Prestige Score in PageRank algorithm, Applied Soft Computing, 24:C, (86-94), Online publication date: 1-Nov-2014.
  384. Hsu P, Shen Y and Xie X Predicting Movies User Ratings with Imdb Attributes Rough Sets and Knowledge Technology, (444-453)
  385. ACM
    Barowy D, Gochev D and Berger E CheckCell Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, (507-523)
  386. ACM
    Geetha M, Anandsankar B, Nair L, Amrutha T and Rajeev A An improved Human Action Recognition system using RSD Code generation Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing, (1-9)
  387. ACM
    Veningston K and Shanmugalakshmi R Information Retrieval by Document Re-ranking using Term Association Graph Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing, (1-8)
  388. ACM
    Park S, Kim H, Kim J and Han H Detecting binary theft via static major-path birthmarks Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, (224-229)
  389. ACM
    Ooi B, Tan K, Tran Q, Yip J, Chen G, Ling Z, Nguyen T, Tung A and Zhang M (2014). Contextual crowd intelligence, ACM SIGKDD Explorations Newsletter, 16:1, (39-46), Online publication date: 25-Sep-2014.
  390. ACM
    Webb A, Albin A, Ye Z, Rastegar-Mojarad M, Huang K, Parvin J, Sadee W, Li L, Lin S and Xiang Y Mining massive SNP data for identifying associated SNPs and uncovering gene relationships Proceedings of the 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics, (304-313)
  391. ACM
    Gaur H and Kumar M (2014). Assessing the understandability of a data warehouse logical model using a decision-tree approach, ACM SIGSOFT Software Engineering Notes, 39:5, (1-6), Online publication date: 17-Sep-2014.
  392. ACM
    AL-Wehaibi R and Khan M Predicting Arabic Tweet Popularity by Use of Data and Text Mining Techniques Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, (183-189)
  393. ACM
    Rsheed N and Khan M Predicting the Popularity of Trending Arabic News on Twitter Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, (15-19)
  394. ACM
    Romagnano M, Aciar S and Marchetta M FiPaWeb Proceedings of the XV International Conference on Human Computer Interaction, (1-2)
  395. ACM
    Wang Y, Zheng Y and Xue Y Travel time estimation of a path using sparse trajectories Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, (25-34)
  396. ACM
    Luo C, Lou J, Lin Q, Fu Q, Ding R, Zhang D and Wang Z Correlating events with time series for incident diagnosis Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, (1583-1592)
  397. Cai G, Wu H and Lv R Rumors detection in chinese via crowd responses Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (912-917)
  398. ACM
    Nakata M, Kovacs T and Takadama K A modified XCS classifier system for sequence labeling Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (565-572)
  399. ACM
    Ludwig S Clonal selection based fuzzy C-means algorithm for clustering Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (105-112)
  400. ACM
    Serrano D and Antunes C Condensed representation of frequent itemsets Proceedings of the 18th International Database Engineering & Applications Symposium, (168-175)
  401. ACM
    Wang Y, Nandi A and Agrawal G SAGA Proceedings of the 26th International Conference on Scientific and Statistical Database Management, (1-12)
  402. ACM
    Lemieux V, Rahmdel P, Walker R, Wong B and Flood M Clustering Techniques And their Effect on Portfolio Formation and Risk Analysis Proceedings of the International Workshop on Data Science for Macro-Modeling, (1-6)
  403. Bernard J, Steiger M, Widmer S, Lücke-Tieke H, May T and Kohlhammer J Visual-interactive exploration of interesting multivariate relations in mixed research data sets Proceedings of the 16th Eurographics Conference on Visualization, (291-300)
  404. ACM
    Thung F, Lo D, Osman M and Chaudron M Condensing class diagrams by analyzing design and network metrics using optimistic classification Proceedings of the 22nd International Conference on Program Comprehension, (110-121)
  405. ACM
    Zhou B, Xia X, Lo D, Tian C and Wang X Towards more accurate content categorization of API discussions Proceedings of the 22nd International Conference on Program Comprehension, (95-105)
  406. Jun S, Park S and Jang D (2014). Document clustering method using dimension reduction and support vector clustering to overcome sparseness, Expert Systems with Applications: An International Journal, 41:7, (3204-3212), Online publication date: 1-Jun-2014.
  407. Pimentel B and de Souza R (2014). A weighted multivariate Fuzzy C-Means method in interval-valued scientific production data, Expert Systems with Applications: An International Journal, 41:7, (3223-3236), Online publication date: 1-Jun-2014.
  408. Liu X, Guo C and Zhang L (2014). Scholar metadata and knowledge generation with human and artificial intelligence, Journal of the Association for Information Science and Technology, 65:6, (1187-1201), Online publication date: 1-Jun-2014.
  409. ACM
    Zikos D, Tsiakas K, Qudah F, Athitsos V and Makedon F Evaluation of classification methods for the prediction of hospital length of stay using medicare claims data Proceedings of the 7th International Conference on PErvasive Technologies Related to Assistive Environments, (1-6)
  410. ACM
    Di Blas N, Mazuran M, Paolini P, Quintarelli E and Tanca L Exploratory computing Proceedings of the 2014 International Working Conference on Advanced Visual Interfaces, (361-362)
  411. Song R, Sun W, Zheng B and Zheng Y (2014). PRESS, Proceedings of the VLDB Endowment, 7:9, (661-672), Online publication date: 1-May-2014.
  412. ACM
    Roitman H, Barkai G, Konopnicki D and Soffer A Measuring the effectiveness of multi-channel marketing campaigns using online chatter Proceedings of the 23rd International Conference on World Wide Web, (143-146)
  413. Chen T, Xu R, Lu Q, Liu B, Xu J, Yao L and He Z A Sentence Vector Based Over-Sampling Method for Imbalanced Emotion Classification Proceedings of the 15th International Conference on Computational Linguistics and Intelligent Text Processing - Volume 8404, (62-72)
  414. ACM
    Reuter B and Durán E Framework de recomendación automática de contenidos en foros de discusión para entornos de e-learning Proceedings of the 7th Euro American Conference on Telematics and Information Systems, (1-2)
  415. ACM
    Yang C, Yang H and Jiang L (2014). Postmarketing Drug Safety Surveillance Using Publicly Available Health-Consumer-Contributed Content in Social Media, ACM Transactions on Management Information Systems, 5:1, (1-21), Online publication date: 1-Apr-2014.
  416. Shen H, Chen Q and Qiu Q Battery aware stochastic QoS boosting in mobile computing devices Proceedings of the conference on Design, Automation & Test in Europe, (1-4)
  417. ACM
    Yoon S, Kim J, Ha J, Kim S, Ryu M and Choi H Reachability vectors Proceedings of the 29th Annual ACM Symposium on Applied Computing, (594-597)
  418. GaneshKumar P, Rani C, Devaraj D and Victoire T (2014). Hybrid ant bee algorithm for fuzzy expert system based sample classification, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 11:2, (347-360), Online publication date: 1-Mar-2014.
  419. King M, Abrahams A and Ragsdale C (2014). Ensemble methods for advanced skier days prediction, Expert Systems with Applications: An International Journal, 41:4, (1176-1188), Online publication date: 1-Mar-2014.
  420. Chen Y, Chuang C and Chiu Y (2014). Community detection based on social interactions in a social network, Journal of the Association for Information Science and Technology, 65:3, (539-550), Online publication date: 1-Mar-2014.
  421. ACM
    Bordawekar R, Blainey B and Apte C (2014). Analyzing analytics, ACM SIGMOD Record, 42:4, (17-28), Online publication date: 28-Feb-2014.
  422. ACM
    Shivhare J and Rath S Software effort estimation using machine learning techniques Proceedings of the 7th India Software Engineering Conference, (1-6)
  423. ACM
    Masri W and Assi R (2014). Prevalence of coincidental correctness and mitigation of its impact on fault localization, ACM Transactions on Software Engineering and Methodology, 23:1, (1-28), Online publication date: 1-Feb-2014.
  424. ACM
    Bae D, Yoon S, Eom T, Ha J, Hwang Y and Kim S Computing paper similarity based on latent dirichlet allocation Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, (1-6)
  425. Kurbalija V, Radovanović M, Geler Z and Ivanović M (2014). The influence of global constraints on similarity measures for time-series databases, Knowledge-Based Systems, 56:C, (49-67), Online publication date: 1-Jan-2014.
  426. Kurbalija V, Ivanović M, von Bernstorff C, Nachtwei J and Burkhard H (2014). Matching Observed with Empirical Reality --What you see is what you get?, Fundamenta Informaticae, 129:1-2, (133-147), Online publication date: 1-Jan-2014.
  427. Dutta D, Dutta P and Sil J (2014). Simultaneous feature selection and clustering with mixed features by multi objective genetic algorithm, International Journal of Hybrid Intelligent Systems, 11:1, (41-54), Online publication date: 1-Jan-2014.
  428. Dalal M and Zaveri M (2014). Opinion mining from online user reviews using fuzzy linguistic hedges, Applied Computational Intelligence and Soft Computing, 2014, (2-2), Online publication date: 1-Jan-2014.
  429. Akmal S, Shih L and Batres R (2014). Ontology-based similarity for product information retrieval, Computers in Industry, 65:1, (91-107), Online publication date: 1-Jan-2014.
  430. Abdullah S, Sabar N, Ahmad Nazri M and Ayob M (2014). An Exponential Monte-Carlo algorithm for feature selection problems, Computers and Industrial Engineering, 67, (160-167), Online publication date: 1-Jan-2014.
  431. Pachidi S, Spruit M and Van De Weerd I (2014). Understanding users' behavior with software operation data mining, Computers in Human Behavior, 30, (583-594), Online publication date: 1-Jan-2014.
  432. Jelinek H, Kelarev A, Robinson D, Stranieri A and Cornforth D (2014). Using meta-regression data mining to improve predictions of performance based on heart rate dynamics for Australian football, Applied Soft Computing, 14, (81-87), Online publication date: 1-Jan-2014.
  433. Song W, Liu Y and Li J (2014). Mining high utility itemsets by dynamically pruning the tree structure, Applied Intelligence, 40:1, (29-43), Online publication date: 1-Jan-2014.
  434. Cariñena P (2014). Fuzzy temporal association rules, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 4:1, (64-70), Online publication date: 1-Jan-2014.
  435. Naik A, Satapathy S and Parvathi K A Comparative Analysis of Results of Data Clustering with Variants of Particle Swarm Optimization Proceedings of the 4th International Conference on Swarm, Evolutionary, and Memetic Computing - Volume 8298, (180-192)
  436. Prabhu P and Anbazhagan N FI-FCM Algorithm for Business Intelligence Proceedings of the First International Conference on Mining Intelligence and Knowledge Exploration - Volume 8284, (518-528)
  437. Nadiammai G and Hemalatha M Performance Analysis of Tree Based Classification Algorithms for Intrusion Detection System Proceedings of the First International Conference on Mining Intelligence and Knowledge Exploration - Volume 8284, (82-89)
  438. Fournier-Viger P, Mwamikazi E, Gueniche T and Faghihi U MEIT Part II of the Proceedings of the 9th International Conference on Advanced Data Mining and Applications - Volume 8347, (95-106)
  439. Shah Z, Naseem R, Orgun M, Mahmood A and Shahzad S Software Clustering Using Automated Feature Subset Selection Part II of the Proceedings of the 9th International Conference on Advanced Data Mining and Applications - Volume 8347, (47-58)
  440. Farahnakian F, Pahikkala T, Liljeberg P and Plosila J Energy Aware Consolidation Algorithm Based on K-Nearest Neighbor Regression for Cloud Data Centers Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, (256-259)
  441. ACM
    Hio C, Bermingham L, Cai G, Lee K and Lee I A Hybrid Grid-based Method for Mining Arbitrary Regions-of-Interest from Trajectories Proceedings of Workshop on Machine Learning for Sensory Data Analysis, (5-12)
  442. (2013). A study on the application of instance selection techniques in genetic fuzzy rule-based classification systems, Knowledge-Based Systems, 54:C, (32-41), Online publication date: 1-Dec-2013.
  443. Tang H, Liao S and Sun S (2013). A prediction framework based on contextual data to support Mobile Personalized Marketing, Decision Support Systems, 56:C, (234-246), Online publication date: 1-Dec-2013.
  444. Zhu J, Zhang N and Li Z (2013). A New Privacy Preserving Association Rule Mining Algorithm Based on Hybrid Partial Hiding Strategy, Cybernetics and Information Technologies, 13:Special Issue, (41-50), Online publication date: 1-Dec-2013.
  445. ACM
    Tang L, Zheng Y, Yuan J, Han J, Leung A, Peng W and Porta T (2014). A framework of traveling companion discovery on trajectory data streams, ACM Transactions on Intelligent Systems and Technology, 5:1, (1-34), Online publication date: 1-Dec-2013.
  446. Lin Y, Hu X, Li X and Wu X (2013). Mining stable patterns in multiple correlated databases, Decision Support Systems, 56:C, (202-210), Online publication date: 1-Dec-2013.
  447. Baralis E, Bianco A, Cerquitelli T, Chiaraviglio L and Mellia M (2013). NetCluster, Computer Networks: The International Journal of Computer and Telecommunications Networking, 57:17, (3300-3315), Online publication date: 1-Dec-2013.
  448. Acharya U, Sree S, Muthu Rama Krishnan M, Krishnananda N, Ranjan S, Umesh P and Suri J (2013). Automated classification of patients with coronary artery disease using grayscale features from left ventricle echocardiographic images, Computer Methods and Programs in Biomedicine, 112:3, (624-632), Online publication date: 1-Dec-2013.
  449. Brilhador A, Colonhezi T, Bugatti P and Lopes F Combining Texture and Shape Descriptors for Bioimages Classification Proceedings, Part I, of the 18th Iberoamerican Congress on Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications - Volume 8258, (431-438)
  450. Liu L, Zhong X, Chen X and Vasudevan S Diagnosing root causes of system level performance violations Proceedings of the International Conference on Computer-Aided Design, (295-302)
  451. Sultana A and Moffatt K Automatic error detection from pointing device input data Proceedings of the 76th ASIS&T Annual Meeting: Beyond the Cloud: Rethinking Information Boundaries, (1-3)
  452. ACM
    Guzzo A, Moccia L, Saccà D and Serra E (2013). Solving inverse frequent itemset mining with infrequency constraints via large-scale linear programs, ACM Transactions on Knowledge Discovery from Data, 7:4, (1-39), Online publication date: 1-Nov-2013.
  453. ACM
    Chae D, Ha J, Kim S, Kang B and Im E Software plagiarism detection Proceedings of the 22nd ACM international conference on Information & Knowledge Management, (1577-1580)
  454. ACM
    Bae D, Kim J, Kim S, Oh H and Park C Intelligent SSD Proceedings of the 22nd ACM international conference on Information & Knowledge Management, (1573-1576)
  455. ACM
    Reyhani Hamedani M, Kim S, Lee S and Kim D On exploiting content and citations together to compute similarity of scientific papers Proceedings of the 22nd ACM international conference on Information & Knowledge Management, (1553-1556)
  456. ACM
    Yu Y, Wang H, Yin G and Liu B Mining and recommending software features across multiple web repositories Proceedings of the 5th Asia-Pacific Symposium on Internetware, (1-9)
  457. ACM
    Zhao X, Liu Y and Fu Y Exploring discriminative pose sub-patterns for effective action classification Proceedings of the 21st ACM international conference on Multimedia, (273-282)
  458. Gorawski M, Chrószcz A and Gorawska A Customer Unification in E-Commerce Proceedings of the 14th International Conference on Intelligent Data Engineering and Automated Learning --- IDEAL 2013 - Volume 8206, (142-152)
  459. Li P, Wu J and Shang L Fast Approximate Attribute Reduction with MapReduce Proceedings of the 8th International Conference on Rough Sets and Knowledge Technology - Volume 8171, (271-278)
  460. ACM
    Hamedani M, Lee S and Kim S On combining text-based and link-based similarity measures for scientific papers Proceedings of the 2013 Research in Adaptive and Convergent Systems, (111-115)
  461. ACM
    Jang M, Eom T, Kim S and Hwang Y A semantic similarity measure in document databases Proceedings of the 2013 Research in Adaptive and Convergent Systems, (94-99)
  462. Peng J, Shen Y and Fan J (2013). Cross-modal social image clustering and tag cleansing, Journal of Visual Communication and Image Representation, 24:7, (895-910), Online publication date: 1-Oct-2013.
  463. Chen L and Liu W (2013). Frequent patterns mining in multiple biological sequences, Computers in Biology and Medicine, 43:10, (1444-1452), Online publication date: 1-Oct-2013.
  464. Chen L, Tsai M, Hsu C and Chen Y (2013). Aging and Reverse-aging Traditional Chinese Painting Images Based on Web-Mining, New Generation Computing, 31:4, (285-309), Online publication date: 1-Oct-2013.
  465. Myszkorowski K and Zakrzewska D Using Fuzzy Logic for Recommending Groups in E-Learning Systems Proceedings of the 5th International Conference on Computational Collective Intelligence. Technologies and Applications - Volume 8083, (671-680)
  466. ACM
    Ouyang R, Srivastava A, Prabahar P, Roy Choudhury R, Addicott M and McClernon F If you see something, swipe towards it Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, (23-32)
  467. Soni G and Ezeife C An Automatic Email Management Approach Using Data Mining Techniques Proceedings of the 15th International Conference on Data Warehousing and Knowledge Discovery - Volume 8057, (260-267)
  468. ACM
    Caravelli P, Wei Y, Subak D, Singh L and Mann J Understanding evolving group structures in time-varying networks Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (142-148)
  469. ACM
    Xu B, Deng L, Jia Y, Zhou B and Han Y Social circle analysis on ego-network based on context frequent pattern mining Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service, (139-144)
  470. ACM
    Kargar M, An A, Cercone N, Tirdad K and Zihayat M Signal detection in genome sequences using complexity based features Proceedings of the 12th International Workshop on Data Mining in Bioinformatics, (25-33)
  471. Lin H and Chen C (2013). An Intelligent Embedded Marketing Service System based on TV apps, Expert Systems with Applications: An International Journal, 40:10, (4127-4136), Online publication date: 1-Aug-2013.
  472. ACM
    Hassan A, White R and Wang Y Toward self-correcting search engines Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval, (263-272)
  473. Stambaugh C, Yang H and Breuer F Analytic feature selection for support vector machines Proceedings of the 9th international conference on Machine Learning and Data Mining in Pattern Recognition, (219-233)
  474. Graco W and Koesmarno H Configurations and couplings Proceedings of the 13th international conference on Advances in Data Mining: applications and theoretical aspects, (266-279)
  475. Livani E, Nguyen R, Denzinger J, Ruhe G and Banack S A hybrid machine learning method and its application in municipal waste prediction Proceedings of the 13th international conference on Advances in Data Mining: applications and theoretical aspects, (166-180)
  476. Güden S and Gursoy U Online shopping customer data analysis by using association rules and cluster analysis Proceedings of the 13th international conference on Advances in Data Mining: applications and theoretical aspects, (127-136)
  477. ACM
    Aljarah I and Ludwig S Towards a scalable intrusion detection system based on parallel PSO clustering using mapreduce Proceedings of the 15th annual conference companion on Genetic and evolutionary computation, (169-170)
  478. Tatsis V, Tjortjis C and Tzirakis P (2013). Evaluating data mining algorithms using molecular dynamics trajectories, International Journal of Data Mining and Bioinformatics, 8:2, (169-187), Online publication date: 1-Jul-2013.
  479. ACM
    Yang H, Lyu M and King I (2013). Efficient online learning for multitask feature selection, ACM Transactions on Knowledge Discovery from Data, 7:2, (1-27), Online publication date: 1-Jul-2013.
  480. Akhtar J, Koshul B and Awais M (2013). A framework for evolutionary algorithms based on Charles Sanders Peirce's evolutionary semiotics, Information Sciences: an International Journal, 236, (93-108), Online publication date: 1-Jul-2013.
  481. Chiang M, Liou J, Wang J, Peng W and Shan M (2013). Exploring heterogeneous information networks and random walk with restart for academic search, Knowledge and Information Systems, 36:1, (59-82), Online publication date: 1-Jul-2013.
  482. Gligoric M, Behrang F, Li Y, Overbey J, Hafiz M and Marinov D Systematic testing of refactoring engines on real software projects Proceedings of the 27th European conference on Object-Oriented Programming, (629-653)
  483. Zhang J and Meng X Blind chance Proceedings of the 14th international conference on Web-Age Information Management, (557-563)
  484. Bai X, Xiong Y, Zhu Y and Zhu H Time series representation Proceedings of the 14th international conference on Web-Age Information Management, (37-50)
  485. ACM
    Yi X, Paulet R, Bertino E and Xu G Private data warehouse queries Proceedings of the 18th ACM symposium on Access control models and technologies, (25-36)
  486. Cano A, Olmo J and Ventura S (2013). Parallel multi-objective Ant Programming for classification using GPUs, Journal of Parallel and Distributed Computing, 73:6, (713-728), Online publication date: 1-Jun-2013.
  487. Wang Z and Liu D (2013). Data-based stability analysis of a class of nonlinear discrete-time systems, Information Sciences: an International Journal, 235, (36-44), Online publication date: 1-Jun-2013.
  488. Huang T, Hsu W and Chen Y (2013). Conjecturable knowledge discovery, Fuzzy Sets and Systems, 221, (1-23), Online publication date: 1-Jun-2013.
  489. Subasi A (2013). Classification of EMG signals using PSO optimized SVM for diagnosis of neuromuscular disorders, Computers in Biology and Medicine, 43:5, (576-586), Online publication date: 1-Jun-2013.
  490. ACM
    Galatas G, Zikos D and Makedon F Application of data mining techniques to determine patient satisfaction Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, (1-4)
  491. Wang J, Dang Y, Zhang H, Chen K, Xie T and Zhang D Mining succinct and high-coverage API usage patterns from source code Proceedings of the 10th Working Conference on Mining Software Repositories, (319-328)
  492. Xia X, Lo D, Wang X and Zhou B Tag recommendation in software information sites Proceedings of the 10th Working Conference on Mining Software Repositories, (287-296)
  493. Lee S, Kang S and Staats M NavClus: a graphical recommender for assisting code exploration Proceedings of the 2013 International Conference on Software Engineering, (1315-1318)
  494. Joshua L and Varghese K (2013). Selection of Accelerometer Location on Bricklayers Using Decision Trees, Computer-Aided Civil and Infrastructure Engineering, 28:5, (372-388), Online publication date: 1-May-2013.
  495. Cobos C, Rodriguez O, Rivera J, Betancourt J, Mendoza M, LeóN E and Herrera-Viedma E (2013). A hybrid system of pedagogical pattern recommendations based on singular value decomposition and variable data attributes, Information Processing and Management: an International Journal, 49:3, (607-625), Online publication date: 1-May-2013.
  496. Zhuang Z, Wilkin C and Ceglowski A (2013). A framework for an intelligent decision support system, Decision Support Systems, 55:2, (476-487), Online publication date: 1-May-2013.
  497. Zhang Y, Meratnia N and Havinga P (2013). Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine, Ad Hoc Networks, 11:3, (1062-1074), Online publication date: 1-May-2013.
  498. Hassani M, Kim Y, Choi S and Seidl T Effective Evaluation Measures for Subspace Clustering of Data Streams Revised Selected Papers of PAKDD 2013 International Workshops on Trends and Applications in Knowledge Discovery and Data Mining - Volume 7867, (342-353)
  499. Wu W and Zhang S Evaluation of Error-Sensitive Attributes Revised Selected Papers of PAKDD 2013 International Workshops on Trends and Applications in Knowledge Discovery and Data Mining - Volume 7867, (283-294)
  500. Wang X, Zhang C, Ji Y, Sun L, Wu L and Bao Z A Depression Detection Model Based on Sentiment Analysis in Micro-blog Social Network Revised Selected Papers of PAKDD 2013 International Workshops on Trends and Applications in Knowledge Discovery and Data Mining - Volume 7867, (201-213)
  501. Liu K, Xu J, Zhang L, Ding Z and Li M (2013). Discovering hot topics from geo-tagged video, Neurocomputing, 105, (90-99), Online publication date: 1-Apr-2013.
  502. Tseng F (2013). Mining frequent itemsets in large databases, Expert Systems with Applications: An International Journal, 40:5, (1654-1661), Online publication date: 1-Apr-2013.
  503. Kumar A, Sivalingam K and Kumar A (2013). On reducing delay in mobile data collection based wireless sensor networks, Wireless Networks, 19:3, (285-299), Online publication date: 1-Apr-2013.
  504. ACM
    Rasin A and Zdonik S An automatic physical design tool for clustered column-stores Proceedings of the 16th International Conference on Extending Database Technology, (203-214)
  505. da Jiménez A, Berzal F and Cubero J (2013). Interestingness measures for association rules within groups, Intelligent Data Analysis, 17:2, (195-215), Online publication date: 1-Mar-2013.
  506. ACM
    Kamal A, Bleakley C and Dobson S (2013). Packet-level attestation (PLA), ACM Transactions on Sensor Networks, 9:2, (1-28), Online publication date: 1-Mar-2013.
  507. Hatamlou A (2013). Black hole, Information Sciences: an International Journal, 222, (175-184), Online publication date: 1-Feb-2013.
  508. ACM
    Yoon S, Song S, Lee S, Jeong K, Kim S, Kang S, Choi Y, Cha J, Ryu M and Jeong B A data partitioning approach for hierarchical clustering Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, (1-4)
  509. Lindawati , Yuan Z, Lau H and Zhu F Automated Parameter Tuning Framework for Heterogeneous and Large Instances Revised Selected Papers of the 7th International Conference on Learning and Intelligent Optimization - Volume 7997, (423-437)
  510. Fang X, Sheng O and Goes P (2013). When Is the Right Time to Refresh Knowledge Discovered from Data?, Operations Research, 61:1, (32-44), Online publication date: 1-Jan-2013.
  511. Do Q and Chen J (2013). A neuro-fuzzy approach in the classification of students' academic performance, Computational Intelligence and Neuroscience, 2013, (6-6), Online publication date: 1-Jan-2013.
  512. Burda M, Rusnok P and Štšjnička M (2013). Mining linguistic associations for emergent flood prediction adjustment, Advances in Fuzzy Systems, 2013, (4-4), Online publication date: 1-Jan-2013.
  513. da Cunha D and de Castro L Evolutionary and immune algorithms applied to association rule mining Proceedings of the Third international conference on Swarm, Evolutionary, and Memetic Computing, (628-635)
  514. Mazumder S, Sharma T, Mitra R, Sengupta N and Sil J Generation of Sufficient Cut Points to Discretize Network Traffic Data Sets Swarm, Evolutionary, and Memetic Computing, (528-539)
  515. Usman M, Pears R and Fong A Data guided approach to generate multi-dimensional schema for targeted knowledge discovery Proceedings of the Tenth Australasian Data Mining Conference - Volume 134, (229-240)
  516. Rahman M and Islam M CRUDAW Proceedings of the Tenth Australasian Data Mining Conference - Volume 134, (27-41)
  517. Fournier-Viger P and Tseng V Mining top-K non-redundant association rules Proceedings of the 20th international conference on Foundations of Intelligent Systems, (31-40)
  518. Coronato A and De Pietro G Detection of motion disorders of patients with autism spectrum disorders Proceedings of the 4th international conference on Ambient Assisted Living and Home Care, (415-422)
  519. Sharma N and Gedeon T (2012). Objective measures, sensors and computational techniques for stress recognition and classification, Computer Methods and Programs in Biomedicine, 108:3, (1287-1301), Online publication date: 1-Dec-2012.
  520. Teng S, Huang S, Huo Y, Teng L and Zhang W A new positioning algorithm in mobile network Proceedings of the 2012 international conference on Pervasive Computing and the Networked World, (461-476)
  521. Bai S, Ning Y, Yuan S and Zhu T Predicting reader's emotion on chinese web news articles Proceedings of the 2012 international conference on Pervasive Computing and the Networked World, (16-27)
  522. Wu Y, Sheng Q, Zeng R and Ma J Modeling sovereign RFID data streams in collaborative traceable networks Proceedings of the 13th international conference on Web Information Systems Engineering, (157-170)
  523. Nguyen T and Nguyen P A new approach for problem of sequential pattern mining Proceedings of the 4th international conference on Computational Collective Intelligence: technologies and applications - Volume Part I, (51-60)
  524. Yazdani H and Kwasnicka H Fuzzy classification method in credit risk Proceedings of the 4th international conference on Computational Collective Intelligence: technologies and applications - Volume Part I, (495-504)
  525. ACM
    Zhang Y, Huang G, Liu X, Zhang W, Mei H and Yang S (2012). Refactoring android Java code for on-demand computation offloading, ACM SIGPLAN Notices, 47:10, (233-248), Online publication date: 15-Nov-2012.
  526. Timarán Pereira R, Yepez Chamorro M and Calderón Romero A Detecting Survival Patterns in Women with Invasive Cervical Cancer with Decision Trees Advances in Artificial Intelligence – IBERAMIA 2012, (130-139)
  527. Nekkaa M and Boughaci D Improving support vector machine using a stochastic local search for classification in datamining Proceedings of the 19th international conference on Neural Information Processing - Volume Part II, (168-175)
  528. Mutalib S, Rahman S and Mohamed A Towards applying associative classifier for genetic variants Proceedings of the 19th international conference on Neural Information Processing - Volume Part I, (673-680)
  529. Uykan Z, Ganiz M and Şahinli Ç Discrete-Time hopfield neural network based text clustering algorithm Proceedings of the 19th international conference on Neural Information Processing - Volume Part I, (551-559)
  530. ACM
    Canavera K, Esfahani N and Malek S Mining the execution history of a software system to infer the best time for its adaptation Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, (1-11)
  531. ACM
    Assam R and Seidl T TMC-pattern Proceedings of the 1st ACM SIGSPATIAL International Workshop on Analytics for Big Geospatial Data, (71-80)
  532. ACM
    Liao R, Li G, Miao S, Lu Y, Zhu J and Shen L Weather-clustering based strategy design for dynamic demand response building HVAC control Proceedings of the Fourth ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings, (33-35)
  533. Ulutagay G and Nasibov E (2012). Fuzzy and crisp clustering methods based on the neighborhood concept, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 23:6, (271-281), Online publication date: 1-Nov-2012.
  534. ACM
    Esling P and Agon C (2012). Time-series data mining, ACM Computing Surveys, 45:1, (1-34), Online publication date: 1-Nov-2012.
  535. Yaneli A, Nicandro C, Efrén M, Enrique M, Nancy P and Héctor Gabriel A Assessment of bayesian network classifiers as tools for discriminating breast cancer pre-diagnosis based on three diagnostic methods Proceedings of the 11th Mexican international conference on Advances in Artificial Intelligence - Volume Part I, (419-431)
  536. ACM
    Ali M, Qaseem M, Rajamani L and Govardhan A Improved decision tree induction Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, (778-784)
  537. Yuan J and Ding S Research and improvement on association rule algorithm based on FP-Growth Proceedings of the 2012 international conference on Web Information Systems and Mining, (306-313)
  538. ACM
    Modi C, Patel D, Borisanya B, Patel A and Rajarajan M A novel framework for intrusion detection in cloud Proceedings of the Fifth International Conference on Security of Information and Networks, (67-74)
  539. ACM
    Zhang Y, Huang G, Liu X, Zhang W, Mei H and Yang S Refactoring android Java code for on-demand computation offloading Proceedings of the ACM international conference on Object oriented programming systems languages and applications, (233-248)
  540. ACM
    Martins M and Lino N MDM-KTV Proceedings of the 18th Brazilian symposium on Multimedia and the web, (103-106)
  541. ACM
    Saidi R, Aridhi S, Nguifo E and Maddouri M Feature extraction in protein sequences classification Proceedings of the ACM Conference on Bioinformatics, Computational Biology and Biomedicine, (683-689)
  542. ACM
    Kurbalija V, von Bernstorff C, Burkhard H, Nachtwei J, Ivanović M and Fodor L Time-series mining in a psychological domain Proceedings of the Fifth Balkan Conference in Informatics, (58-63)
  543. ACM
    Bernard J, Ruppert T, Scherer M, Schreck T and Kohlhammer J Guided discovery of interesting relationships between time series clusters and metadata properties Proceedings of the 12th International Conference on Knowledge Management and Knowledge Technologies, (1-8)
  544. Lima C, de Assis F and de Souza C A comparative study of use of shannon, rényi and tsallis entropy for attribute selecting in network intrusion detection Proceedings of the 13th international conference on Intelligent Data Engineering and Automated Learning, (492-501)
  545. Meng Q and Kennedy P Using Field of Research Codes to Discover Research Groups from Co-authorship Networks Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (289-293)
  546. Koochakzadeh N, Kianmehr K, Sarraf A and Alhajj R Stock Market Investment Advice Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (71-78)
  547. Opuszko M and Ruhland J Classification Analysis in Complex Online Social Networks Using Semantic Web Technologies Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (1032-1039)
  548. ACM
    Ferreira A, Gonçalves M and Laender A (2012). A brief survey of automatic methods for author name disambiguation, ACM SIGMOD Record, 41:2, (15-26), Online publication date: 17-Aug-2012.
  549. ACM
    Zhang L, Wang X, Zhang L, Chen Y and Shi Y Context-based knowledge discovery and its application Proceedings of the Data Mining and Intelligent Knowledge Management Workshop, (1-9)
  550. ACM
    Zhang Y, Peng Y, Li J, Kou G and Shi Y An ensemble clustering model for mining concept drifting stream data in emergency management Proceedings of the Data Mining and Intelligent Knowledge Management Workshop, (1-8)
  551. ACM
    Wang H, Yu Y, Wang Q and Wan Y A density-based clustering structure mining algorithm for data streams Proceedings of the 1st International Workshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications, (69-76)
  552. ACM
    Zhang J, Li T and Pan Y Parallel rough set based knowledge acquisition using MapReduce from big data Proceedings of the 1st International Workshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications, (20-27)
  553. ACM
    Arora M and Tagra D Neuro-fuzzy expert system for breast cancer diagnosis Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (979-985)
  554. ACM
    Patil U and Patil J Web data mining trends and techniques Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (961-965)
  555. ACM
    Tripathy A, Dansana J and Mishra R A classification based framework for privacy preserving data mining Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (660-666)
  556. ACM
    Tripathy A and Pradhan M A novel framework for preserving privacy of data using correlation analysis Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (650-655)
  557. ACM
    Sujatha P, Priya C and Kannan A Network intrusion detection system using genetic network programming with support vector machine Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (645-649)
  558. ACM
    Nayak R, Mishra D, Das S, Shaw K, Mishra S and Tripathy R Clustering and classifying informative attributes using rough set theory Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (118-123)
  559. Pendharkar P and Troutt M (2012). DEA based data preprocessing for maximum decisional efficiency linear case valuation models, Expert Systems with Applications: An International Journal, 39:10, (9435-9442), Online publication date: 1-Aug-2012.
  560. Rajendra Acharya U, Vinitha Sree S, Alvin A and Suri J (2012). Use of principal component analysis for automatic classification of epileptic EEG activities in wavelet framework, Expert Systems with Applications: An International Journal, 39:10, (9072-9078), Online publication date: 1-Aug-2012.
  561. Kim K and Ahn H (2012). A corporate credit rating model using multi-class support vector machines with an ordinal pairwise partitioning approach, Computers and Operations Research, 39:8, (1800-1811), Online publication date: 1-Aug-2012.
  562. Ma L (2012). A two-phase case-based distance approach for multiple-group classification problems, Computers and Industrial Engineering, 63:1, (89-97), Online publication date: 1-Aug-2012.
  563. Martínez-de-Pisón F, Sanz A, Martínez-de-Pisón E, Jiménez E and Conti D (2012). Mining association rules from time series to explain failures in a hot-dip galvanizing steel line, Computers and Industrial Engineering, 63:1, (22-36), Online publication date: 1-Aug-2012.
  564. Kim D, Lee T, Kang J, Jeong H and In H (2012). Adaptive pattern mining model for early detection of botnet-propagation scale, Security and Communication Networks, 5:8, (917-927), Online publication date: 1-Aug-2012.
  565. Kirshners A, Parshutin S and Leja M Research on application of data mining methods to diagnosing gastric cancer Proceedings of the 12th Industrial conference on Advances in Data Mining: applications and theoretical aspects, (24-37)
  566. Dragut E, Wang H, Yu C, Sistla P and Meng W Polarity consistency checking for sentiment dictionaries Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Long Papers - Volume 1, (997-1005)
  567. Guan Z, Yan X and Kaplan L (2012). Measuring two-event structural correlations on graphs, Proceedings of the VLDB Endowment, 5:11, (1400-1411), Online publication date: 1-Jul-2012.
  568. Pal S, Meher S and Dutta S (2012). Class-dependent rough-fuzzy granular space, dispersion index and classification, Pattern Recognition, 45:7, (2690-2707), Online publication date: 1-Jul-2012.
  569. Chen S, Chang P, Cheng T and Zhang Q (2012). A Self-guided Genetic Algorithm for permutation flowshop scheduling problems, Computers and Operations Research, 39:7, (1450-1457), Online publication date: 1-Jul-2012.
  570. Vranić M, Pintar D and Skočir Z Integrating quantitative attributes in hierarchical clustering of transactional data Proceedings of the 6th KES international conference on Agent and Multi-Agent Systems: technologies and applications, (94-103)
  571. ACM
    Tunali V and Bilgin T PRETO Proceedings of the 13th International Conference on Computer Systems and Technologies, (134-140)
  572. de Oliveira I, Grégio A and Cansian A A malware detection system inspired on the human immune system Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV, (286-301)
  573. Li H, Zong Y, Wang K and Wu B A novel classification algorithm to noise data Proceedings of the Third international conference on Advances in Swarm Intelligence - Volume Part II, (192-199)
  574. Qu Z and Wang Q Design and implementation of an intelligent automatic question answering system based on data mining Proceedings of the Third international conference on Advances in Swarm Intelligence - Volume Part II, (137-146)
  575. ACM
    Mitrović D, Geler Z and Ivanović M Distributed distance matrix generator based on agents Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics, (1-6)
  576. ACM
    Muntean M and Vălean H Wrappers for web access logs feature selection Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics, (1-7)
  577. ACM
    Menéndez H, Bello-Orgaz G and Camacho D Features selection from high-dimensional web data using clustering analysis Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics, (1-9)
  578. Dang Y, Wu R, Zhang H, Zhang D and Nobel P ReBucket: a method for clustering duplicate crash reports based on call stack similarity Proceedings of the 34th International Conference on Software Engineering, (1084-1093)
  579. Lucia , Lo D, Jiang L and Budi A Active refinement of clone anomaly reports Proceedings of the 34th International Conference on Software Engineering, (397-407)
  580. ACM
    Kirsch A, Mitzenmacher M, Pietracaprina A, Pucci G, Upfal E and Vandin F (2012). An Efficient Rigorous Approach for Identifying Statistically Significant Frequent Itemsets, Journal of the ACM, 59:3, (1-22), Online publication date: 1-Jun-2012.
  581. Chen C and Tsai Y (2012). A novel business cycle surveillance system using the query logs of search engines, Knowledge-Based Systems, 30, (104-114), Online publication date: 1-Jun-2012.
  582. Kim H, Kim J and Chen Q (2012). A product network analysis for extending the market basket analysis, Expert Systems with Applications: An International Journal, 39:8, (7403-7410), Online publication date: 1-Jun-2012.
  583. Kang P, Cho S and MacLachlan D (2012). Improved response modeling based on clustering, under-sampling, and ensemble, Expert Systems with Applications: An International Journal, 39:8, (6738-6753), Online publication date: 1-Jun-2012.
  584. Chattopadhyay S, Rabhi F, Acharya U, Joshi R and Gajendran R (2012). An Approach to Model Right Iliac Fossa Pain Using Pain-Only-Parameters for Screening Acute Appendicitis, Journal of Medical Systems, 36:3, (1491-1502), Online publication date: 1-Jun-2012.
  585. Chattopadhyay S, Davis R, Menezes D, Singh G, Acharya R and Tamura T (2012). Application of Bayesian Classifier for the Diagnosis of Dental Pain, Journal of Medical Systems, 36:3, (1425-1439), Online publication date: 1-Jun-2012.
  586. Srinivas P, Reddy P, Bhargav S, Kiran R and Kumar D Discovering coverage patterns for banner advertisement placement Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II, (133-144)
  587. Mirylenka K, Giannakopoulos G and Palpanas T SRF Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, (109-121)
  588. Fournier-Viger P, Wu C and Tseng V Mining top-k association rules Proceedings of the 25th Canadian conference on Advances in Artificial Intelligence, (61-73)
  589. ACM
    Singh M, Nandi A and Jagadish H Skimmer Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, (181-192)
  590. ACM
    Wang S, Li C and Chen H (2012). A conversation with Professor Shan Wang et al., ACM SIGKDD Explorations Newsletter, 13:2, (92-95), Online publication date: 1-May-2012.
  591. ACM
    Merceron A Investigating the core group effect in usage of resources with analytics Proceedings of the 2nd International Conference on Learning Analytics and Knowledge, (230-233)
  592. Turcinek P, Stastny J and Motycka A Usage of data mining techniques on marketing research data Proceedings of the 11th WSEAS international conference on Applied Computer and Applied Computational Science, (159-164)
  593. ACM
    Orgaz G, R-Moreno M, Camacho D and Barrero D Clustering avatars behaviours from virtual worlds interactions Proceedings of the 4th International Workshop on Web Intelligence & Communities, (1-7)
  594. ACM
    Gani K, Hacid H and Skraba R Towards multiple identity detection in social networks Proceedings of the 21st International Conference on World Wide Web, (503-504)
  595. Tao V and Lee J A novel approach for finding alternative clusterings using feature selection Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part I, (482-493)
  596. Braga R, Tahir A, Bertolotto M and Martin H Clustering user trajectories to find patterns for social interaction applications Proceedings of the 11th international conference on Web and Wireless Geographical Information Systems, (82-97)
  597. Li X, Xiang Z, Zhang H and Zhu Z A novel method for extension transformation knowledge discovering Proceedings of the 14th international conference on Web Technologies and Applications, (43-50)
  598. He J, Zhang Y, Huang G, Xin Y, Liu X, Zhang H, Chiang S and Zhang H An association rule analysis framework for complex physiological and genetic data Proceedings of the First international conference on Health Information Science, (131-142)
  599. Yoshida T and Ogino H (2012). A re-coloring approach for graph b-coloring based clustering, International Journal of Knowledge-based and Intelligent Engineering Systems, 16:2, (117-128), Online publication date: 1-Apr-2012.
  600. Kang H, Yoo S and Han D (2012). Senti-lexicon and improved Naïve Bayes algorithms for sentiment analysis of restaurant reviews, Expert Systems with Applications: An International Journal, 39:5, (6000-6010), Online publication date: 1-Apr-2012.
  601. Zuccon G, Azzopardi L, Zhang D and Wang J Top-k retrieval using facility location analysis Proceedings of the 34th European conference on Advances in Information Retrieval, (305-316)
  602. Sondhi P, Vydiswaran V and Zhai C Reliability prediction of webpages in the medical domain Proceedings of the 34th European conference on Advances in Information Retrieval, (219-231)
  603. Fan Y and Chern C An agent model for incremental rough set-based rule induction in customer relationship management Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part I, (1-12)
  604. ACM
    Gunopulos D and Trajcevski G Similarity in (spatial, temporal and) spatio-temporal datasets Proceedings of the 15th International Conference on Extending Database Technology, (554-557)
  605. ACM
    Gomes A and da Graça Campos Pimentel M A media-based social interactions analysis procedure Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1018-1024)
  606. Shams M, Saffar M, Shakery A and Faili H Applying sentiment and social network analysis in user modeling Proceedings of the 13th international conference on Computational Linguistics and Intelligent Text Processing - Volume Part I, (526-539)
  607. Loslever P, Cauffriez L, Caouder N, Turgis F and Copin R (2012). A scale fuzzy windowing comparison applied to multivariate descriptive analysis, Intelligent Data Analysis, 16:2, (279-303), Online publication date: 1-Mar-2012.
  608. Khor K, Ting C and Phon-Amnuaisuk S (2012). A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection, Applied Intelligence, 36:2, (320-329), Online publication date: 1-Mar-2012.
  609. Lee K, Lee K and Lee C Linguistic classification pattern extraction for numeric data Proceedings of the 11th WSEAS international conference on Artificial Intelligence, Knowledge Engineering and Data Bases, (207-212)
  610. ACM
    Jantan H, Hamdan A and Othman Z Intelligent DSS for talent management Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, (1-7)
  611. ACM
    Islam S, Fariha A, Ahmed C and Jeong B EGDIM Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, (1-10)
  612. ACM
    Oh H, Yoon S and Kim S Hierarchical clustering and outlier detection for effective image data organization Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, (1-5)
  613. ACM
    Verde N, Vaidya J, Atluri V and Colantonio A Role engineering Proceedings of the second ACM conference on Data and Application Security and Privacy, (181-192)
  614. ACM
    Palpanas T (2012). A knowledge mining framework for business analysts, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 43:1, (46-60), Online publication date: 1-Feb-2012.
  615. ACM
    Yang D, Rundensteiner E and Ward M (2012). Shared execution strategy for neighbor-based pattern mining requests over streaming windows, ACM Transactions on Database Systems, 37:1, (1-44), Online publication date: 1-Feb-2012.
  616. Zolfaghar K and Aghaie A (2012). A syntactical approach for interpersonal trust prediction in social web applications, Knowledge-Based Systems, 26, (93-102), Online publication date: 1-Feb-2012.
  617. ACM
    Khare R, An Y, Li J, Song I and Hu X Exploiting semantic structure for mapping user-specified form terms to SNOMED CT concepts Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium, (285-294)
  618. Han J, Chen K and Jiang D Probabilistically ranking web article quality based on evolution patterns Transactions on Large-Scale Data- and Knowledge-Centered Systems VI, (229-258)
  619. Zakrzewska D Building group recommendations in e-learning systems Transactions on Computational Collective Intelligence VII, (144-163)
  620. Gossen T, Nitsche M, Haun S and Nürnberger A Data exploration for bisociative knowledge discovery Bisociative Knowledge Discovery, (287-300)
  621. Langohr L and Toivonen H Finding representative nodes in probabilistic graphs Bisociative Knowledge Discovery, (218-229)
  622. Zhang X, Ding Z, Zhu C, Chen W and Peng Q View-Dependent line drawings for 3d scenes Transactions on Edutainment VII, (151-160)
  623. Raciti M, Cucurull J and Nadjm-Tehrani S Anomaly detection in water management systems Critical Infrastructure Protection, (98-119)
  624. Verma R and Chen P (2012). A data mining hypertextbook, Journal of Computing Sciences in Colleges, 27:3, (22-28), Online publication date: 1-Jan-2012.
  625. Xu X, Wang Z and Wang X (2012). Effective Service Composition in Large Scale Service Market, International Journal of Web Services Research, 9:1, (74-94), Online publication date: 1-Jan-2012.
  626. Dehuri S and Cho S (2012). Learning Fuzzy Network Using Sequence Bound Global Particle Swarm Optimizer, International Journal of Fuzzy System Applications, 2:1, (54-70), Online publication date: 1-Jan-2012.
  627. Di Martino F and Sessa S (2012). Detection of fuzzy association rules by fuzzy transforms, Advances in Fuzzy Systems, 2012, (6-6), Online publication date: 1-Jan-2012.
  628. Xiang Y, Payne P and Huang K (2012). Transactional Database Transformation and Its Application in Prioritizing Human Disease Genes, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 9:1, (294-304), Online publication date: 1-Jan-2012.
  629. Kumar D, Murthy J, Satapathy S and Pullela S A study of decision tree induction for data stream mining using boosting genetic programming classifier Proceedings of the Second international conference on Swarm, Evolutionary, and Memetic Computing - Volume Part I, (315-322)
  630. Huang Y, Seck M and Verbraeck A From data to simulation models Proceedings of the Winter Simulation Conference, (3724-3734)
  631. Rahman A and Islam Z Seed-detective Proceedings of the Ninth Australasian Data Mining Conference - Volume 121, (211-220)
  632. Rahman G and Islam Z A decision tree-based missing value imputation technique for data pre-processing Proceedings of the Ninth Australasian Data Mining Conference - Volume 121, (41-50)
  633. Shouman M, Turner T and Stocker R Using decision tree for diagnosing heart disease patients Proceedings of the Ninth Australasian Data Mining Conference - Volume 121, (23-30)
  634. Van A, Gay V, Kennedy P, Barin E and Leijdekkers P Understanding risk factors in cardiac rehabilitation patients with random forests and decision trees Proceedings of the Ninth Australasian Data Mining Conference - Volume 121, (11-22)
  635. Deng Z, Gao N and Xu X (2011). Mop: An Efficient Algorithm for Mining Frequent Pattern with Subtree Traversing, Fundamenta Informaticae, 111:4, (373-390), Online publication date: 1-Dec-2011.
  636. ACM
    Gomes A and Pimentel M Measuring media-based social interactions provided by smartphone applications in social networks Proceedings of the 2011 ACM workshop on Social and behavioural networked media access, (59-64)
  637. Shiue Y, Guh R and Lee K (2011). Study of SOM-based intelligent multi-controller for real-time scheduling, Applied Soft Computing, 11:8, (4569-4580), Online publication date: 1-Dec-2011.
  638. Lin S and Chen S (2011). Parameter tuning, feature selection and weight assignment of features for case-based reasoning by artificial immune system, Applied Soft Computing, 11:8, (5042-5052), Online publication date: 1-Dec-2011.
  639. Rezaei M and Zarandi M (2011). Facility location via fuzzy modeling and simulation, Applied Soft Computing, 11:8, (5330-5340), Online publication date: 1-Dec-2011.
  640. Yang S, Zhou Y, Liu J and Chen D Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations Proceedings of the 14th international conference on Information Security and Cryptology, (169-185)
  641. ACM
    Martínez H and Yannakakis G Mining multimodal sequential patterns Proceedings of the 13th international conference on multimodal interfaces, (3-10)
  642. Othman Z, Hamdan A, Bakar A, Zainudin S, Sarim H, Nazri M, Othman Z, Abdullah S, Ayob M and Ghani A MYNDA Proceedings of the Second international conference on Visual informatics: sustaining research and innovations - Volume Part II, (217-230)
  643. Sagdeo P, Athavale V, Kowshik S and Vasudevan S PRECIS Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering, (532-535)
  644. Mazalek A, Ondryhal V, Platenka V and Vranova Z Detecting the trend component for selected network parameters Proceedings of the 13th WSEAS international conference on Mathematical and computational methods in science and engineering, (391-395)
  645. ACM
    Schubert M and Kriegel H LOCAR Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (441-444)
  646. ACM
    Lian D and Xie X Learning location naming from user check-in histories Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (112-121)
  647. ACM
    Abelló A, Ferrarons J and Romero O Building cubes with MapReduce Proceedings of the ACM 14th international workshop on Data Warehousing and OLAP, (17-24)
  648. Mattei N Empirical Evaluation of Voting Rules with Strictly Ordered Preference Data Algorithmic Decision Theory, (165-177)
  649. Kaosar G, Paulet R and Yi X Optimized two party privacy preserving association rule mining using fully homomorphic encryption Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I, (360-370)
  650. ACM
    Bae D, Hwang S, Kim S and Faloutsos C Constructing seminal paper genealogy Proceedings of the 20th ACM international conference on Information and knowledge management, (2101-2104)
  651. ACM
    Tang L, Li T and Perng C LogSig Proceedings of the 20th ACM international conference on Information and knowledge management, (785-794)
  652. ACM
    Vinzamuri B and Karlapalem K Designing an ensemble classifier over subspace classifiers using iterative convergence routine Proceedings of the 20th ACM international conference on Information and knowledge management, (693-698)
  653. ACM
    Oberortner E, Kwan I and Damian D Towards patterns to enhance the communication in distributed software development environments Proceedings of the 18th Conference on Pattern Languages of Programs, (1-8)
  654. Ribeiro J and Weijters A Event cube Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I, (274-283)
  655. Luo A, Jia X, Shang L, Gao Y and Yang Y Granular-based partial periodic pattern discovery over time series data Proceedings of the 6th international conference on Rough sets and knowledge technology, (706-711)
  656. Gonçalves C, Totti L and Pereira A ROCK: A Characterization Methodology for Web Multimedia Services Based on an Informational Hierarchy Proceedings of the 17th Brazilian Symposium on Multimedia and the Web on Brazilian Symposium on Multimedia and the Web - Volume 1, (174-181)
  657. Gomes A and Pimentel M A Technique for Human-readable Representation e Evaluation of Media-based Social Interactions in Social Networks Proceedings of the 17th Brazilian Symposium on Multimedia and the Web on Brazilian Symposium on Multimedia and the Web - Volume 1, (119-126)
  658. Uehara K and Shirahama K (2011). Constructing and Utilizing Video Ontology for Accurate and Fast Retrieval, International Journal of Multimedia Data Engineering & Management, 2:4, (59-75), Online publication date: 1-Oct-2011.
  659. ACM
    Huang K and Li Z (2008). A multilabel text classification algorithm for labeling risk factors in SEC form 10-K, ACM Transactions on Management Information Systems, 2:3, (1-19), Online publication date: 1-Oct-2011.
  660. Mohamed M (2011). Rules extraction from constructively trained neural networks based on genetic algorithms, Neurocomputing, 74:17, (3180-3192), Online publication date: 1-Oct-2011.
  661. Wan W, Xu H, Zhang W, Hu X and Deng G (2011). Questionnaires-based skin attribute prediction using Elman neural network, Neurocomputing, 74:17, (2834-2841), Online publication date: 1-Oct-2011.
  662. Safi Esfahani F, Azmi Murad M, Sulaiman M and Udzir N (2011). Adaptable Decentralized Service Oriented Architecture, Journal of Systems and Software, 84:10, (1591-1617), Online publication date: 1-Oct-2011.
  663. Huang P, Lin P, Yan S and Xiao M Data mining for seasonal influences in broiler breeding based on observational study Proceedings of the Second international conference on Information Computing and Applications, (25-32)
  664. Esmaeili L, Nasiri M and Minaei-Bidgoli B Personalizing group recommendation to social network users Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I, (124-133)
  665. Li Y, Chung W and Bae H A novel outlier detection method for spatio-tempral trajectory data Proceedings of the 5th international conference on Convergence and hybrid information technology, (698-707)
  666. Zakrzewska D Building context-aware group recommendations in E-learning systems Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part I, (132-141)
  667. ACM
    Pimentel M Documenting social networks Proceedings of the 11th ACM symposium on Document engineering, (277-280)
  668. Ito H and Koshimizu H Face image annotation and retrieval in impressive words using minimum bounding rectangles of face parts Proceedings of the 15th international conference on Knowledge-based and intelligent information and engineering systems - Volume Part IV, (34-43)
  669. Kim S, Barsky M and Han J Efficient mining of top correlated patterns based on null-invariant measures Proceedings of the 2011 European conference on Machine learning and knowledge discovery in databases - Volume Part II, (177-192)
  670. Antzoulatos G and Vrahatis M α-clusterable sets Proceedings of the 2011 European conference on Machine learning and knowledge discovery in databases - Volume Part I, (108-123)
  671. ACM
    Tamrawi A, Nguyen T, Al-Kofahi J and Nguyen T Fuzzy set and cache-based approach for bug triaging Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, (365-375)
  672. Kim S, Barsky M and Han J Efficient mining of top correlated patterns based on null-invariant measures Proceedings of the 2011th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II, (177-192)
  673. Antzoulatos G and Vrahatis M α-clusterable sets Proceedings of the 2011th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I, (108-123)
  674. Campan A, Cooper N and Truta T On-the-fly generalization hierarchies for numerical attributes revisited Proceedings of the 8th VLDB international conference on Secure data management, (18-32)
  675. Zhang X, Liu J, Du Y and Lv T (2011). A novel clustering method on time series data, Expert Systems with Applications: An International Journal, 38:9, (11891-11900), Online publication date: 1-Sep-2011.
  676. Wang X, Yue K, Niu W and Shi Z (2011). An approach for adaptive associative classification, Expert Systems with Applications: An International Journal, 38:9, (11873-11883), Online publication date: 1-Sep-2011.
  677. Wang C and Chu K (2011). Using a projection-based approach to mine frequent inter-transaction patterns, Expert Systems with Applications: An International Journal, 38:9, (11024-11031), Online publication date: 1-Sep-2011.
  678. Naubourg P, Savonnet M, Leclercq É and Yétongnon K A approach to clinical proteomics data quality control and import Proceedings of the Second international conference on Information technology in bio- and medical informatics, (168-182)
  679. Janiesch C, Matzner M and Müller O A blueprint for event-driven business activity management Proceedings of the 9th international conference on Business process management, (17-28)
  680. Bouguessa M A practical approach for clustering transaction data Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition, (265-279)
  681. Simeon M and Hilderman R GENCCS Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition, (140-154)
  682. Wu S and Wang S Parameter-free anomaly detection for categorical data Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition, (112-126)
  683. Lam D, Liu A and Martin C Graph-based data warehousing using the core-facets model Proceedings of the 11th international conference on Advances in data mining: applications and theoretical aspects, (240-254)
  684. Kashyap S, Lee M and Hsu W Similar subsequence search in time series databases Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I, (232-246)
  685. Wang J and Wang X An ontology-based traffic accident risk mapping framework Proceedings of the 12th international conference on Advances in spatial and temporal databases, (21-38)
  686. Chen Y, Zhang L, Li J and Shi Y Domain Driven Two-Phase Feature Selection Method Based on Bhattacharyya Distance and Kernel Distance Measurements Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03, (217-220)
  687. Kuznetsov I, Kozerenko E and Matskevich A Intelligent Extraction of Knowledge Structures from Natural Language Texts Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03, (269-272)
  688. Ouyang Z and Shi Y A Fuzzy Clustering Algorithm for Petroleum Data Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03, (233-236)
  689. ACM
    Lee B, Oh J, Yu H and Kim J Protecting location privacy using location semantics Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (1289-1297)
  690. ACM
    Jin R, Liu L and Aggarwal C Discovering highly reliable subgraphs in uncertain graphs Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (992-1000)
  691. ACM
    Saraee M, Moghimi M and Bagheri A Modeling batch annealing process using data mining techniques for cold rolled steel sheets Proceedings of the First International Workshop on Data Mining for Service and Maintenance, (18-22)
  692. Rose A, Awang M, Hassan H, Zakaria A, Herawan T and Deris M Hybrid reduction in soft set decision making Proceedings of the 7th international conference on Advanced Intelligent Computing, (108-115)
  693. ACM
    Morid M, Shajari M and Golpayegani A Who are the most influential users in a recommender system? Proceedings of the 13th International Conference on Electronic Commerce, (1-5)
  694. Saxena A, Patre D and Dubey A (2011). Investigating a novel GA-based feature selection method using improved KNN classifiers, International Journal of Information and Communication Technology, 3:3, (274-288), Online publication date: 1-Aug-2011.
  695. Chen R, Mohammed N, Fung B, Desai B and Xiong L (2020). Publishing set-valued data via differential privacy, Proceedings of the VLDB Endowment, 4:11, (1087-1098), Online publication date: 1-Aug-2011.
  696. Huang B and Yang P (2011). Finding key knowledge attribute subspace of outliers in high-dimensional dataset, Expert Systems with Applications: An International Journal, 38:8, (10147-10152), Online publication date: 1-Aug-2011.
  697. Lin F, Yu H, Hsu C and Weng T (2011). Recommendation system for localized products in vending machines, Expert Systems with Applications: An International Journal, 38:8, (9129-9138), Online publication date: 1-Aug-2011.
  698. Elkafrawy P and Sauber A Multi-objective GA rule extraction in a parallel framework Proceedings of the 15th WSEAS international conference on Computers, (273-278)
  699. Vrotsou K and Forsell C A qualitative study of similarity measures in event-based data Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I, (170-179)
  700. Kerdprasop N and Kerdprasop K Discrete decision tree induction to avoid overfitting on categorical data Proceedings of the 13th WSEAS international conference on mathematical methods, computational techniques and intelligent systems, and 10th WSEAS international conference on non-linear analysis, non-linear systems and chaos, and 7th WSEAS international conference on dynamical systems and control, and 11th WSEAS international conference on Wavelet analysis and multirate systems: recent researches in computational techniques, non-linear systems and control, (247-252)
  701. Kerdprasop N and Kerdprasop K The discovery of frequent patterns with logic and constraint programming Proceedings of the 13th WSEAS international conference on mathematical methods, computational techniques and intelligent systems, and 10th WSEAS international conference on non-linear analysis, non-linear systems and chaos, and 7th WSEAS international conference on dynamical systems and control, and 11th WSEAS international conference on Wavelet analysis and multirate systems: recent researches in computational techniques, non-linear systems and control, (198-203)
  702. Jiang B, Hu X, Wei Q, Song J, Han C and Liang M (2011). Weak Ratio Rules, International Journal of Data Warehousing and Mining, 7:3, (50-87), Online publication date: 1-Jul-2011.
  703. Liu L, Sheridan D, Athavale V and Vasudevan S Automatic generation of assertions from system level design using data mining Proceedings of the Ninth ACM/IEEE International Conference on Formal Methods and Models for Codesign, (191-200)
  704. Weng C (2011). Mining fuzzy specific rare itemsets for education data, Knowledge-Based Systems, 24:5, (697-708), Online publication date: 1-Jul-2011.
  705. Lima J and Hirata C (2011). Multidimensional cyclic graph approach, Information Sciences: an International Journal, 181:13, (2626-2655), Online publication date: 1-Jul-2011.
  706. ACM
    Lino N, Siebra C, Araújo J, Anabuki D, Patricio J, Batista M, Nóbrega R, Amaro M and Lemos G Knowledge tv Proceedings of the 9th European Conference on Interactive TV and Video, (29-38)
  707. Stevanovic D, An A and Vlajic N Detecting web crawlers from web server access logs with data mining classifiers Proceedings of the 19th international conference on Foundations of intelligent systems, (483-489)
  708. Kołaczkowski P and Gawrysiak P Extracting product descriptions from polish e-commerce websites using classification and clustering Proceedings of the 19th international conference on Foundations of intelligent systems, (456-464)
  709. ACM
    Santos M and Wachowicz M Computing performance indicators in detecting shipping collision Proceedings of the 3rd ACM international workshop on MobiArch, (29-34)
  710. Li X, Wang X and Qi S Coreference resolution with loose transitivity constraints Proceedings of the Fifteenth Conference on Computational Natural Language Learning: Shared Task, (107-111)
  711. ACM
    Agarwal D and Chen B Latent OLAP Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (877-888)
  712. Ouyang J, Patel N and Sethi I (2011). From centralized to distributed decision tree induction using CHAID and fisher's linear discriminant function algorithms, Intelligent Decision Technologies, 5:2, (133-149), Online publication date: 1-Jun-2011.
  713. ACM
    Cheng X and Liu J Load-balanced migration of social media to content clouds Proceedings of the 21st international workshop on Network and operating systems support for digital audio and video, (51-56)
  714. Tseng F (2011). Segmenting online gamers by motivation, Expert Systems with Applications: An International Journal, 38:6, (7693-7697), Online publication date: 1-Jun-2011.
  715. Govindarajan M and Chandrasekaran R (2011). Intrusion detection using neural based hybrid classification methods, Computer Networks: The International Journal of Computer and Telecommunications Networking, 55:8, (1662-1671), Online publication date: 1-Jun-2011.
  716. Hu Y and Liao P (2011). Finding critical criteria of evaluating electronic service quality of Internet banking using fuzzy multiple-criteria decision making, Applied Soft Computing, 11:4, (3764-3770), Online publication date: 1-Jun-2011.
  717. Rabuñal J, Puertas J, Rivero D, Fraga I, Cea L and Garrido M Genetic programming for prediction of water flow and transport of solids in a basin Proceedings of the 4th international conference on Interplay between natural and artificial computation: new challenges on bioinspired applications - Volume Part II, (223-232)
  718. ACM
    Wang J and Li C An iterative voting method based on word density for text classification Proceedings of the International Conference on Web Intelligence, Mining and Semantics, (1-5)
  719. Sarmah S, Sarmah R and Bhattacharyya D An effective density-based hierarchical clustering technique to identify coherent patterns from gene expression data Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part I, (225-236)
  720. Tomašev N, Radovanovič M, Mladenič D and Ivanovič M The role of hubness in clustering high-dimensional data Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part I, (183-195)
  721. Dai B and Hsu S An instance selection algorithm based on reverse nearest neighbor Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part I, (1-12)
  722. Zhang L, Zhang Q, Wang Y and Yu D Selecting an appropriate interestingness measure to evaluate the correlation between syndrome elements and symptoms Proceedings of the 15th international conference on New Frontiers in Applied Data Mining, (372-383)
  723. Le Quy Nhon V and Anh D A BIRCH-Based clustering method for large time series databases Proceedings of the 15th international conference on New Frontiers in Applied Data Mining, (148-159)
  724. Grudenic I and Bogunovic N Job status prediction - catch them before they fail Proceedings of the 6th international conference on Advances in grid and pervasive computing, (3-12)
  725. Tran Q (2011). Improving non-small cell lung cancer classification in data mining courses, Journal of Computing Sciences in Colleges, 26:5, (104-112), Online publication date: 1-May-2011.
  726. Peng Y, Zhang Y, Tang Y and Li S (2011). An incident information management framework based on data integration, data mining, and multi-criteria decision making, Decision Support Systems, 51:2, (316-327), Online publication date: 1-May-2011.
  727. Pietrzyk M, Plissonneau L, Urvoy-Keller G and En-Najjary T On profiling residential customers Proceedings of the Third international conference on Traffic monitoring and analysis, (1-14)
  728. Spolaôr N, Lorena A and Lee H Multi-objective genetic algorithm evaluation in feature selection Proceedings of the 6th international conference on Evolutionary multi-criterion optimization, (462-476)
  729. Daneshpour N and Barfourosh A (2011). Dynamic View Management System for Query Prediction to View Materialization, International Journal of Data Warehousing and Mining, 7:2, (67-96), Online publication date: 1-Apr-2011.
  730. Abbasimehr H, Tarokh M and Setak M (2011). Determination of Algorithms Making Balance Between Accuracy and Comprehensibility in Churn Prediction Setting, International Journal of Information Retrieval Research, 1:2, (39-54), Online publication date: 1-Apr-2011.
  731. Patel S, Mehta T and Pradhan S (2011). A unified technique for robust digital watermarking of colour images using data mining and DCT, International Journal of Internet Technology and Secured Transactions, 3:1, (81-96), Online publication date: 1-Apr-2011.
  732. ACM
    Yoon S, Kim S, Kim J and Hwang W On computing text-based similarity in scientific literature Proceedings of the 20th international conference companion on World wide web, (169-170)
  733. ACM
    Patil N, Toshniwal D and Garg K Species identification based on approximate matching Proceedings of the Fourth Annual ACM Bangalore Conference, (1-4)
  734. ACM
    Cuzzocrea A and Serafino P ClustCube Proceedings of the 2011 ACM Symposium on Applied Computing, (976-982)
  735. ACM
    Largeron C, Moulin C and Géry M Entropy based feature selection for text categorization Proceedings of the 2011 ACM Symposium on Applied Computing, (924-928)
  736. ACM
    Schlegel B, Gemulla R and Lehner W Memory-efficient frequent-itemset mining Proceedings of the 14th International Conference on Extending Database Technology, (461-472)
  737. ACM
    Lo D, Cheng H and Lucia Mining closed discriminative dyadic sequential patterns Proceedings of the 14th International Conference on Extending Database Technology, (21-32)
  738. ACM
    Bishnu P and Bhattacherjee V (2011). Application of K-Medoids with Kd-Tree for Software Fault Prediction, ACM SIGSOFT Software Engineering Notes, 36:2, (1-6), Online publication date: 14-Mar-2011.
  739. ACM
    Asha T, Natarajan S and Murthy K Associative classification in the prediction of tuberculosis Proceedings of the International Conference & Workshop on Emerging Trends in Technology, (1327-1330)
  740. ACM
    Dalal M and Zaveri M Heuristics based automatic text summarization of unstructured text Proceedings of the International Conference & Workshop on Emerging Trends in Technology, (690-693)
  741. ACM
    Liu S, Chen L, Ni L and Fan J CIM Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, (1-10)
  742. ACM
    Yoon S, Song S and Kim S Efficient link-based clustering in a large scaled blog network Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, (1-5)
  743. ACM
    Park S, An D and Yoo H Document clustering using NMF and fuzzy relation Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, (1-5)
  744. ACM
    Sharma N Comparing the performance of data mining techniques for oral cancer prediction Proceedings of the 2011 International Conference on Communication, Computing & Security, (433-438)
  745. ACM
    Dutta D and Dutta P A real coded MOGA for mining classification rules with missing attribute values Proceedings of the 2011 International Conference on Communication, Computing & Security, (355-358)
  746. Koc M and Ré C (2011). Incrementally maintaining classification using an RDBMS, Proceedings of the VLDB Endowment, 4:5, (302-313), Online publication date: 1-Feb-2011.
  747. Abadia R, Stranieri A, Quinn A and Seifollahi S Real time processing of data from patient biodevices Proceedings of the Fourth Australasian Workshop on Health Informatics and Knowledge Management - Volume 120, (25-30)
  748. Kaosar M, Paulet R and Yi X Secure two-party association rule mining Proceedings of the Ninth Australasian Information Security Conference - Volume 116, (15-22)
  749. Puri C and Kumar N Projected Gustafson-Kessel clustering algorithm and its convergence Transactions on rough sets XIV, (159-182)
  750. Romano P and Milanesi L Complex search, ranks, and biological discovery Search computing, (226-235)
  751. ACM
    Chaovalit P, Gangopadhyay A, Karabatis G and Chen Z (2011). Discrete wavelet transform-based time series analysis and mining, ACM Computing Surveys, 43:2, (1-37), Online publication date: 1-Jan-2011.
  752. Yeh W, Lin W, Hsieh T and Liu S (2011). Feasible prediction in S-system models of genetic networks, Expert Systems with Applications: An International Journal, 38:1, (193-197), Online publication date: 1-Jan-2011.
  753. Dante C, De Pison Francisco J and Alpha P Temporal association rules mining Proceedings of the 9th WSEAS international conference on computational intelligence, man-machine systems and cybernetics, (69-74)
  754. Dante C, De Pison Francisco J and Alpha P Finding temporal associative rules in financial time-series Proceedings of the 9th WSEAS international conference on computational intelligence, man-machine systems and cybernetics, (60-68)
  755. ACM
    Bouguessa M, Wang S and Dumoulin B (2010). Discovering Knowledge-Sharing Communities in Question-Answering Forums, ACM Transactions on Knowledge Discovery from Data, 5:1, (1-49), Online publication date: 1-Dec-2010.
  756. Özyurt Ö and Köse C (2010). Chat mining, Expert Systems with Applications: An International Journal, 37:12, (8705-8710), Online publication date: 1-Dec-2010.
  757. Patil B, Joshi R and Toshniwal D (2010). Hybrid prediction model for Type-2 diabetic patients, Expert Systems with Applications: An International Journal, 37:12, (8102-8108), Online publication date: 1-Dec-2010.
  758. Khatibi V and Montazer G (2010). A fuzzy-evidential hybrid inference engine for coronary heart disease risk assessment, Expert Systems with Applications: An International Journal, 37:12, (8536-8542), Online publication date: 1-Dec-2010.
  759. Jiao N, Miao D and Zhou J (2010). Two novel feature selection methods based on decomposition and composition, Expert Systems with Applications: An International Journal, 37:12, (7419-7426), Online publication date: 1-Dec-2010.
  760. Yu L, Xu L and Tsai W Time-constrained test selection for regression testing Proceedings of the 6th international conference on Advanced data mining and applications - Volume Part II, (221-232)
  761. Anekritmongkol S and Kasamsan M Boolean algebra and compression technique for association rule mining Proceedings of the 6th international conference on Advanced data mining and applications - Volume Part II, (150-157)
  762. Tang Y, Srihari S, Kasiviswanathan H and Corso J Footwear print retrieval system for real crime scene marks Proceedings of the 4th international conference on Computational forensics, (88-100)
  763. Kiran R, Reddy P, Swamy M and Reddy G (2010). Analysing dynamics of crop problems by applying text analysis methods on farm advisory data of eSaguTM, International Journal of Computational Science and Engineering, 5:2, (154-164), Online publication date: 1-Nov-2010.
  764. Huang L, Ke X, Wong K and Mankovskii S Symptom-based problem determination using log data abstraction Proceedings of the 2010 Conference of the Center for Advanced Studies on Collaborative Research, (313-326)
  765. ACM
    Abu Doush I, Pontelli E, Son T, Simon D and Ma O (2010). Multimodal Presentation of Two-Dimensional Charts, ACM Transactions on Accessible Computing, 3:2, (1-50), Online publication date: 1-Nov-2010.
  766. ACM
    Broilo M, Zavesky E, Basso A and De Natale F Unsupervised event segmentation of news content with multimodal cues Proceedings of the 3rd international workshop on Automated information extraction in media production, (39-44)
  767. Zhao Q, Peng H, Hu B, Li L, Qi Y, Liu Q and Liu L Towards an efficient and accurate EEG data analysis in EEG-based individual identification Proceedings of the 7th international conference on Ubiquitous intelligence and computing, (534-547)
  768. ACM
    Jin X, Han J, Cao L, Luo J, Ding B and Lin C Visual cube and on-line analytical processing of images Proceedings of the 19th ACM international conference on Information and knowledge management, (849-858)
  769. Solskinnsbakk G and Gulla J A hybrid approach to constructing tag hierarchies Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II, (975-982)
  770. ACM
    Kim H, Jung J and El Saddik A Associative face co-occurrence networks for recommending friends in social networks Proceedings of second ACM SIGMM workshop on Social media, (27-32)
  771. Krömer P, Platoš J and Snášel V Fast dimension reduction based on NMF Proceedings of the 5th international conference on Advances in computation and intelligence, (424-433)
  772. Xia Y, Wang G, Zhang X, Kim G and Bae H Research of spatio-temporal similarity measure on network constrained trajectory data Proceedings of the 5th international conference on Rough set and knowledge technology, (491-498)
  773. Seki H, Honda Y and Nagano S On enumerating frequent closed patterns with key in multi-relational data Proceedings of the 13th international conference on Discovery science, (72-86)
  774. Holimchayachotikul P, Leksakul K, Montella D and Savino M Predictive collaborative performance system in B2B supply chain using neuro-fuzzy Proceedings of the 9th WSEAS international conference on System science and simulation in engineering, (348-353)
  775. ACM
    Barrera D, Kayacik H, van Oorschot P and Somayaji A A methodology for empirical analysis of permission-based security models and its application to android Proceedings of the 17th ACM conference on Computer and communications security, (73-84)
  776. Jantan H, Hamdan A and Othman Z (2010). Human Talent Forecasting using Data Mining Classification Techniques, International Journal of Technology Diffusion, 1:4, (29-41), Online publication date: 1-Oct-2010.
  777. Ha S (2010). Behavioral assessment of recoverable credit of retailer's customers, Information Sciences: an International Journal, 180:19, (3703-3717), Online publication date: 1-Oct-2010.
  778. Cheng Z and Shen J Large scale rich media information search Proceedings of the Advances in multimedia information processing, and 11th Pacific Rim conference on Multimedia: Part II, (13-21)
  779. Yu L, Liu J and Xu C Discovering phrase-level lexicon for image annotation Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I, (183-192)
  780. Cuzzocrea A and Gunopulos D Efficiently computing and querying multidimensional OLAP data cubes over probabilistic relational data Proceedings of the 14th east European conference on Advances in databases and information systems, (132-148)
  781. ACM
    Lo D and Maoz S Scenario-based and value-based specification mining Proceedings of the 25th IEEE/ACM International Conference on Automated Software Engineering, (387-396)
  782. ACM
    Lawall J and Lo D An automated approach for finding variable-constant pairing bugs Proceedings of the 25th IEEE/ACM International Conference on Automated Software Engineering, (103-112)
  783. Xiao Y, Xiong L and Yuan C Differentially private data release through multidimensional partitioning Proceedings of the 7th VLDB conference on Secure data management, (150-168)
  784. ACM
    Bhattacharya I and Bhatia M SVM classification to distinguish Parkinson disease patients Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, (1-6)
  785. ACM
    Bindu K, Sai Prasad P and Rao C Hybrid decision tree based on inferred attribute Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, (1-7)
  786. Luo Y, Ben K and Mi L Software metrics reduction for fault-proneness prediction of software modules Proceedings of the 2010 IFIP international conference on Network and parallel computing, (432-441)
  787. Jantan H, Hamdan A and Othman Z Classification and prediction of academic talent using data mining techniques Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part I, (491-500)
  788. Kurbalija V, Radovanović M, Geler Z and Ivanović M A framework for time-series analysis Proceedings of the 14th international conference on Artificial intelligence: methodology, systems, and applications, (42-51)
  789. ACM
    Najjar M and Abdollahi Azgomi M A distributed multi-approach intrusion detection system for web services Proceedings of the 3rd international conference on Security of information and networks, (238-244)
  790. Mateo R and Lee J (2010). Data mining model based on multi-agent for the intelligent distributed framework, International Journal of Intelligent Information and Database Systems, 4:4, (322-336), Online publication date: 1-Sep-2010.
  791. Hou W, Yang B, Wu C and Zhou Z (2010). RedTrees, Expert Systems with Applications: An International Journal, 37:9, (6265-6269), Online publication date: 1-Sep-2010.
  792. Ge J, Xia Y and Tu Y A discretization algorithm for uncertain data Proceedings of the 21st international conference on Database and expert systems applications: Part II, (485-499)
  793. Middelfart M, Pedersen T and Krogsgaard J Efficient discovery of generalized sentinel rules Proceedings of the 21st international conference on Database and expert systems applications: Part II, (32-48)
  794. Wu Q, Ye Y, Ng M, Su H and Huang J Exploiting word cluster information for unsupervised feature selection Proceedings of the 11th Pacific Rim international conference on Trends in artificial intelligence, (292-303)
  795. Nguyen M, Omiecinski E, Mark L and Irani D A fast randomized method for local density-based outlier detection in high dimensional data Proceedings of the 12th international conference on Data warehousing and knowledge discovery, (215-226)
  796. Chou B and Suzuki E Discovering community-oriented roles of nodes in a social network Proceedings of the 12th international conference on Data warehousing and knowledge discovery, (52-64)
  797. Gu J, Chen Y, Fu J, Peng H and Ye X Synthesizing Proceedings of the 21st international conference on Database and expert systems applications: Part I, (385-399)
  798. Xu S Data mining using an adaptive HONN model with hyperbolic tangent neurons Proceedings of the 11th international conference on Knowledge management and acquisition for smart systems and services, (73-81)
  799. Mirroshandel S and Ghassem-Sani G Temporal Relations Learning with a Bootstrapped Cross-document Classifier Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (829-834)
  800. Kumar P and Ananthanarayana V Attribute -TID method for discovering sequence of attributes Proceedings of the Second international conference on Data Engineering and Management, (333-340)
  801. Bifet A Adaptive Stream Mining Proceedings of the 2010 conference on Adaptive Stream Mining: Pattern Learning and Mining from Evolving Data Streams, (1-212)
  802. ACM
    Bhaskar R, Laxman S, Smith A and Thakurta A Discovering frequent patterns in sensitive data Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (503-512)
  803. ACM
    Tai C, Yu P and Chen M k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (473-482)
  804. ACM
    Zheng L, Shen C, Tang L, Li T, Luis S, Chen S and Hristidis V Using data mining techniques to address critical information exchange needs in disaster affected public-private networks Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (125-134)
  805. ACM
    Fradkin D and Moerchen F Margin-closed frequent sequential pattern mining Proceedings of the ACM SIGKDD Workshop on Useful Patterns, (45-54)
  806. ACM
    Dries A and Nijssen S Analyzing graph databases by aggregate queries Proceedings of the Eighth Workshop on Mining and Learning with Graphs, (37-45)
  807. Watanabe Y, Otagiri K and Yokota H FileSearchCube Proceedings of the 11th international conference on Web-age information management, (386-397)
  808. Olsen M, Snaprud M and Nietzio A Automatic checking of alternative texts on web pages Proceedings of the 12th international conference on Computers helping people with special needs: Part I, (425-432)
  809. Zargar G and Kabiri P Selection of effective network parameters in attacks for intrusion detection Proceedings of the 10th industrial conference on Advances in data mining: applications and theoretical aspects, (643-652)
  810. Parshutin S Managing product life cycle with multiagent data mining system Proceedings of the 10th industrial conference on Advances in data mining: applications and theoretical aspects, (308-322)
  811. Bhatnagar V and Ahuja S Robust clustering using discriminant analysis Proceedings of the 10th industrial conference on Advances in data mining: applications and theoretical aspects, (143-157)
  812. Wang P and Mao G Describing data with the support vector shell in distributed environments Proceedings of the 10th industrial conference on Advances in data mining: applications and theoretical aspects, (128-142)
  813. Demiriz A, Ertek G, Atan T and Kula U Re-mining positive and negative association mining results Proceedings of the 10th industrial conference on Advances in data mining: applications and theoretical aspects, (101-114)
  814. Rodríguez C, Silveira P, Daniel F and Casati F Analyzing compliance of service-based business processes for root-cause analysis and prediction Proceedings of the 10th international conference on Current trends in web engineering, (277-288)
  815. ACM
    Kriegel H, Kröger P, Renz M and Schubert M (2010). Metric spaces in data mining, SIGSPATIAL Special, 2:2, (36-39), Online publication date: 1-Jul-2010.
  816. ACM
    Tremblay M, Dutta K and Vandermeer D (2010). Using Data Mining Techniques to Discover Bias Patterns in Missing Data, Journal of Data and Information Quality, 2:1, (1-19), Online publication date: 1-Jul-2010.
  817. Hosseini S, Maleki A and Gholamian M (2010). Cluster analysis using data mining approach to develop CRM methodology to assess the customer loyalty, Expert Systems with Applications: An International Journal, 37:7, (5259-5264), Online publication date: 1-Jul-2010.
  818. Petry F and Yager R Negotiation as creative social interaction using concept hierarchies Proceedings of the Computational intelligence for knowledge-based systems design, and 13th international conference on Information processing and management of uncertainty, (281-289)
  819. Błaszczyński J, Słowiński R and Szeląg M Probabilistic rough set approaches to ordinal classification with monotonicity constraints Proceedings of the Computational intelligence for knowledge-based systems design, and 13th international conference on Information processing and management of uncertainty, (99-108)
  820. Zakrzewska D Building group recommendations in e-learning systems Proceedings of the 4th KES international conference on Agent and multi-agent systems: technologies and applications, Part I, (391-400)
  821. Abdullah Z, Herawan T and Deris M Mining significant least association rules using fast SLP-growth algorithm Proceedings of the 2010 international conference on Advances in computer science and information technology, (324-336)
  822. ACM
    Huang Y, Zheng H, Nugent C, McCullagh P, McDonough S, Tully M and Connor S Activity monitoring using an intelligent mobile phone Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments, (1-6)
  823. Wang J and Lin C An association model for implicit crime link analysis Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics, (15-21)
  824. Thomas B and Raju G A fuzzy threshold based modified clustering algorithm for natural data exploration Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics, (167-172)
  825. ACM
    Ordonez C and García-García J Database systems research on data mining Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, (1253-1254)
  826. Cheng Y and Tong Q Spectral clustering on manifolds with statistical and geometrical similarity Proceedings of the 7th international conference on Advances in Neural Networks - Volume Part I, (422-429)
  827. Gericke A and Bucher T Realization approaches of customer relationship management – a design science research contribution to support the construction of situational CRM artifacts Proceedings of the 5th international conference on Global Perspectives on Design Science Research, (349-364)
  828. Winck A, Machado K, Ruiz D and de Lima V Association rules to identify receptor and ligand structures through named entities recognition Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part III, (119-128)
  829. Adeodato P, Braga P, Arnaud A, Vasconcelos G, Guedes F, Menezes H and Limeira G Domain driven data mining for unavailability estimation of electrical power grids Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part II, (357-366)
  830. Alonso-González C, Moro-Sancho Q, Ramos-Muñoz I and Simón-Hurtado M Rotation forest on microarray domain Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part II, (96-105)
  831. Matos P, Lombardi L, Pardo T, Ciferri C, Vieira M and Ciferri R An environment for data analysis in biomedical domain Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part I, (306-316)
  832. Schmitz D, Arzdorf T, Jarke M and Lakemeyer G Analyzing agent-based simulations of inter-organizational networks Proceedings of the 6th international conference on Agents and data mining interaction, (87-102)
  833. García S, Fernández A, Luengo J and Herrera F (2010). Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining, Information Sciences: an International Journal, 180:10, (2044-2064), Online publication date: 1-May-2010.
  834. ACM
    Yoon S, Kim S and Park S A link-based similarity measure for scientific literature Proceedings of the 19th international conference on World wide web, (1213-1214)
  835. ACM
    Hwang W, Chae S, Kim S and Woo G Yet another paper ranking algorithm advocating recent publications Proceedings of the 19th international conference on World wide web, (1117-1118)
  836. ACM
    Bagui S and Islam M Query optimization in large databases using association rule mining Proceedings of the 48th Annual Southeast Regional Conference, (1-2)
  837. Kattan A, Agapitos A and Poli R Unsupervised problem decomposition using genetic programming Proceedings of the 13th European conference on Genetic Programming, (122-133)
  838. Engle K and Gangopadhyay A (2010). An Efficient Method for Discretizing Continuous Attributes, International Journal of Data Warehousing and Mining, 6:2, (1-21), Online publication date: 1-Apr-2010.
  839. Petry F and Yager R (2010). A framework for use of imprecise categorization in developing intelligent systems, IEEE Transactions on Fuzzy Systems, 18:2, (348-361), Online publication date: 1-Apr-2010.
  840. Gonen Y, Gal-Oz N, Yahalom R and Gudes E CAMLS Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part I, (63-77)
  841. Goharian N, Frieder O, Yee W and Mundrawala J Enriching peer-to-peer file descriptors using association rules on query logs Proceedings of the 32nd European conference on Advances in Information Retrieval, (636-639)
  842. Jung J Towards semantic preprocessing for mining sensor streams from heterogeneous environments Proceedings of the Second international conference on Intelligent information and database systems: Part I, (103-112)
  843. Esmaelnejad J, Habibi J and Yeganeh S A novel method to find appropriate for ε for DBSCAN Proceedings of the Second international conference on Intelligent information and database systems: Part I, (93-102)
  844. ACM
    Colantonio A, Di Pietro R, Ocello A and Verde N ABBA Proceedings of the 2010 ACM Symposium on Applied Computing, (1026-1033)
  845. ACM
    Sami A, Yadegari B, Rahimi H, Peiravian N, Hashemi S and Hamze A Malware detection based on mining API calls Proceedings of the 2010 ACM Symposium on Applied Computing, (1020-1025)
  846. ACM
    Zorrilla M, García D and Álvarez E A decision support system to improve e-learning environments Proceedings of the 2010 EDBT/ICDT Workshops, (1-8)
  847. ACM
    Hu Y, Hou W, Sundara S and Srinivasan J An experimental study of time-constrained aggregate queries Proceedings of the 13th International Conference on Extending Database Technology, (669-674)
  848. ACM
    Wu T, Sun Y, Li C and Han J Region-based online promotion analysis Proceedings of the 13th International Conference on Extending Database Technology, (63-74)
  849. Nedjar S, Casali A, Cicchetti R and Lakhal L Constrained closed datacubes Proceedings of the 8th international conference on Formal Concept Analysis, (177-192)
  850. ACM
    McCown F Teaching web information retrieval to undergraduates Proceedings of the 41st ACM technical symposium on Computer science education, (87-91)
  851. Ferent C, Subramanian V, Gilberti M and Doboli A Linear programming approach for performance-driven data aggregation in networks of embedded sensors Proceedings of the Conference on Design, Automation and Test in Europe, (1456-1461)
  852. Bo Y and Yongqing Z The improved on-line analysis mining for multi-dimension data based on association rules Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 2, (345-348)
  853. Czibula G and Czibula I (2010). Clustering based adaptive refactoring, WSEAS Transactions on Information Science and Applications, 7:3, (391-400), Online publication date: 1-Mar-2010.
  854. Espejo P, Ventura S and Herrera F (2010). A survey on the application of genetic programming to classification, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 40:2, (121-144), Online publication date: 1-Mar-2010.
  855. Yoon Y, Bien S and Park S (2010). Microarray data classifier consisting of k-top-scoring rank-comparison decision rules with a variable number of genes, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 40:2, (216-226), Online publication date: 1-Mar-2010.
  856. Zhong C, Miao D and Wang R (2010). A graph-theoretical clustering method based on two rounds of minimum spanning trees, Pattern Recognition, 43:3, (752-766), Online publication date: 1-Mar-2010.
  857. Tseng F and Hu Y (2010). Comparing four bankruptcy prediction models, Expert Systems with Applications: An International Journal, 37:3, (1846-1853), Online publication date: 1-Mar-2010.
  858. Nasibov E and Ulutagay G (2010). Comparative clustering analysis of bispectral index series of brain activity, Expert Systems with Applications: An International Journal, 37:3, (2495-2504), Online publication date: 1-Mar-2010.
  859. Chen Y and Cheng C (2010). A Delphi-based rough sets fusion model for extracting payment rules of vehicle license tax in the government sector, Expert Systems with Applications: An International Journal, 37:3, (2161-2174), Online publication date: 1-Mar-2010.
  860. Feng Q, Miao D and Cheng Y (2010). Hierarchical decision rules mining, Expert Systems with Applications: An International Journal, 37:3, (2081-2091), Online publication date: 1-Mar-2010.
  861. Chen S, Wang W and van Zuylen H (2010). A comparison of outlier detection algorithms for ITS data, Expert Systems with Applications: An International Journal, 37:2, (1169-1178), Online publication date: 1-Mar-2010.
  862. ACM
    Beatrice S, Thirumahal R and Raja S Comparing the computational complexity and accuracy of classification algorithms Proceedings of the International Conference and Workshop on Emerging Trends in Technology, (513-514)
  863. Saravanan M and Valaramathi B Generalization of web log datas using WUM technique Proceedings of the 12th international conference on Networking, VLSI and signal processing, (157-165)
  864. Carstea C OS based Aplix software solution Proceedings of the 9th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases, (88-92)
  865. Han A, Jeon S, Bae D and Hong J (2010). Measuring behavioral dependency for improving change-proneness prediction in UML-based design models, Journal of Systems and Software, 83:2, (222-234), Online publication date: 1-Feb-2010.
  866. Yoon K and Bae D (2010). A pattern-based outlier detection method identifying abnormal attributes in software project data, Information and Software Technology, 52:2, (137-151), Online publication date: 1-Feb-2010.
  867. De Meo P, Quattrone G and Ursino D (2010). A query expansion and user profile enrichment approach to improve the performance of recommender systems operating on a folksonomy, User Modeling and User-Adapted Interaction, 20:1, (41-86), Online publication date: 1-Feb-2010.
  868. Anbarasi M and Mehata K Enhanced k-means clustering for patient reported outcome Proceedings of the 4th WSEAS international conference on Computer engineering and applications, (19-26)
  869. Kumar A and Sivalingam K Energy-efficient mobile data collection in wireless sensor networks with delay reduction using wireless communication Proceedings of the 2nd international conference on COMmunication systems and NETworks, (50-59)
  870. Pal S Computational theory perception (CTP), rough-fuzzy uncertainty analysis and mining in bioinformatics and web intelligence Transactions on Rough Sets XI, (106-129)
  871. Ng W and Dash M Discovery of frequent patterns in transactional data streams Transactions on large-scale data- and knowledge-centered systems II, (1-30)
  872. Ng W and Dash M Discovery of frequent patterns in transactional data streams Transactions on large-scale data- and knowledge-centered systems II, (1-30)
  873. Terlecki P On the relation between jumping emerging patterns and rough set theory with application to data classification Transactions on rough sets XII, (236-338)
  874. Alcala-Fdez J, Flugy-Pape N, Bonarini A and Herrera F (2010). Analysis of the Effectiveness of the Genetic Algorithms based on Extraction of Association Rules, Fundamenta Informaticae, 98:1, (1-14), Online publication date: 1-Jan-2010.
  875. Varvarigou T, Tserpes K, Kyriazis D, Silvestri F and Psimogiannos N (2010). A Study on the Effect of Application and Resource Characteristics on the QoS in Service Provisioning Environments, International Journal of Distributed Systems and Technologies, 1:1, (55-75), Online publication date: 1-Jan-2010.
  876. Arnold M, Ghosh A, Ameling S and Lacey G (2010). Automatic segmentation and inpainting of specular highlights for endoscopic imaging, Journal on Image and Video Processing, 2010, (1-12), Online publication date: 1-Jan-2010.
  877. Li H and Sun J (2010). Business failure prediction using hybrid2 case-based reasoning (H2CBR), Computers and Operations Research, 37:1, (137-151), Online publication date: 1-Jan-2010.
  878. ACM
    Abdullah Z and Deris M Association rules mining with relative weighted support Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, (507-511)
  879. Palshikar G, Deshpande S and Bhat S QUEST Proceedings of the Eighth Australasian Data Mining Conference - Volume 101, (83-91)
  880. Kaosar M, Xu Z and Yi X Distributed association rule mining with minimum communication overhead Proceedings of the Eighth Australasian Data Mining Conference - Volume 101, (17-23)
  881. Guha S Efficiently mining frequent subpaths Proceedings of the Eighth Australasian Data Mining Conference - Volume 101, (11-15)
  882. Syed Z, Indyk P and Guttag J (2009). Learning Approximate Sequential Patterns for Classification, The Journal of Machine Learning Research, 10, (1913-1936), Online publication date: 1-Dec-2009.
  883. Tan G, Viard-Gaudin C and Kot A (2009). Automatic writer identification framework for online handwritten documents using character prototypes, Pattern Recognition, 42:12, (3313-3323), Online publication date: 1-Dec-2009.
  884. Huang T (2009). Developing an efficient knowledge discovering model for mining fuzzy multi-level sequential patterns in sequence databases, Fuzzy Sets and Systems, 160:23, (3359-3381), Online publication date: 1-Dec-2009.
  885. Tsai C and Lu Y (2009). Customer churn prediction by hybrid neural networks, Expert Systems with Applications: An International Journal, 36:10, (12547-12553), Online publication date: 1-Dec-2009.
  886. Thongkam J, Xu G, Zhang Y and Huang F (2009). Toward breast cancer survivability prediction models through improving training space, Expert Systems with Applications: An International Journal, 36:10, (12200-12209), Online publication date: 1-Dec-2009.
  887. Cheng C and Wei L (2009). Data spread-based entropy clustering method using adaptive learning, Expert Systems with Applications: An International Journal, 36:10, (12357-12361), Online publication date: 1-Dec-2009.
  888. ACM
    Huang Y and Hoa V General criteria on building decision trees for data classification Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, (649-654)
  889. ACM
    Mohror K and Karavanic K Evaluating similarity-based trace reduction techniques for scalable performance analysis Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis, (1-12)
  890. ACM
    Szebenyi Z, Wolf F and Wylie B Space-efficient time-series call-path profiling of parallel applications Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis, (1-12)
  891. ACM
    Farooq M, Khan M, Shamail S and Awais M Intelligent project approval cycle for local government Proceedings of the 3rd international conference on Theory and practice of electronic governance, (68-73)
  892. ACM
    Hasan T, Mudur S and Shiri N A session generalization technique for improved web usage mining Proceedings of the eleventh international workshop on Web information and data management, (23-30)
  893. ACM
    Hu C and Chou C RSS watchdog Proceedings of the 18th ACM conference on Information and knowledge management, (2097-2098)
  894. ACM
    Ji L, Yan J, Liu N, Zhang W, Fan W and Chen Z ExSearch Proceedings of the 18th ACM conference on Information and knowledge management, (1357-1366)
  895. ACM
    Wang X, Tan B, Shakery A and Zhai C Beyond hyperlinks Proceedings of the 18th ACM conference on Information and knowledge management, (1237-1246)
  896. Nedjar S, Casali A, Cicchetti R and Lakhal L (2009). Reduced representations of Emerging Cubes for OLAP database mining, International Journal of Business Intelligence and Data Mining, 4:3/4, (267-300), Online publication date: 1-Nov-2009.
  897. Fan Y, (Bill) Tseng T, Chern C and Huang C (2009). Rule induction based on an incremental rough set, Expert Systems with Applications: An International Journal, 36:9, (11439-11450), Online publication date: 1-Nov-2009.
  898. Lin S, Shiue Y, Chen S and Cheng H (2009). Applying enhanced data mining approaches in predicting bank performance, Expert Systems with Applications: An International Journal, 36:9, (11543-11551), Online publication date: 1-Nov-2009.
  899. Shiue Y, Guh R and Tseng T (2009). GA-based learning bias selection mechanism for real-time scheduling systems, Expert Systems with Applications: An International Journal, 36:9, (11451-11460), Online publication date: 1-Nov-2009.
  900. Liao N, Tian S and Wang T (2009). Network forensics based on fuzzy logic and expert system, Computer Communications, 32:17, (1881-1892), Online publication date: 1-Nov-2009.
  901. Fang N and Lu J Work in progress - a decision tree approach to predicting student performance in a high-enrollment, high-impact, and core engineering Proceedings of the 39th IEEE international conference on Frontiers in education conference, (256-258)
  902. Yeh I, Lien C, Ting T and Liu C (2009). Applications of web mining for marketing of online bookstores, Expert Systems with Applications: An International Journal, 36:8, (11249-11256), Online publication date: 1-Oct-2009.
  903. Hu Y, Huang T, Yang H and Chen Y (2009). On mining multi-time-interval sequential patterns, Data & Knowledge Engineering, 68:10, (1112-1127), Online publication date: 1-Oct-2009.
  904. Zeng Y, Xu H, Guo J, Wang Y and Bai S A Clustering Framework Based on Adaptive Space Mapping and Rescaling Proceedings of the 5th Asia Information Retrieval Symposium on Information Retrieval Technology, (363-374)
  905. Qiang Z, Ying Y, Teng-fei W and Cheng L A signal filter based clustering algorithm Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (5311-5314)
  906. Yu L and Li Q A novel web text mining method based on semantic polarity analysis Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (5116-5119)
  907. Chen F, Wang M, Fu Y and Zeng J New detection of peer-to-peer controlled bots on the host Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (4595-4598)
  908. Ávila J, Gibaja E, Zafra A and Ventura S A niching algorithm to learn discriminant functions with multi-label patterns Proceedings of the 10th international conference on Intelligent data engineering and automated learning, (570-577)
  909. Fernández A, Luengo J, Derrac J, Alcalá-Fdez J and Herrera F Implementation and integration of algorithms into the KEEL data-mining software tool Proceedings of the 10th international conference on Intelligent data engineering and automated learning, (562-569)
  910. Lairenjam B and Wasan S Neural network with classification based on multiple association rule for classifying mammographic data Proceedings of the 10th international conference on Intelligent data engineering and automated learning, (465-476)
  911. Kang P and Cho S K-means clustering seeds initialization based on centrality, sparsity, and isotropy Proceedings of the 10th international conference on Intelligent data engineering and automated learning, (109-117)
  912. Guaragnella C, Guerriero A, Pasquale C and Ragni F Jobs run-time scheduling in a Java based grid architecture Proceedings of the 5th international conference on Emerging intelligent computing technology and applications, (453-463)
  913. ACM
    Dash M and Singhania A (2009). Mining in Large Noisy Domains, Journal of Data and Information Quality, 1:2, (1-30), Online publication date: 1-Sep-2009.
  914. ACM
    Bhagwan V, Grandison T and Gruhl D (2009). Sound index, Communications of the ACM, 52:9, (64-70), Online publication date: 1-Sep-2009.
  915. Akay A, Dragomir A, Yardimci A, Canatan D, Yesilipek A and Pogue B (2009). A data-mining approach for investigating social and economic geographical dynamics of β-thalassemia's spread, IEEE Transactions on Information Technology in Biomedicine, 13:5, (774-780), Online publication date: 1-Sep-2009.
  916. Ordonez C and Chen Z (2009). Evaluating statistical tests on OLAP cubes to compare degree of disease, IEEE Transactions on Information Technology in Biomedicine, 13:5, (756-765), Online publication date: 1-Sep-2009.
  917. Ouyang J, Patel N and Sethi I (2009). Induction of multiclass multifeature split decision trees from distributed data, Pattern Recognition, 42:9, (1786-1794), Online publication date: 1-Sep-2009.
  918. Gómez L, Haesevoets S, Kuijpers B and Vaisman A (2009). Spatial aggregation, Information Systems, 34:6, (551-576), Online publication date: 1-Sep-2009.
  919. De Meo P, Quattrone G and Ursino D (2009). Exploitation of semantic relationships and hierarchical data structures to support a user in his annotation and browsing activities in folksonomies, Information Systems, 34:6, (511-535), Online publication date: 1-Sep-2009.
  920. Seo S, Kang J and Ho Ryu K (2009). Multivariable stream data classification using motifs and their temporal relations, Information Sciences: an International Journal, 179:20, (3489-3504), Online publication date: 1-Sep-2009.
  921. Aliguliyev R (2009). Performance evaluation of density-based clustering methods, Information Sciences: an International Journal, 179:20, (3583-3602), Online publication date: 1-Sep-2009.
  922. García S, Fernández A and Herrera F (2009). Enhancing the effectiveness and interpretability of decision tree and rule induction classifiers with evolutionary training set selection over imbalanced problems, Applied Soft Computing, 9:4, (1304-1314), Online publication date: 1-Sep-2009.
  923. ACM
    Lo D, Mariani L and Pezzè M Automatic steering of behavioral model inference Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (345-354)
  924. ACM
    Zimmermann T, Nagappan N, Gall H, Giger E and Murphy B Cross-project defect prediction Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (91-100)
  925. Zhi-hang T and Bao-an Y Investigation and application of extension data mining based on rough set Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 7, (43-47)
  926. Yang S, Chen F and Tan Z The application of data mining technique in data analyzing and processing of liquid propellant rocket engine test Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 5, (553-557)
  927. Ziyong Z and Zilin D Association rules based feature selection for the interpretation of well log data Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 5, (183-187)
  928. Jiao N, Miao D and Zhang H A novel attribute reduction algorithm of decomposition based on rough sets Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 4, (515-519)
  929. Zhang L, Qiao M and Zhang D Research on multi-dimensional association rules mining in distributed environments based on advanced SQL query Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 2, (108-112)
  930. ACM
    Koopaei M and Minaei-Bidgoli B A new method for ranking changes in customer's behavioral patterns in department stores Proceedings of the 11th International Conference on Electronic Commerce, (317-322)
  931. ACM
    Kim J, Jang M, Kim H and Cho Y A hybrid recommendation procedure for new items using preference boundary Proceedings of the 11th International Conference on Electronic Commerce, (289-295)
  932. Cunha R, Adeodato P and Meira S Integration and knowledge reuse environment for producing award winning solutions for binary decision data mining problems Proceedings of the 10th IEEE international conference on Information Reuse & Integration, (376-381)
  933. Liu Z, Li P, Zheng Y and Sun M Clustering to find exemplar terms for keyphrase extraction Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1, (257-266)
  934. Sun W, Wang C, Zhang T and Zhang Y (2009). Transaction-item association matrix-based frequent pattern network mining algorithm in large-scale transaction database, WSEAS Transactions on Computers, 8:8, (1327-1336), Online publication date: 1-Aug-2009.
  935. Hu Y (2009). Bankruptcy prediction using ELECTRE-based single-layer perceptron, Neurocomputing, 72:13-15, (3150-3157), Online publication date: 1-Aug-2009.
  936. Alatas B and Akin E (2009). Multi-objective rule mining using a chaotic particle swarm optimization algorithm, Knowledge-Based Systems, 22:6, (455-460), Online publication date: 1-Aug-2009.
  937. Zhang M and Zhou Z (2009). Multi-instance clustering with applications to multi-instance prediction, Applied Intelligence, 31:1, (47-68), Online publication date: 1-Aug-2009.
  938. Wang Y, Sun W, She J, Wei S and Wang C Frequent pattern network mining algorithm based on transaction-item association matrix Proceedings of the WSEAES 13th international conference on Computers, (498-501)
  939. Cernian A and Carstoiu D Clustering heterogeneous data using clustering by compression Proceedings of the WSEAES 13th international conference on Computers, (133-138)
  940. Jurczyk P and Xiong L Distributed Anonymization Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII, (191-207)
  941. Chen Y A Fast Approximation Algorithm for the k Partition-Distance Problem Proceedings of the International Conference on Computational Science and Its Applications: Part II, (537-546)
  942. Shin I, Park G, Saha A, Kwak H and Kim H Analysis of Moving Patterns of Moving Objects with the Proposed Framework Proceedings of the International Conference on Computational Science and Its Applications: Part II, (443-452)
  943. ACM
    Weninger T, Hsu W, Xia J and Aljandal W An evolutionary approach to constructive induction for link discovery Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers, (2167-2172)
  944. ACM
    Weninger T, Hsu W, Xia J and Aljandal W An evolutionary approach to constructive induction for link discovery Proceedings of the 11th Annual conference on Genetic and evolutionary computation, (1941-1942)
  945. UmaMaheswari P and Rajaram M (2009). Principal component analysis-based frequent pattern evaluation on the object-relational data model of a cricket match database, International Journal of Data Analysis Techniques and Strategies, 1:4, (364-384), Online publication date: 1-Jul-2009.
  946. Chevrefils C, Cheriet F, Aubin C and Grimard G (2009). Texture analysis for automatic segmentation of intervertebral disks of scoliotic spines from MR images, IEEE Transactions on Information Technology in Biomedicine, 13:4, (608-620), Online publication date: 1-Jul-2009.
  947. Wu L, Lee J, Huang H, Liu B and Horng J (2009). An expert system to predict protein thermostability using decision tree, Expert Systems with Applications: An International Journal, 36:5, (9007-9014), Online publication date: 1-Jul-2009.
  948. Wu J and Li Y Granule Oriented Data Warehouse Model Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology, (255-263)
  949. ACM
    Wan L, Liao J and Zhu X A frequent pattern based framework for event detection in sensor network stream data Proceedings of the Third International Workshop on Knowledge Discovery from Sensor Data, (87-96)
  950. ACM
    Georgii E, Tsuda K and Schölkopf B Multi-way set enumeration in real-valued tensors Proceedings of the 2nd Workshop on Data Mining using Matrices and Tensors, (1-10)
  951. ACM
    Ding X, Liu B and Zhang L Entity discovery and assignment for opinion mining applications Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (1125-1134)
  952. ACM
    Last M Improving data mining utility with projective sampling Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (487-496)
  953. Neuhaus S and Zimmermann T The beauty and the beast Proceedings of the 2009 conference on USENIX Annual technical conference, (30-30)
  954. Baralis E, Bianco A, Cerquitelli T, Chiaraviglio L and Mellia M Netcluster Proceedings of the 2009 IEEE international conference on Communications, (2288-2292)
  955. Adeodato P, Arnaud A, Vasconcelos G, Cunha R, Gurgel T and Monteiro D The role of temporal feature extraction and bagging of MLP neural networks for solving the WCCI 2008 ford classification challenge Proceedings of the 2009 international joint conference on Neural Networks, (2685-2690)
  956. Lan M, Xu Y, Li L, Wang F, Zuo Y, Chen Y, Tan C and Su J CpG-Discover Proceedings of the 2009 international joint conference on Neural Networks, (1981-1986)
  957. Ogasawara E, Murta L, Zimbrão G and Mattoso M Neural networks cartridges for data mining on time series Proceedings of the 2009 international joint conference on Neural Networks, (256-263)
  958. Van Long T and Linsen L Multiclustertree Proceedings of the 11th Eurographics / IEEE - VGTC conference on Visualization, (823-830)
  959. Badia A Supporting data exploration in databases Proceedings of the 2009 IEEE international conference on Intelligence and security informatics, (49-54)
  960. Park B, Won Y, Yu H, Hong J, Noh H and Lee J Fault detection in IP-based process control networks using data mining Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management, (211-217)
  961. Lin S and Chen S (2009). PSOLDA, Applied Soft Computing, 9:3, (1008-1015), Online publication date: 1-Jun-2009.
  962. ACM
    Singh J, Shi Q, Sandhu H and Fung B Anonymizing location-based RFID data Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering, (27-33)
  963. ACM
    Wang T and Desai B Issues in pattern mining and their resolutions Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering, (17-26)
  964. Golzari S, Doraisamy S, Sulaiman M and Udzir N Improving the accuracy of AIRS by incorporating real world tournament selection in resource competition phase Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (3040-3044)
  965. Zhang J, Wu Z, Wang Z, Guo J and Huang Z Unconstrained gene expression programming Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (2043-2048)
  966. Qu L, Min Y, Weihong W and Xiaohong C Dynamic split-point selection method for decision tree evolved by gene expression programming Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (736-740)
  967. He S, Balecel N, Hamam H and Bouslimani Y Web Site Auditing Using Web Access Log Data Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference, (94-101)
  968. Berzal F, Cubero J and Jiménez A (2009). The design and use of the TMiner component-based data mining framework, Expert Systems with Applications: An International Journal, 36:4, (7882-7887), Online publication date: 1-May-2009.
  969. Tseng T, Shiue Y, Ning K, Lin S and Cheng W (2009). Using new attribute construction to incorporate the expertise of human experts into a smuggling vessels classification system, Expert Systems with Applications: An International Journal, 36:4, (7773-7777), Online publication date: 1-May-2009.
  970. Aliguliyev R (2009). A new sentence similarity measure and sentence based extractive technique for automatic text summarization, Expert Systems with Applications: An International Journal, 36:4, (7764-7772), Online publication date: 1-May-2009.
  971. Aliguliyev R (2009). Clustering of document collection - A weighting approach, Expert Systems with Applications: An International Journal, 36:4, (7904-7916), Online publication date: 1-May-2009.
  972. Shim J and Lee W (2009). On-line analytical framework for the 2-DE based proteome information, Expert Systems with Applications: An International Journal, 36:4, (7528-7534), Online publication date: 1-May-2009.
  973. Chiu H, Wei T and Lee H (2009). A novel approach for missing data processing based on compounded PSO clustering, WSEAS Transactions on Information Science and Applications, 6:4, (589-600), Online publication date: 1-Apr-2009.
  974. Ghinita G (2009). Private Queries and Trajectory Anonymization, Transactions on Data Privacy, 2:1, (3-19), Online publication date: 1-Apr-2009.
  975. Ordonez C (2009). Models for association rules based on clustering and correlation, Intelligent Data Analysis, 13:2, (337-358), Online publication date: 1-Apr-2009.
  976. Shaari F, Bakar A and Hamdan A (2009). Outlier detection based on rough sets theory, Intelligent Data Analysis, 13:2, (191-206), Online publication date: 1-Apr-2009.
  977. Andreopoulos B, An A, Wang X and Labudde D (2009). Efficient layered density-based clustering of categorical data, Journal of Biomedical Informatics, 42:2, (365-376), Online publication date: 1-Apr-2009.
  978. Pendharkar P (2009). Genetic algorithm based neural network approaches for predicting churn in cellular wireless network services, Expert Systems with Applications: An International Journal, 36:3, (6714-6720), Online publication date: 1-Apr-2009.
  979. Lu T and Wu K (2009). A transaction pattern analysis system based on neural network, Expert Systems with Applications: An International Journal, 36:3, (6091-6099), Online publication date: 1-Apr-2009.
  980. Kianmehr K and Alhajj R (2009). Calling communities analysis and identification using machine learning techniques, Expert Systems with Applications: An International Journal, 36:3, (6218-6226), Online publication date: 1-Apr-2009.
  981. Hu Y (2009). Fuzzy multiple-criteria decision making in the determination of critical criteria for assessing service quality of travel websites, Expert Systems with Applications: An International Journal, 36:3, (6439-6445), Online publication date: 1-Apr-2009.
  982. Wu S and Yen E (2009). Data mining-based intrusion detectors, Expert Systems with Applications: An International Journal, 36:3, (5605-5612), Online publication date: 1-Apr-2009.
  983. Lee J and Olafsson S (2009). Two-way cooperative prediction for collaborative filtering recommendations, Expert Systems with Applications: An International Journal, 36:3, (5353-5361), Online publication date: 1-Apr-2009.
  984. Lin C and Hong C (2009). Development of a marketing information system for supporting sales in a Tea-beverage market, Expert Systems with Applications: An International Journal, 36:3, (5393-5401), Online publication date: 1-Apr-2009.
  985. Cheng C, Wang J and Wu M (2009). OWA-weighted based clustering method for classification problem, Expert Systems with Applications: An International Journal, 36:3, (4988-4995), Online publication date: 1-Apr-2009.
  986. Xie D, Xu W, Foster K and Bronlund J (2009). Object-oriented knowledge framework for modelling human mastication of foods, Expert Systems with Applications: An International Journal, 36:3, (4810-4821), Online publication date: 1-Apr-2009.
  987. Gudmundsson J, van Kreveld M and Narasimhan G (2009). Region-restricted clustering for geographic data mining, Computational Geometry: Theory and Applications, 42:3, (231-240), Online publication date: 1-Apr-2009.
  988. Chen Y, Wu C and Tang K (2009). Building a cost-constrained decision tree with multiple condition attributes, Information Sciences: an International Journal, 179:7, (967-979), Online publication date: 10-Mar-2009.
  989. ACM
    de Castro Lima J and Hirata C Computing data cubes using exact sub-graph matching Proceedings of the 2009 ACM symposium on Applied Computing, (1541-1548)
  990. ACM
    Peng T and Chou S iTrustU Proceedings of the 2009 ACM symposium on Applied Computing, (1278-1285)
  991. Hu J and Li X (2009). Association rules mining including weak-support modes using novel measures, WSEAS Transactions on Computers, 8:3, (559-568), Online publication date: 1-Mar-2009.
  992. ACM
    Kriegel H, Kröger P and Zimek A (2009). Clustering high-dimensional data, ACM Transactions on Knowledge Discovery from Data, 3:1, (1-58), Online publication date: 1-Mar-2009.
  993. Chen W and Du Y (2009). Using neural networks and data mining techniques for the financial distress prediction model, Expert Systems with Applications: An International Journal, 36:2, (4075-4086), Online publication date: 1-Mar-2009.
  994. Fan B (2009). A hybrid spatial data clustering method for site selection, Expert Systems with Applications: An International Journal, 36:2, (3923-3936), Online publication date: 1-Mar-2009.
  995. Chung S and Suh Y (2009). Estimating the utility value of individual credit card delinquents, Expert Systems with Applications: An International Journal, 36:2, (3975-3981), Online publication date: 1-Mar-2009.
  996. Lu C and Chen T (2009). A study of applying data mining approach to the information disclosure for Taiwan's stock market investors, Expert Systems with Applications: An International Journal, 36:2, (3536-3542), Online publication date: 1-Mar-2009.
  997. Chu Y, Tseng S, Tsai Y and Luo R (2009). An intelligent questionnaire analysis expert system, Expert Systems with Applications: An International Journal, 36:2, (2699-2710), Online publication date: 1-Mar-2009.
  998. Chu H, Chen M and Chen Y (2009). A semantic-based approach to content abstraction and annotation for content management, Expert Systems with Applications: An International Journal, 36:2, (2360-2376), Online publication date: 1-Mar-2009.
  999. Lau H, Ho G, Chu K, Ho W and Lee C (2009). Development of an intelligent quality management system using fuzzy association rules, Expert Systems with Applications: An International Journal, 36:2, (1801-1815), Online publication date: 1-Mar-2009.
  1000. Zhan J, Loh H and Liu Y (2009). Gather customer concerns from online product reviews - A text summarization approach, Expert Systems with Applications: An International Journal, 36:2, (2107-2115), Online publication date: 1-Mar-2009.
  1001. Poon S, Davis J and Choi B (2009). Augmenting productivity analysis with data mining, Expert Systems with Applications: An International Journal, 36:2, (2213-2224), Online publication date: 1-Mar-2009.
  1002. Yeh I and Lien C (2009). The comparisons of data mining techniques for the predictive accuracy of probability of default of credit card clients, Expert Systems with Applications: An International Journal, 36:2, (2473-2480), Online publication date: 1-Mar-2009.
  1003. Huang C and Tsai C (2009). A hybrid SOFM-SVR with a filter-based feature selection for stock market forecasting, Expert Systems with Applications: An International Journal, 36:2, (1529-1539), Online publication date: 1-Mar-2009.
  1004. Tsai C, Lee C and Yang W (2009). Mining decision rules on data streams in the presence of concept drifts, Expert Systems with Applications: An International Journal, 36:2, (1164-1178), Online publication date: 1-Mar-2009.
  1005. Liu D, Shih M, Liau C and Lai C (2009). Mining the change of event trends for decision support in environmental scanning, Expert Systems with Applications: An International Journal, 36:2, (972-984), Online publication date: 1-Mar-2009.
  1006. Han H, Kim H and Sohn S (2009). Sequential association rules for forecasting failure patterns of aircrafts in Korean airforce, Expert Systems with Applications: An International Journal, 36:2, (1129-1133), Online publication date: 1-Mar-2009.
  1007. Toma A, Constantinescu R and Nastase F Recommendation system based on the clustering of frequent sets Proceedings of the 8th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases, (343-347)
  1008. Czibula G, Cojocar G and Czibula I A partitional clustering algorithm for crosscutting concerns identification Proceedings of the 8th WSEAS International Conference on Software engineering, parallel and distributed systems, (111-116)
  1009. ACM
    Lee M, Lee Y, Meang B and Choi O A clustering algorithm using particle swarm optimization for DNA chip data analysis Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, (664-668)
  1010. Do T, Hui S, Fong A and Fong B (2009). Associative classification with artificial immune system, IEEE Transactions on Evolutionary Computation, 13:2, (217-228), Online publication date: 1-Feb-2009.
  1011. Nassiri-Mofakham F, Nematbakhsh M, Baraani-Dastjerdi A and Ghasem-Aghaee N (2009). Electronic promotion to new customers using mkNN learning, Information Sciences: an International Journal, 179:3, (248-266), Online publication date: 15-Jan-2009.
  1012. Chen Y, Chien S and Lin H True color image steganography using palette and minimum spanning tree Proceedings of the 3rd WSEAS international conference on Computer engineering and applications, (273-278)
  1013. ACM
    Bala P A technique for mining negative association rules Proceedings of the 2nd Bangalore Annual Compute Conference, (1-4)
  1014. Wang J, Chiu D and S.Lui J Credit-based network management Proceedings of the First international conference on COMmunication Systems And NETworks, (473-482)
  1015. Bandyopadhyay S and Bhattacharyya M (2009). Mining the Largest Dense Vertexlet in a Weighted Scale-free Graph, Fundamenta Informaticae, 96:1-2, (1-25), Online publication date: 1-Jan-2009.
  1016. Basgalupp M, Carvalho A, Barros R, Ruiz D and Freitas A (2009). Lexicographic multi-objective evolutionary induction of decision trees, International Journal of Bio-Inspired Computation, 1:1/2, (105-117), Online publication date: 1-Jan-2009.
  1017. Su X and Khoshgoftaar T (2009). A survey of collaborative filtering techniques, Advances in Artificial Intelligence, 2009, (2-2), Online publication date: 1-Jan-2009.
  1018. Ma J, Nguyen M and Rajapakse J (2009). Gene Classification Using Codon Usage and Support Vector Machines, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 6:1, (134-143), Online publication date: 1-Jan-2009.
  1019. Peng J, Tang C, Yang D, Zhang J and Hu J (2009). Similarity computing model of high dimension data for symptom classification of Chinese traditional medicine, Applied Soft Computing, 9:1, (209-218), Online publication date: 1-Jan-2009.
  1020. Polpinij J and Ghose A An Ontology-Based Sentiment Classification Methodology for Online Consumer Reviews Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01, (518-524)
  1021. Xiao Y, Deng F, Liu B, Liu S, Luo D and Liang G A Learning Process Using SVMs for Multi-agents Decision Classification Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (583-586)
  1022. Ouyang Z, He J and Zhang K Data Mining for Seismic Exploration Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (424-427)
  1023. Abbasi A and Chen H (2008). CyberGate, MIS Quarterly, 32:4, (811-837), Online publication date: 1-Dec-2008.
  1024. Yun U (2008). An efficient mining of weighted frequent patterns with length decreasing support constraints, Knowledge-Based Systems, 21:8, (741-752), Online publication date: 1-Dec-2008.
  1025. Zhang W, Yoshida T and Tang X (2008). Text classification based on multi-word with support vector machine, Knowledge-Based Systems, 21:8, (879-886), Online publication date: 1-Dec-2008.
  1026. ACM
    Lo D and Maoz S Specification mining of symbolic scenario-based models Proceedings of the 8th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, (29-35)
  1027. ACM
    Pultar E, Raubal M and Goodchild M GEDMWA Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems, (1-4)
  1028. ACM
    Ganti R, Pham N, Tsai Y and Abdelzaher T PoolView Proceedings of the 6th ACM conference on Embedded network sensor systems, (281-294)
  1029. Lin S, Ying K, Chen S and Lee Z (2008). Particle swarm optimization for parameter determination and feature selection of support vector machines, Expert Systems with Applications: An International Journal, 35:4, (1817-1824), Online publication date: 1-Nov-2008.
  1030. Cano J, Herrera F, Lozano M and García S (2008). Making CN2-SD subgroup discovery algorithm scalable to large size data sets using instance selection, Expert Systems with Applications: An International Journal, 35:4, (1949-1965), Online publication date: 1-Nov-2008.
  1031. ACM
    Akbar M and Angryk R Frequent pattern-growth approach for document organization Proceedings of the 2nd international workshop on Ontologies and information systems for the semantic web, (77-82)
  1032. ACM
    Raftopoulou P and Petrakis E A measure for cluster cohesion in semantic overlay networks Proceedings of the 2008 ACM workshop on Large-Scale distributed systems for information retrieval, (59-66)
  1033. ACM
    Chen Z and Ordonez C Efficient OLAP with UDFs Proceedings of the ACM 11th international workshop on Data warehousing and OLAP, (41-48)
  1034. ACM
    da Silva J, Times V, Salgado A, Souza C, Fidalgo R and de Oliveira A A set of aggregation functions for spatial measures Proceedings of the ACM 11th international workshop on Data warehousing and OLAP, (25-32)
  1035. ACM
    Jiang M, Munawar M, Reidemeister T and Ward P Information-theoretic modeling for tracking the health of complex software systems Proceedings of the 2008 conference of the center for advanced studies on collaborative research: meeting of minds, (236-247)
  1036. ACM
    Lula P and Paliwoda-Pękosz G An ontology-based cluster analysis framework Proceedings of the first international workshop on Ontology-supported business intelligence, (1-6)
  1037. ACM
    Basu Roy S, Wang H, Das G, Nambiar U and Mohania M Minimum-effort driven dynamic faceted search in structured databases Proceedings of the 17th ACM conference on Information and knowledge management, (13-22)
  1038. Ma Q and Deng P Secure Multi-party Protocols for Privacy Preserving Data Mining Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications, (526-537)
  1039. Garcia E and Vieira M Estudo de caso de mineração de dados multi-relacional Proceedings of the 23rd Brazilian symposium on Databases, (224-237)
  1040. de Castro Lima J and Hirata C Computing data cubes without redundant aggregated nodes and single graph paths Proceedings of the 23rd Brazilian symposium on Databases, (31-45)
  1041. ACM
    Ntawanga F, Calitz A and Barnard L Maintaining customer profiles in an e-commerce environment Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology, (169-179)
  1042. Hu H and Chen Y (2008). Mining typical patterns from databases, Information Sciences: an International Journal, 178:19, (3683-3696), Online publication date: 1-Oct-2008.
  1043. Danfeng Zhang , Yao Guo and Xiangqun Chen Automated Aspect Recommendation through Clustering-Based Fan-in Analysis Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, (278-287)
  1044. Guo G, Xu P, Bai Z, Zhou S, Xu G and Cao B Optimization of Ni-MH Battery Fast Charging in Electric Vehicles Using Dynamic Data Mining and ANFIS Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Artificial Intelligence, (468-475)
  1045. Raju G, Thomas B, Kumar T and Thinley S Integration of Fuzzy Logic in Data Mining to Handle Vagueness and Uncertainty Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Artificial Intelligence, (880-887)
  1046. ACM
    Ferrizzi A, Jardini T, Costa L, Colombo J, Mauad E, Kerr L, Hidalgo G, Rahal P and Valêncio C A clinical decision support system for cancer diseases Proceedings of the 2008 Euro American Conference on Telematics and Information Systems, (1-4)
  1047. Ito H, Kawai Y and Koshimizu H Face Image Annotation Based on Latent Semantic Space and Rules Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II, (766-773)
  1048. Lee T, Wang E and Chen A Mining Serial Episode Rules with Time Lags over Multiple Data Streams Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery, (227-240)
  1049. Zhang L and Zhang W Generalization-Based Privacy-Preserving Data Collection Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery, (115-124)
  1050. Sidorova A, Evangelopoulos N, Valacich J and Ramakrishnan T (2008). Uncovering the intellectual core of the information systems discipline, MIS Quarterly, 32:3, (467-482), Online publication date: 1-Sep-2008.
  1051. ACM
    Siersdorfer S and Sizov S (2008). Meta methods for model sharing in personal information systems, ACM Transactions on Information Systems, 26:4, (1-35), Online publication date: 1-Sep-2008.
  1052. Chen Y and Huang T (2008). A novel knowledge discovering model for mining fuzzy multi-level sequential patterns in sequence databases, Data & Knowledge Engineering, 66:3, (349-367), Online publication date: 1-Sep-2008.
  1053. Palpanas T and Sairamesh J Knowledge Mining for the Business Analyst Proceedings of the 19th international conference on Database and Expert Systems Applications, (770-778)
  1054. Abdelzaher T, Khan M, Le H, Ahmadi H and Han J Data mining for diagnostic debugging in sensor networks Proceedings of the Second international conference on Knowledge Discovery from Sensor Data, (1-24)
  1055. Castellano G, Fanelli A and Torsello M (2008). Computational Intelligence techniques for Web personalization, Web Intelligence and Agent Systems, 6:3, (253-272), Online publication date: 1-Aug-2008.
  1056. Ding H, Trajcevski G, Scheuermann P, Wang X and Keogh E (2008). Querying and mining of time series data, Proceedings of the VLDB Endowment, 1:2, (1542-1552), Online publication date: 1-Aug-2008.
  1057. Lee J, Han J, Li X and Gonzalez H (2008). TraClass, Proceedings of the VLDB Endowment, 1:1, (1081-1094), Online publication date: 1-Aug-2008.
  1058. ACM
    Lo D, Khoo S and Liu C Mining past-time temporal rules from execution traces Proceedings of the 2008 international workshop on dynamic analysis: held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2008), (50-56)
  1059. ACM
    Parmee I Evolutionary design search, exploration and optimisation Proceedings of the 10th annual conference companion on Genetic and evolutionary computation, (2777-2804)
  1060. Lee K, Lee W, Peuquet D and Zheng B Searching Correlated Objects in a Long Sequence Proceedings of the 20th international conference on Scientific and Statistical Database Management, (436-454)
  1061. Hu G, Zhou S, Guan J and Hu X (2008). Towards effective document clustering, Information Processing and Management: an International Journal, 44:4, (1397-1409), Online publication date: 1-Jul-2008.
  1062. Huang Y, Chuang W, Ke Y and Sandnes F (2008). Using back-propagation to learn association rules for service personalization, Expert Systems with Applications: An International Journal, 35:1-2, (245-253), Online publication date: 1-Jul-2008.
  1063. Huang Y, Kao L and Sandnes F (2008). Efficient mining of salinity and temperature association rules from ARGO data, Expert Systems with Applications: An International Journal, 35:1-2, (59-68), Online publication date: 1-Jul-2008.
  1064. Kahramanli H and Allahverdi N (2008). Design of a hybrid system for the diabetes and heart diseases, Expert Systems with Applications: An International Journal, 35:1-2, (82-89), Online publication date: 1-Jul-2008.
  1065. Du N, Wang B and Wu B (2008). Community detection in complex networks, Journal of Computer Science and Technology, 23:4, (672-683), Online publication date: 1-Jul-2008.
  1066. Calargun S and Yazici A Fuzzy Association Rule Mining from Spatio-temporal Data Proceeding sof the international conference on Computational Science and Its Applications, Part I, (631-646)
  1067. Puppe F, Atzmueller M, Buscher G, Huettig M, Luehrs H and Buscher H Application and Evaluation of a Medical Knowledge System in Sonography (SONOCONSULT) Proceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence, (683-687)
  1068. Johansson U, Sönströd C, Löfström T and Boström H Chipper --A Novel Algorithm for Concept Description Proceedings of the 2008 conference on Tenth Scandinavian Conference on Artificial Intelligence: SCAI 2008, (133-140)
  1069. Nishimura S, Terabe M, Hashimoto K and Mihara K Learning Higher Accuracy Decision Trees from Concept Drifting Data Streams Proceedings of the 21st international conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: New Frontiers in Applied Artificial Intelligence, (179-188)
  1070. ACM
    Wu W, Reinwald B, Sismanis Y and Manjrekar R Discovering topical structures of databases Proceedings of the 2008 ACM SIGMOD international conference on Management of data, (1019-1030)
  1071. El Sayed A, Velcin J and Zighed D Word clustering with validity indices Proceedings of the Canadian Society for computational studies of intelligence, 21st conference on Advances in artificial intelligence, (259-270)
  1072. May T and Kohlhammer J Towards closing the analysis gap Proceedings of the 10th Joint Eurographics / IEEE - VGTC conference on Visualization, (911-918)
  1073. Denny D, Williams G and Christen P Exploratory hot spot profile analysis using interactive visual drill-down self-organizing maps Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining, (536-543)
  1074. Liu D, Hu P and Jiang C The incremental learning methodology of VPRS based on complete information system Proceedings of the 3rd international conference on Rough sets and knowledge technology, (276-283)
  1075. ACM
    Seo Y, Yoon K and Bae D An empirical analysis of software effort estimation with outlier elimination Proceedings of the 4th international workshop on Predictor models in software engineering, (25-32)
  1076. Lee C, Tsai C, Wu T and Yang W (2008). An approach to mining the multi-relational imbalanced database, Expert Systems with Applications: An International Journal, 34:4, (3021-3032), Online publication date: 1-May-2008.
  1077. Saraçoğlu R, Tütüncü K and Allahverdi N (2008). A new approach on search for similar documents with multiple categories using fuzzy clustering, Expert Systems with Applications: An International Journal, 34:4, (2545-2554), Online publication date: 1-May-2008.
  1078. Chen Y, Huang T and Chang S (2008). A novel approach for discovering retail knowledge with price information from transaction databases, Expert Systems with Applications: An International Journal, 34:4, (2350-2359), Online publication date: 1-May-2008.
  1079. Liu Y, Wang J, Yang Y and Sun J (2008). A semi-automatic approach for workflow staff assignment, Computers in Industry, 59:5, (463-476), Online publication date: 1-May-2008.
  1080. Thongkam J, Xu G, Zhang Y and Huang F Support Vector Machine for Outlier Detection in Breast Cancer Survivability Prediction Revised Selected Papers of the APWeb 2008 International Workshops on Advanced Web and Network Technologies, and Applications - Volume 4977, (99-109)
  1081. Feng S, Liu Y, Wang D and Shen D A novel and effective method for web system tuning based on feature selection Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development, (537-547)
  1082. Mateo R, Yoon I and Lee J Data-mining model based on multi-agent for the intelligent distributed framework Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications, (753-762)
  1083. Lo D, Khoo S and Liu C Efficient mining of recurrent rules from a sequence database Proceedings of the 13th international conference on Database systems for advanced applications, (67-83)
  1084. ACM
    Wei C, Sprague A, Warner G and Skjellum A Mining spam email to identify common origins for forensic application Proceedings of the 2008 ACM symposium on Applied computing, (1433-1437)
  1085. ACM
    Liu D, Hua K and Cheng H Handle local optimum traps in CBIR systems Proceedings of the 2008 ACM symposium on Applied computing, (1202-1206)
  1086. ACM
    Antonellis P, Makris C and Tsirakis N XEdge Proceedings of the 2008 ACM symposium on Applied computing, (1081-1088)
  1087. ACM
    Fonseca N, Costa V and Camacho R k-RNN Proceedings of the 2008 ACM symposium on Applied computing, (944-948)
  1088. ACM
    LaRosa C, Xiong L and Mandelberg K Frequent pattern mining for kernel trace data Proceedings of the 2008 ACM symposium on Applied computing, (880-885)
  1089. Chauhan N and Sharma A (2008). A framework to derive web page context from hyperlink structure, International Journal of Information and Communication Technology, 1:3/4, (329-346), Online publication date: 1-Mar-2008.
  1090. Kwon Y, Omitaomu O and Wang G (2008). Data mining approaches for modeling complex electronic circuit design activities, Computers and Industrial Engineering, 54:2, (229-241), Online publication date: 1-Mar-2008.
  1091. Liao I and Kao K (2008). Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information, Information Sciences: an International Journal, 178:4, (1049-1068), Online publication date: 20-Feb-2008.
  1092. Mori K and Orihara R Frequent pattern mining from high-dimensional data using record space search Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications, (327-333)
  1093. Rahal I, Rahhal R, Wang B and Perrizo W (2008). CARIBIAM: Constrained Association Rules using Interactive Biological IncrementAl Mining, International Journal of Bioinformatics Research and Applications, 4:1, (28-48), Online publication date: 1-Feb-2008.
  1094. Tsai C, Lee C and Yang W (2008). A discretization algorithm based on Class-Attribute Contingency Coefficient, Information Sciences: an International Journal, 178:3, (714-731), Online publication date: 1-Feb-2008.
  1095. Yager R and Filev D (2008). Summarizing data using a similarity based mountain method, Information Sciences: an International Journal, 178:3, (816-826), Online publication date: 1-Feb-2008.
  1096. Osei-Bryson K (2008). Post-pruning in regression tree induction, Expert Systems with Applications: An International Journal, 34:2, (1481-1490), Online publication date: 1-Feb-2008.
  1097. Lin S, Tseng T, Chou S and Chen S (2008). A simulated-annealing-based approach for simultaneous parameter optimization and feature selection of back-propagation networks, Expert Systems with Applications: An International Journal, 34:2, (1491-1499), Online publication date: 1-Feb-2008.
  1098. Lin J, Ke H, Chien B and Yang W (2008). Classifier design with feature selection and feature extraction using layered genetic programming, Expert Systems with Applications: An International Journal, 34:2, (1384-1393), Online publication date: 1-Feb-2008.
  1099. Chavarnakul T and Enke D (2008). Intelligent technical analysis based equivolume charting for stock trading using neural networks, Expert Systems with Applications: An International Journal, 34:2, (1004-1017), Online publication date: 1-Feb-2008.
  1100. Zheng X, Zhou C, Shi X, Li T and Chen Y Automatic acquisition of phrase semantic rule for Chinese Proceedings of the 4th Asia information retrieval conference on Information retrieval technology, (543-548)
  1101. Sarmah S, Das R and Bhattacharyya D DGDCT Proceedings of the 9th international conference on Distributed computing and networking, (239-250)
  1102. Zhang S, Zhang J, Zhu X, Qin Y and Zhang C Missing value imputation based on data clustering Transactions on computational science I, (128-138)
  1103. Thongkam J, Xu G, Zhang Y and Huang F Breast cancer survivability via AdaBoost algorithms Proceedings of the second Australasian workshop on Health data and knowledge management - Volume 80, (55-64)
  1104. Choo Y, Bakar A and Hamdan A (2008). The fitness-rough: A new attribute reduction method based on statistical and rough set theory, Intelligent Data Analysis, 12:1, (73-87), Online publication date: 1-Jan-2008.
  1105. Chen J and Cheng C (2008). Extracting classification rule of software diagnosis using modified MEPA, Expert Systems with Applications: An International Journal, 34:1, (411-418), Online publication date: 1-Jan-2008.
  1106. Qian Y, Qiu F, Chang J and Zhang K (2008). Visualization-informed noise elimination and its application in processing high-spatial-resolution remote sensing imagery, Computers & Geosciences, 34:1, (35-52), Online publication date: 1-Jan-2008.
  1107. Alatas B, Akin E and Karci A (2008). MODENAR, Applied Soft Computing, 8:1, (646-656), Online publication date: 1-Jan-2008.
  1108. Nasibov E (2008). A robust algorithm for solution of the fuzzy clustering problem on the basis of the fuzzy joint points method, Cybernetics and Systems Analysis, 44:1, (7-17), Online publication date: 1-Jan-2008.
  1109. Schering A, Bruder I, Schmitt C, Meyer H and Heuer A Towards a digital archive for handwritten paper slips with ethnological contents Proceedings of the 10th international conference on Asian digital libraries: looking back 10 years and forging new frontiers, (61-64)
  1110. ACM
    Wang Y and Li J Is your IP address prefix well-served by internet routing? Proceedings of the 2007 ACM CoNEXT conference, (1-2)
  1111. Aigner W, Bertone A, Miksch S, Tominski C and Schumann H Towards a conceptual framework for visual analytics of time and time-oriented data Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come, (721-729)
  1112. Christen P Evaluation of a graduate level data mining course with industry participants Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70, (233-241)
  1113. Stewart B Reflection on development and delivery of a data mining unit Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70, (225-232)
  1114. Denny , Williams G and Christen P Exploratory multilevel hot spot analysis Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70, (77-84)
  1115. Kolyshkina I and Simoff S Customer analytics projects Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70, (13-19)
  1116. Ji A, Yeon C, Kim H and Jo G Collaborative tagging in recommender systems Proceedings of the 20th Australian joint conference on Advances in artificial intelligence, (377-386)
  1117. Soon L and Lee S An empirical study of similarity search in stock data Proceedings of the 2nd international workshop on Integrating artificial intelligence and data mining - Volume 84, (31-38)
  1118. Angiulli F and Folino G (2007). Distributed Nearest Neighbor-Based Condensation of Very Large Data Sets, IEEE Transactions on Knowledge and Data Engineering, 19:12, (1593-1606), Online publication date: 1-Dec-2007.
  1119. Fan T and Cheng K (2007). Tests and variables selection on regression analysis for massive datasets, Data & Knowledge Engineering, 63:3, (811-819), Online publication date: 1-Dec-2007.
  1120. Al-Shboul B, Alsawalqah H and Lee D Real-time speaker identification system Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7, (424-428)
  1121. ACM
    Ordonez C, García-García J and Chen Z Measuring referential integrity in distributed databases Proceedings of the ACM first workshop on CyberInfrastructure: information management in eScience, (61-66)
  1122. ACM
    Escribano A, Gomez L, Kuijpers B and Vaisman A Piet Proceedings of the ACM tenth international workshop on Data warehousing and OLAP, (73-80)
  1123. ACM
    Li T and Anand S Diva Proceedings of the sixteenth ACM conference on Conference on information and knowledge management, (147-156)
  1124. ACM
    Lo D, Maoz S and Khoo S Mining modal scenario-based specifications from execution traces of reactive systems Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering, (465-468)
  1125. Zhang Y and Liu C An improved fast algorithm of frequent string extracting with no thesaurus Proceedings of the artificial intelligence 6th Mexican international conference on Advances in artificial intelligence, (894-903)
  1126. Lin N, Chen H, Chueh H, Hao W and Chang C (2007). A fuzzy statistics based method for mining fuzzy correlation rules, WSEAS Transactions on Mathematics, 6:11, (852-858), Online publication date: 1-Nov-2007.
  1127. Chen M (2007). Ranking discovered rules from data mining with multiple criteria by data envelopment analysis, Expert Systems with Applications: An International Journal, 33:4, (1110-1116), Online publication date: 1-Nov-2007.
  1128. Moss M and Pu C Assessing operational impact in enterprise systems by mining usage patterns Proceedings of the Distributed systems: operations and management 18th IFIP/IEEE international conference on Managing virtualization of networks and services, (159-170)
  1129. ACM
    Lo D, Maoz S and Khoo S Mining modal scenarios from execution traces Companion to the 22nd ACM SIGPLAN conference on Object-oriented programming systems and applications companion, (777-778)
  1130. Chandra B, Gupta M and Gupta M Adaptive Query Interface for Mining Crime Data Databases in Networked Information Systems, (285-296)
  1131. ACM
    Gil N, Hine N, Arnott J, Hanson J, Curry R, Amaral T and Osipovic D Data visualisation and data mining technology for supporting care for older people Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility, (139-146)
  1132. Kim H, Ha I, Jung J and Jo G User preference modeling from positive contents for personalized recommendation Proceedings of the 10th international conference on Discovery science, (116-126)
  1133. Hsu C, Chen C and Su Y (2007). Hierarchical clustering of mixed data based on distance hierarchy, Information Sciences: an International Journal, 177:20, (4474-4492), Online publication date: 1-Oct-2007.
  1134. Ohshima M, Zhong N, Yao Y and Liu C (2007). Relational peculiarity-oriented mining, Data Mining and Knowledge Discovery, 15:2, (249-273), Online publication date: 1-Oct-2007.
  1135. Cong G, Fan W, Geerts F, Jia X and Ma S Improving data quality Proceedings of the 33rd international conference on Very large data bases, (315-326)
  1136. Yang M, Kang L and Guan J An evolutionary algorithm for dynamic multi-objective TSP Proceedings of the 2nd international conference on Advances in computation and intelligence, (62-71)
  1137. Ishikawa Y and Hasegawa M T-Scroll Proceedings of the 11th European conference on Research and Advanced Technology for Digital Libraries, (235-246)
  1138. Chang C and Chu F Applying data mining and XML technology to build a web-based house trading and matching system Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization, (110-115)
  1139. Zheng Y, Dou W, Wu G and Li X Automated Chinese domain ontology construction from text documents Proceedings of the Life system modeling and simulation 2007 international conference on Bio-Inspired computational intelligence and applications, (639-648)
  1140. Cho S, Hong S, Kim J and Park S Design of urban growth probability model by using spatial association rules Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part I, (354-362)
  1141. ACM
    Wasylkowski A, Zeller A and Lindig C Detecting object usage anomalies Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (35-44)
  1142. Casali A, Nedjar S, Cicchetti R and Lakhal L Convex cube Proceedings of the 18th international conference on Database and Expert Systems Applications, (572-581)
  1143. ACM
    Cotroneo D, Pietrantuono R, Mariani L and Pastore F Investigation of failure causes in workload-driven reliability testing Fourth international workshop on Software quality assurance: in conjunction with the 6th ESEC/FSE joint meeting, (78-85)
  1144. Warren Liao T (2007). A clustering procedure for exploratory mining of vector time series, Pattern Recognition, 40:9, (2550-2562), Online publication date: 1-Sep-2007.
  1145. Lokaiczyk R, Faatz A, Beckhaus A and Goertz M Enhancing just-in-time e-learning through machine learning on desktop context sensors Proceedings of the 6th international and interdisciplinary conference on Modeling and using context, (330-341)
  1146. ACM
    Lee T Needs-based analysis of online customer reviews Proceedings of the ninth international conference on Electronic commerce, (311-318)
  1147. ACM
    Du N, Wu B, Pei X, Wang B and Xu L Community detection in large-scale social networks Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, (16-25)
  1148. ACM
    Ye Y, Wang D, Li T and Ye D IMDS Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, (1043-1047)
  1149. ACM
    Wang X, Zhai C, Hu X and Sproat R Mining correlated bursty topic patterns from coordinated text streams Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, (784-793)
  1150. ACM
    Dou D, Frishkoff G, Rong J, Frank R, Malony A and Tucker D Development of NeuroElectroMagnetic ontologies(NEMO) Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, (270-279)
  1151. Huang J, Chen S and Kuo H (2007). An efficient incremental mining algorithm-QSD, Intelligent Data Analysis, 11:3, (265-278), Online publication date: 1-Aug-2007.
  1152. Böhm C, Kunath P, Pryakhin A and Schubert M Querying objects modeled by arbitrary probability distributions Proceedings of the 10th international conference on Advances in spatial and temporal databases, (294-311)
  1153. Ma X, Li S, Luo Q, Yang D and Tang S Distributed, hierarchical clustering and summarization in sensor networks Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management, (168-175)
  1154. Park S, Lee J, Kim D and Ahn C Multi-document summarization using weighted similarity between topic and clustering-based non-negative semantic feature Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management, (108-115)
  1155. ACM
    Marinova-Boncheva V Applying a data mining method for intrusion detection Proceedings of the 2007 international conference on Computer systems and technologies, (1-6)
  1156. ACM
    Varde A, Rundensteiner E and Sisson R AutoDomainMine Proceedings of the 2007 ACM SIGMOD international conference on Management of data, (1103-1105)
  1157. ACM
    Lee J, Han J and Whang K Trajectory clustering Proceedings of the 2007 ACM SIGMOD international conference on Management of data, (593-604)
  1158. Cao L, Luo C and Zhang C Agent-mining interaction Proceedings of the 2nd international conference on Autonomous intelligent systems: agents and data mining, (60-73)
  1159. Stuart K and Majewski M Selected Problems of Knowledge Discovery Using Artificial Neural Networks Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks, Part III, (1049-1057)
  1160. Feng Y, Zhong J, Xiong Z, Ye C and Wu K Network Anomaly Detection Based on DSOM and ACO Clustering Proceedings of the 4th international symposium on Neural Networks: Part II--Advances in Neural Networks, (947-955)
  1161. Zeinalipour-Yazti D, Kalogeraki V and Gunopulos D (2007). pFusion, IEEE Transactions on Parallel and Distributed Systems, 18:6, (804-817), Online publication date: 1-Jun-2007.
  1162. Wu S and Chen Y (2007). Mining Nonambiguous Temporal Patterns for Interval-Based Events, IEEE Transactions on Knowledge and Data Engineering, 19:6, (742-758), Online publication date: 1-Jun-2007.
  1163. Niu K, Huang C, Zhang S and Chen J ODDC Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining, (332-343)
  1164. Jin H Practical issues on privacy-preserving health data mining Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining, (64-75)
  1165. Zhang N Towards comprehensive privacy protection in data clustering Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining, (1096-1104)
  1166. Wimalasuriya D, Ramachandran S and Dou D Clustering zebrafish genes based on frequent-itemsets and frequency levels Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining, (912-920)
  1167. Han J Research frontiers in advanced data mining technologies and applications Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining, (1-5)
  1168. Yu L and Ramaswamy S Mining CVS Repositories to Understand Open-Source Project Developer Roles Proceedings of the Fourth International Workshop on Mining Software Repositories
  1169. Angiulli F, Greco G, Palopoli L and Trimboli D The LP-OD system Proceedings of the 9th international conference on Logic programming and nonmonotonic reasoning, (254-259)
  1170. ACM
    Cao L and Zhang C F-trade Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, (1-2)
  1171. ACM
    Xu Y, Wang K, Zhang B and Chen Z Privacy-enhancing personalized web search Proceedings of the 16th international conference on World Wide Web, (591-600)
  1172. Shih W, Yang C, Chen T and Tseng S Performance-based workload distribution on grid environments Proceedings of the 2nd international conference on Advances in grid and pervasive computing, (385-396)
  1173. Chen M and Lin C (2007). A data mining approach to product assortment and shelf space allocation, Expert Systems with Applications: An International Journal, 32:4, (976-986), Online publication date: 1-May-2007.
  1174. ACM
    Šilhavá J, Beran V, Chmelař P, Herout A, Hradiš M, Juránek R and Zemčík P Platform for evaluation of image classifiers Proceedings of the 23rd Spring Conference on Computer Graphics, (93-99)
  1175. Lai C, Hsu P, Chien S, Lai C and Fang K Predictive factors of glycemic control Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6, (558-563)
  1176. Lin N, Hao W and Chen H Fast accumulation lattice algorithm for mining sequential patterns Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6, (229-233)
  1177. Lin N and Chueh H Fuzzy correlation rules mining Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6, (13-18)
  1178. Chitrakala S and Manjula D Distributed multi-lingual content based text mining DML - CBTM Proceedings of the third conference on IASTED International Conference: Advances in Computer Science and Technology, (500-505)
  1179. Jin G and Nittel S (2007). UDC: a self-adaptive uneven clustering protocol for dynamic sensor networks, International Journal of Sensor Networks, 2:1/2, (25-33), Online publication date: 1-Apr-2007.
  1180. Zhang N and Zhao W (2007). Privacy-Preserving Data Mining Systems, Computer, 40:4, (52-58), Online publication date: 1-Apr-2007.
  1181. Chang C and Chu C (2007). Defect prevention in software processes, Journal of Systems and Software, 80:4, (559-570), Online publication date: 1-Apr-2007.
  1182. Jiao J, Zhang L, Pokharel S and He Z (2007). Identifying generic routings for product families based on text mining and tree matching, Decision Support Systems, 43:3, (866-883), Online publication date: 1-Apr-2007.
  1183. Stewart A and Zhang X Building a disordered protein database Proceedings of the eighteenth conference on Australasian database - Volume 63, (151-159)
  1184. ACM
    Al-Otaiby T and AlSharif M Software requirements modularization using partitioning clustering technique Proceedings of the 45th annual southeast regional conference, (65-69)
  1185. ACM
    Liu S, Mernik M and Bryant B A clustering entropy-driven approach for exploring and exploiting noisy functions Proceedings of the 2007 ACM symposium on Applied computing, (738-742)
  1186. ACM
    Huang Y, Jhan Y and Liou S Finding putative core promoter elements with position-dependent consensuses Proceedings of the 2007 ACM symposium on Applied computing, (138-139)
  1187. Yen E and Chu I (2007). Relaxing instance boundaries for the search of splitting points of numerical attributes in classification trees, Information Sciences: an International Journal, 177:5, (1276-1289), Online publication date: 1-Mar-2007.
  1188. Duarte J, Fred A, Rodrigues F, Duarte J, Ramos S and Vale Z Definition of MV load diagrams via weighted evidence accumulation clustering using subsampling Proceedings of the 6th WSEAS International Conference on Signal Processing, Robotics and Automation, (249-256)
  1189. Duarte J, Fred A, Rodrigues F, Duarte J, Ramos S and Vale Z Definition of MV load diagrams via weighted evidence accumulation clustering using subsampling Proceedings of the 6th WSEAS International Conference on Signal Processing, Robotics and Automation, (249-256)
  1190. Lee C and Chuang H An effective soft clustering approach to mining gene expressions from multi-source databases Proceedings of the 6th Conference on 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases - Volume 6, (165-169)
  1191. Al-Zoubi M, Hudaib A and Al-Shboul B A fast fuzzy clustering algorithm Proceedings of the 6th Conference on 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases - Volume 6, (28-32)
  1192. Mobasher B Data mining for web personalization The adaptive web, (90-135)
  1193. Li C and Gao Y Agent-Based Pattern Mining of Discredited Activities in Public Services Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, (15-18)
  1194. Aliguliyev R A Novel Partitioning-Based Clustering Method and Generic Document Summarization Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, (626-629)
  1195. Cao L, Zhang C, Luo D and Dai R Intelligence metasynthesis in building business intelligence systems Proceedings of the 1st WICI international conference on Web intelligence meets brain informatics, (454-470)
  1196. Li D, Xiao L, Han Y, Chen G and Liu K Network thinking and network intelligence Proceedings of the 1st WICI international conference on Web intelligence meets brain informatics, (36-58)
  1197. Li D, Xiao L, Han Y, Chen G and Liu K Network Thinking and Network Intelligence Web Intelligence Meets Brain Informatics, (36-58)
  1198. Cao L, Zhang C, Luo D and Dai R Intelligence Metasynthesis in Building Business Intelligence Systems Web Intelligence Meets Brain Informatics, (454-470)
  1199. Ishida K, Uchida T and Kawamoto K Extracting structural features among words from document data streams Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence, (332-341)
  1200. ACM
    Michel S, Bender M, Ntarmos N, Triantafillou P, Weikum G and Zimmer C Discovering and exploiting keyword and attribute-value co-occurrences to improve P2P routing indices Proceedings of the 15th ACM international conference on Information and knowledge management, (172-181)
  1201. ACM
    Lo D and Khoo S SMArTIC Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering, (265-275)
  1202. Chen Y and Hu Y (2006). Constraint-based sequential pattern mining, Decision Support Systems, 42:2, (1203-1215), Online publication date: 1-Nov-2006.
  1203. Feng Y, Wu Z, Zhou X, Zhou Z and Fan W (2006). Methodological review, Artificial Intelligence in Medicine, 38:3, (219-236), Online publication date: 1-Nov-2006.
  1204. Gama J, Rodrigues P and Aguilar-Ruiz J (2007). An Overview on Learning from Data Streams, New Generation Computing, 25:1, (1-4), Online publication date: 1-Nov-2006.
  1205. Lieber J, Napoli A, Szathmary L and Toussaint Y First Elements on Knowledge Discovery Guided by Domain Knowledge (KDDK) Concept Lattices and Their Applications, (22-41)
  1206. Ghenea Ş Application tool for experiments on SQL server 2005 transactions Proceedings of the 5th WSEAS international conference on Data networks, communications and computers, (30-35)
  1207. Jun S and Oh K A competitive co-evolving support vector clustering Proceedings of the 13 international conference on Neural Information Processing - Volume Part I, (864-873)
  1208. Džeroski S Towards a general framework for data mining Proceedings of the 5th international conference on Knowledge discovery in inductive databases, (259-300)
  1209. Kaufman K, Michalski R, Pietrzykowski J and Wojtusiak J An integrated multi-task inductive database VINLEN Proceedings of the 5th international conference on Knowledge discovery in inductive databases, (116-133)
  1210. Elbasi E and Eskicioglu A Naïve bayes classifier based watermark detection in wavelet transform Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security, (232-240)
  1211. ACM
    Achtert E, Böhm C, Kriegel H, Kröger P and Zimek A Deriving quantitative models for correlation clusters Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (4-13)
  1212. Han J, Gonzalez H, Li X and Klabjan D Warehousing and mining massive RFID data sets Proceedings of the Second international conference on Advanced Data Mining and Applications, (1-18)
  1213. Li C, Tang C, Yu Z, Liu Y, Zhang T, Liu Q, Zhu M and Jiang Y Mining multi-dimensional frequent patterns without data cube construction Proceedings of the 9th Pacific Rim international conference on Artificial intelligence, (251-260)
  1214. Angiulli F Clustering by exceptions Proceedings of the 21st national conference on Artificial intelligence - Volume 1, (312-317)
  1215. Hsu C, Su C and Chiu C Case-based Bayesian approach for prognostic prediction of breast cancer Proceedings of the 10th WSEAS international conference on Computers, (775-779)
  1216. Washio T, Shinnou Y, Yada K, Motoda H and Okada T Analysis on a relation between enterprise profit and financial state by using data mining techniques Proceedings of the 20th annual conference on New frontiers in artificial intelligence, (305-316)
  1217. ACM
    Ha S and Park S (2006). Service quality improvement through business process management based on data mining, ACM SIGKDD Explorations Newsletter, 8:1, (49-56), Online publication date: 1-Jun-2006.
  1218. He J, Yue W and Shi Y Pattern recognition for MCNs using fuzzy linear programming Proceedings of the 6th international conference on Computational Science - Volume Part IV, (509-516)
  1219. Shih W, Yang C and Tseng S A performance-based approach to dynamic workload distribution for master-slave applications on grid environments Proceedings of the First international conference on Advances in Grid and Pervasive Computing, (73-82)
  1220. Jin W, Jiang Y, Qian W and Tung A Mining outliers in spatial networks Proceedings of the 11th international conference on Database Systems for Advanced Applications, (156-170)
  1221. Jin W, Tung A, Han J and Wang W Ranking outliers using symmetric neighborhood relationship Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining, (577-593)
  1222. Albayrak S and Milosevic D (2006). Multi-domain strategy coordination approach for optimal resource usage in agent based filtering framework, Web Intelligence and Agent Systems, 4:2, (239-253), Online publication date: 1-Apr-2006.
  1223. Sadeghian P, Kantardzic M, Lozitskiy O and Sheta W (2006). The frequent wayfinding-sequence (FWS) methodology, International Journal of Human-Computer Studies, 64:4, (356-374), Online publication date: 1-Apr-2006.
  1224. Guan X, Song C, Ho Y and Zhao Q (2006). Constrained Ordinal Optimization--A Feasibility Model Based Approach, Discrete Event Dynamic Systems, 16:2, (279-299), Online publication date: 1-Apr-2006.
  1225. Su C, Yang C, Hsu K and Chiu W (2006). Data mining for the diagnosis of type II diabetes from three-dimensional body surface anthropometrical scanning data, Computers & Mathematics with Applications, 51:6-7, (1075-1092), Online publication date: 1-Mar-2006.
  1226. Angiulli F, Basta S and Pizzuti C (2006). Distance-Based Detection and Prediction of Outliers, IEEE Transactions on Knowledge and Data Engineering, 18:2, (145-160), Online publication date: 1-Feb-2006.
  1227. Hsu C and Wang S (2006). An Integrated Framework for Visualized and Exploratory Pattern Discovery in Mixed Data, IEEE Transactions on Knowledge and Data Engineering, 18:2, (161-173), Online publication date: 1-Feb-2006.
  1228. Kaikhah K and Doddameti S (2006). Discovering Trends in Large Datasets Using Neural Networks, Applied Intelligence, 24:1, (51-60), Online publication date: 1-Feb-2006.
  1229. Fan T, Liu D and Tzeng G Arrow decision logic for relational information systems Transactions on Rough Sets V, (240-262)
  1230. Gupta N, Mangal N, Tiwari K and Mitra P Mining quantitative association rules in protein sequences Data Mining, (273-281)
  1231. Chen J, He H, Jin H, McAullay D, Williams G and Kelman C Identifying risk groups associated with colorectal cancer Data Mining, (260-272)
  1232. Nayak R and Qiu T Use of data mining in system development life cycle Data Mining, (105-117)
  1233. Zheng Z, Zhang G, He Q, Lu J and Shi Z Rule sets based bilevel decision model Proceedings of the 29th Australasian Computer Science Conference - Volume 48, (113-120)
  1234. Pham K, Lee Y and Lee S Middleware architecture for context knowledge discovery in ubiquitous computing Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (1177-1188)
  1235. Jun S Web usage mining using evolutionary support vector machine Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence, (1015-1020)
  1236. Li Y and Zhong N Rough association mining and its application in web information gathering Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence, (1005-1008)
  1237. Van Someren M and Urbančič T (2005). Applications of machine learning: matching problems to tasks and methods, The Knowledge Engineering Review, 20:4, (363-402), Online publication date: 1-Dec-2005.
  1238. Kriegel H, Kroger P, Pryakhin A and Schubert M Effective and Efficient Distributed Model-Based Clustering Proceedings of the Fifth IEEE International Conference on Data Mining, (258-265)
  1239. Kriegel H, Kroger P, Renz M and Wurst S A Generic Framework for Efficient Subspace Clustering of High-Dimensional Data Proceedings of the Fifth IEEE International Conference on Data Mining, (250-257)
  1240. Achtert E, Bohm C, Kriegel H and Kroger P Online Hierarchical Clustering in a Data Warehouse Environment Proceedings of the Fifth IEEE International Conference on Data Mining, (10-17)
  1241. Kim M and Ramakrishna R (2005). New indices for cluster validity assessment, Pattern Recognition Letters, 26:15, (2353-2363), Online publication date: 1-Nov-2005.
  1242. Enke D and Thawornwong S (2005). The use of data mining and neural networks for forecasting stock market returns, Expert Systems with Applications: An International Journal, 29:4, (927-940), Online publication date: 1-Nov-2005.
  1243. Chen W, Tseng S and Wang C (2005). A novel manufacturing defect detection method using association rule mining techniques, Expert Systems with Applications: An International Journal, 29:4, (807-815), Online publication date: 1-Nov-2005.
  1244. Ngoc K, Lee Y and Lee S OWL-based user preference and behavior routine ontology for ubiquitous system Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, COA, and ODBASE - Volume Part II, (1615-1622)
  1245. De Meo P, Quattrone G, Terracina G and Ursino D An approach for clustering semantically heterogeneous XML schemas Proceedings of the 2005 Confederated international conference on On the Move to Meaningful Internet Systems - Volume >Part I, (329-346)
  1246. Vassiliadis B, Stefani A, Drossos L and Ioannou K Knowledge discovery in multimedia repositories Proceedings of the 7th WSEAS International Conference on Mathematical Methods and Computational Techniques In Electrical Engineering, (330-335)
  1247. ACM
    Javed F Inferring context-free grammars for domain-specific languages Companion to the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (242-243)
  1248. ACM
    Javed F Inferring context-free grammars for domain-specific languages Companion to the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (212-213)
  1249. ACM
    Li J, Dou D, Wu Z, Kim S and Agarwal V (2005). An internet routing forensics framework for discovering rules of abnormal BGP events, ACM SIGCOMM Computer Communication Review, 35:5, (55-66), Online publication date: 6-Oct-2005.
  1250. da Silva J, Giannella C, Bhargava R, Kargupta H and Klusch M (2005). Distributed data mining and agents, Engineering Applications of Artificial Intelligence, 18:7, (791-807), Online publication date: 1-Oct-2005.
  1251. Al-Kabir Z, Le K and Sharma D MEDADVIS Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II, (789-795)
  1252. ACM
    He Z, Lee B and Snapp R (2005). Self-tuning cost modeling of user-defined functions in an object-relational DBMS, ACM Transactions on Database Systems, 30:3, (812-853), Online publication date: 1-Sep-2005.
  1253. ACM
    Varde A, Rundensteiner E, Ruiz C, Maniruzzaman M and Sisson R Learning semantics-preserving distance metrics for clustering graphical data Proceedings of the 6th international workshop on Multimedia data mining: mining integrated media and complex data, (107-112)
  1254. ACM
    Yang C and Létourneau S Learning to predict train wheel failures Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (516-525)
  1255. ACM
    Zhang N, Wang S and Zhao W A new scheme on privacy-preserving data classification Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (374-383)
  1256. ACM
    Bao Y, Zou H and Zhang J Using PACT in an e-commerce recommendation system Proceedings of the 7th international conference on Electronic commerce, (466-470)
  1257. Lu Y, Sun Y, Xu G and Liu G A grid-based clustering algorithm for high-dimensional data streams Proceedings of the First international conference on Advanced Data Mining and Applications, (824-831)
  1258. Gupta A, Kumar N and Bhatnagar V Incremental classification rules based on association rules using formal concept analysis Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition, (11-20)
  1259. Xie Y, Raghavan V, Dhatric P and Zhao X (2005). A new fuzzy clustering algorithm for optimally finding granular prototypes, International Journal of Approximate Reasoning, 40:1, (109-124), Online publication date: 1-Jul-2005.
  1260. ACM
    Tung A, Xu X and Ooi B CURLER Proceedings of the 2005 ACM SIGMOD international conference on Management of data, (467-478)
  1261. Peng Y, Kou G, Shi Y and Chen Z Improving clustering analysis for credit card accounts classification Proceedings of the 5th international conference on Computational Science - Volume Part III, (548-553)
  1262. ACM
    Li Z, Chen Z and Zhou Y (2005). Mining block correlations to improve storage performance, ACM Transactions on Storage, 1:2, (213-245), Online publication date: 1-May-2005.
  1263. ACM
    Ketel M and Homaifar A Privacy-preserving mining by rotational data transformation Proceedings of the 43rd annual Southeast regional conference - Volume 1, (233-236)
  1264. ACM
    Al-Otaiby T, AlSherif M and Bond W Toward software requirements modularization using hierarchical clustering techniques Proceedings of the 43rd annual Southeast regional conference - Volume 2, (223-228)
  1265. ACM
    Angiulli F, Basta S and Pizzuti C Detection and prediction of distance-based outliers Proceedings of the 2005 ACM symposium on Applied computing, (537-542)
  1266. ACM
    Ning P and Xu D (2004). Hypothesizing and reasoning about attacks missed by intrusion detection systems, ACM Transactions on Information and System Security, 7:4, (591-627), Online publication date: 11-Nov-2004.
  1267. Feng L and Dillon T Mining interesting XML-enabled association rules with templates Proceedings of the Third international conference on Knowledge Discovery in Inductive Databases, (66-88)
  1268. Pelekis N, Theodoulidis B, Kopanakis I and Theodoridis Y (2004). Literature review of spatio-temporal database models, The Knowledge Engineering Review, 19:3, (235-274), Online publication date: 1-Sep-2004.
  1269. ACM
    Phua C, Alahakoon D and Lee V (2004). Minority report in fraud detection, ACM SIGKDD Explorations Newsletter, 6:1, (50-59), Online publication date: 1-Jun-2004.
  1270. Overton J Querying to mine clusters Proceedings of the 2nd annual conference on Mid-south college computing, (183-191)
  1271. ACM
    Chen Y and Sprague A Exploration on the commonality of hierarchical clustering algorithms Proceedings of the 42nd annual Southeast regional conference, (246-247)
  1272. Zheng Z and Wang G (2004). RRIA: A Rough Set and Rule Tree Based Incremental Knowledge Acquisition Algorithm, Fundamenta Informaticae, 59:2-3, (299-313), Online publication date: 1-Apr-2004.
  1273. Li Z, Chen Z, Srinivasan S and Zhou Y C-Miner Proceedings of the 3rd USENIX conference on File and storage technologies, (13-13)
  1274. Li Z, Chen Z, Srinivasan S and Zhou Y C-Miner: Mining Block Correlations in Storage Systems Proceedings of the 3rd USENIX Conference on File and Storage Technologies, (173-186)
  1275. ACM
    Kehagias D, Symeonidis A, Chatzidimitriou K and Mitkas P Information agents cooperating with heterogenous data sources for customer-order management Proceedings of the 2004 ACM symposium on Applied computing, (52-57)
  1276. Ozsoyoglu G, Balkir N, Ozsoyoglu Z and Cormode G (2004). On Automated Lesson Construction from Electronic Textbooks, IEEE Transactions on Knowledge and Data Engineering, 16:3, (317-331), Online publication date: 1-Mar-2004.
  1277. Sund R (2003). Utilisation of administrative registers using scientific knowledge discovery, Intelligent Data Analysis, 7:6, (501-519), Online publication date: 1-Dec-2003.
  1278. Jin H, Wong M and Leung K Scalable Model-based Clustering by Working on Data Summaries Proceedings of the Third IEEE International Conference on Data Mining
  1279. Keim D, Panse C, Sips M and North S PixelMaps Proceedings of the Third IEEE International Conference on Data Mining
  1280. Gupta R, Narayana B, Reddy P, Rao G, Gowda C, Reddy Y and Murthy G Understanding Helicoverpa armigera Pest Population Dynamics related to Chickpea Crop Using Neural Networks Proceedings of the Third IEEE International Conference on Data Mining
  1281. Li M, Feng S, Sethi I, Luciow J and Wagner K Mining Production Data with Neural Network & CART Proceedings of the Third IEEE International Conference on Data Mining
  1282. Pierrakos D, Paliouras G, Papatheodorou C and Spyropoulos C (2003). Web Usage Mining as a Tool for Personalization, User Modeling and User-Adapted Interaction, 13:4, (311-372), Online publication date: 1-Nov-2003.
  1283. Kroeze J, Matthee M and Bothma T Differentiating data- and text-mining terminology Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, (93-101)
  1284. ACM
    Du W and Zhan Z Using randomized response techniques for privacy-preserving data mining Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, (505-510)
  1285. Zheng Z and Wang G (2003). RRIA, Fundamenta Informaticae, 59:2-3, (299-313), Online publication date: 1-Jul-2003.
  1286. ACM
    Roddick J, Fule P and Graco W (2003). Exploratory medical knowledge discovery, ACM SIGKDD Explorations Newsletter, 5:1, (94-99), Online publication date: 1-Jul-2003.
  1287. ACM
    Rantzau R Processing frequent itemset discovery queries by division and set containment join operators Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, (20-27)
  1288. Kou G, Peng Y, Shi Y and Xu W A set of data mining models to classify credit cardholder behavior Proceedings of the 2003 international conference on Computational science: PartII, (54-63)
  1289. Gan W and Li D Optimal choice of parameters for a density-based clustering algorithm Proceedings of the 9th international conference on Rough sets, fuzzy sets, data mining, and granular computing, (603-606)
  1290. Robles V, Larrañaga P, Peña J, Marbán O, Crespo J and Pérez M Collaborative filtering using interval estimation naïve Bayes Proceedings of the 1st international Atlantic web intelligence conference on Advances in web intelligence, (46-53)
  1291. ACM
    Kim H and Chan P Learning implicit user interest hierarchy for context in personalization Proceedings of the 8th international conference on Intelligent user interfaces, (101-108)
  1292. Aburto L and Weber R Demand forecast in a supermarket using a hybrid intelligent system Design and application of hybrid intelligent systems, (1076-1083)
  1293. Veryha Y Implementation of fuzzy classification query language in relational databases using stored procedures Enterprise information systems IV, (90-97)
  1294. ACM
    Chaudhuri S, Gupta A and Narasayya V Compressing SQL workloads Proceedings of the 2002 ACM SIGMOD international conference on Management of data, (488-499)
  1295. Marques O and Furht B (2002). MUSE, Multimedia Tools and Applications, 17:1, (21-50), Online publication date: 1-May-2002.
  1296. Gantenbein D and Deri L Categorizing computing assets according to communication patterns Advanced lectures on networking, (83-100)
  1297. Berendt B (2002). Using Site Semantics to Analyze, Visualize, and Support Navigation, Data Mining and Knowledge Discovery, 6:1, (37-59), Online publication date: 1-Jan-2002.
  1298. Ma C, Liang X and Ma Y A Succinct Distributive Big Data Clustering Algorithm Based on Local-Remote Coordination 2015 IEEE International Conference on Systems, Man, and Cybernetics, (1839-1844)
  1299. Apiletti D, Baralis E, Cerquitelli T, Garza P and Venturini L SaFe-NeC: A scalable and flexible system for network data characterization NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, (812-816)
  1300. Milanov S and Georgieva O Pattern frequency representation for time series classification 2016 IEEE 8th International Conference on Intelligent Systems (IS), (478-483)
  1301. Wang L, Renna F, Yuan X, Rodrigues M, Calderbank R and Carin L A general framework for reconstruction and classification from compressive measurements with side information 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4239-4243)
  1302. Rusnok P Probabilistic coverage of linguistic IF-THEN rules 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (798-803)
Contributors
  • University of Illinois Urbana-Champaign

Recommendations

Yannis Manolopoulos

This second edition of this textbook has been expanded to cover topics that emerged from recent research. It discusses the concepts of data mining, but also includes a complete reference to the topics of data warehousing and online analytical processing (OLAP). Nowadays, excessive amounts of data are being generated in domains as diverse as market research, functional genomics, and pharmaceuticals. Analyzing this data, with the aim of answering crucial questions and helping make informed decisions, is the challenge addressed by the concepts discussed in this book. Data mining (also known as knowledge discovery) is the process of analyzing data collections from different perspectives and summarizing them into useful information. Data warehousing is a process of centralized data management and retrieval. All of these technologies are becoming indispensable parts of business intelligence. The book starts by explaining what data mining is. Next, the authors address the data itself in terms of its quality, usability, and organization for efficient access. They then explain what a data warehouse is, and, in particular, how it differs from a database. The next chapter (a new addition since the first edition) examines data cube generation and data generalization issues. The central chapters, 5 through 8, address various data mining tasks, such as association rules discovery; classification and prediction; cluster analysis; and mining stream, time-series, and sequence data (this latter task is also new material). In the final two chapters, 9 and 10, useful extensions are presented, examining complex data such as graphs, social networks, text, multimedia, spatial data, and World Wide Web data. Recent work in these emerging research fields is summarized. A clear introduction to data mining is presented in the book. It is nicely laid out as a textbook, with an orderly summary, problem set, and bibliography at the end of each chapter. The book consistently uses data from a fictitious organization to illustrate most concepts. This gives a strong sense of cohesion to what can actually be very different techniques. One key aspect of the book is its question-and-answer (Socratic) format. The good thing about this format is the clean way that it introduces a new topic, something readers will appreciate. The bibliography helps the reader decide which references will give the best description of each of the chapter's topics. The book is also very usable, as it provides pseudocode for many techniques and prepares the reader for more advanced discussions. This is one of its merits-instead of going into great depth, it offers readers an easy explanation of the big picture of each topic and points them in the right direction (in the related bibliography) for further understanding. The book can be used for both students and practitioners. We have been using it for several years as an introductory-level book for a master's of science course on data mining and data warehousing. It requires a basic background in mathematics, a fact that makes it appealing to students with various backgrounds in computer science. Little normal statistical analysis is used, though some facility with statistics will help. However, reasonably good programming skills are required. For practitioners, this is one of the few books on data mining that contains material of technical merit, in the sense that it explains how data mining algorithms actually work. This is a good starting point for any implementation. Moreover, the second edition provides some coverage of data mining tools. A great number of data mining books either contain a shallow description of the involved techniques or are nothing more than improperly titled books on machine learning. This textbook, one of the few on data mining algorithms and techniques, has become a standard work. For these reasons, I recommend it very highly. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.