skip to main content
Skip header Section
Data Mining: Concepts and TechniquesJuly 2011
Publisher:
  • Morgan Kaufmann Publishers Inc.
  • 340 Pine Street, Sixth Floor
  • San Francisco
  • CA
  • United States
ISBN:978-0-12-381479-1
Published:29 July 2011
Pages:
696
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

The increasing volume of data in modern business and science calls for more complex and sophisticated tools. Although advances in data mining technology have made extensive data collection much easier, it's still always evolving and there is a constant need for new techniques and tools that can help us transform this data into useful information and knowledge. Since the previous edition's publication, great advances have been made in the field of data mining. Not only does the third of edition of Data Mining: Concepts and Techniques continue the tradition of equipping you with an understanding and application of the theory and practice of discovering patterns hidden in large data sets, it also focuses on new, important topics in the field: data warehouses and data cube technology, mining stream, mining social networks, and mining spatial, multimedia and other complex data. Each chapter is a stand-alone guide to a critical topic, presenting proven algorithms and sound implementations ready to be used directly or with strategic modification against live data. This is the resource you need if you want to apply today's most powerful data mining techniques to meet real business challenges. * Presents dozens of algorithms and implementation examples, all in pseudo-code and suitable for use in real-world, large-scale data mining projects. * Addresses advanced topics such as mining object-relational databases, spatial databases, multimedia databases, time-series databases, text databases, the World Wide Web, and applications in several fields. *Provides a comprehensive, practical look at the concepts and techniques you need to get the most out of real business data

References

  1. S. Agarwal, R. Agrawal, P. M. Deshpande, A. Gupta, J. F. Naughton, R. Ramakrishnan, and S. Sarawagi. On the computation of multidimensional aggregates. In Proc. 1996 Int. Conf. Very Large Data Bases (VLDB'96), pp. 506-521, Bombay, India, Sept. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Agarwal, C. C. Aggarwal, and V. V. V. Prasad. A tree projection algorithm for generation of frequent itemsets. J. Parallel and Distributed Computing, 61:350-371, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. Abraham and G. E. P. Box. Bayesian analysis of some outlier problems in time series. Biometrika, 66:229-248, 1979.Google ScholarGoogle ScholarCross RefCross Ref
  4. R. Albert and A.-L. Barabasi. Emergence of scaling in random networks. Science, 286:509-512, 1999.Google ScholarGoogle Scholar
  5. M. Agyemang, K. Barker, and R. Alhajj. A comprehensive survey of numeric and symbolic outlier mining techniques. Intell. Data Anal., 10:521-538, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Ankerst, M. Breunig, H.-P. Kriegel, and J. Sander. OPTICS: Ordering points to identify the clustering structure. In Proc. 1999 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'99), pp. 49-60, Philadelphia, PA, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Almuallim and T. G. Dietterich. Learning with many irrelevant features. In Proc. 1991 Nat. Conf. Artificial Intelligence (AAAI'91), pp. 547-552, Anaheim, CA, July 1991. Google ScholarGoogle Scholar
  8. M. Ankerst, C. Elsen, M. Ester, and H.-P. Kriegel. Visual classification: An interactive approach to decision tree construction. In Proc. 1999 Int. Conf. Knowledge Discovery and Data Mining (KDD'99), pp. 392-396, San Diego, CA, Aug. 1999. Google ScholarGoogle Scholar
  9. K. M. Ahmed, N. M. El-Makky, and Y. Taha. A note on "beyond market basket: Generalizing association rules to correlations." SIGKDD Explorations, 1:46-48, 2000. Google ScholarGoogle Scholar
  10. F. J. Anscombe, and I. Guttman. Rejection of outliers. Technometrics, 2:123-147, 1960.Google ScholarGoogle ScholarCross RefCross Ref
  11. D. Agarwal. Detecting anomalies in cross-classified streams: A Bayesian approach. Knowl. Inf. Syst., 11:29-44, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. Amigó, J. Gonzalo, J. Artiles, and F. Verdejo. A comparison of extrinsic clustering evaluation metrics based on formal constraints. Information Retrieval, 12(4):461-486, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. C. Aggarwal. Data Streams: Models and Algorithms. Kluwer Academic, 2006. Google ScholarGoogle Scholar
  14. R. Agrawal, J. Gehrke, D. Gunopulos, and P. Raghavan. Automatic subspace clustering of high dimensional data for data mining applications. In Proc. 1998 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'98), pp. 94-105, Seattle, WA, June 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. F. N. Afrati, A. Gionis, and H. Mannila. Approximating a collection of frequent sets. In Proc. 2004 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'04), pp. 12-19, Seattle, WA, Aug. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Agrawal, A. Gupta, and S. Sarawagi. Modeling multidimensional databases. In Proc.1997 Int.Conf. Data Engineering (ICDE'97), pp. 232-243, Birmingham, England, Apr. 1997. Google ScholarGoogle ScholarCross RefCross Ref
  17. D. Aha. Tolerating noisy, irrelevant, and novel attributes in instance-based learning algorithms. Int. J. Man-Machine Studies, 36:267-287, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Arabie, L. J. Hubert, and G. De Soete. Clustering and Classification. World Scientific, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  19. C. C. Aggarwal, J. Han, J. Wang, and P. S. Yu. A framework for clustering evolving data streams. In Proc. 2003 Int. Conf. Very Large Data Bases (VLDB'03), pp. 81-92, Berlin, Germany, Sept. 2003. Google ScholarGoogle ScholarCross RefCross Ref
  20. C. C. Aggarwal, J. Han, J. Wang, and P. S. Yu. A framework for projected clustering of high dimensional data streams. In Proc. 2004 Int. Conf. Very Large Data Bases (VLDB'04), pp. 852-863, Toronto, Ontario, Canada, Aug. 2004. Google ScholarGoogle ScholarCross RefCross Ref
  21. C. C. Aggarwal, J. Han, J. Wang, and P. S. Yu. On demand classification of data streams. In Proc. 2004 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'04), pp. 503-508, Seattle, WA, Aug. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proc. 1993 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'93), pp. 207-216, Washington, DC, May 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. T. Anand and G. Kahn. Opportunity explorer: Navigating large databases using knowledge discovery templates. In Proc. AAAI-93 Workshop Knowledge Discovery in Databases, pp. 45-51, Washington, DC, July 1993.Google ScholarGoogle Scholar
  24. Y. Aumann and Y. Lindell. A statistical theory for quantitative association rules. In Proc. 1999 Int. Conf. Knowledge Discovery and Data Mining (KDD'99), pp. 261-270, San Diego, CA, Aug. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. B. P. Allen. Case-based reasoning: Business applications. Communications of the ACM, 37:40-42, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. E. Alpaydin. Introduction to Machine Learning (2nd ed.). Cambridge, MA: MIT Press, 2011. Google ScholarGoogle Scholar
  27. R. Agrawal, K.-I. Lin, H. S. Sawhney, and K. Shim. Fast similarity search in the presence of noise, scaling, and translation in time-series databases. In Proc. 1995 Int. Conf. Very Large Data Bases (VLDB'95), pp. 490-501, Zurich, Switzerland, Sept. 1995. Google ScholarGoogle Scholar
  28. R. Agrawal, M. Mehta, J. Shafer, R. Srikant, A. Arning, and T. Bollinger. The Quest data mining system. In Proc. 1996 Int. Conf. Data Mining and Knowledge Discovery (KDD'96), pp. 244-249, Portland, OR, Aug. 1996.Google ScholarGoogle Scholar
  29. P. M. Aoki. Generalizing "search" in generalized search trees. In Proc. 1998 Int. Conf. Data Engineering (ICDE'98), pp. 380-389, Orlando, FL, Feb. 1998. Google ScholarGoogle Scholar
  30. A. Aamodt and E. Plazas. Case-based reasoning: Foundational issues, methodological variations, and system approaches. AI Communications, 7:39-52, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. F. Angiulli, and C. Pizzuti. Outlier mining in large high-dimensional data sets. IEEE Trans. on Knowl. and Data Eng., 17:203-215, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. C. C. Aggarwal, C. Procopiuc, J. Wolf, P. S. Yu, and J.-S. Park. Fast algorithms for projected clustering. In Proc. 1999 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'99), pp. 61-72, Philadelphia, PA, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. S. Arora, S. Rao, and U. Vazirani. Expander flows, geometric embeddings and graph partitioning. J. ACM, 56(2):1-37, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. R. Agrawal and R. Srikant. Fast algorithm for mining association rules in large databases. In Research Report RJ 9839, IBM Almaden Research Center, San Jose, CA, June 1994.Google ScholarGoogle Scholar
  35. R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In Proc. 1994 Int. Conf. Very Large Data Bases (VLDB'94), pp. 487-499, Santiago, Chile, Sept. 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. R. Agrawal and R. Srikant. Mining sequential patterns. In Proc. 1995 Int. Conf. Data Engineering (ICDE'95), pp. 3-14, Taipei, Taiwan, Mar. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. R. Agrawal and J. C. Shafer. Parallel mining of association rules: Design, implementation, and experience. IEEE Trans. Knowledge and Data Engineering, 8:962-969, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. R. Agrawal and R. Srikant. Privacy-preserving data mining. In Proc. 2000 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'00), pp. 439-450, Dallas, TX, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. E. Allwein, R. Shapire, and Y. Singer. Reducing multiclass to binary: A unifying approach for margin classifiers. Journal of Machine Learning Research, 1:113-141, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. D. Arthur and S. Vassilvitskii. K-means++: The advantages of careful seeding. In Proc. 2007 ACM-SIAM Symp. on Discrete Algorithms (SODA'07), pp. 1027-1035, Tokyo, 2007. Google ScholarGoogle Scholar
  41. S. Avner. Discovery of comprehensible symbolic rules in a neural network. In Proc. 1995 Int. Symp. Intelligence in Neural and Biological Systems, pp. 64-67, Washington, DC, 1995. Google ScholarGoogle ScholarCross RefCross Ref
  42. C. C. Aggarwal and P. S. Yu. A new framework for itemset generation. In Proc. 1998 ACM Symp. Principles of Database Systems (PODS'98), pp. 18-24, Seattle, WA, June 1999. Google ScholarGoogle Scholar
  43. C. C. Aggarwal and P. S. Yu. Outlier detection for high dimensional data. In Proc. 2001 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'01), pp. 37-46, Santa Barbara, CA, May 2001. Google ScholarGoogle ScholarCross RefCross Ref
  44. C. C. Aggarwal and P. S. Yu. Privacy-Preserving Data Mining: Models and Algorithms. New York: Springer, 2008. Google ScholarGoogle Scholar
  45. L. A. Breslow and D. W. Aha. Simplifying decision trees: A survey. Knowledge Engineering Rev., 12:1-40, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. R. J. Bayardo. Efficiently mining long patterns from databases. In Proc. 1998 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'98), pp. 85-93, Seattle, WA, June 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. A. Bagga and B. Baldwin. Entity-based cross-document coreferencing using the vector space model. In Proc. 1998 Annual Meeting of the Association for Computational Linguistics and Int. Conf. Computational Linguistics (COLING-ACL'98), Montreal, Quebec, Canada, Aug. 1998. Google ScholarGoogle Scholar
  48. P. Baldi and S. Brunak. Bioinformatics: The Machine Learning Approach (2nd ed.). Cambridge, MA: MIT Press, 2001. Google ScholarGoogle Scholar
  49. C. Borgelt and M. R. Berthold. Mining molecular fragments: Finding relevant substructures of molecules. In Proc. 2002 Int. Conf. Data Mining (ICDM'02), pp. 211-218, Maebashi, Japan, Dec. 2002. Google ScholarGoogle ScholarCross RefCross Ref
  50. B. Babcock, S. Babu, M. Datar, R. Motwani, and J. Widom. Models and issues in data stream systems. In Proc. 2002 ACM Symp. Principles of Database Systems (PODS'02), pp. 1-16, Madison, WI, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. R. J. Beckman and R. D. Cook. Outlier...s. Technometrics, 25:119-149, 1983.Google ScholarGoogle Scholar
  52. S. Buettcher, C. L. A. Clarke, and G. V. Cormack. Information Retrieval: Implementing and Evaluating Search Engines. Cambridge, MA: MIT Press, 2010. Google ScholarGoogle Scholar
  53. D. Burdick, M. Calimlim, and J. Gehrke. MAFIA: A maximal frequent itemset algorithm for transactional databases. In Proc. 2001 Int. Conf. Data Engineering (ICDE'01), pp. 443-452, Heidelberg, Germany, Apr. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. D. E. Brown, V. Corruble, and C. L. Pittard. A comparison of decision tree classifiers with backpropagation neural networks for multimodal classification problems. Pattern Recognition, 26:953-961, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  55. P. J. Bickel and K. A. Doksum. Mathematical Statistics: Basic Ideas and Selected Topics, Vol. 1. Prentice-Hall, 2001.Google ScholarGoogle Scholar
  56. P. J. Brockwell and R. A. Davis. Introduction to Time Series and Forecasting (2nd ed.). New York: Springer, 2002.Google ScholarGoogle Scholar
  57. D. Barbará, W. DuMouchel, C. Faloutsos, P. J. Haas, J. H. Hellerstein, Y. Ioannidis, H. V. Jagadish, T. Johnson, R. Ng, V. Poosala, K. A. Ross, and K. C. Servcik. The New Jersey data reduction report. Bull. Technical Committee on Data Engineering, 20:3-45, Dec. 1997.Google ScholarGoogle Scholar
  58. A. Bruce, D. Donoho, and H.-Y. Gao. Wavelet analysis. IEEE Spectrum, 33:26-35, Oct. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. D. Burdick, P. Deshpande, T. S. Jayram, R. Ramakrishnan, and S. Vaithyanathan. OLAP over uncertain and imprecise data. In Proc. 2005 Int. Conf. Very Large Data Bases (VLDB'05), pp. 970-981, Trondheim, Norway, Aug. 2005. Google ScholarGoogle Scholar
  60. S. Benninga. Financial Modeling (3rd. ed.). Cambridge, MA: MIT Press, 2008.Google ScholarGoogle Scholar
  61. J. Bertin. Graphics and Graphic Information Processing. Walter de Gruyter, Berlin, 1981.Google ScholarGoogle Scholar
  62. M. W. Berry. Survey of Text Mining: Clustering, Classification, and Retrieval. New York: Springer, 2003. Google ScholarGoogle Scholar
  63. J. C. Bezdek. Pattern Recognition with Fuzzy Objective Function Algorithms. Plenum Press, 1981. Google ScholarGoogle Scholar
  64. L. Breiman, J. Friedman, R. Olshen, and C. Stone. Classification and Regression Trees. Wadsworth International Group, 1984.Google ScholarGoogle Scholar
  65. P. Bradley, U. Fayyad, and C. Reina. Scaling clustering algorithms to large databases. In Proc. 1998 Int. Conf. Knowledge Discovery and Data Mining (KDD'98), pp. 9-15, New York, Aug. 1998.Google ScholarGoogle Scholar
  66. I. Bhattacharya and L. Getoor. Iterative record linkage for cleaning and integration. In Proc. SIGMOD 2004 Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD'04), pp. 11-18, Paris, France, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. I. Ben-Gal. Outlier detection. In O. Maimon and L. Rockach (eds.), Data Mining and Knowledge Discovery Handbook: A Complete Guide for Practitioners and Researchers. Kluwer Academic, 2005.Google ScholarGoogle Scholar
  68. C. Bucila, J. Gehrke, D. Kifer, and W. White. DualMiner: A dual-pruning algorithm for itemsets with constraints. Data Mining and Knowledge Discovery, 7:241-272, 2003. Google ScholarGoogle ScholarCross RefCross Ref
  69. F. Bonchi, F. Giannotti, A. Mazzanti, and D. Pedreschi. ExAnte: Anticipated data reduction in constrained pattern mining. In Proc. 7th European Conf. Principles and Pratice of Knowledge Discovery in Databases (PKDD'03), Vol. 2838/2003, pp. 59-70, Cavtat-Dubrovnik, Croatia, Sept. 2003.Google ScholarGoogle ScholarCross RefCross Ref
  70. K. S. Beyer, J. Goldstein, R. Ramakrishnan, and U. Shaft. When is "nearest neighbor" meaningful? In Proc. 1999 Int. Conf. Database Theory (ICDT'99), pp. 217-235, Jerusalem, Israel, Jan. 1999. Google ScholarGoogle ScholarCross RefCross Ref
  71. B. Boser, I. Guyon, and V. N. Vapnik. A training algorithm for optimal margin classifiers. In Proc. Fifth Annual Workshop on Computational Learning Theory, pp. 144-152, ACM Press, San Mateo, CA, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. C. M. Bishop. Neural Networks for Pattern Recognition. Oxford University Press, 1995. Google ScholarGoogle Scholar
  73. C. M. Bishop. Pattern Recognition and Machine Learning. New York: Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. G. E. P. Box, G. M. Jenkins, and G. C. Reinsel. Time Series Analysis: Forecasting and Control (4th ed.). Prentice-Hall, 2008.Google ScholarGoogle Scholar
  75. M. M. Breunig, H.-P. Kriegel, R. Ng, and J. Sander. LOF: Identifying density-based local outliers. In Proc. 2000 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'00), pp. 93-104, Dallas, TX, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. M. J. A. Berry and G. Linoff. Mastering Data Mining: The Art and Science of Customer Relationship Management. John Wiley & Sons, 1999. Google ScholarGoogle Scholar
  77. M. J. A. Berry and G. S. Linoff. Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management. John Wiley & Sons, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. D. Blei and J. Lafferty. Topic models. In A. Srivastava and M. Sahami (eds.), TextMining: Theory and Applications, Taylor and Francis, 2009.Google ScholarGoogle Scholar
  79. D. Barbará, Y. Li, J. Couto, J.-L. Lin, and S. Jajodia. Bootstrapping a data mining intrusion detection system. In Proc. 2003 ACM Symp. on Applied Computing (SAC'03), Melbourne, FL, March 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. A. Blum and T. Mitchell. Combining labeled and unlabeled data with co-training. In Proc. 11th Conf. Computational Learning Theory (COLT'98), pp. 92-100, Madison, WI, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Z. A. Bakar, R. Mohemad, A. Ahmad, and M. M. Deris. A comparative study for outlier detection techniques in data mining. In Proc. 2006 IEEE Conf. Cybernetics and Intelligent Systems, pp. 1-6, Bangkok, Thailand, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  82. S. Brin, R. Motwani, and C. Silverstein. Beyond market basket: Generalizing association rules to correlations. In Proc. 1997 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'97), pp. 265-276, Tucson, AZ, May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. S. Brin, R. Motwani, J. D. Ullman, and S. Tsur. Dynamic itemset counting and implication rules for market basket analysis. In Proc. 1997 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'97), pp. 255-264, Tucson, AZ, May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. W. L. Buntine and T. Niblett. A further comparison of splitting rules for decision-tree induction. Machine Learning, 8:75-85, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. A. Baxevanis and B. F. F. Ouellette. Bioinformatics: A Practical Guide to the Analysis of Genes and Proteins (3rd ed.). John Wiley & Sons, 2004.Google ScholarGoogle Scholar
  86. J. C. Bezdek and S. K. Pal. Fuzzy Models for Pattern Recognition: Methods That Search for Structures in Data. IEEE Press, 1992.Google ScholarGoogle Scholar
  87. S. Brin and L. Page. The anatomy of a large-scale hypertextual web search engine. In Proc. 7th Int. World Wide Web Conf. (WWW'98), pp. 107-117, Brisbane, Australia, Apr. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. E. Baralis, S. Paraboschi, and E. Teniente. Materialized view selection in a multidimensional database. In Proc. 1997 Int. Conf. Very Large Data Bases (VLDB'97), pp. 98-12, Athens, Greece, Aug. 1997. Google ScholarGoogle Scholar
  89. E. R. Bareiss, B. W. Porter, and C. C. Weir. Protos: An exemplar-based learning apprentice. Int. J. Man-Machine Studies, 29:549-561, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. K. Beyer and R. Ramakrishnan. Bottom-up computation of sparse and iceberg cubes. In Proc. 1999 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'99), pp. 359-370, Philadelphia, PA, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. L. Breiman. Bagging predictors. Machine Learning, 24:123-140, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. L. Breiman. Random forests. Machine Learning, 45:5-32, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. D. Barbará and M. Sullivan. Quasi-cubes: Exploiting approximation in multidimensional databases. SIGMOD Record, 26:12-17, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. S. D. Bay and M. Schwabacher. Mining distance-based outliers in near linear time with randomization and a simple pruning rule. In Proc. 2003 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'03), pp. 29-38, Washington, DC, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. A. Berson, S. J. Smith, and K. Thearling. Building Data Mining Applications for CRM. McGraw-Hill, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. D. P. Ballou and G. K. Tayi. Enhancing data quality in data warehouse environments. Communications of the ACM, 42:73-78, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. C. E. Brodley and P. E. Utgoff. Multivariate decision trees. Machine Learning, 19:45-77, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. W. L. Buntine. Operations for learning with graphical models. J. Artificial Intelligence Research, 2:159-225, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. C. J. C. Burges. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2:121-168, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. D. Barbará and X. Wu. Using loglinear models to compress datacubes. In Proc. 1st Int. Conf. Web-Age Information Management (WAIM'00), pp. 311-322, Shanghai, China, 2000. Google ScholarGoogle ScholarCross RefCross Ref
  101. S. Babu and J. Widom. Continuous queries over data streams. SIGMOD Record, 30: 109-120, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. R. A. Baeza-Yates and B. A. Ribeiro-Neto. Modern Information Retrieval (2nd ed.). Boston: Addison-Wesley, 2011. Google ScholarGoogle Scholar
  103. J. Catlett. Megainduction: Machine Learning on Very large Databases. Ph. D. Thesis, University of Sydney, 1991.Google ScholarGoogle Scholar
  104. V. Chandola, A. Banerjee, and V. Kumar. Anomaly detection: A survey. ACM Computing Surveys, 41:1-58, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Y. Cheng and G. Church. Biclustering of expression data. In Proc. 2000 Int. Conf. Intelligent Systems for Molecular Biology (ISMB'00), pp. 93-103, La Jolla, CA, Aug. 2000. Google ScholarGoogle Scholar
  106. Y. Cai, N. Cercone, and J. Han. Attribute-oriented induction in relational databases. In G. Piatetsky-Shapiro and W. J. Frawley (eds.), Knowledge Discovery in Databases, pp. 213-228. AAAI/MIT Press, 1991.Google ScholarGoogle Scholar
  107. B.-C. Chen, L. Chen, Y. Lin, and R. Ramakrishnan. Prediction cubes. In Proc. 2005 Int. Conf. Very Large Data Bases (VLDB'05), pp. 982-993, Trondheim, Norway, Aug. 2005. Google ScholarGoogle Scholar
  108. E. F. Codd, S. B. Codd, and C. T. Salley. Beyond decision support. Computer World, 27(30):5-12, July 1993.Google ScholarGoogle Scholar
  109. S. Chaudhuri and U. Dayal. An overview of data warehousing and OLAP technology. SIGMOD Record, 26:65-74, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. Y. Chen, G. Dong, J. Han, B. W. Wah, and J. Wang. Multidimensional regression analysis of time-series data streams. In Proc. 2002 Int. Conf. Very Large Data Bases (VLDB'02), pp. 323-334, Hong Kong, China, Aug. 2002. Google ScholarGoogle ScholarCross RefCross Ref
  111. Y. Chen, G. Dong, J. Han, J. Pei, B. W. Wah, and J. Wang. Regression cubes with lossless compression and aggregation. IEEE Trans. Knowledge and Data Engineering, 18:1585-1599, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. S. Chakrabarti, B. E. Dom, and P. Indyk. Enhanced hypertext classification using hyperlinks. In Proc. 1998 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'98), pp. 307-318, Seattle, WA, June 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. S. Chakrabarti, B. E. Dom, S. R. Kumar, P. Raghavan, S. Rajagopalan, A. Tomkins, D. Gibson, and J. M. Kleinberg. Mining the web's link structure. COMPUTER, 32:60-67, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. A. Chaturvedi, P. Green, and J. Carroll. k-means, k-medians and k-modes: Special cases of partitioning multiway data. In The Classification Society of North America (CSNA) Meeting Presentation, Houston, TX, 1994.Google ScholarGoogle Scholar
  115. A. Chaturvedi, P. Green, and J. Carroll. k-modes clustering. J. Classification, 18:35-55, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. T. Cover and P. Hart. Nearest neighbor pattern classification. IEEE Trans. Information Theory, 13:21-27, 1967. Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. G. Cooper and E. Herskovits. A Bayesian method for the induction of probabilistic networks from data. Machine Learning, 9:309-347, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. D. J. Cook and L. B. Holder. Mining Graph Data. John Wiley & Sons, 2007. Google ScholarGoogle Scholar
  119. S. Chakrabarti. Mining the Web: Discovering Knowledge from Hypertext Data. Morgan Kaufmann, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. C. Chatfield. The Analysis of Time Series: An Introduction (6th ed.). Chapman & Hall, 2003.Google ScholarGoogle Scholar
  121. D. W. Cheung, J. Han, V. Ng, A. Fu, and Y. Fu. A fast distributed algorithm for mining association rules. In Proc. 1996 Int. Conf. Parallel and Distributed Information Systems, pp. 31-44, Miami Beach, FL, Dec. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. D. W. Cheung, J. Han, V. Ng, and C. Y. Wong. Maintenance of discovered association rules in large databases: An incremental updating technique. In Proc. 1996 Int. Conf. Data Engineering (ICDE'96), pp. 106-114, New Orleans, LA, Feb. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. M. S. Chen, J. Han, and P. S. Yu. Data mining: An overview from a database perspective. IEEE Trans. Knowledge and Data Engineering, 8:866-883, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. M. Carey and D. Kossman. Reducing the braking distance of an SQL query engine. In Proc. 1998 Int. Conf. Very Large Data Bases (VLDB'98), pp. 158-169, New York, Aug. 1998. Google ScholarGoogle Scholar
  125. D. Chakrabarti, R. Kumar, and A. Tomkins. Evolutionary clustering. In Proc. 2006 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'06), pp. 554-560, Philadelphia, PA, Aug. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. W. Cleveland. Visualizing Data. Hobart Press, 1993. Google ScholarGoogle Scholar
  127. O. Chapelle, B. Schölkopf, and A. Zien. Semi-supervised Learning. Cambridge, MA: MIT Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. S. P. Curram and J. Mingers. Neural networks, decision tree induction and discriminant analysis: An empirical comparison. J. Operational Research Society, 45:440-450, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  129. H. Cao, N. Mamoulis, and D. W. Cheung. Mining frequent spatio-temporal sequential patterns. In Proc. 2005 Int. Conf. Data Mining (ICDM'05), pp. 82-89, Houston, TX, Nov. 2005. Google ScholarGoogle Scholar
  130. B. Croft, D. Metzler, and T. Strohman. Search Engines: Information Retrieval in Practice. Boston: Addison-Wesley, 2009. Google ScholarGoogle Scholar
  131. P. Clark and T. Niblett. The CN2 induction algorithm. Machine Learning, 3:261-283, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. W. Cohen. Fast effective rule induction. In Proc. 1995 Int. Conf. Machine Learning (ICML'95), pp. 115-123, Tahoe City, CA, July 1995.Google ScholarGoogle ScholarCross RefCross Ref
  133. G. F. Cooper. The computational complexity of probabilistic inference using Bayesian belief networks. Artificial Intelligence, 42:393-405, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  134. K. Cios, W. Pedrycz, and R. Swiniarski. Data Mining Methods for Knowledge Discovery. Kluwer Academic, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  135. Y. Chauvin and D. Rumelhart. Backpropagation: Theory, Architectures, and Applications. Lawrence Erlbaum, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  136. S. L. Crawford. Extensions to the CART algorithm. Int. J. Man-Machine Studies, 31:197-217, Aug. 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  137. B.-C. Chen, R. Ramakrishnan, J. W. Shavlik, and P. Tamma. Bellwether analysis: Predicting global aggregates from local regions. In Proc. 2006 Int. Conf. Very Large Data Bases (VLDB'06), pp. 655-666, Seoul, Korea, Sept. 2006. Google ScholarGoogle Scholar
  138. P. K. Chan and S. J. Stolfo. Experiments on multistrategy learning by metalearning. In Proc. 2nd. Int. Conf. Information and Knowledge Management (CIKM'93), pp. 314-323, Washington, DC, Nov. 1993. Google ScholarGoogle Scholar
  139. P. K. Chan and S. J. Stolfo. Toward multi-strategy parallel & distributed learning in sequence analysis. In Proc. 1st Int. Conf. Intelligent Systems for Molecular Biology (ISMB'93), pp. 65-73, Bethesda, MD, July 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. M. W. Craven and J. W. Shavlik. Extracting tree-structured representations of trained networks. In D. Touretzky, M. Mozer, and M. Hasselmo (eds.), Advances in Neural Information Processing Systems. Cambridge, MA: MIT Press, 1996.Google ScholarGoogle Scholar
  141. M. W. Craven and J. W. Shavlik. Using neural networks in data mining. Future Generation Computer Systems, 13:211-229, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. N. Cristianini and J. Shawe-Taylor. An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge University Press, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  143. Y. Chi, X. Song, D. Zhou, K. Hino, and B. L. Tseng. Evolutionary spectral clustering by incorporating temporal smoothness. In Proc. 2007 ACM SIGKDD Intl. Conf. Knowledge Discovery and Data Mining (KDD'07), pp. 153-162, San Jose, CA, Aug. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  144. G. Cong, K.-Lee Tan, A. K. H. Tung, and X. Xu. Mining top-k covering rule groups for gene expression data. In Proc. 2005 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'05), pp. 670-681, Baltimore, MD, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. G. Cong, L. Wang, C.-Y. Lin, Y.-I. Song, and Y. Sun. Finding question-answer pairs from online forums. In Proc. 2008 Int. ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR'08), pp. 467-474, Singapore, July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  146. H. Cheng, X. Yan, J. Han, and C.-W. Hsu. Discriminative frequent pattern analysis for effective classification. In Proc. 2007 Int. Conf. Data Engineering (ICDE'07), pp. 716-725, Istanbul, Turkey, Apr. 2007.Google ScholarGoogle ScholarCross RefCross Ref
  147. H. Cheng, X. Yan, J. Han, and P. S. Yu. Direct discriminative pattern mining for effective classification. In Proc. 2008 Int. Conf. Data Engineering (ICDE'08), pp. 169-178, Cancun, Mexico, Apr. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. C. Chen, X. Yan, F. Zhu, J. Han, and P. S. Yu. Graph OLAP: Towards online analytical processing on graphs. In Proc. 2008 Int. Conf. Data Mining (ICDM'08), pp. 103-112, Pisa, Italy, Dec. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  149. A. Darwiche. Bayesian networks. Communications of the ACM, 53:80-90, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  150. B. V. Dasarathy. Nearest Neighbor (NN) Norms: NN Pattern Classification Techniques. IEEE Computer Society Press, 1991.Google ScholarGoogle Scholar
  151. I. Daubechies. Ten Lectures on Wavelets. Capital City Press, 1992. Google ScholarGoogle Scholar
  152. T. G. Dietterich and G. Bakiri. Solving multiclass learning problems via error-correcting output codes. J. Artificial Intelligence Research, 2:263-286, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  153. H. Drucker, C. J. C. Burges, L. Kaufman, A. Smola, and V. N. Vapnik. Support vector regression machines. In M. Mozer, M. Jordan, and T. Petsche (eds.), Advances in Neural Information Processing Systems 9, pp. 155-161. Cambridge, MA: MIT Press, 1997.Google ScholarGoogle Scholar
  154. W. H. E. Day and H. Edelsbrunner. Efficient algorithms for agglomerative hierarchical clustering methods. J. Classification, 1:7-24, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  155. S. Dzeroski and N. Lavrac (eds.). Relational Data Mining. New York: Springer, 2001. Google ScholarGoogle Scholar
  156. R. Durbin, S. Eddy, A. Krogh, and G. Mitchison. Biological Sequence Analysis: Probability Models of Proteins and Nucleic Acids. Cambridge University Press, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  157. J. L. Devore. Probability and Statistics for Engineering and the Sciences (4th ed.). Duxbury Press, 1995.Google ScholarGoogle Scholar
  158. J. L. Devore. Probability and Statistics for Engineering and the Sciences (6th ed.). Duxbury Press, 2003.Google ScholarGoogle Scholar
  159. W. E. Donath and A. J. Hoffman. Lower bounds for the partitioning of graphs. IBM J. Research and Development, 17:420-425, 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  160. P. Domingos and G. Hulten. Mining high-speed data streams. In Proc. 2000 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'00), pp. 71-80, Boston, MA, Aug. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  161. G. Dong, J. Han, J. Lam, J. Pei, and K. Wang. Mining multi-dimensional constrained gradients in data cubes. In Proc. 2001 Int. Conf. Very Large Data Bases (VLDB'01), pp. 321-330, Rome, Italy, Sept. 2001. Google ScholarGoogle Scholar
  162. G. Dong, J. Han, J. Lam, J. Pei, K. Wang, and W. Zou. Mining constrained gradients in multi-dimensional databases. IEEE Trans. Knowledge and Data Engineering, 16:922-938, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  163. R. O. Duda, P. E. Hart, and D. G. Stork. Pattern Classification (2nd ed.). John Wiley & Sons, 2001. Google ScholarGoogle Scholar
  164. T. Dasu and T. Johnson. Exploratory Data Mining and Data Cleaning. John Wiley & Sons, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  165. T. Dasu, T. Johnson, S. Muthukrishnan, and V. Shkapenyuk. Mining database structure; or how to build a data quality browser. In Proc. 2002 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'02), pp. 240-251, Madison, WI, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  166. M. Dash and H. Liu. Feature selection methods for classification. Intelligent Data Analysis, 1:131-156, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  167. G. Dong and J. Li. Efficient mining of emerging patterns: Discovering trends and differences. In Proc. 1999 Int. Conf. Knowledge Discovery and Data Mining (KDD'99), pp. 43-52, San Diego, CA, Aug. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  168. A. P. Dempster, N. M. Laird, and D. B. Rubin. Maximum likelihood from incomplete data via the EM algorithm. J. Royal Statistical Society, Series B, 39:1-38, 1977.Google ScholarGoogle Scholar
  169. M. Dash, H. Liu, and J. Yao. Dimensionality reduction of unsupervised data. In Proc. 1997 IEEE Int. Conf. Tools with AI (ICTAI'97), pp. 532-539, Newport Beach, CA, IEEE Computer Society, 1997. Google ScholarGoogle ScholarCross RefCross Ref
  170. D. Dasgupta and N. S. Majumdar. Anomaly detection in multidimensional data using negative selection algorithm. In Proc. 2002 Congress on Evolutionary Computation (CEC'02), Chapter 12, pp. 1039-1044, Washington, DC, 2002. Google ScholarGoogle ScholarCross RefCross Ref
  171. P. Deshpande, J. Naughton, K. Ramasamy, A. Shukla, K. Tufte, and Y. Zhao. Cubing algorithms, storage estimation, and storage and processing alternatives for OLAP. Bull. Technical Committee on Data Engineering, 20:3-11, 1997.Google ScholarGoogle Scholar
  172. A. J. Dobson. An Introduction to Generalized Linear Models. Chapman & Hall, 1990.Google ScholarGoogle ScholarCross RefCross Ref
  173. A. J. Dobson. An Introduction to Generalized Linear Models (2nd ed.). Chapman & Hall, 2001.Google ScholarGoogle Scholar
  174. P. Domingos. The RISE system: Conquering without separating. In Proc. 1994 IEEE Int. Conf. Tools with Artificial Intelligence (TAI'94), pp. 704-707, New Orleans, LA, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  175. P. Domingos. The role of Occam's razor in knowledge discovery. Data Mining and Knowledge Discovery, 3:409-425, 1999. Google ScholarGoogle ScholarCross RefCross Ref
  176. P. Domingos and M. Pazzani. Beyond independence: Conditions for the optimality of the simple Bayesian classifier. In Proc. 1996 Int. Conf. Machine Learning (ML'96), pp. 105-112, Bari, Italy, July 1996.Google ScholarGoogle Scholar
  177. J. Devore and R. Peck. Statistics: The Exploration and Analysis of Data. Duxbury Press, 1997.Google ScholarGoogle Scholar
  178. G. Dong and J. Pei. Sequence Data Mining. New York: Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  179. D. Donjerkovic and R. Ramakrishnan. Probabilistic optimization of top N queries. In Proc. 1999 Int. Conf. Very Large Data Bases (VLDB'99), pp. 411-422, Edinburgh, UK, Sept. 1999. Google ScholarGoogle Scholar
  180. I. Davidson and S. S. Ravi. Clustering with constraints: Feasibility issues and the k-means algorithm. In Proc. 2005 SIAM Int. Conf. Data Mining (SDM'05), Newport Beach, CA, Apr. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  181. V. Dhar and A. Tuzhilin. Abstract-driven pattern discovery in databases. IEEE Trans. Knowledge and Data Engineering, 5:926-938, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  182. M. Dunham. Data Mining: Introductory and Advanced Topics. Prentice-Hall, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  183. I. Davidson, K. L. Wagstaff, and S. Basu. Measuring constraint-set utility for partitional clustering algorithms. In Proc. 10th European Conf. Principles and Practice of Knowledge Discovery in Databases (PKDD'06), pp. 115-126, Berlin, Germany, Sept. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  184. C. Dwork. Differential privacy. In Proc. 2006 Int. Col. Automata, Languages and Programming (ICALP), pp. 1-12, Venice, Italy, July 2006. Google ScholarGoogle Scholar
  185. W. Dai, Q. Yang, G. Xue, and Y. Yu. Boosting for transfer learning. In Proc. 24th Intl. Conf. Machine Learning, pp. 193-200, Corvallis, OR, June 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  186. J. P. Egan. Signal Detection Theory and ROC Analysis. Academic Press, 1975.Google ScholarGoogle Scholar
  187. D. Easley and J. Kleinberg. Networks, Crowds, and Markets: Reasoning about a Highly Connected World. Cambridge University Press, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  188. E. Eskin. Anomaly detection over noisy data using learned probability distributions. In Proc. 17th Int. Conf. Machine Learning (ICML'00), Stanford, CA, 2000. Google ScholarGoogle Scholar
  189. M. Ester, H.-P. Kriegel, J. Sander, and X. Xu. A density-based algorithm for discovering clusters in large spatial databases. In Proc. 1996 Int. Conf. Knowledge Discovery and Data Mining (KDD'96), pp. 226-231, Portland, OR, Aug. 1996.Google ScholarGoogle Scholar
  190. M. Ester, H.-P. Kriegel, and X. Xu. Knowledge discovery in large spatial databases: Focusing techniques for efficient class identification. In Proc. 1995 Int. Symp. Large Spatial Databases (SSD'95), pp. 67-82, Portland, ME, Aug. 1995. Google ScholarGoogle ScholarCross RefCross Ref
  191. C. Elkan. Boosting and naïve Bayesian learning. In Technical Report CS97-557, Dept. Computer Science and Engineering, University of California at San Diego, Sept. 1997.Google ScholarGoogle Scholar
  192. C. Elkan. The foundations of cost-sensitive learning. In Proc. 17th Intl. Joint Conf. Artificial Intelligence (IJCAI'01), pp. 973-978, Seattle, WA, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  193. R. Elmasri and S. B. Navathe. Fundamentals of Database Systems (6th ed.). Boston: Addison-Wesley, 2010. Google ScholarGoogle Scholar
  194. L. English. Improving Data Warehouse and Business Information Quality: Methods for Reducing Costs and Increasing Profits. John Wiley & Sons, 1999. Google ScholarGoogle Scholar
  195. A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In Proc. 2002 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'02), pp. 217-228, Edmonton, Alberta, Canada, July 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  196. B. Efron and R. Tibshirani. An Introduction to the Bootstrap. Chapman & Hall, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  197. R. A. Finkel and J. L. Bentley. Quad-trees: A data structure for retrieval on composite keys. ACTA Informatica, 4:1-9, 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  198. J. Friedman and E. P. Bogdan. Predictive learning via rule ensembles. Ann. Applied Statistics, 2:916-954, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  199. J. H. Friedman, J. L. Bentley, and R. A. Finkel. An algorithm for finding best matches in logarithmic expected time. ACM Transactions on Math Software, 3:209-226, 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  200. M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law relationships of the internet topology. In Proc. ACM SIGCOMM'99 Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 251-262, Cambridge, MA, Aug. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  201. M. Fishelson and D. Geiger. Exact genetic linkage computations for general pedigrees. Disinformation, 18:189-198, 2002.Google ScholarGoogle Scholar
  202. R. Fagin, R. V. Guha, R. Kumar, J. Novak, D. Sivakumar, and A. Tomkins. Multistructural databases. In Proc. 2005 ACM SIGMOD-SIGACT-SIGART Symp. Principles of Database Systems (PODS'05), pp. 184-195, Baltimore, MD, June 2005. Google ScholarGoogle Scholar
  203. U. Fayyad, G. Grinstein, and A. Wierse. Information Visualization in Data Mining and Knowledge Discovery. Morgan Kaufmann, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  204. E. Fix and J. L. Hodges Jr. Discriminatory analysis, non-parametric discrimination: Consistency properties. In Technical Report 21-49-004(4), USAF School of Aviation Medicine, Randolph Field, Texas, 1951.Google ScholarGoogle Scholar
  205. K. Fukunaga and D. Hummels. Bayes error estimation using Parzen and k-nn procedure. IEEE Trans. Pattern Analysis and Machine Learning, 9:634-643, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  206. Y. Fu and J. Han. Meta-rule-guided mining of association rules in relational databases. In Proc. 1995 Int. Workshop Integration of Knowledge Discovery with Deductive and Object-Oriented Databases (KDOOD'95), pp. 39-46, Singapore, Dec. 1995.Google ScholarGoogle Scholar
  207. U. M. Fayyad and K. B. Irani. What should be minimized in a decision tree? In Proc. 1990 Nat. Conf. Artificial Intelligence (AAAI'90), pp. 749-754, Boston, MA, 1990. Google ScholarGoogle Scholar
  208. U. M. Fayyad and K. B. Irani. The attribute selection problem in decision tree generation. In Proc. 1992 Nat. Conf. Artificial Intelligence (AAAI'92), pp. 104-110, San Jose, CA, 1992. Google ScholarGoogle Scholar
  209. U. Fayyad and K. Irani. Multi-interval discretization of continuous-valued attributes for classification learning. In Proc. 1993 Int. Joint Conf. Artificial Intelligence (IJCAI'93), pp. 1022-1029, Chambery, France, 1993.Google ScholarGoogle Scholar
  210. M. Fiedler. Algebraic connectivity of graphs. Czechoslovak Mathematical J., 23:298-305, 1973.Google ScholarGoogle Scholar
  211. S. Fahlman and C. Lebiere. The cascade-correlation learning algorithm. In Technical Report CMU-CS-90-100, Computer Sciences Department, Carnegie Mellon University, 1990.Google ScholarGoogle Scholar
  212. C. Faloutsos and K.-I. Lin. FastMap: A fast algorithm for indexing, data-mining and visualization of traditional and multimedia datasets. In Proc. 1995 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'95), pp. 163-174, San Jose, CA, May 1995. Google ScholarGoogle ScholarCross RefCross Ref
  213. R. Fletcher. Practical Methods of Optimization. John Wiley & Sons, 1987. Google ScholarGoogle Scholar
  214. T. Fukuda, Y. Morimoto, S. Morishita, and T. Tokuyama. Data mining using twodimensional optimized association rules: Scheme, algorithms, and visualization. In Proc. 1996 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'96), pp. 13-23, Montreal, Quebec, Canada, June 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  215. J. Friedman and B. E. Popescu. Predictive learning via rule ensembles. In Technical Report, Department of Statistics, Stanford University, 2005.Google ScholarGoogle Scholar
  216. D. Freedman, R. Pisani, and R. Purves. Statistics (4th ed.). W. W. Norton & Co., 2007.Google ScholarGoogle Scholar
  217. U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy (eds.). Advances in Knowledge Discovery and Data Mining. AAAI/MIT Press, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  218. T. Fawcett and F. Provost. Adaptive fraud detection. Data Mining and Knowledge Discovery, 1:291-316, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  219. C. Fraley and A. E. Raftery. Model-based clustering, discriminant analysis, and density estimation. J. American Statistical Association, 97:611-631, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  220. J. H. Friedman. A recursive partitioning decision rule for nonparametric classifiers. IEEE Trans. Computer, 26:404-408, 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  221. J. H. Friedman. Greedy function approximation: A gradient boosting machine. Ann. Statistics, 29:1189-1232, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  222. N. Friedman. Pcluster: Probabilistic agglomerative clustering of gene expression profiles. In Technical Report 2003-80, Hebrew University, 2003.Google ScholarGoogle Scholar
  223. C. Faloutsos, M. Ranganathan, and Y. Manolopoulos. Fast subsequence matching in time-series databases. In Proc. 1994 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'94), pp. 419-429, Minneapolis, MN, May 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  224. U. Fayyad and P. Smyth. Image database exploration: Progress and challenges. In Proc. AAAI'93 Workshop Knowledge Discovery in Databases (KDD'93), pp. 14-27, Washington, DC, July 1993.Google ScholarGoogle Scholar
  225. Y. Freund and R. E. Schapire. A decision-theoretic generalization of on-line learning and an application to boosting. J. Computer and System Sciences, 55:119-139, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  226. R. Feldman and J. Sanger. The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data. Cambridge University Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  227. M. Fang, N. Shivakumar, H. Garcia-Molina, R. Motwani, and J. D. Ullman. Computing iceberg queries efficiently. In Proc. 1998 Int. Conf. Very Large Data Bases (VLDB'98), pp. 299-310, New York, NY, Aug. 1998. Google ScholarGoogle Scholar
  228. J. Furnkranz and G. Widmer. Incremental reduced error pruning. In Proc. 1994 Int. Conf. Machine Learning (ICML'94), pp. 70-77, New Brunswick, NJ, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  229. B. C. M. Fung, K. Wang, A. W.-C. Fu, and P. S. Yu. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. Chapman & Hall/CRC, 2010. Google ScholarGoogle ScholarCross RefCross Ref
  230. R. Fujimaki, T. Yairi, and K. Machida. An approach to spacecraft anomaly detection problem using kernel feature space. In Proc. 2005 Int. Workshop Link Discovery (LinkKDD'05), pp. 401-410, Chicago, IL, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  231. S. I. Gallant. Neural Network Learning and Expert Systems. Cambridge, MA: MIT Press, 1993. Google ScholarGoogle Scholar
  232. B. Gates. Business @ the Speed of Thought: Succeeding in the Digital Economy. Warner Books, 2000. Google ScholarGoogle Scholar
  233. J. Gray, S. Chaudhuri, A. Bosworth, A. Layman, D. Reichart, M. Venkatrao, F. Pellow, and H. Pirahesh. Data cube: A relational aggregation operator generalizing group-by, cross-tab and sub-totals. Data Mining and Knowledge Discovery, 1:29-54, 1997. Google ScholarGoogle ScholarCross RefCross Ref
  234. L. Getoor, N. Friedman, D. Koller, and B. Taskar. Learning probabilistic models of relational structure. In Proc. 2001 Int. Conf. Machine Learning (ICML'01), pp. 170-177, Williamstown, MA, 2001. Google ScholarGoogle Scholar
  235. H. Galhardas, D. Florescu, D. Shasha, E. Simon, and C.-A. Saita. Declarative data cleaning: Language, model, and algorithms. In Proc. 2001 Int. Conf. Very Large Data Bases (VLDB'01), pp. 371-380, Rome, Italy, Sept. 2001. Google ScholarGoogle Scholar
  236. A. Gersho and R. M. Gray. Vector Quantization and Signal Compression. Kluwer Academic, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  237. V. Gaede and O. Günther. Multidimensional access methods. ACM Computing Surveys, 30:170-231, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  238. V. Ganti, J. E. Gehrke, and R. Ramakrishnan. CACTUS--clustering categorical data using summaries. In Proc. 1999 Int. Conf. Knowledge Discovery and Data Mining (KDD'99), pp. 73-83, San Diego, CA, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  239. J. Gehrke, V. Ganti, R. Ramakrishnan, and W.-Y. Loh. BOAT--optimistic decision tree construction. In Proc. 1999 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'99), pp. 169-180, Philadelphia, PA, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  240. H. Gonzalez, J. Han, and X. Li. Flowcube: Constructuing RFID flowcubes for multidimensional analysis of commodity flows. In Proc. 2006 Int. Conf. Very Large Data Bases (VLDB'06), pp. 834-845, Seoul, Korea, Sept. 2006. Google ScholarGoogle Scholar
  241. H. Gonzalez, J. Han, X. Li, and D. Klabjan. Warehousing and analysis of massive RFID data sets. In Proc. 2006 Int. Conf. Data Engineering (ICDE'06), p. 83, Atlanta, GA, Apr. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  242. R. L. Grossman, C. Kamath, P. Kegelmeyer, V. Kumar, and R. R. Namburu. Data Mining for Scientific and Engineering Applications. Kluwer Academic, 2001. Google ScholarGoogle ScholarCross RefCross Ref
  243. D. Gibson, J. M. Kleinberg, and P. Raghavan. Clustering categorical data: An approach based on dynamical systems. In Proc. 1998 Int. Conf. Very Large Data Bases (VLDB'98), pp. 311-323, New York, NY, Aug. 1998. Google ScholarGoogle Scholar
  244. A. Gupta and I. S. Mumick. Materialized Views: Techniques, Implementations, and Applications. Cambridge, MA: MIT Press, 1999. Google ScholarGoogle ScholarCross RefCross Ref
  245. S. Guha, N. Mishra, R. Motwani, and L. O'Callaghan. Clustering data streams. In Proc. 2000 Symp. Foundations of Computer Science (FOCS'00), pp. 359-366, Redondo Beach, CA, 2000. Google ScholarGoogle ScholarCross RefCross Ref
  246. J. Ginsberg, M. H. Mohebbi, R. S. Patel, L. Brammer, M. S. Smolinski, and L. Brilliant. Detecting influenza epidemics using search engine query data. Nature, 457:1012-1014, Feb. 2009.Google ScholarGoogle Scholar
  247. H. Garcia-Molina, J. D. Ullman, and J. Widom. Database Systems: The Complete Book (2nd ed.). Prentice Hall, 2008. Google ScholarGoogle Scholar
  248. I. Guyon, N. Matic, and V. Vapnik. Discoverying informative patterns and data cleaning. In U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy (eds.), Advances in Knowledge Discovery and Data Mining, pp. 181-203. AAAI/MIT Press, 1996. Google ScholarGoogle Scholar
  249. D. Goldberg. Genetic Algorithms in Search, Optimization, and Machine Learning. Reading, MA: Addison-Wesley, 1989. Google ScholarGoogle Scholar
  250. D. A. Grossman and O. Frieder. Information Retrieval: Algorithms and Heuristics. New York: Springer, 2004. Google ScholarGoogle Scholar
  251. P. D. Grunwald and J. Rissanen. The Minimum Description Length Principle. Cambridge, MA: MIT Press, 2007. Google ScholarGoogle Scholar
  252. J. Gehrke, R. Ramakrishnan, and V. Ganti. RainForest: A framework for fast decision tree construction of large datasets. In Proc. 1998 Int. Conf. Very Large Data Bases (VLDB'98), pp. 416-427, New York, NY, Aug. 1998. Google ScholarGoogle Scholar
  253. S. Guha, R. Rastogi, and K. Shim. CURE: An efficient clustering algorithm for large databases. In Proc. 1998 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'98), pp. 73-84, Seattle, WA, June 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  254. S. Guha, R. Rastogi, and K. Shim. ROCK: A robust clustering algorithm for categorical attributes. In Proc. 1999 Int. Conf. Data Engineering (ICDE'99), pp. 512-521, Sydney, Australia, Mar. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  255. F. E. Grubbs. Procedures for detecting outlying observations in samples. Technometrics, 11:1-21, 1969.Google ScholarGoogle Scholar
  256. H. Gupta. Selection of views to materialize in a data warehouse. In Proc. 7th Int. Conf. Database Theory (ICDT'97), pp. 98-112, Delphi, Greece, Jan. 1997. Google ScholarGoogle ScholarCross RefCross Ref
  257. A. Guttman. R-Tree: A dynamic index structure for spatial searching. In Proc. 1984 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'84), pp. 47-57, Boston, MA, June 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  258. R. C. Gonzalez and R. E. Woods. Digital Image Processing (3rd ed.). Prentice Hall, 2007. Google ScholarGoogle Scholar
  259. B. Goethals and M. Zaki. An introduction to workshop frequent itemset mining implementations. In Proc. ICDM'03 Int. Workshop Frequent Itemset Mining Implementations (FIMI'03), pp. 1-13, Melbourne, FL, Nov. 2003.Google ScholarGoogle Scholar
  260. G. Grahne and J. Zhu. Efficiently using prefix-trees in mining frequent itemsets. In Proc. ICDM'03 Int. Workshop on Frequent Itemset Mining Implementations (FIMI'03), Melbourne, FL, Nov. 2003.Google ScholarGoogle Scholar
  261. V. J. Hodge, and J. Austin. A survey of outlier detection methodologies. Artificial Intelligence Review, 22:85-126, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  262. J. M. Hellerstein, R. Avnur, A. Chou, C. Hidber, C. Olston, V. Raman, T. Roth, and P. J. Haas. Interactive data analysis: The control project. IEEE Computer, 32:51-59, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  263. J. Hamilton. Time Series Analysis. Princeton University Press, 1994.Google ScholarGoogle Scholar
  264. J. Han. Towards on-line analytical mining in large databases. SIGMOD Record, 27:97-107, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  265. P. E. Hart. The condensed nearest neighbor rule. IEEE Trans. Information Theory, 14:515-516, 1968. Google ScholarGoogle ScholarDigital LibraryDigital Library
  266. J. Hartigan. Direct clustering of a data matrix. J. American Stat. Assoc., 67:123-129, 1972.Google ScholarGoogle ScholarCross RefCross Ref
  267. J. A. Hartigan. Clustering Algorithms. John Wiley & Sons, 1975. Google ScholarGoogle Scholar
  268. S. S. Haykin. Neural Networks: A Comprehensive Foundation. Prentice-Hall, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  269. S. Haykin. Neural Networks and Learning Machines. Prentice-Hall, 2008.Google ScholarGoogle Scholar
  270. S. J. Hanson and D. J. Burr. Minkowski-r back-propagation: Learning in connectionist models with non-euclidian error signals. In Neural Information Proc. Systems Conf., pp. 348-357, Denver, CO, 1987.Google ScholarGoogle Scholar
  271. M. Halkidi, Y. Batistakis, and M. Vazirgiannis. On clustering validation techniques. J. Intelligent Information Systems, 17:107-145, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  272. J. Han, Y. Cai, and N. Cercone. Data-driven discovery of quantitative rules in relational databases. IEEE Trans. Knowledge and Data Engineering, 5:29-40, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  273. L. B. Holder, D. J. Cook, and S. Djoko. Substructure discovery in the subdue system. In Proc. AAAI'94 Workshop on Knowledge Discovery in Databases (KDD'94), pp. 169-180, Seattle, WA, July 1994.Google ScholarGoogle Scholar
  274. D. Heckerman. Bayesian networks for knowledge discovery. In U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy (eds.), Advances in Knowledge Discovery and Data Mining, pp. 273-305. Cambridge, MA: MIT Press, 1996. Google ScholarGoogle Scholar
  275. J. Han and Y. Fu. Dynamic generation and refinement of concept hierarchies for knowledge discovery in databases. In Proc. AAAI'94 Workshop Knowledge Discovery in Databases (KDD'94), pp. 157-168, Seattle, WA, July 1994.Google ScholarGoogle Scholar
  276. J. Han and Y. Fu. Discovery of multiple-level association rules from large databases. In Proc. 1995 Int. Conf. Very Large Data Bases (VLDB'95), pp. 420-431, Zurich, Switzerland, Sept. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  277. J. Han and Y. Fu. Exploration of the power of attribute-oriented induction in data mining. In U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy (eds.), Advances in Knowledge Discovery and Data Mining, pp. 399-421. AAAI/MIT Press, 1996. Google ScholarGoogle Scholar
  278. P. S. Horn, L. Feng, Y. Li, and A. J. Pesce. Effect of outliers and nonhealthy individuals on reference interval estimation. Clinical Chemistry, 47:2137-2145, 2001.Google ScholarGoogle Scholar
  279. K. A. Heller and Z. Ghahramani. Bayesian hierarchical clustering. In Proc. 22nd Int. Conf. Machine Learning (ICML'05), pp. 297-304, Bonn, Germany, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  280. A. Hinneburg and H.-H. Gabriel. DENCLUE 2.0: Fast clustering based on kernel density estimation. In Proc. 2007 Int. Conf. Intelligent Data Analysis (IDA'07), pp. 70-80, Ljubljana, Slovenia, 2007. Google ScholarGoogle Scholar
  281. D. Heckerman, D. Geiger, and D. M. Chickering. Learning Bayesian networks: The combination of knowledge and statistical data. Machine Learning, 20:197-243, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  282. R. J. Hilderman and H. J. Hamilton. Knowledge Discovery and Measures of Interest. Kluwer Academic, 2001. Google ScholarGoogle ScholarCross RefCross Ref
  283. J. Hellerstein, P. Haas, and H. Wang. Online aggregation. In Proc. 1997 ACMSIGMOD Int. Conf. Management of Data (SIGMOD'97), pp. 171-182, Tucson, AZ, May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  284. R. C. Higgins. Analysis for Financial Management with S&P Bind-In Card. Irwin/ McGraw-Hill, 2008.Google ScholarGoogle Scholar
  285. P. Hoschka and W. Klösgen. A support system for interpreting statistical data. In G. Piatetsky-Shapiro and W. J. Frawley (eds.), Knowledge Discovery in Databases, pp. 325-346. AAAI/MIT Press, 1991.Google ScholarGoogle Scholar
  286. A. Hinneburg and D. A. Keim. An efficient approach to clustering in large multimedia databases with noise. In Proc. 1998 Int. Conf. Knowledge Discovery and Data Mining (KDD'98), pp. 58-65, New York, NY, Aug. 1998.Google ScholarGoogle Scholar
  287. M. Hadjieleftheriou, G. Kollios, D. Gunopulos, and V. J. Tsotras. Online discovery of dense areas in spatio-temporal databases. In Proc. 2003 Int. Symp. Spatial and Temporal Databases (SSTD'03), pp. 306-324, Santorini Island, Greece, July 2003.Google ScholarGoogle Scholar
  288. F. Höppner, F. Klawonn, R. Kruse, and T. Runkler. Fuzzy Cluster Analysis: Methods for Classification, Data Analysis and Image Recognition. Wiley, 1999.Google ScholarGoogle Scholar
  289. J. Hertz, A. Krogh, and R. G. Palmer. Introduction to the Theory of Neural Computation. Reading, MA: Addison-Wesley, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  290. W. Hsu, M. L. Lee, and J. Wang. Temporal and Spatio-Temporal Data Mining. IGI Publishing, 2007. Google ScholarGoogle Scholar
  291. W. Hsu, M. L. Lee, and J. Zhang. Image mining: Trends and developments. J. Intelligent Information Systems, 19:7-23, 2002. Google ScholarGoogle ScholarCross RefCross Ref
  292. J. Hong, I. Mozetic, and R. S. Michalski. Incremental learning of attribute-based descriptions from examples, the method and user's guide. In Report ISG 85-5, UIUCDCS-F-86-949, Department of Computer Science, University of Illinois at Urbana-Champaign, 1986.Google ScholarGoogle Scholar
  293. E. B. Hunt, J. Marin, and P. T. Stone. Experiments in Induction. Academic Press, 1966.Google ScholarGoogle Scholar
  294. D. J. Hand, H. Mannila, and P. Smyth. Principles of Data Mining (Adaptive Computation and Machine Learning). Cambridge, MA: MIT Press, 2001. Google ScholarGoogle Scholar
  295. R. Hecht-Nielsen. Neurocomputing. Reading, MA: Addison-Wesley, 1990. Google ScholarGoogle Scholar
  296. R. Horak. Telecommunications and Data Communications Handbook (2nd ed.). Wiley-Interscience, 2008. Google ScholarGoogle Scholar
  297. M. Hua and J. Pei. Cleaning disguised missing data: A heuristic approach. In Proc. 2007 ACM SIGKDD Intl. Conf. Knowledge Discovery and Data Mining (KDD'07), pp. 950-958, San Jose, CA, Aug. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  298. J. Han, J. Pei, G. Dong, and K. Wang. Efficient computation of iceberg cubes with complex measures. In Proc. 2001 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'01), pp. 1-12, Santa Barbara, CA, May 2001. Google ScholarGoogle ScholarCross RefCross Ref
  299. J. Hosking, E. Pednault, and M. Sudan. A statistical perspective on data mining. Future Generation Computer Systems, 13:117-134, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  300. J. Han, J. Pei, and Y. Yin. Mining frequent patterns without candidate generation. In Proc. 2000 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'00), pp. 1-12, Dallas, TX, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  301. M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentiallyprivate queries through consistency. In Proc. 2010 Int. Conf. Very Large Data Bases (VLDB'10), pp. 1021-1032, Singapore, Sept. 2010. Google ScholarGoogle Scholar
  302. V. Harinarayan, A. Rajaraman, and J. D. Ullman. Implementing data cubes efficiently. In Proc. 1996 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'96), pp. 205-216, Montreal, Quebec, Canada, June 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  303. J. M. Hellerstein and M. Stonebraker. Readings in Database Systems (4th ed.). Cambridge, MA: MIT Press, 2005. Google ScholarGoogle Scholar
  304. S. A. Harp, T. Samad, and A. Guha. Designing application-specific neural networks using the genetic algorithm. In D. S. Touretzky (ed.), Advances in Neural Information Processing Systems II, pp. 447-454. Morgan Kaufmann, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  305. T. Hastie and R. Tibshirani. Classification by pairwise coupling. Ann. Statistics, 26:451- 471, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  306. T. Hastie, R. Tibshirani, and J. Friedman. The Elements of Statistical Learning: Data Mining, Inference, and Prediction (2nd ed.). Springer Verlag, 2009.Google ScholarGoogle Scholar
  307. Z. Huang. Extensions to the k-means algorithm for clustering large data sets with categorical values. Data Mining and Knowledge Discovery, 2:283-304, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  308. C. H. Huberty. Applied Discriminant Analysis. Wiley-Interscience, 1994.Google ScholarGoogle Scholar
  309. B. B. Hubbard. The World According to Wavelets. A. K. Peters, 1996. Google ScholarGoogle Scholar
  310. J. Huan, W. Wang, D. Bandyopadhyay, J. Snoeyink, J. Prins, and A. Tropsha. Mining spatial motifs from protein structure graphs. In Proc. 8th Int. Conf. Research in Computational Molecular Biology (RECOMB), pp. 308-315, San Diego, CA, Mar. 2004. Google ScholarGoogle Scholar
  311. Z. He, X. Xu, and S. Deng. Discovering cluster-based local outliers. Pattern Recognition Lett., 24:1641-1650, June, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  312. C. Imhoff, N. Galemmo, and J. G. Geiger. Mastering Data Warehouse Design: Relational and Dimensional Techniques. John Wiley & Sons, 2003. Google ScholarGoogle Scholar
  313. T. Imielinski, L. Khachiyan, and A. Abdulghani. Cubegrades: Generalizing association rules. Data Mining and Knowledge Discovery, 6:219-258, 2002. Google ScholarGoogle ScholarCross RefCross Ref
  314. T. Imielinski and H. Mannila. A database perspective on knowledge discovery. Communications of the ACM, 39:58-64, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  315. W. H. Inmon. Building the Data Warehouse. John Wiley & Sons, 1996. Google ScholarGoogle Scholar
  316. A. Inokuchi, T. Washio, and H. Motoda. An apriori-based algorithm for mining frequent substructures from graph data. In Proc. 2000 European Symp. Principles of Data Mining and Knowledge Discovery (PKDD'00), pp. 13-23, Lyon, France, Sept. 1998. Google ScholarGoogle Scholar
  317. R. Jacobs. Increased rates of convergence through learning rate adaptation. Neural Networks, 1:295-307, 1988.Google ScholarGoogle ScholarCross RefCross Ref
  318. A. K. Jain. Data clustering: 50 years beyond k-means. Pattern Recognition Lett., 31(8):651-666, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  319. M. James. Classification Algorithms. John Wiley & Sons, 1985. Google ScholarGoogle Scholar
  320. X. Ji, J. Bailey, and G. Dong. Mining minimal distinguishing subsequence patterns with gap constraints. In Proc. 2005 Int. Conf. Data Mining (ICDM'05), pp. 194-201, Houston, TX, Nov. 2005. Google ScholarGoogle Scholar
  321. A. K. Jain and R. C. Dubes. Algorithms for Clustering Data. Prentice-Hall, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  322. F. V. Jensen. An Introduction to Bayesian Networks. Springer Verlag, 1996. Google ScholarGoogle Scholar
  323. G. H. John and P. Langley. Static versus dynamic sampling for data mining. In Proc. 1996 Int. Conf. Knowledge Discovery and Data Mining (KDD'96), pp. 367-370, Portland, OR, Aug. 1996.Google ScholarGoogle Scholar
  324. A. K. Jain, M. N. Murty, and P. J. Flynn. Data clustering: A survey. ACM Computing Surveys, 31:264-323, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  325. G. H. John. Enhancements to the Data Mining Process. Ph. D. Thesis, Computer Science Department, Stanford University, 1997. Google ScholarGoogle Scholar
  326. G. H. John. Behind-the-scenes data mining: A report on the KDD-98 panel. SIGKDD Explorations, 1:6-8, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  327. N. C. Jones and P. A. Pevzner. An Introduction to Bioinformatics Algorithms. Cambridge, MA: MIT Press, 2004.Google ScholarGoogle Scholar
  328. M. Ji, Y. Sun, M. Danilevsky, J. Han, and J. Gao. Graph regularized transductive classification on heterogeneous information networks. In Proc. 2010 European Conf. Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD'10), pp. 570-586, Barcelona, Spain, Sept. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  329. W. Jin, K. H. Tung, and J. Han. Mining top-n local outliers in large databases. In Proc. 2001 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'01), pp. 293-298, San Fransisco, CA, Aug. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  330. W. Jin, A. K. H. Tung, J. Han, and W. Wang. Ranking outliers using symmetric neighborhood relationship. In Proc. 2006 Pacific-Asia Conf. Knowledge Discovery and Data Mining (PAKDD'06), Singapore, Apr. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  331. R. A. Johnson and D. A. Wichern. Applied Multivariate Statistical Analysis (3rd ed.). Prentice-Hall, 1992.Google ScholarGoogle Scholar
  332. G. Jeh and J. Widom. SimRank: A measure of structural-context similarity. In Proc. 2002 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'02), pp. 538-543, Edmonton, Alberta, Canada, July 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  333. R. A. Johnson and D. A. Wichern. Applied Multivariate Statistical Analysis (5th ed.). Prentice Hall, 2002.Google ScholarGoogle Scholar
  334. C. Kamath. Scientific Data Mining: A Practical Perspective. Society for Industrial and Applied Mathematic (SIAM), 2009. Google ScholarGoogle ScholarCross RefCross Ref
  335. G. V. Kass. An exploratory technique for investigating large quantities of categorical data. Applied Statistics, 29:119-127, 1980.Google ScholarGoogle Scholar
  336. B. Kulis, S. Basu, I. Dhillon, and R. Mooney. Semi-supervised graph clustering: A kernel approach. Machine Learning, 74:1-22, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  337. V. Kecman. Learning and Soft Computing. Cambridge, MA: MIT Press, 2001. Google ScholarGoogle Scholar
  338. D. A. Keim. Visual techniques for exploring databases. In Tutorial Notes, 3rd Int. Conf. Knowledge Discovery and Data Mining (KDD'97), Newport Beach, CA, Aug. 1997.Google ScholarGoogle Scholar
  339. R. Kerber. ChiMerge: Discretization of numeric attributes. In Proc. 1992 Nat. Conf. Artificial Intelligence (AAAI'92), pp. 123-128, San Jose, CA, 1992. Google ScholarGoogle Scholar
  340. D. Koller and N. Friedman. Probabilistic Graphical Models: Principles and Techniques. Cambridge, MA: MIT Press, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  341. K. Koperski and J. Han. Discovery of spatial association rules in geographic information databases. In Proc. 1995 Int. Symp. Large Spatial Databases (SSD'95), pp. 47-66, Portland, ME, Aug. 1995. Google ScholarGoogle ScholarCross RefCross Ref
  342. I. Kononenko and S. J. Hong. Attribute selection for modeling. Future Generation Computer Systems, 13:181-195, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  343. M.-S. Kim and J. Han. A particle-and-density based evolutionary clustering method for dynamic networks. In Proc. 2009 Int. Conf. Very Large Data Bases (VLDB'09), Lyon, France, Aug. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  344. M. Kamber, J. Han, and J. Y. Chiang. Metarule-guided mining of multi-dimensional association rules using data cubes. In Proc. 1997 Int. Conf. Knowledge Discovery and Data Mining (KDD'97), pp. 207-210, Newport Beach, CA, Aug. 1997.Google ScholarGoogle Scholar
  345. G. Karypis, E.-H. Han, and V. Kumar. CHAMELEON: A hierarchical clustering algorithm using dynamic modeling. COMPUTER, 32:68-75, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  346. H. Kargupta, J. Han, P. S. Yu, R. Motwani, and V. Kumar. Next Generation of Data Mining. Chapman & Hall/CRC, 2008. Google ScholarGoogle ScholarCross RefCross Ref
  347. R. Kohavi and G. H. John. Wrappers for feature subset selection. Artificial Intelligence, 97:273-324, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  348. H. Kargupta, A. Joshi, K. Sivakumar, and Y. Yesha. Data Mining: Next Generation Challenges and Future Directions. Cambridge, MA: AAAI/MIT Press, 2004. Google ScholarGoogle Scholar
  349. M. Kuramochi and G. Karypis. Frequent subgraph discovery. In Proc. 2001 Int. Conf. Data Mining (ICDM'01), pp. 313-320, San Jose, CA, Nov. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  350. H. S. Kim, S. Kim, T. Weninger, J. Han, and T. Abdelzaher. NDPMine: Efficiently mining discriminative numerical features for pattern-based classification. In Proc. 2010 European Conf. Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD'10), Barcelona, Spain, Sept. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  351. H.-P. Kriegel, P. Kroeger, and A. Zimek. Clustering high-dimensional data: A survey on subspace clustering, pattern-based clustering, and correlation clustering. ACM Trans. Knowledge Discovery from Data (TKDD), 3(1):1-58, 2009. Google ScholarGoogle Scholar
  352. M. Khan, H. Le, H. Ahmadi, T. Abdelzaher, and J. Han. DustMiner: Troubleshooting interactive complexity bugs in sensor networks. In Proc. 2008 ACM Int. Conf. Embedded Networked Sensor Systems (SenSys'08), pp. 99-112, Raleigh, NC, Nov. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  353. J. M. Kleinberg. Authoritative sources in a hyperlinked environment. J. ACM, 46: 604-632, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  354. R. L. Kennedy, Y. Lee, B. Van Roy, C. D. Reed, and R. P. Lippman. Solving Data Mining Problems Through Pattern Recognition. Prentice-Hall, 1998.Google ScholarGoogle Scholar
  355. Y. Kodratoff and R. S. Michalski. Machine Learning, An Artificial Intelligence Approach, Vol. 3. Morgan Kaufmann, 1990. Google ScholarGoogle Scholar
  356. J. Kivinen and H. Mannila. The power of sampling in knowledge discovery. In Proc. 13th ACM Symp. Principles of Database Systems, pp. 77-85, Minneapolis, MN, May 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  357. T. Kanungo, D. M. Mount, N. S. Netanyahu, C. D. Piatko, R. Silverman, and A. Y. Wu. An efficient k-means clustering algorithm: Analysis and implementation. IEEE Trans. Pattern Analysis and Machine Intelligence (PAMI), 24:881-892, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  358. M. Klemettinen, H. Mannila, P. Ronkainen, H. Toivonen, and A. I. Verkamo. Finding interesting rules from large sets of discovered association rules. In Proc. 3rd Int. Conf. Information and Knowledge Management, pp. 401-408, Gaithersburg, MD, Nov. 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  359. J. Kubica, A. Moore, and J. Schneider. Tractable group detection on large link data sets. In Proc. 2003 Int. Conf. Data Mining (ICDM'03), pp. 573-576, Melbourne, FL, Nov. 2003. Google ScholarGoogle ScholarCross RefCross Ref
  360. E. Knorr and R. Ng. A unified notion of outliers: Properties and computation. In Proc. 1997 Int. Conf. Knowledge Discovery and Data Mining (KDD'97), pp. 219-222, Newport Beach, CA, Aug. 1997.Google ScholarGoogle Scholar
  361. M. H. Kutner, C. J. Nachtsheim, J. Neter, and W. Li. Applied Linear Statistical Models with Student CD. Irwin, 2004.Google ScholarGoogle Scholar
  362. E. M. Knorr, R. T. Ng, and V. Tucakov. Distance-based outliers: Algorithms and applications. The VLDB J., 8:237-253, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  363. R. Kohavi. A study of cross-validation and bootstrap for accuracy estimation and model selection. In Proc. 14th Joint Int. Conf. Artificial Intelligence (IJCAI'95), Vol. 2, pp. 1137- 1143, Montreal, Quebec, Canada, Aug. 1995. Google ScholarGoogle Scholar
  364. J. L. Kolodner. Case-Based Reasoning. Morgan Kaufmann, 1993. Google ScholarGoogle Scholar
  365. I. Kononenko. On biases in estimating multi-valued attributes. In Proc. 14th Joint Int. Conf. Artificial Intelligence (IJCAI'95), Vol. 2, pp. 1034-1040, Montreal, Quebec, Canada, Aug. 1995. Google ScholarGoogle Scholar
  366. P. Koton. Reasoning about evidence in causal explanation. In Proc. 7th Nat. Conf. Artificial Intelligence (AAAI'88), pp. 256-263, St. Paul, MN, Aug. 1988.Google ScholarGoogle Scholar
  367. J. M. Kleinberg, C. Papadimitriou, and P. Raghavan. A microeconomic view of data mining. Data Mining and Knowledge Discovery, 2:311-324, 1998. Google ScholarGoogle ScholarCross RefCross Ref
  368. R. M. Karp, C. H. Papadimitriou, and S. Shenker. A simple algorithm for finding frequent elements in streams and bags. ACM Trans. Database Systems, 28:51-55, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  369. L. Kaufman and P. J. Rousseeuw. Finding Groups in Data: An Introduction to Cluster Analysis. John Wiley & Sons, 1990.Google ScholarGoogle Scholar
  370. R. Kimball and M. Ross. The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling (2nd ed.). John Wiley & Sons, 2002. Google ScholarGoogle Scholar
  371. D. Krane and R. Raymer. Fundamental Concepts of Bioinformatics. Benjamin Cummings, 2003.Google ScholarGoogle Scholar
  372. V. Krebs. Mapping networks of terrorist cells. Connections, 24:43-52 (Winter), 2002.Google ScholarGoogle Scholar
  373. R. Kumar, P. Raghavan, S. Rajagopalan, D. Sivakumar, A. Tomkins, and E. Upfal. Stochastic models for the web graph. In Proc. 2000 IEEE Symp. Foundations of Computer Science (FOCS'00), pp. 57-65, Redondo Beach, CA, Nov. 2000. Google ScholarGoogle ScholarCross RefCross Ref
  374. R. Kimball, M. Ross, W. Thornthwaite, and J. Mundy. The Data Warehouse Lifecycle Toolkit. Hoboken, NJ: John Wiley & Sons, 2008. Google ScholarGoogle Scholar
  375. H.-P. Kriegel, M. Schubert, and A. Zimek. Angle-based outlier detection in highdimensional data. In Proc. 2008 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'08), pp. 444-452, Las Vegas, NV, Aug. 2008. Google ScholarGoogle Scholar
  376. J. M. Kleinberg and A. Tomkins. Application of linear algebra in information retrieval and hypertext analysis. In Proc. 18th ACM Symp. Principles of Database Systems (PODS'99), pp. 185-193, Philadelphia, PA, May 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  377. I. Korf, M. Yandell, and J. Bedell. BLAST. Sebastopol, CA: O'Reilly Media, 2003. Google ScholarGoogle Scholar
  378. W. Lam. Bayesian network refinement via machine learning approach. IEEE Trans. Pattern Analysis and Machine Intelligence, 20:240-252, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  379. S. L. Lauritzen. The EM algorithm for graphical association models with missing data. Computational Statistics and Data Analysis, 19:191-201, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  380. D. Lo, H. Cheng, J. Han, S. Khoo, and C. Sun. Classification of software behaviors for failure detection: A discriminative pattern mining approach. In Proc. 2009 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'09), pp. 557-566, Paris, France, June 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  381. C. X. Lin, B. Ding, J. Han, F. Zhu, and B. Zhao. Text cube: Computing IR measures for multidimensional text database analysis. In Proc. 2008 Int. Conf. Data Mining (ICDM'08), pp. 905-910, Pisa, Italy, Dec. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  382. Z. Li, B. Ding, J. Han, R. Kays, and P. Nye. Mining periodic behaviors for moving objects. In Proc. 2010 ACM SIGKDD Conf. Knowledge Discovery and Data Mining (KDD'10), pp. 1099-1108, Washington, DC, July 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  383. J. Li, G. Dong, and K. Ramamohanrarao. Making use of the most expressive jumping emerging patterns for classification. In Proc. 2000 Pacific-Asia Conf. Knowledge Discovery and Data Mining (PAKDD'00), pp. 220-232, Kyoto, Japan, Apr. 2000. Google ScholarGoogle ScholarCross RefCross Ref
  384. Y. Le Cun, J. S. Denker, and S. A. Solla. Optimal brain damage. In D. Touretzky (ed.), Advances in Neural Information Processing Systems. Morgan Kaufmann, 1990. Google ScholarGoogle Scholar
  385. D. B. Leake. CBR in context: The present and future. In D. B. Leake (ed.), Cased-Based Reasoning: Experiences, Lessons, and Future Directions, pp. 3-30. AAAI Press, 1996.Google ScholarGoogle Scholar
  386. S. Lawrence, C. L. Giles, and A. C. Tsoi. Symbolic conversion, grammatical inference and rule extraction for foreign exchange rate prediction. In Y. Abu-Mostafa, A. S. Weigend, and P. N. Refenes (eds.), Neural Networks in the Capital Markets. London: World Scientific, 1997.Google ScholarGoogle Scholar
  387. B. Liu, W. Hsu, and S. Chen. Using general impressions to analyze discovered classification rules. In Proc. 1997 Int. Conf. Knowledge Discovery and Data Mining (KDD'97), pp. 31-36, Newport Beach, CA, Aug. 1997.Google ScholarGoogle Scholar
  388. H. Lu, J. Han, and L. Feng. Stock movement and n-dimensional inter-transaction association rules. In Proc. 1998 SIGMOD Workshop Research Issues on Data Mining and Knowledge Discovery (DMKD'98), pp. 12:1-12:7, Seattle, WA, June 1998.Google ScholarGoogle Scholar
  389. X. Li, J. Han, and H. Gonzalez. High-dimensional OLAP: A minimal cubing approach. In Proc. 2004 Int. Conf. Very Large Data Bases (VLDB'04), pp. 528-539, Toronto, Ontario, Canada, Aug. 2004. Google ScholarGoogle Scholar
  390. X. Li, J. Han, S. Kim, and H. Gonzalez. Roam: Rule- and motif-based anomaly detection in massive moving object data sets. In Proc. 2007 SIAM Int. Conf. Data Mining (SDM'07), Minneapolis, MN, Apr. 2007.Google ScholarGoogle ScholarCross RefCross Ref
  391. B. Liu, W. Hsu, and Y. Ma. Integrating classification and association rule mining. In Proc. 1998 Int. Conf. Knowledge Discovery and Data Mining (KDD'98), pp. 80-86, New York, Aug. 1998.Google ScholarGoogle Scholar
  392. W. Li, J. Han, and J. Pei. CMAR: Accurate and efficient classification based on multiple class-association rules. In Proc. 2001 Int. Conf. Data Mining (ICDM'01), pp. 369-376, San Jose, CA, Nov. 2001. Google ScholarGoogle Scholar
  393. H. Liu, F. Hussain, C. L. Tan, and M. Dash. Discretization: An enabling technique. Data Mining and Knowledge Discovery, 6:393-423, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  394. J.-G. Lee, J. Han, and K. Whang. Clustering trajectory data. In Proc. 2007 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'07), Beijing, China, June 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  395. H. Liu, J. Han, D. Xin, and Z. Shao. Mining frequent patterns on very high dimensional data: A top-down row enumeration approach. In Proc. 2006 SIAM Int. Conf. Data Mining (SDM'06), Bethesda, MD, Apr. 2006.Google ScholarGoogle ScholarCross RefCross Ref
  396. X. Li, J. Han, Z. Yin, J.-G. Lee, and Y. Sun. Sampling Cube: A framework for statistical OLAP over sampling data. In Proc. 2008 ACM SIGMOD Int. Conf. Management of Data (SIGMOD'08), pp. 779-790, Vancouver, British Columbia, Canada, June 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  397. B. Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data. New York: Springer, 2006. Google ScholarGoogle Scholar
  398. J. Laurikkala, M. Juhola, and E. Kentala. Informal identification of outliers in medical data. In Proc. 5th Int. Workshop on Intelligent Data Analysis in Medicine and Pharmacology, Berlin, Germany, Aug. 2000.Google ScholarGoogle Scholar
  399. Y.-K. Lee, W.-Y. Kim, Y. D. Cai, and J. Han. CoMine: Efficient mining of correlated patterns. In Proc. 2003 Int. Conf. Data Mining (ICDM'03), pp. 581-584, Melbourne, FL, Nov. 2003. Google ScholarGoogle ScholarCross RefCross Ref
  400. J. Leskovec, J. Kleinberg, and C. Faloutsos. Graphs over time: Densification laws, shrinking diameters and possible explanations. In Proc. 2005 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'05), pp. 177-187, Chicago, IL, Aug. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  401. G. Liu, H. Lu, W. Lou, and J. X. Yu. On computing, storing and querying frequent patterns. In Proc. 2003 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'03), pp. 607-612, Washington, DC, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  402. Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A tool for finding copy-paste and related bugs in operating system code. In Proc. 2004 Symp. Operating Systems Design and Implementation (OSDI'04), pp. 20-22, San Francisco, CA, Dec. 2004. Google ScholarGoogle Scholar
  403. S. P. Lloyd. Least squares quantization in PCM. IEEE Trans. Information Theory, 28:128-137, 1982 (original version: Technical Report, Bell Labs, 1957). Google ScholarGoogle ScholarDigital LibraryDigital Library
  404. T.-S. Lim, W.-Y. Loh, and Y.-S. Shih. A comparison of prediction accuracy, complexity, and training time of thirty-three old and new classification algorithms. Machine Learning, 40:203-228, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  405. K. Laskey and S. Mahoney. Network fragments: Representing knowledge for constructing probabilistic models. In Proc. 13th Annual Conf. Uncertainty in Artificial Intelligence, pp. 334-341, San Francisco, CA, Aug. 1997. Google ScholarGoogle Scholar
  406. H. Liu and H. Motoda. Feature Selection for Knowledge Discovery and Data Mining. Kluwer Academic, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  407. H. Liu and H. Motoda (eds.). Feature Extraction, Construction, and Selection: A Data Mining Perspective. Kluwer Academic, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  408. L. V. S. Lakshmanan, R. Ng, J. Han, and A. Pang. Optimization of constrained frequent set queries with 2-variable constraints. In Proc. 1999 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'99), pp. 157-168, Philadelphia, PA, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  409. D. Liben-Nowell and J. Kleinberg. The link prediction problem for social networks. In Proc. 2003 Int. Conf. Information and Knowledge Management (CIKM'03), pp. 556-559, New Orleans, LA, Nov. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  410. D. Loshin. Enterprise Knowledge Management: The Data Quality Approach. Morgan Kaufmann, 2001. Google ScholarGoogle Scholar
  411. A. Lenarcik and Z. Piasta. Probabilistic rough classifiers with mixture of discrete and continuous variables. In T. Y. Lin and N. Cercone (eds.), Rough Sets and Data Mining: Analysis for Imprecise Data, pp. 373-383, Kluwer Academic, 1997.Google ScholarGoogle ScholarCross RefCross Ref
  412. L. V. S. Lakshmanan, J. Pei, and J. Han. Quotient cube: How to summarize the semantics of a data cube. In Proc. 2002 Int. Conf. Very Large Data Bases (VLDB'02), pp. 778-789, Hong Kong, China, Aug. 2002. Google ScholarGoogle Scholar
  413. J. Liu, Y. Pan, K. Wang, and J. Han. Mining frequent itemsets by opportunistic projection. In Proc. 2002 ACMSIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'02), pp. 239-248, Edmonton, Alberta, Canada, July 2002. Google ScholarGoogle Scholar
  414. L. V. S. Lakshmanan, J. Pei, and Y. Zhao. QC-Trees: An efficient summary structure for semantic OLAP. In Proc. 2003 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'03), pp. 64-75, San Diego, CA, June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  415. H. Liu and R. Setiono. Chi2: Feature selection and discretization of numeric attributes. In Proc. 1995 IEEE Int. Conf. Tools with AI (ICTAI'95), pp. 388-391, Washington, DC, Nov. 1995. Google ScholarGoogle Scholar
  416. W. Y. Loh and Y. S. Shih. Split selection methods for classification trees. Statistica Sinica, 7:815-840, 1997.Google ScholarGoogle Scholar
  417. P. Langley, H. A. Simon, G. L. Bradshaw, and J. M. Zytkow. Scientific Discovery: Computational Explorations of the Creative Processes. Cambridge, MA: MIT Press, 1987. Google ScholarGoogle Scholar
  418. H. Lu, R. Setiono, and H. Liu. Neurorule: A connectionist approach to data mining. In Proc. 1995 Int. Conf. Very Large Data Bases (VLDB'95), pp. 478-489, Zurich, Switzerland, Sept. 1995. Google ScholarGoogle Scholar
  419. B. Lent, A. Swami, and J. Widom. Clustering association rules. In Proc. 1997 Int. Conf. Data Engineering (ICDE'97), pp. 220-231, Birmingham, England, Apr. 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  420. U. Luxburg. A tutorial on spectral clustering. Statistics and Computing, 17:395-416, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  421. W. Y. Loh and N. Vanichsetakul. Tree-structured classificaiton via generalized discriminant analysis. J. American Statistical Association, 83:715-728, 1988.Google ScholarGoogle ScholarCross RefCross Ref
  422. Z. Li and Y. Zhou. PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code. In Proc. 2005 ACM SIGSOFT Symp. Foundations of Software Engineering (FSE'05), Lisbon, Portugal, Sept. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  423. S. Mitra and T. Acharya. Data Mining: Multimedia, Soft Computing, and Bioinformatics. John Wiley & Sons, 2003. Google ScholarGoogle Scholar
  424. A. Metwally, D. Agrawal, and A. El Abbadi. Efficient computation of frequent and top-k elements in data streams. In Proc. 2005 Int. Conf. Database Theory (ICDT'05), pp. 398-412, Edinburgh, Scotland, Jan. 2005. Google ScholarGoogle Scholar
  425. J. MacQueen. Some methods for classification and analysis of multivariate observations. In Proc. 5th Berkeley Symp. Math. Stat. Prob., 1:281-297, Berkeley, CA, 1967.Google ScholarGoogle Scholar
  426. J. Magidson. The CHAID approach to segmentation modeling: CHI-squared automatic interaction detection. In R. P. Bagozzi (ed.), Advanced Methods of Marketing Research, pp. 118-159. Blackwell Business, 1994.Google ScholarGoogle Scholar
  427. H. Mannila. Theoretical frameworks of data mining. SIGKDD Explorations, 1:30-32, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  428. M. Mehta, R. Agrawal, and J. Rissanen. SLIQ: A fast scalable classifier for data mining. In Proc. 1996 Int. Conf. Extending Database Technology (EDBT'96), pp. 18-32, Avignon, France, Mar. 1996. Google ScholarGoogle ScholarCross RefCross Ref
  429. S. Marsland. Machine Learning: An Algorithmic Perspective. Chapman &Hall/CRC, 2009. Google ScholarGoogle Scholar
  430. G. J. McLachlan and K. E. Basford. Mixture Models: Inference and Applications to Clustering. John Wiley & Sons, 1988.Google ScholarGoogle Scholar
  431. M. V. Mahoney and P. K. Chan. Learning rules for anomaly detection of hostile network traffic. In Proc. 2003 Int. Conf. Data Mining (ICDM'03), Melbourne, FL, Nov. 2003. Google ScholarGoogle ScholarCross RefCross Ref
  432. N. Mamoulis, H. Cao, G. Kollios, M. Hadjieleftheriou, Y. Tao, and D. Cheung. Mining, indexing, and querying historical spatiotemporal data. In Proc. 2004 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'04), pp. 236-245, Seattle, WA, Aug. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  433. R. S. Michalski, J. G. Carbonell, and T. M. Mitchell. Machine Learning, An Artificial Intelligence Approach, Vol. 1. Morgan Kaufmann, 1983.Google ScholarGoogle ScholarCross RefCross Ref
  434. R. S. Michalski, J. G. Carbonell, and T. M. Mitchell. Machine Learning, An Artificial Intelligence Approach, Vol. 2. Morgan Kaufmann, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  435. M. Muralikrishna and D. J. DeWitt. Equi-depth histograms for extimating selectivity factors for multi-dimensional queries. In Proc. 1988 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'88), pp. 28-36, Chicago, IL, June 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  436. M. Meila. Comparing clusterings by the variation of information. In Proc. 16th Annual Conf. Computational Learning Theory (COLT'03), pp. 173-187, Washington, DC, Aug. 2003.Google ScholarGoogle ScholarCross RefCross Ref
  437. M. Meila. Comparing clusterings: An axiomatic view. In Proc. 22nd Int. Conf. Machine Learning (ICML'05), pp. 577-584, Bonn, Germany, 2005. Google ScholarGoogle Scholar
  438. J. Mena. Investigative Data Mining with Security and Criminal Detection. Butterworth-Heinemann, 2003. Google ScholarGoogle Scholar
  439. D. Malerba, E. Floriana, and G. Semeraro. A further comparison of simplification methods for decision tree induction. In D. Fisher and H. Lenz (eds.), Learning from Data: AI and Statistics. Springer Verlag, 1995.Google ScholarGoogle Scholar
  440. J. K. Martin and D. S. Hirschberg. The time complexity of decision tree induction. In Technical Report ICS-TR 95-27, pp. 1-27, Department of Information and Computer Science, University of California, Irvine, CA, Aug. 1995.Google ScholarGoogle Scholar
  441. H. Miller and J. Han. Geographic Data Mining and Knowledge Discovery (2nd ed.). Chapman & Hall/CRC, 2009.Google ScholarGoogle Scholar
  442. R. S. Michalski. A theory and methodology of inductive learning. In R. S. Michalski, J. G. Carbonell, and T. M. Mitchell (eds.), Machine Learning: An Artificial Intelligence Approach, Vol. 1, pp. 83-134. Morgan Kaufmann, 1983.Google ScholarGoogle Scholar
  443. Z. Michalewicz. Genetic Algorithms + Data Structures = Evolution Programs. Springer Verlag, 1992. Google ScholarGoogle Scholar
  444. R. G. Miller. Survival Analysis. Wiley-Interscience, 1998.Google ScholarGoogle Scholar
  445. J. Mingers. An empirical comparison of pruning methods for decision-tree induction. Machine Learning, 4:227-243, 1989. Google ScholarGoogle ScholarCross RefCross Ref
  446. B. Mirkin. Mathematical classification and clustering. J. Global Optimization, 12:105- 108, 1998. Google ScholarGoogle ScholarCross RefCross Ref
  447. M. Mitchell. An Introduction to Genetic Algorithms. Cambridge, MA: MIT Press, 1996. Google ScholarGoogle Scholar
  448. T. M. Mitchell. Machine Learning. McGraw-Hill, 1997. Google ScholarGoogle Scholar
  449. M. Manago and Y. Kodratoff. Induction of decision trees from complex structured data. In G. Piatetsky-Shapiro and W. J. Frawley (eds.), Knowledge Discovery in Databases, pp. 289-306. AAAI/MIT Press, 1991.Google ScholarGoogle Scholar
  450. Q. Mei, C. Liu, H. Su, and C. Zhai. A probabilistic approach to spatiotemporal theme pattern mining on weblogs. In Proc. 15th Int. Conf. World Wide Web (WWW'06), pp. 533-542, Edinburgh, Scotland, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  451. J. Major and J. Mangano. Selecting among rules induced from a hurricane database. J. Intelligent Information Systems, 4:39-52, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  452. G. Manku and R. Motwani. Approximate frequency counts over data streams. In Proc. 2002 Int. Conf. Very Large Data Bases (VLDB'02), pp. 346-357, Hong Kong, China, Aug. 2002. Google ScholarGoogle ScholarCross RefCross Ref
  453. M. Mézard and J.-P. Nadal. Learning in feedforward layered networks: The tiling algorithm. J. Physics, 22:2191-2204, 1989.Google ScholarGoogle Scholar
  454. S. C. Madeira and A. L. Oliveira. Biclustering algorithms for biological data analysis: A survey. IEEE/ACM Trans. Computational Biology and Bioinformatics, 1(1):24-25, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  455. M. L. Minsky and S. Papert. Perceptrons: An Introduction to Computational Geometry. Cambridge, MA: MIT Press, 1969. Google ScholarGoogle ScholarDigital LibraryDigital Library
  456. M. Metha, J. Rissanen, and R. Agrawal. MDL-based decision tree pruning. In Proc. 1995 Int. Conf. Knowledge Discovery and Data Mining (KDD'95), pp. 216-221, Montreal, Quebec, Canada, Aug. 1995.Google ScholarGoogle Scholar
  457. C. D. Manning, P. Raghavan, and H. Schutze. Introduction to Information Retrieval. Cambridge University Press, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  458. M. Markou and S. Singh. Novelty detection: A review--part 1: Statistical approaches. Signal Processing, 83:2481-2497, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  459. M. Markou and S. Singh. Novelty detection: A review--part 2: Neural network based approaches. Signal Processing, 83:2499-2521, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  460. D. Michie, D. J. Spiegelhalter, and C. C. Taylor. Machine Learning, Neural and Statistical Classification. Chichester, England: Ellis Horwood, 1994. Google ScholarGoogle Scholar
  461. R. S. Michalski and G. Tecuci. Machine Learning, A Multistrategy Approach, Vol. 4. Morgan Kaufmann, 1994.Google ScholarGoogle Scholar
  462. H. Mannila, H. Toivonen, and A. I. Verkamo. Efficient algorithms for discovering association rules. In Proc. AAAI'94 Workshop Knowledge Discovery in Databases (KDD'94), pp. 181-192, Seattle, WA, July 1994.Google ScholarGoogle Scholar
  463. H. Mannila, H. Toivonen, and A. I. Verkamo. Discovery of frequent episodes in event sequences. Data Mining and Knowledge Discovery, 1:259-289, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  464. S. K. Murthy. Automatic construction of decision trees from data: A multi-disciplinary survey. Data Mining and Knowledge Discovery, 2:345-389, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  465. S. Muthukrishnan. Data Streams: Algorithms and Applications. Now Publishers, 2005.Google ScholarGoogle Scholar
  466. Q. Mei, D. Xin, H. Cheng, J. Han, and C. Zhai. Semantic annotation of frequent patterns. ACM Trans. Knowledge Discovery from Data (TKDD), 15:321-348, 2007. Google ScholarGoogle Scholar
  467. R. J. Miller and Y. Yang. Association rules over interval data. In Proc. 1997 ACMSIGMOD Int. Conf. Management of Data (SIGMOD'97), pp. 452-461, Tucson, AZ, May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  468. Q. Mei and C. Zhai. A mixture model for contextual text mining. In Proc. 2006 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'06), pp. 649-655, Philadelphia, PA, Aug. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  469. T. Niblett and I. Bratko. Learning decision rules in noisy domains. In M. A. Brammer (ed.), Expert Systems '86: Research and Development in Expert Systems III, pp. 25-34. British Computer Society Specialist Group on Expert Systems, Dec. 1986. Google ScholarGoogle Scholar
  470. M. Newman, A.-L. Barabasi, and D. J. Watts. The Structure and Dynamics of Networks. Princeton University Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  471. C. C. Noble and D. J. Cook. Graph-based anomaly detection. In Proc. 2003 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'03), pp. 631-636, Washington, DC, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  472. M. Newman. Networks: An Introduction. Oxford University Press, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  473. M. E. J. Newman and M. Girvan. Finding and evaluating community structure in networks. Physical Rev. E, 69:113-128, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  474. J. Neville, B. Gallaher, and T. Eliassi-Rad. Evaluating statistical tests for within-network classifiers of relational data. In Proc. 2009 Int. Conf. Data Mining (ICDM'09), pp. 397- 406, Miami, FL, Dec. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  475. R. Ng and J. Han. Efficient and effective clustering method for spatial data mining. In Proc. 1994 Int. Conf. Very Large Data Bases (VLDB'94), pp. 144-155, Santiago, Chile, Sept. 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  476. A. Y. Ng, M. I. Jordan, and Y. Weiss. On spectral clustering: Analysis and an algorithm. In T. G. Dietterich, S. Becker, and Z. Ghahramani (eds.), Advances in Neural Information Processing Systems 14. pp. 849-856, Cambridge, MA: MIT Press, 2001.Google ScholarGoogle Scholar
  477. S. Nijssen and J. Kok. A quick start in frequent structure mining can make a difference. In Proc. 2004 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'04), pp. 647-652, Seattle, WA, Aug. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  478. J. Neter, M. H. Kutner, C. J. Nachtsheim, and L. Wasserman. Applied Linear Statistical Models (4th ed.). Irwin, 1996.Google ScholarGoogle Scholar
  479. R. Ng, L. V. S. Lakshmanan, J. Han, and A. Pang. Exploratory mining and pruning optimizations of constrained associations rules. In Proc. 1998 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'98), pp. 13-24, Seattle, WA, June 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  480. A. Natsev, R. Rastogi, and K. Shim. Walrus: A similarity retrieval algorithm for image databases. In Proc. 1999 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'99), pp. 395-406, Philadelphia, PA, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  481. J. Nocedal and S. J. Wright. Numerical Optimization. Springer Verlag, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  482. E. Osuna, R. Freund, and F. Girosi. An improved training algorithm for support vector machines. In Proc. 1997 IEEE Workshop Neural Networks for Signal Processing (NNSP'97), pp. 276-285, Amelia Island, FL, Sept. 1997.Google ScholarGoogle ScholarCross RefCross Ref
  483. P. O'Neil and G. Graefe. Multi-table joins through bitmapped join indices. SIGMOD Record, 24:8-11, Sept. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  484. J. E. Olson. Data Quality: The Accuracy Dimension. Morgan Kaufmann, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  485. E. Omiecinski. Alternative interest measures for mining associations. IEEE Trans. Knowledge and Data Engineering, 15:57-69, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  486. L. O'Callaghan, A. Meyerson, R. Motwani, N. Mishra, and S. Guha. Streaming-data algorithms for high-quality clustering. In Proc. 2002 Int. Conf. Data Engineering (ICDE'02), pp. 685-696, San Fransisco, CA, Apr. 2002. Google ScholarGoogle ScholarCross RefCross Ref
  487. P. O'Neil and D. Quass. Improved query performance with variant indexes. In Proc. 1997 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'97), pp. 38-49, Tucson, AZ, May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  488. B. Özden, S. Ramaswamy, and A. Silberschatz. Cyclic association rules. In Proc. 1998 Int. Conf. Data Engineering (ICDE'98), pp. 412-421, Orlando, FL, Feb. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  489. G. Pagallo. Learning DNF by decision trees. In Proc. 1989 Int. Joint Conf. Artificial Intelligence (IJCAI'89), pp. 639-644, San Francisco, CA, 1989. Google ScholarGoogle Scholar
  490. Z. Pawlak. Rough Sets, Theoretical Aspects of Reasoning about Data. Kluwer Academic, 1991. Google ScholarGoogle Scholar
  491. J. C. Pinheiro and D. M. Bates. Mixed Effects Models in S and S-PLUS. Springer Verlag, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  492. N. Pasquier, Y. Bastide, R. Taouil, and L. Lakhal. Discovering frequent closed itemsets for association rules. In Proc. 7th Int. Conf. Database Theory (ICDT'99), pp. 398-416, Jerusalem, Israel, Jan. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  493. F. Pan, G. Cong, A. K. H. Tung, J. Yang, and M. Zaki. CARPENTER: Finding closed patterns in long biological datasets. In Proc. 2003 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'03), pp. 637-642, Washington, DC, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  494. J. S. Park, M. S. Chen, and P. S. Yu. An effective hash-based algorithm for mining association rules. In Proc. 1995 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'95), pp. 175-186, San Jose, CA, May 1995. Google ScholarGoogle ScholarCross RefCross Ref
  495. J. S. Park, M. S. Chen, and P. S. Yu. Efficient parallel mining for association rules. In Proc. 4th Int. Conf. Information and Knowledge Management, pp. 31-36, Baltimore, MD, Nov. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  496. J. Pearl. Probabilistic Reasoning in Intelligent Systems. Morgan Kaufmann, 1988. Google ScholarGoogle Scholar
  497. J. Pei, J. Han, and L. V. S. Lakshmanan. Mining frequent itemsets with convertible constraints. In Proc. 2001 Int. Conf. Data Engineering (ICDE'01), pp. 433-442, Heidelberg, Germany, Apr. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  498. J. Pei, J. Han, H. Lu, S. Nishio, S. Tang, and D. Yang, H-Mine: Hyper-Structure Mining of Frequent Patterns in Large Databases. In Proc. 2001 Int. Conf. Data Mining (ICDM'01), pp. 441-448, San Jose, CA, Nov. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  499. L. Parsons, E. Haque, and H. Liu. Subspace clustering for high dimensional data: A review. SIGKDD Explorations, 6:90-105, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  500. J. Pei, J. Han, and R. Mao. CLOSET: An efficient algorithm for mining frequent closed itemsets. In Proc. 2000 ACM-SIGMOD Int. Workshop Data Mining and Knowledge Discovery (DMKD'00), pp. 11-20, Dallas, TX, May 2000.Google ScholarGoogle Scholar
  501. J. Pei, J. Han, B. Mortazavi-Asl, H. Pinto, Q. Chen, U. Dayal, and M.-C. Hsu. PrefixSpan: Mining sequential patterns efficiently by prefix-projected pattern growth. In Proc. 2001 Int. Conf. Data Engineering (ICDE'01), pp. 215-224, Heidelberg, Germany, Apr. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  502. J. Pei, J. Han, B. Mortazavi-Asl, J. Wang, H. Pinto, Q. Chen, U. Dayal, and M.-C. Hsu. Mining sequential patterns by pattern-growth: The prefix Span approach. IEEE Trans. Knowledge and Data Engineering, 16:1424-1440, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  503. V. Poosala and Y. Ioannidis. Selectivity estimation without the attribute value independence assumption. In Proc. 1997 Int. Conf. Very Large Data Bases (VLDB'97), pp. 486-495, Athens, Greece, Aug. 1997. Google ScholarGoogle Scholar
  504. S. Papadimitriou, H. Kitagawa, P. B. Gibbons, and C. Faloutsos. Loci: Fast outlier detection using the local correlation integral. In Proc. 2003 Int. Conf. Data Engineering (ICDE'03), pp. 315-326, Bangalore, India, Mar. 2003.Google ScholarGoogle ScholarCross RefCross Ref
  505. A. Pfeffer, D. Koller, B. Milch, and K. Takusagawa. SPOOK: A system for probabilistic object-oriented knowledge representation. In Proc. 15th Annual Conf. Uncertainty in Artificial Intelligence (UAI'99), pp. 541-550, Stockholm, Sweden, 1999. Google ScholarGoogle Scholar
  506. D. Papadias, P. Kalnis, J. Zhang, and Y. Tao. Efficient OLAP operations in spatial data warehouses. In Proc. 2001 Int. Symp. Spatial and Temporal Databases (SSTD'01), pp. 443-459, Redondo Beach, CA, July 2001. Google ScholarGoogle ScholarCross RefCross Ref
  507. B. Pang and L. Lee. Opinion mining and sentiment analysis. Foundations and Trends in Information Retrieval, 2:1-135, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  508. J. C. Platt. Fast training of support vector machines using sequential minimal optimization. In B. Schölkopf, C. J. C. Burges, and A. Smola (eds.), Advances in Kernel Methods--Support Vector Learning, pp. 185-208. Cambridge, MA: MIT Press, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  509. A. Patcha, and J.-M. Park. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 51(12):3448-3470, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  510. F. P. Preparata and M. I. Shamos. Computational Geometry: An Introduction. Springer Verlag, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  511. G. Piatetsky-Shapiro. Notes AAAI'91 Workshop Knowledge Discovery in Databases (KDD'91). Anaheim, CA, July 1991.Google ScholarGoogle Scholar
  512. G. Piatetsky-Shapiro and W. J. Frawley. Knowledge Discovery in Databases. AAAI/MIT Press, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  513. F. Pan, A. K. H. Tung, G. Cong, and X. Xu. COBBLER: Combining column and row enumeration for closed pattern discovery. In Proc. 2004 Int. Conf. Scientific and Statistical Database Management (SSDBM'04), pp. 21-30, Santorini Island, Greece, June 2004. Google ScholarGoogle Scholar
  514. W. H. Press, S. A. Teukolosky, W. T. Vetterling, and B. P. Flannery. Numerical Recipes: The Art of Scientific Computing. Cambridge: Cambridge University Press, 2007.Google ScholarGoogle Scholar
  515. S. J. Pan and Q. Yang. A survey on transfer learning. IEEE Trans. Knowledge and Data Engineering, 22:1345-1359, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  516. D. Pyle. Data Preparation for Data Mining. Morgan Kaufmann, 1999. Google ScholarGoogle Scholar
  517. J. Pei, X. Zhang, M. Cho, H. Wang, and P. S. Yu. Maple: A fast algorithm for maximal pattern-based clustering. In Proc. 2003 Int. Conf. Data Mining (ICDM'03), pp. 259-266, Melbourne, FL, Dec. 2003. Google ScholarGoogle Scholar
  518. J. R. Quinlan and R. M. Cameron-Jones. FOIL: A midterm report. In Proc. 1993 European Conf. Machine Learning (ECML'93), pp. 3-20, Vienna, Austria, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  519. J. R. Quinlan and R. L. Rivest. Inferring decision trees using the minimum description length principle. Information and Computation, 80:227-248, Mar. 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  520. J. R. Quinlan. Induction of decision trees. Machine Learning, 1:81-106, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  521. J. R. Quinlan. Simplifying decision trees. Int. J. Man-Machine Studies, 27:221-234, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  522. J. R. Quinlan. An empirical comparison of genetic and decision-tree classifiers. In Proc. 1988 Int. Conf. Machine Learning (ICML'88), pp. 135-141, Ann Arbor, MI, June 1988.Google ScholarGoogle ScholarCross RefCross Ref
  523. J. R. Quinlan. Unknown attribute values in induction. In Proc. 1989 Int. Conf. Machine Learning (ICML'89), pp. 164-168, Ithaca, NY, June 1989. Google ScholarGoogle ScholarCross RefCross Ref
  524. J. R. Quinlan. Learning logic definitions from relations. Machine Learning, 5:139-166, 1990. Google ScholarGoogle ScholarCross RefCross Ref
  525. J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  526. J. R. Quinlan. Bagging, boosting, and C4.5. In Proc. 1996 Nat. Conf. Artificial Intelligence (AAAI'96), Vol. 1, pp. 725-730, Portland, OR, Aug. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  527. E. L. Rissland and K. Ashley. HYPO: A case-based system for trade secret law. In Proc. 1st Int. Conf. Artificial Intelligence and Law, pp. 60-66, Boston, MA, May 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  528. L. R. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE, 77:257-286, 1989.Google ScholarGoogle ScholarDigital LibraryDigital Library
  529. S. Russell, J. Binder, D. Koller, and K. Kanazawa. Local learning in probabilistic networks with hidden variables. In Proc. 1995 Joint Int. Conf. Artificial Intelligence (IJCAI'95), pp. 1146-1152, Montreal, Quebec, Canada, Aug. 1995. Google ScholarGoogle Scholar
  530. R. Ramakrishnan and B.-C. Chen. Exploratory mining in cube space. Data Mining and Knowledge Discovery, 15:29-54, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  531. T. Redman. Data Quality: Management and Technology. Bantam Books, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  532. T. Redman. Data Quality: The Field Guide. Digital Press (Elsevier), 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  533. R. Ramakrishnan and J. Gehrke. Database Management Systems (3rd ed.). McGraw-Hill, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  534. L. De Raedt, T. Guns, and S. Nijssen. Constraint programming for data mining and machine learning. In Proc. 2010 AAAI Conf. Artificial Intelligence (AAAI'10), pp. 1671- 1675, Atlanta, GA, July 2010.Google ScholarGoogle Scholar
  535. V. Raman and J. M. Hellerstein. Potter's wheel: An interactive data cleaning system. In Proc. 2001 Int. Conf. Very Large Data Bases (VLDB'01), pp. 381-390, Rome, Italy, Sept. 2001. Google ScholarGoogle Scholar
  536. A. Rosenberg and J. Hirschberg. V-measure: A conditional entropy-based external cluster evaluation measure. In Proc. 2007 Joint Conf. Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL'07), pp. 410-420, Prague, Czech Republic, June 2007.Google ScholarGoogle Scholar
  537. J. F. Roddick, K. Hornsby, and M. Spiliopoulou. An updated bibliography of temporal, spatial, and spatio-temporal data mining research. In J. F. Roddick and K. Hornsby (eds.), TSDM 2000, Lecture Notes in Computer Science 2007, pp. 147-163. New York: Springer, 2001. Google ScholarGoogle Scholar
  538. D. E. Rumelhart, G. E. Hinton, and R. J. Williams. Learning internal representations by error propagation. In D. E. Rumelhart and J. L. McClelland (eds.), Parallel Distributed Processing. Cambridge, MA: MIT Press, 1986. Google ScholarGoogle Scholar
  539. B. D. Ripley. Pattern Recognition and Neural Networks. Cambridge University Press, 1996. Google ScholarGoogle Scholar
  540. D. E. Rumelhart and J. L. McClelland. Parallel Distributed Processing. Cambridge, MA: MIT Press, 1986.Google ScholarGoogle ScholarDigital LibraryDigital Library
  541. S. Ramaswamy, S. Mahajan, and A. Silberschatz. On the discovery of interesting patterns in association rules. In Proc. 1998 Int. Conf. Very Large Data Bases (VLDB'98), pp. 368-379, New York, Aug. 1998. Google ScholarGoogle Scholar
  542. S. Russell and P. Norvig. Artificial Intelligence: A Modern Approach. Prentice-Hall, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  543. M. Radovanovic, A. Nanopoulos, and M. Ivanovic. Nearest neighbors in highdimensional data: The emergence and influence of hubs. In Proc. 2009 Int. Conf. Machine Learning (ICML'09), pp. 865-872, Montreal, Quebec, Canada, June 2009. Google ScholarGoogle Scholar
  544. F. Rosenblatt. The perceptron: A probabilistic model for information storage and organization in the brain. Psychological Rev., 65:386-498, 1958.Google ScholarGoogle ScholarCross RefCross Ref
  545. C. Riesbeck and R. Schank. Inside Case-Based Reasoning. Lawrence Erlbaum, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  546. K. Ross and D. Srivastava. Fast computation of sparse datacubes. In Proc. 1997 Int. Conf. Very Large Data Bases (VLDB'97), pp. 116-125, Athens, Greece, Aug. 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  547. R. Rastogi and K. Shim. Public: A decision tree classifer that integrates building and pruning. In Proc. 1998 Int. Conf. Very Large Data Bases (VLDB'98), pp. 404-415, New York, Aug. 1998. Google ScholarGoogle Scholar
  548. F. Ramsey and D. Schafer. The Statistical Sleuth: A Course in Methods of Data Analysis. Duxbury Press, 2001.Google ScholarGoogle Scholar
  549. K. A. Ross, D. Srivastava, and D. Chatziantoniou. Complex aggregation atmultiple granularities. In Proc. Int. Conf. Extending Database Technology (EDBT'98), pp. 263-277, Valencia, Spain, Mar. 1998. Google ScholarGoogle Scholar
  550. J. C. Russ. The Image Processing Handbook (5th ed.). CRC Press, 2006. Google ScholarGoogle Scholar
  551. R. Srikant and R. Agrawal. Mining generalized association rules. In Proc. 1995 Int. Conf. Very Large Data Bases (VLDB'95), pp. 407-419, Zurich, Switzerland, Sept. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  552. R. Srikant and R. Agrawal. Mining sequential patterns: Generalizations and performance improvements. In Proc. 5th Int. Conf. Extending Database Technology (EDBT'96), pp. 3-17, Avignon, France, Mar. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  553. J. Shafer, R. Agrawal, and M. Mehta. SPRINT: A scalable parallel classifier for data mining. In Proc. 1996 Int. Conf. Very Large Data Bases (VLDB'96), pp. 544-555, Bombay, India, Sept. 1996. Google ScholarGoogle Scholar
  554. S. Sarawagi, R. Agrawal, and N. Megiddo. Discovery-driven exploration of OLAP data cubes. In Proc. Int. Conf. Extending Database Technology (EDBT'98), pp. 168-182, Valencia, Spain, Mar. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  555. B. Schölkopf, P. L. Bartlett, A. Smola, and R. Williamson. Shrinking the tube: A new support vector regression algorithm. In M. S. Kearns, S. A. Solla, and D. A. Cohn (eds.), Advances in Neural Information Processing Systems 11, pp. 330-336. Cambridge, MA: MIT Press, 1999. Google ScholarGoogle Scholar
  556. S. Shekhar and S. Chawla. Spatial Databases: A Tour. Prentice-Hall, 2003.Google ScholarGoogle Scholar
  557. J. C. Schlimmer. Learning and representation change. In Proc. 1986 Nat. Conf. Artificial Intelligence (AAAI'86), pp. 511-515, Philadelphia, PA, 1986. Google ScholarGoogle Scholar
  558. S. E. Schaeffer. Graph clustering. Computer Science Rev., 1:27-64, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  559. G. Sheikholeslami, S. Chatterjee, and A. Zhang. WaveCluster: A multi-resolution clustering approach for very large spatial databases. In Proc. 1998 Int. Conf. Very Large Data Bases (VLDB'98), pp. 428-439, New York, Aug. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  560. J. W. Shavlik and T. G. Dietterich. Readings in Machine Learning. Morgan Kaufmann, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  561. T. Soukup and I. Davidson. Visual Data Mining: Techniques and Tools for Data Visualization and Mining. Wiley, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  562. D. Srivastava, S. Dar, H. V. Jagadish, and A. V. Levy. Answering queries with aggregation using views. In Proc. 1996 Int. Conf. Very Large Data Bases (VLDB'96), pp. 318-329, Bombay, India, Sept. 1996. Google ScholarGoogle Scholar
  563. A. Shukla, P. M. Deshpande, and J. F. Naughton. Materialized view selection for multidimensional datasets. In Proc. 1998 Int. Conf. Very Large Data Bases (VLDB'98), pp. 488-499, New York, Aug. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  564. G. Seni and J. F. Elder. Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions. Morgan and Claypool, 2010. Google ScholarGoogle ScholarCross RefCross Ref
  565. B. Settles. Active learning literature survey. In Computer Sciences Technical Report 1648, University of Wisconsin-Madison, 2010.Google ScholarGoogle Scholar
  566. J. C. Schlimmer and D. Fisher. A case study of incremental concept induction. In Proc. 1986 Nat. Conf. Artificial Intelligence (AAAI'86), pp. 496-501, Philadelphia, PA, 1986.Google ScholarGoogle Scholar
  567. J. Shanmugasundaram, U. M. Fayyad, and P. S. Bradley. Compressed data cubes for OLAP aggregate query approximation on continuous dimensions. In Proc. 1999 Int. Conf. Knowledge Discovery and Data Mining (KDD'99), pp. 223-232, San Diego, CA, Aug. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  568. P. Smyth and R. M. Goodman. An information theoretic approach to rule induction. IEEE Trans. Knowledge and Data Engineering, 4:301-316, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  569. W. A. Shewhart. Economic Control of Quality of Manufactured Product. D. Van Nostrand, 1931.Google ScholarGoogle Scholar
  570. Y.-S. Shih. Families of splitting criteria for classification trees. Statistics and Computing, 9:309-315, 1999. Google ScholarGoogle ScholarCross RefCross Ref
  571. N. Stefanovic, J. Han, and K. Koperski. Object-based selective materialization for efficient implementation of spatial data cubes. IEEE Trans. Knowledge and Data Engineering, 12:938-958, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  572. A. Shoshani. OLAP and statistical databases: Similarities and differences. In Proc. 16th ACM Symp. Principles of Database Systems, pp. 185-196, Tucson, AZ, May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  573. R. H. Shumway. Applied Statistical Time Series Analysis. Prentice-Hall, 1988.Google ScholarGoogle Scholar
  574. Z. Shao, J. Han, and D. Xin. MM-Cubing: Computing iceberg cubes by factorizing the lattice space. In Proc. 2004 Int. Conf. Scientific and Statistical Database Management (SSDBM'04), pp. 213-222, Santorini Island, Greece, June 2004. Google ScholarGoogle Scholar
  575. Y. Sun, J. Han, P. Zhao, Z. Yin, H. Cheng, and T. Wu. RankClus: Integrating clustering with ranking for heterogeneous information network analysis. In Proc. 2009 Int. Conf. Extending Data Base Technology (EDBT'09), pp. 565-576, Saint Petersburg, Russia, Mar. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  576. F. Silvestri. Mining query logs: Turning search usage data into knowledge. Foundations and Trends in Information Retrieval, 4:1-174, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  577. J. Shieh and E. Keogh. iSAX: Indexing and mining terabyte sized time series. In Proc. 2008 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'08), pp. 623- 631, Las Vegas, NV, Aug. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  578. A. Silberschatz, H. F. Korth, and S. Sudarshan. Database System Concepts (6th ed.). McGraw-Hill, 2010.Google ScholarGoogle Scholar
  579. S. Shekhar, C.-T. Lu, X. Tan, S. Chawla, and R. R. Vatsavai. Map cube: A visualization tool for spatial data warehouses. In H. J. Miller and J. Han (eds.), Geographic Data Mining and Knowledge Discovery, pp. 73-108. Taylor and Francis, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  580. J. C. Setubal and J. Meidanis. Introduction to Computational Molecular Biology. PWS Publishing Co., 1997.Google ScholarGoogle Scholar
  581. J. W. Shavlik, R. J. Mooney, and G. G. Towell. Symbolic and neural learning algorithms: An experimental comparison. Machine Learning, 6:111-144, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  582. K. Saito and R. Nakano. Medical diagnostic expert system based on PDP model. In Proc. 1988 IEEE Int. Conf. Neural Networks, pp. 225-262, San Mateo, CA, 1988.Google ScholarGoogle ScholarCross RefCross Ref
  583. W. Shen, K. Ong, B. Mitbander, and C. Zaniolo. Metaqueries for data mining. In U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy (eds.), Advances in Knowledge Discovery and Data Mining, pp. 375-398. AAAI/MIT Press, 1996. Google ScholarGoogle Scholar
  584. A. Savasere, E. Omiecinski, and S. Navathe. An efficient algorithm for mining association rules in large databases. In Proc. 1995 Int. Conf. Very Large Data Bases (VLDB'95), pp. 432-443, Zurich, Switzerland, Sept. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  585. A. Savasere, E. Omiecinski, and S. Navathe. Mining for strong negative associations in a large database of customer transactions. In Proc. 1998 Int. Conf. Data Engineering (ICDE'98), pp. 494-502, Orlando, FL, Feb. 1998. Google ScholarGoogle ScholarCross RefCross Ref
  586. R. Sokal and F. Rohlf. Biometry. Freeman, 1981.Google ScholarGoogle Scholar
  587. A. Skowron and C. Rauszer. The discernibility matrices and functions in information systems. In R. Slowinski (ed.), Intelligent Decision Support, Handbook of Applications and Advances of the Rough Set Theory, pp. 331-362. Kluwer Academic, 1992.Google ScholarGoogle Scholar
  588. W. Siedlecki and J. Sklansky. On automatic feature selection. Int. J. Pattern Recognition and Artificial Intelligence, 2:197-220, 1988.Google ScholarGoogle ScholarCross RefCross Ref
  589. S. Sarawagi and M. Stonebraker. Efficient organization of large multidimensional arrays. In Proc. 1994 Int. Conf. Data Engineering (ICDE'94), pp. 328-336, Houston, TX, Feb. 1994. Google ScholarGoogle ScholarCross RefCross Ref
  590. G. Sathe and S. Sarawagi. Intelligent rollups in multidimensional OLAP data. In Proc. 2001 Int. Conf. Very Large Data Bases (VLDB'01), pp. 531-540, Rome, Italy, Sept. 2001. Google ScholarGoogle Scholar
  591. R. H. Shumway and D. S. Stoffer. Time Series Analysis and Its Applications. New York: Springer, 2005. Google ScholarGoogle Scholar
  592. A. Silberschatz and A. Tuzhilin. What makes patterns interesting in knowledge discovery systems. IEEE Trans. Knowledge and Data Engineering, 8:970-974, Dec. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  593. S. Sarawagi, S. Thomas, and R. Agrawal. Integrating association rule mining with relational database systems: Alternatives and implications. In Proc. 1998 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'98), pp. 343-354, Seattle, WA, June 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  594. Y. Sun, J. Tang, J. Han, M. Gupta, and B. Zhao. Community evolution detection in dynamic heterogeneous information networks. In Proc. 2010 KDD Workshop Mining and Learning with Graphs (MLG'10), Washington, DC, July 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  595. W. Stefansky. Rejecting outliers in factorial designs. Technometrics, 14:469-479, 1972.Google ScholarGoogle ScholarCross RefCross Ref
  596. M. Stone. Cross-validatory choice and assessment of statistical predictions. J. Royal Statistical Society, 36:111-147, 1974.Google ScholarGoogle Scholar
  597. R. Srikant, Q. Vu, and R. Agrawal. Mining association rules with item constraints. In Proc. 1997 Int. Conf. Knowledge Discovery and Data Mining (KDD'97), pp. 67-73, Newport Beach, CA, Aug. 1997.Google ScholarGoogle Scholar
  598. C. E. Shannon and W. Weaver. The Mathematical Theory of Communication. University of Illinois Press, 1949.Google ScholarGoogle ScholarDigital LibraryDigital Library
  599. J. Swets. Measuring the accuracy of diagnostic systems. Science, 240:1285-1293, 1988.Google ScholarGoogle Scholar
  600. R. Swiniarski. Rough sets and principal component analysis and their applications in feature extraction and selection, data model building and classification. In S. K. Pal and A. Skowron (eds.), Rough Fuzzy Hybridization: A New Trend in Decision-Making, Springer Verlag, Singapore, 1999.Google ScholarGoogle Scholar
  601. X. Song, M. Wu, C. Jermaine, and S. Ranka. Conditional anomaly detection. IEEE Trans. on Knowledge and Data Engineering, 19(5):631-645, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  602. D. Shasha and Y. Zhu. High Performance Discovery in Time Series: Techniques and Case Studies. New York: Springer, 2004. Google ScholarGoogle Scholar
  603. D. M. J. Tax and R. P. W. Duin. Using two-class classifiers for multiclass classification. In Proc. 16th Intl. Conf. Pattern Recognition (ICPR'2002), pp. 124-127, Montreal, Quebec, Canada, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  604. Y. Tao, C. Faloutsos, D. Papadias, and B. Liu. Prediction and indexing of moving objects with unknown motion patterns. In Proc. 2004 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'04), pp. 611-622, Paris, France, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  605. I. Tsoukatos and D. Gunopulos. Efficient mining of spatiotemporal patterns. In Proc. 2001 Int. Symp. Spatial and Temporal Databases (SSTD'01), pp. 425-442, Redondo Beach, CA, July 2001. Google ScholarGoogle ScholarCross RefCross Ref
  606. A. K. H. Tung, J. Hou, and J. Han. Spatial clustering in the presence of obstacles. In Proc. 2001 Int. Conf. Data Engineering (ICDE'01), pp. 359-367, Heidelberg, Germany, Apr. 2001. Google ScholarGoogle ScholarCross RefCross Ref
  607. A. K. H. Tung, J. Han, L. V. S. Lakshmanan, and R. T. Ng. Constraint-based clustering in large databases. In Proc. 2001 Int. Conf. Database Theory (ICDT'01), pp. 405-419, London, Jan. 2001. Google ScholarGoogle ScholarCross RefCross Ref
  608. Y. Tian, R. A. Hankins, and J. M. Patel. Efficient aggregation for graph summarization. In Proc. 2008 ACM SIGMOD Int. Conf. Management of Data (SIGMOD'08), pp. 567-580, Vancouver, British Columbia, Canada, June 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  609. B. Thuraisingham. Data mining for counterterrorism. In H. Kargupta, A. Joshi, K. Sivakumar, and Y. Yesha (eds.), Data Mining: Next Generation Challenges and Future Directions, pp. 157-183. AAAI/MIT Press, 2004.Google ScholarGoogle Scholar
  610. S. Theodoridis and K. Koutroumbas. Pattern Recognition (4th ed.) Academic Press, 2008. Google ScholarGoogle Scholar
  611. P.-N. Tan, V. Kumar, and J. Srivastava. Selecting the right interestingness measure for association patterns. In Proc. 2002 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'02), pp. 32-41, Edmonton, Alberta, Canada, July 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  612. L. Tang, H. Liu, J. Zhang, and Z. Nazeri. Community evolution in dynamic multi-mode networks. In Proc. 2008 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'08), pp. 677-685, Las Vegas, NV, Aug. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  613. H. Toivonen. Sampling large databases for association rules. In Proc. 1996 Int. Conf. Very Large Data Bases (VLDB'96), pp. 134-145, Bombay, India, Sept. 1996. Google ScholarGoogle Scholar
  614. G. G. Towell and J. W. Shavlik. Extracting refined rules from knowledge-based neural networks. Machine Learning, 13:71-101, Oct. 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  615. P. N. Tan, M. Steinbach, and V. Kumar. Introduction to Data Mining. Boston: Addison-Wesley, 2005. Google ScholarGoogle Scholar
  616. A. Tanay, R. Sharan, and R. Shamir. Biclustering algorithms: A survey. In S. Aluru (ed.), Handbook of Computational Molecular Biology, pp. 26:1-26:17. London: Chapman & Hall, 2004.Google ScholarGoogle Scholar
  617. E. R. Tufte. The Visual Display of Quantitative Information. Graphics Press, 1983. Google ScholarGoogle Scholar
  618. E. R. Tufte. Envisioning Information. Graphics Press, 1990. Google ScholarGoogle Scholar
  619. E. R. Tufte. Visual Explanations: Images and Quantities, Evidence and Narrative. Graphics Press, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  620. E. R. Tufte. The Visual Display of Quantitative Information (2nd ed.). Graphics Press, 2001.Google ScholarGoogle Scholar
  621. Y. Tao, X. Xiao, and S. Zhou. Mining distance-based outliers from large databases in any metric space. In Proc. 2006 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'06), pp. 394-403, Philadelphia, PA, Aug. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  622. P. E. Utgoff, N. C. Berkman, and J. A. Clouse. Decision tree induction based on efficient tree restructuring. Machine Learning, 29:5-44, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  623. R. Uthurusamy, U. M. Fayyad, and S. Spangler. Learning useful rules from inconclusive data. In G. Piatetsky-Shapiro and W. J. Frawley (eds.), Knowledge Discovery in Databases, pp. 141-157. AAAI/MIT Press, 1991.Google ScholarGoogle Scholar
  624. P. E. Utgoff. An incremental ID3. In Proc. Fifth Int. Conf. Machine Learning (ICML'88), pp. 107-120, San Mateo, CA, 1988.Google ScholarGoogle Scholar
  625. P. Valduriez. Join indices. ACM Trans. Database Systems, 12:218-246, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  626. V. N. Vapnik. The Nature of Statistical Learning Theory. Springer Verlag, 1995. Google ScholarGoogle Scholar
  627. V. N. Vapnik. Statistical Learning Theory. John Wiley & Sons, 1998.Google ScholarGoogle Scholar
  628. V. N. Vapnik and A. Y. Chervonenkis. On the uniform convergence of relative frequencies of events to their probabilities. Theory of Probability and Its Applications, 16:264-280, 1971.Google ScholarGoogle ScholarCross RefCross Ref
  629. J. Vaidya and C. Clifton. Privacy-preserving k-means clustering over vertically partitioned data. In Proc. 2003 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'03), Washington, DC, Aug 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  630. M. Vuk and T. Curk. ROC curve, lift chart and calibration plot. Metodolo¿ki zvezki, 3:89-108, 2006.Google ScholarGoogle Scholar
  631. J. Vaidya, C. W. Clifton, and Y. M. Zhu. Privacy Preserving Data Mining. New York: Springer, 2010. Google ScholarGoogle Scholar
  632. M. Vlachos, D. Gunopulos, and G. Kollios. Discovering similar multidimensional trajectories. In Proc. 2002 Int. Conf. Data Engineering (ICDE'02), pp. 673-684, San Fransisco, CA, Apr. 2002. Google ScholarGoogle ScholarCross RefCross Ref
  633. A. Veloso, W. Meira, and M. Zaki. Lazy associative classificaiton. In Proc. 2006 Int. Conf. Data Mining (ICDM'06), pp. 645-654, Hong Kong, China, 2006. Google ScholarGoogle Scholar
  634. C. J. van Rijsbergen. Information Retrieval. Butterworth, 1990.Google ScholarGoogle Scholar
  635. J. S. Vitter, M. Wang, and B. R. Iyer. Data cube approximation and histograms via wavelets. In Proc. 1998 Int. Conf. Information and Knowledge Management (CIKM'98), pp. 96-104, Washington, DC, Nov. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  636. M. S. Waterman. Introduction to Computational Biology: Maps, Sequences, and Genomes (Interdisciplinary Statistics). CRC Press, 1995.Google ScholarGoogle Scholar
  637. D. J. Watts. Six Degrees: The Science of a Connected Age. W. W. Norton & Company, 2003.Google ScholarGoogle Scholar
  638. C. Westphal and T. Blaxton. Data Mining Solutions: Methods and Tools for Solving Real-World Problems. John Wiley & Sons, 1998. Google ScholarGoogle Scholar
  639. T. Wu, Y. Chen, and J. Han. Re-examination of interestingness measures in pattern mining: A unified framework. Data Mining and Knowledge Discovery, 21(3):371-397, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  640. K. Wagstaff, C. Cardie, S. Rogers, and S. Schrödl. Constrained k-means clustering with background knowledge. In Proc. 2001 Int. Conf. Machine Learning (ICML'01), pp. 577- 584, Williamstown, MA, June 2001. Google ScholarGoogle Scholar
  641. G. M. Weiss. Mining with rarity: A unifying framework. SIGKDD Explorations, 6:7-19, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  642. S. Wasserman and K. Faust. Social Network Analysis: Methods and Applications. Cambridge University Press, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  643. I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques (2nd ed.). Morgan Kaufmann, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  644. I. H. Witten, E. Frank, and M. A. Hall. Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations (3rd ed.). Boston: Morgan Kaufmann, 2011.Google ScholarGoogle Scholar
  645. H. Wang, W. Fan, P. S. Yu, and J. Han. Mining concept-drifting data streams using ensemble classifiers. In Proc. 2003 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'03), pp. 226-235, Washington, DC, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  646. K. Wang, Y. He, and J. Han. Mining frequent itemsets using support constraints. In Proc. 2000 Int. Conf. Very Large Data Bases (VLDB'00), pp. 43-52, Cairo, Egypt, Sept. 2000. Google ScholarGoogle Scholar
  647. C. Wang, J. Han, Y. Jia, J. Tang, D. Zhang, Y. Yu, and J. Guo. Mining advisor-advisee relationships from research publication networks. In Proc. 2010 ACM SIGKDD Conf. Knowledge Discovery and Data Mining (KDD'10), Washington, DC, July 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  648. J. Wang, J. Han, Y. Lu, and P. Tzvetkov. TFP: An efficient algorithm for mining top-k frequent closed itemsets. IEEE Trans. Knowledge and Data Engineering, 17:652-664, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  649. J. Wang, J. Han, and J. Pei. CLOSET+: Searching for the best strategies for mining frequent closed itemsets. In Proc. 2003 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'03), pp. 236-245, Washington, DC, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  650. S. M. Weiss and N. Indurkhya. Predictive Data Mining. Morgan Kaufmann, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  651. J. Widom. Research problems in data warehousing. In Proc. 4th Int. Conf. Information and Knowledge Management, pp. 25-30, Baltimore, MD, Nov. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  652. S. Weiss, N. Indurkhya, T. Zhang, and F. Damerau. Text Mining: Predictive Methods for Analyzing Unstructured Information. New York: Springer, 2004. Google ScholarGoogle Scholar
  653. S. M. Weiss and C. A. Kulikowski. Computer Systems That Learn: Classification and Prediction Methods from Statistics, Neural Nets, Machine Learning, and Expert Systems. Morgan Kaufmann, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  654. J. Wang and G. Karypis. HARMONY: Efficiently mining the best rules for classification. In Proc. 2005 SIAM Conf. Data Mining (SDM'05), pp. 205-216, Newport Beach, CA, Apr. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  655. W. Wang, H. Lu, J. Feng, and J. X. Yu. Condensed cube: An effective approach to reducing data cube size. In Proc. 2002 Int. Conf. Data Engineering (ICDE'02), pp. 155-165, San Fransisco, CA, Apr. 2002. Google ScholarGoogle ScholarCross RefCross Ref
  656. B. Widrow, D. E. Rumelhart, and M. A. Lehr. Neural networks: Applications in industry, business and science. Communications of the ACM, 37:93-105, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  657. R. Wang, V. Storey, and C. Firth. A framework for analysis of data quality research. IEEE Trans. Knowledge and Data Engineering, 7:623-640, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  658. C. F. J. Wu. On the convergence properties of the EM algorithm. Ann. Statistics, 11:95- 103, 1983.Google ScholarGoogle ScholarCross RefCross Ref
  659. Y. Wand and R. Wang. Anchoring data quality dimensions in ontological foundations. Communications of the ACM, 39:86-95, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  660. H. Wang, W. Wang, J. Yang, and P. S. Yu. Clustering by pattern similarity in large data sets. In Proc. 2002 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'02), pp. 418-427, Madison, WI, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  661. T. Wu, D. Xin, and J. Han. ARCube: Supporting ranking aggregate queries in partially materialized data cubes. In Proc. 2008 ACM SIGMOD Int. Conf. Management of Data (SIGMOD'08), pp. 79-92, Vancouver, British Columbia, Canada, June 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  662. T. Wu, D. Xin, Q. Mei, and J. Han. Promotion analysis in multi-dimensional space. In Proc. 2009 Int. Conf. Very Large Data Bases (VLDB'09), 2(1):109-120, Lyon, France, Aug. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  663. W. Wang, J. Yang, and R. Muntz. STING: A statistical information grid approach to spatial data mining. In Proc. 1997 Int. Conf. Very Large Data Bases (VLDB'97), pp. 186-195, Athens, Greece, Aug. 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  664. D. Xin, H. Cheng, X. Yan, and J. Han. Extracting redundancy-aware top-k patterns. In Proc. 2006 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'06), pp. 444-453, Philadelphia, PA, Aug. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  665. D. Xin, J. Han, H. Cheng, and X. Li. Answering top-k queries with multi-dimensional selections: The ranking cube approach. In Proc. 2006 Int. Conf. Very Large Data Bases (VLDB'06), pp. 463-475, Seoul, Korea, Sept. 2006. Google ScholarGoogle Scholar
  666. D. Xin, J. Han, X. Li, and B. W. Wah. Star-cubing: Computing iceberg cubes by top-down and bottom-up integration. In Proc. 2003 Int. Conf. Very Large Data Bases (VLDB'03), pp. 476-487, Berlin, Germany, Sept. 2003. Google ScholarGoogle Scholar
  667. D. Xin, J. Han, Z. Shao, and H. Liu. C-cubing: Efficient computation of closed cubes by aggregation-based checking. In Proc. 2006 Int. Conf. Data Engineering (ICDE'06), p. 4, Atlanta, GA, Apr. 2006. Google ScholarGoogle Scholar
  668. D. Xin, J. Han, X. Yan, and H. Cheng. Mining compressed frequent-pattern sets. In Proc. 2005 Int. Conf. Very Large Data Bases (VLDB'05), pp. 709-720, Trondheim, Norway, Aug. 2005. Google ScholarGoogle Scholar
  669. Y. Xiang, K. G. Olesen, and F. V. Jensen. Practical issues in modeling large diagnostic systems withmultiply sectioned Bayesian networks. Intl. J. Pattern Recognition and Artificial Intelligence (IJPRAI), 14:59-71, 2000.Google ScholarGoogle Scholar
  670. Z. Xing, J. Pei, and E. Keogh. A brief survey on sequence classification. SIGKDD Explorations, 12:40-48, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  671. H. Xiong, S. Shekhar, Y. Huang, V. Kumar, X. Ma, and J. S. Yoo. A framework for discovering co-location patterns in data sets with extended spatial objects. In Proc. 2004 SIAM Int. Conf. Data Mining (SDM'04), Lake Buena Vista, FL, Apr. 2004.Google ScholarGoogle ScholarCross RefCross Ref
  672. X. Xu, N. Yuruk, Z. Feng, and T. A. J. Schweiger. SCAN: A structural clustering algorithm for networks. In Proc. 2007 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'07), pp. 824-833, San Jose, CA, Aug. 2007. Google ScholarGoogle Scholar
  673. T. Xu, Z. M. Zhang, P. S. Yu, and B. Long. Evolutionary clustering by hierarchical Dirichlet process with hidden Markov state. In Proc. 2008 Int. Conf. Data Mining (ICDM'08), pp. 658-667, Pisa, Italy, Dec. 2008. Google ScholarGoogle Scholar
  674. N. Ye and Q. Chen. An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems. Quality and Reliability Engineering International, 17:105-112, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  675. X. Yan, H. Cheng, J. Han, and D. Xin. Summarizing itemset patterns: A profile-based approach. In Proc. 2005 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'05), pp. 314-323, Chicago, IL, Aug. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  676. C. Yang, U. Fayyad, and P. S. Bradley. Efficient discovery of error-tolerant frequent itemsets in high dimensions. In Proc. 2001 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'01), pp. 194-203, San Fransisco, CA, Aug. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  677. K. Yoda, T. Fukuda, Y. Morimoto, S. Morishita, and T. Tokuyama. Computing optimized rectilinear regions for association rules. In Proc. 1997 Int. Conf. Knowledge Discovery and Data Mining (KDD'97), pp. 96-103, Newport Beach, CA, Aug. 1997.Google ScholarGoogle Scholar
  678. X. Yan and J. Han. gSpan: Graph-based substructure pattern mining. In Proc. 2002 Int. Conf. Data Mining (ICDM'02), pp. 721-724, Maebashi, Japan, Dec. 2002. Google ScholarGoogle Scholar
  679. X. Yan and J. Han. CloseGraph: Mining closed frequent graph patterns. In Proc. 2003 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'03), pp. 286-295, Washington, DC, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  680. X. Yin and J. Han. CPAR: Classification based on predictive association rules. In Proc. 2003 SIAM Int. Conf. Data Mining (SDM'03), pp. 331-335, San Fransisco, CA, May 2003.Google ScholarGoogle ScholarCross RefCross Ref
  681. X. Yan, J. Han, and R. Afshar. CloSpan: Mining closed sequential patterns in large datasets. In Proc. 2003 SIAM Int. Conf. Data Mining (SDM'03), pp. 166-177, San Fransisco, CA, May 2003.Google ScholarGoogle ScholarCross RefCross Ref
  682. P. S. Yu, J. Han, and C. Faloutsos. Link Mining: Models, Algorithms and Applications. New York: Springer, 2010. Google ScholarGoogle Scholar
  683. X. Yin, J. Han, and P. S. Yu. Cross-relational clustering with user's guidance. In Proc. 2005 ACM SIGKDD Int. Conf. Knowledge Discovery in Databases (KDD'05), pp. 344-353, Chicago, IL, Aug. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  684. X. Yin, J. Han, and P. S. Yu. Object distinction: Distinguishing objects with identical names by link analysis. In Proc. 2007 Int. Conf. Data Engineering (ICDE'07), Istanbul, Turkey, Apr. 2007.Google ScholarGoogle Scholar
  685. X. Yin, J. Han, and P. S. Yu. Truth discovery with multiple conflicting information providers on the Web. IEEE Trans. Knowledge and Data Engineering, 20:796-808, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  686. X. Yin, J. Han, J. Yang, and P. S. Yu. CrossMine: Efficient classification across multiple database relations. In Proc. 2004 Int. Conf. Data Engineering (ICDE'04), pp. 399-410, Boston, MA, Mar. 2004. Google ScholarGoogle Scholar
  687. L. Ye and E. Keogh. Time series shapelets: A new primitive for data mining. In Proc. 2009 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'09), pp. 947-956, Paris, France, June 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  688. J. Yuan, Y. Wu, and M. Yang. Discovery of collocation patterns: From visual words to visual phrases. In Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR'07), pp. 1-8, Minneapolis, MN, June 2007.Google ScholarGoogle ScholarCross RefCross Ref
  689. H. Yu, J. Yang, and J. Han. Classifying large data sets using SVM with hierarchical clusters. In Proc. 2003 ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'03), pp. 306-315, Washington, DC, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  690. X. Yan, P. S. Yu, and J. Han. Graph indexing based on discriminative frequent structure analysis. ACM Trans. Database Systems, 30:960-993, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  691. R. R. Yager and L. A. Zadeh. Fuzzy Sets, Neural Networks and Soft Computing. Van Nostrand Reinhold, 1994. Google ScholarGoogle Scholar
  692. X. Yan, F. Zhu, P. S. Yu, and J. Han. Feature-based substructure similarity search. ACM Trans. Database Systems, 31:1418-1453, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  693. L. A. Zadeh. Fuzzy sets. Information and Control, 8:338-353, 1965.Google ScholarGoogle ScholarDigital LibraryDigital Library
  694. L. Zadeh. Commonsense knowledge representation based on fuzzy logic. Computer, 16:61-65, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  695. M. J. Zaki. Scalable algorithms for association mining. IEEE Trans. Knowledge and Data Engineering, 12:372-390, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  696. M. Zaki. SPADE: An efficient algorithm for mining frequent sequences. Machine Learning, 40:31-60, 2001. Google ScholarGoogle ScholarCross RefCross Ref
  697. Y. Zhao, P. M. Deshpande, and J. F. Naughton. An array-based algorithm for simultaneous multidimensional aggregates. In Proc. 1997 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'97), pp. 159-170, Tucson, AZ, May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  698. M. J. Zaki and C. J. Hsiao. CHARM: An efficient algorithm for closed itemset mining. In Proc. 2002 SIAM Int. Conf. Data Mining (SDM'02), pp. 457-473, Arlington, VA, Apr. 2002.Google ScholarGoogle ScholarCross RefCross Ref
  699. C. Zhai. Statistical Language Models for Information Retrieval. Morgan and Claypool, 2008. Google ScholarGoogle Scholar
  700. O. R. Zaïane, J. Han, Z. N. Li, J. Y. Chiang, and S. Chee. Multi Media-Miner: A system prototype for multimedia data mining. In Proc. 1998 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'98), pp. 581-583, Seattle, WA, June 1998. Google ScholarGoogle Scholar
  701. X. Zhu. Semi-supervised learning literature survey. In Computer Sciences Technical Report 1530, University of Wisconsin-Madison, 2005.Google ScholarGoogle Scholar
  702. O. R. Zaïane, J. Han, and H. Zhu. Mining recurrent items in multimedia with progressive resolution refinement. In Proc. 2000 Int. Conf. Data Engineering (ICDE'00), pp. 461-470, San Diego, CA, Feb. 2000. Google ScholarGoogle ScholarCross RefCross Ref
  703. W. Ziarko. The discovery, analysis, and representation of data dependencies in databases. In G. Piatetsky-Shapiro and W. J. Frawley (eds.), Knowledge Discovery in Databases, pp. 195-209. AAAI Press, 1991.Google ScholarGoogle Scholar
  704. Z.-H. Zhou and X.-Y. Liu. Training cost-sensitive neural networks with methods addressing the class imbalance problem. IEEE Trans. Knowledge and Data Engineering, 18:63-77, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  705. M. J. Zaki, S. Parthasarathy, M. Ogihara, and W. Li. Parallel algorithm for discovery of association rules. Data Mining and Knowledge Discovery, 1:343-374, 1997. Google ScholarGoogle ScholarCross RefCross Ref
  706. T. Zhang, R. Ramakrishnan, and M. Livny. BIRCH: An efficient data clustering method for very large databases. In Proc. 1996 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'96), pp. 103-114, Montreal, Quebec, Canada, June 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  707. N. Zapkowicz and S. Stephen. The class imbalance program: A systematic study. Intelligence Data Analysis, 6:429-450, 2002. Google ScholarGoogle ScholarCross RefCross Ref
  708. F. Zhu, X. Yan, J. Han, P. S. Yu, and H. Cheng. Mining colossal frequent patterns by core pattern fusion. In Proc. 2007 Int. Conf. Data Engineering (ICDE'07), pp. 706-715, Istanbul, Turkey, Apr. 2007.Google ScholarGoogle ScholarCross RefCross Ref
  709. F. Zhu, X. Yan, J. Han, and P. S. Yu. gPrune: A constraint pushing framework for graph pattern mining. In Proc. 2007 Pacific-Asia Conf. Knowledge Discovery and Data Mining (PAKDD'07), pp. 388-400, Nanjing, China, May 2007. Google ScholarGoogle ScholarCross RefCross Ref
  710. Z. Zhang and R. Zhang. Multimedia Data Mining: A Systematic Introduction to Concepts and Theory. Chapman & Hall, 2009. Google ScholarGoogle Scholar
  711. D. Zhang, C. Zhai, and J. Han. Topic cube: Topic modeling for OLAP on multidimensional text databases. In Proc. 2009 SIAM Int. Conf. Data Mining (SDM'09), pp. 1123-1134, Sparks, NV, Apr. 2009.Google ScholarGoogle ScholarCross RefCross Ref

Cited By

  1. ACM
    Chow K, Deshpande U, Deenadayalan V, Seshadri S and Liu L Atlas: Hybrid Cloud Migration Advisor for Interactive Microservices Proceedings of the Nineteenth European Conference on Computer Systems, (870-887)
  2. Zand J, Katebi J and Yaghmaei-Sabegh S (2024). A hybrid clustering-based type-2 adaptive neuro-fuzzy forecasting model for smart control systems, Expert Systems with Applications: An International Journal, 239:C, Online publication date: 1-Apr-2024.
  3. ACM
    Pimenta T, Ceschin F and Gregio A (2023). ANDROIDGYNY: Reviewing Clustering Techniques for Android Malware Family Classification, Digital Threats: Research and Practice, 5:1, (1-35), Online publication date: 31-Mar-2024.
  4. Bolorunduro J and Zou Z (2024). Community Detection On Multi-layer Graph using Intra-layer and Inter-layer Linkage Graphs (CDMIILG), Expert Systems with Applications: An International Journal, 238:PA, Online publication date: 15-Mar-2024.
  5. Karami A and Niaki S (2024). An Online Support Vector Machine Algorithm for Dynamic Social Network Monitoring, Neural Networks, 171:C, (497-511), Online publication date: 1-Mar-2024.
  6. Dalbah L, Al-Betar M and Awadallah M (2024). Jaya clustering-based algorithm for multiobjective IoV network routing optimization, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 28:6, (5639-5665), Online publication date: 1-Mar-2024.
  7. Jiang J and Zhang X (2024). Feature selection based on self-information combining double-quantitative class weights and three-order approximation accuracies in neighborhood rough sets, Information Sciences: an International Journal, 657:C, Online publication date: 1-Feb-2024.
  8. Mokkadem A, Pelletier M and Raimbault L (2024). SufRec, an algorithm for mining association rules, Expert Systems with Applications: An International Journal, 236:C, Online publication date: 1-Feb-2024.
  9. Zhang X, Chang J, Ge Z and Sheng Z (2024). A family of gradient methods using Householder transformation with application to hypergraph partitioning, Numerical Algorithms, 95:2, (897-927), Online publication date: 1-Feb-2024.
  10. Morovatian I, Basiri A and Rezaei S (2024). RUCIB: a novel rule-based classifier based on BRADO algorithm, Computing, 106:2, (495-519), Online publication date: 1-Feb-2024.
  11. ACM
    Hernando K and Samonte M Using Data Mining to Uncover Association of Philippines' Demographic Data to Tuberculosis Proceedings of the 2024 7th International Conference on Software Engineering and Information Management, (49-57)
  12. Nayem K and Williamson D (2024). Attention-Based Speech Enhancement Using Human Quality Perception Modeling, IEEE/ACM Transactions on Audio, Speech and Language Processing, 32, (250-260), Online publication date: 1-Jan-2024.
  13. Braik M, Hammouri A, Alzoubi H and Sheta A (2024). Feature Selection based nature inspired Capuchin Search Algorithm for solving classification problems, Expert Systems with Applications: An International Journal, 235:C, Online publication date: 1-Jan-2024.
  14. Kaur I and Ahmad T (2024). A cluster-based ensemble approach for congenital heart disease prediction, Computer Methods and Programs in Biomedicine, 243:C, Online publication date: 1-Jan-2024.
  15. Fernando Panicachi Cocovilo Filho L and Palermo Coelho G (2024). Evaluating the impact of drift detection mechanisms on stock market forecasting, Knowledge and Information Systems, 66:1, (723-763), Online publication date: 1-Jan-2024.
  16. Zhang W, Shen X, Zhang H, Yin Z, Sun J, Zhang X and Zou L (2024). Feature importance measure of a multilayer perceptron based on the presingle-connection layer, Knowledge and Information Systems, 66:1, (511-533), Online publication date: 1-Jan-2024.
  17. Chakraborty S, Saha A, Ezugwu A, Chakraborty R and Saha A (2023). Horizontal crossover and co-operative hunting-based Whale Optimization Algorithm for feature selection, Knowledge-Based Systems, 282:C, Online publication date: 20-Dec-2023.
  18. Zhou S, Huang X, Liu N, Zhou H, Chung F and Huang L (2023). Improving Generalizability of Graph Anomaly Detection Models via Data Augmentation, IEEE Transactions on Knowledge and Data Engineering, 35:12, (12721-12735), Online publication date: 1-Dec-2023.
  19. Elias P, Campos H, Ogasawara E and Murta L (2024). Towards accurate recommendations of merge conflicts resolution strategies, Information and Software Technology, 164:C, Online publication date: 1-Dec-2023.
  20. Zaman N, Hau Y, Leong M and Al-ashwal R (2023). A review on the significance of body temperature interpretation for early infectious disease diagnosis, Artificial Intelligence Review, 56:12, (15449-15494), Online publication date: 1-Dec-2023.
  21. Lima F and Souza V (2023). A Large Comparison of Normalization Methods on Time Series, Big Data Research, 34:C, Online publication date: 28-Nov-2023.
  22. Khan A, Mishra A and Mohanty S (2023). An entropy-based weighted dissimilarity metric for numerical data clustering using the distribution of intra feature differences, Knowledge-Based Systems, 280:C, Online publication date: 25-Nov-2023.
  23. Maden E and Karagoz P (2023). Recent methods on short text stream clustering, WIREs Computational Statistics, 15:6, Online publication date: 3-Nov-2023.
  24. Kang D, Lee W, Lee Y, Han K and Kim S (2023). A Framework for Accurate Community Detection on Signed Networks Using Adversarial Learning, IEEE Transactions on Knowledge and Data Engineering, 35:11, (10937-10951), Online publication date: 1-Nov-2023.
  25. Mittal M, Kumar K and Behal S (2023). DL-2P-DDoSADF, Journal of Information Security and Applications, 78:C, Online publication date: 1-Nov-2023.
  26. Mennella C, Maniscalco U, Pietro G and Esposito M (2023). A deep learning system to monitor and assess rehabilitation exercises in home-based remote and unsupervised conditions, Computers in Biology and Medicine, 166:C, Online publication date: 1-Nov-2023.
  27. Soto-Ferrari M, Bhattacharyya K and Schikora P (2024). POST-BaLSTM, Computers and Industrial Engineering, 185:C, Online publication date: 1-Nov-2023.
  28. Altaf A, Anwar M, Jamal M and Bajwa U (2023). Exploiting Linguistic Features for Effective Sentence-Level Sentiment Analysis in Urdu Language, Multimedia Tools and Applications, 82:27, (41813-41839), Online publication date: 1-Nov-2023.
  29. ACM
    Hu T, Dubois D and Choffnes D BehavIoT: Measuring Smart Home IoT Behavior Using Network-Inferred Behavior Models Proceedings of the 2023 ACM on Internet Measurement Conference, (421-436)
  30. Wang M, Han H, Huang Z and Xie J (2023). Unsupervised spectral feature selection algorithms for high dimensional data, Frontiers of Computer Science: Selected Publications from Chinese Universities, 17:5, Online publication date: 1-Oct-2023.
  31. Alhowaide A, Alsmadi I and Tang J (2023). Towards the design of real-time autonomous IoT NIDS, Cluster Computing, 26:5, (2489-2502), Online publication date: 1-Oct-2023.
  32. Agerskov J, Nielsen K and Pedersen C (2023). Computationally Efficient Labeling of Cancer-Related Forum Posts by Non-clinical Text Information Retrieval, SN Computer Science, 4:6, Online publication date: 18-Sep-2023.
  33. Dai J, Wang Z and Huang W (2023). Interval-valued fuzzy discernibility pair approach for attribute reduction in incomplete interval-valued information systems, Information Sciences: an International Journal, 642:C, Online publication date: 1-Sep-2023.
  34. Shedthi B S, Siddappa M, Shetty S, Shetty V and Suresh R (2023). Detection and classification of diseased plant leaf images using hybrid algorithm, Multimedia Tools and Applications, 82:21, (32349-32372), Online publication date: 1-Sep-2023.
  35. Previtali D, Mazzoleni M, Ferramosca A and Previdi F (2023). GLISp-r: a preference-based optimization algorithm with convergence guarantees, Computational Optimization and Applications, 86:1, (383-420), Online publication date: 1-Sep-2023.
  36. Domova V and Vrotsou K (2023). A Model for Types and Levels of Automation in Visual Analytics: A Survey, a Taxonomy, and Examples, IEEE Transactions on Visualization and Computer Graphics, 29:8, (3550-3568), Online publication date: 1-Aug-2023.
  37. Baser F, Koc O and Selcuk-Kestel A (2023). Credit risk evaluation using clustering based fuzzy classification method, Expert Systems with Applications: An International Journal, 223:C, Online publication date: 1-Aug-2023.
  38. Chien C, Trappey A and Wang C (2023). ARIMA-AdaBoost hybrid approach for product quality prediction in advanced transformer manufacturing, Advanced Engineering Informatics, 57:C, Online publication date: 1-Aug-2023.
  39. Jebari C, Herrera-Viedma E and Cobo M (2023). Context-aware citation recommendation of scientific papers: comparative study, gaps and trends, Scientometrics, 128:8, (4243-4268), Online publication date: 1-Aug-2023.
  40. Salam M, Basu Roy S and Das G (2023). Efficient approximate top-k mutual information based feature selection, Journal of Intelligent Information Systems, 61:1, (191-223), Online publication date: 1-Aug-2023.
  41. Abdelhakim A (2023). Machine learning for localization of radioactive sources via a distributed sensor network, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 27:15, (10493-10508), Online publication date: 1-Aug-2023.
  42. ACM
    Chen Z, Chen J, Wang W, Zhou J, Wang M, Chen X, Zhou S and Wang J (2022). Exploring Better Black-Box Test Case Prioritization via Log Analysis, ACM Transactions on Software Engineering and Methodology, 32:3, (1-32), Online publication date: 31-Jul-2023.
  43. Zhang X, Liu H, Meng F and Shen X (2023). Group target tracking via jointly optimizing group partition and association, Automatica (Journal of IFAC), 153:C, Online publication date: 1-Jul-2023.
  44. Fernández-Gómez A, Gutiérrez-Avilés D, Troncoso A and Martínez-Álvarez F (2023). A new Apache Spark-based framework for big data streaming forecasting in IoT networks, The Journal of Supercomputing, 79:10, (11078-11100), Online publication date: 1-Jul-2023.
  45. Marques H, Swersky L, Sander J, Campello R and Zimek A (2023). On the evaluation of outlier detection and one-class classification: a comparative study of algorithms, model selection, and ensembles, Data Mining and Knowledge Discovery, 37:4, (1473-1517), Online publication date: 1-Jul-2023.
  46. Oyewole G and Thopil G (2022). Data clustering: application and trends, Artificial Intelligence Review, 56:7, (6439-6475), Online publication date: 1-Jul-2023.
  47. ACM
    Yates D and Islam M (2022). Data Mining on Smartphones: An Introduction and Survey, ACM Computing Surveys, 55:5, (1-38), Online publication date: 30-Jun-2023.
  48. Novick D and Last M Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan, and Israel Cyber Security, Cryptology, and Machine Learning, (151-169)
  49. Gijón C, Toril M and Luna-Ramírez S (2023). Data-Driven Estimation of Throughput Performance in Sliced Radio Access Networks via Supervised Learning, IEEE Transactions on Network and Service Management, 20:2, (1008-1023), Online publication date: 1-Jun-2023.
  50. Ali S, Abusabha O, Ali F, Imran M and Abuhmed T (2023). Effective Multitask Deep Learning for IoT Malware Detection and Identification Using Behavioral Traffic Analysis, IEEE Transactions on Network and Service Management, 20:2, (1199-1209), Online publication date: 1-Jun-2023.
  51. Junaid M, Ali S, Eid F, El-Sappagh S and Abuhmed T (2023). Explainable machine learning models based on multimodal time-series data for the early detection of Parkinson’s disease, Computer Methods and Programs in Biomedicine, 234:C, Online publication date: 1-Jun-2023.
  52. Panskyi T and Korzeniewska E (2023). Statistical and clustering validation analysis of primary students' learning outcomes and self-awareness of information and technical online security problems at a post-pandemic time, Education and Information Technologies, 28:6, (6423-6451), Online publication date: 1-Jun-2023.
  53. Zavrak S and Iskefiyeli M (2023). Flow-based intrusion detection on software-defined networks: a multivariate time series anomaly detection approach, Neural Computing and Applications, 35:16, (12175-12193), Online publication date: 1-Jun-2023.
  54. Oliveira A, Neves V, Plastino A, Bibiano A, Garcia A and Murta L Do Code Refactorings Influence the Merge Effort? Proceedings of the 45th International Conference on Software Engineering, (134-146)
  55. Chen Z, Manolios P and Riedewald M (2023). Why Not Yet: Fixing a Top-k Ranking that is Not Fair to Individuals, Proceedings of the VLDB Endowment, 16:9, (2377-2390), Online publication date: 1-May-2023.
  56. Zhang S, Zhang J, Li J, Guo P and Pedrycz W (2023). A user-guided reduction concept lattice and its algebraic structure, Expert Systems with Applications: An International Journal, 217:C, Online publication date: 1-May-2023.
  57. Mirzaie M, Behkamal B, Allahbakhsh M, Paydar S and Bertino E (2023). State of the art on quality control for data streams, Computer Science Review, 48:C, Online publication date: 1-May-2023.
  58. İnkaya T (2023). Consensus similarity graph construction for clustering, Pattern Analysis & Applications, 26:2, (703-733), Online publication date: 1-May-2023.
  59. Xu W, Li T, Wang J and Tang Y (2023). Detecting vulnerable software functions via text and dependency features, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 27:9, (5425-5435), Online publication date: 1-May-2023.
  60. ACM
    Hong J and Kim S C-Affinity: A Novel Similarity Measure for Effective Data Clustering Companion Proceedings of the ACM Web Conference 2023, (41-44)
  61. Haseli G, Ranjbarzadeh R, Hajiaghaei-Keshteli M, Jafarzadeh Ghoushchi S, Hasani A, Deveci M and Ding W (2023). HECON, Information Sciences: an International Journal, 623:C, (184-205), Online publication date: 1-Apr-2023.
  62. Gomes J, Bernardino H, de Souza J and Rajabi E (2022). Indexing, enriching, and understanding Brazilian missing person cases from data of distributed repositories on the web, AI & Society, 38:2, (565-579), Online publication date: 1-Apr-2023.
  63. ACM
    Rubin F, Souza P and Ferreto T Reducing Power Consumption during Server Maintenance on Edge Computing Infrastructures Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, (691-698)
  64. ACM
    Bertl M, Shahin M, Ross P and Draheim D Finding Indicator Diseases of Psychiatric Disorders in BigData using Clustered Association Rule Mining Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, (826-833)
  65. Majumdar S, Pramanik P and Sarkar R (2023). Gamma function based ensemble of CNN models for breast cancer detection in histopathology images, Expert Systems with Applications: An International Journal, 213:PB, Online publication date: 1-Mar-2023.
  66. Alzaqebah A, Al-Kadi O and Aljarah I (2023). An enhanced Harris hawk optimizer based on extreme learning machine for feature selection, Progress in Artificial Intelligence, 12:1, (77-97), Online publication date: 1-Mar-2023.
  67. Najjar-Ghabel S, Farzinvash L and Razavi S (2023). Data harvesting in wireless sensor networks using mobile sinks under real-world circumstances, The Journal of Supercomputing, 79:5, (5486-5515), Online publication date: 1-Mar-2023.
  68. Nascimento K, Santos F, Jale J, Júnior S and Ferreira T (2023). Extracting Rules via Markov Chains for Cryptocurrencies Returns Forecasting, Computational Economics, 61:3, (1095-1114), Online publication date: 1-Mar-2023.
  69. Yasmin G, Chowdhury S, Nayak J, Das P and Das A (2023). Key moment extraction for designing an agglomerative clustering algorithm-based video summarization framework, Neural Computing and Applications, 35:7, (4881-4902), Online publication date: 1-Mar-2023.
  70. Sheikhpour R (2023). A local spline regression-based framework for semi-supervised sparse feature selection, Knowledge-Based Systems, 262:C, Online publication date: 28-Feb-2023.
  71. Mishra A, Gupta N and Gupta B (2023). Defensive mechanism against DDoS attack based on feature selection and multi-classifier algorithms, Telecommunications Systems, 82:2, (229-244), Online publication date: 1-Feb-2023.
  72. Bedru H, Zhang C, Xie F, Yu S and Hussain I (2023). CLARA: citation and similarity-based author ranking, Scientometrics, 128:2, (1091-1117), Online publication date: 1-Feb-2023.
  73. Kumar S and Chauhan A (2023). Augmenting Textbooks with cQA Question-Answers and Annotated YouTube Videos to Increase Its Relevance, Neural Processing Letters, 55:1, (551-588), Online publication date: 1-Feb-2023.
  74. Sarker I, Khan A, Abushark Y and Alsolami F (2023). Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions, Mobile Networks and Applications, 28:1, (296-312), Online publication date: 1-Feb-2023.
  75. Ewees A, Al-qaness M, Abualigah L, Algamal Z, Oliva D, Yousri D and Elaziz M (2023). Enhanced feature selection technique using slime mould algorithm: a case study on chemical data, Neural Computing and Applications, 35:4, (3307-3324), Online publication date: 1-Feb-2023.
  76. Zhao J, Knoop V and Wang M (2023). Microscopic Traffic Modeling Inside Intersections, Transportation Science, 57:1, (135-155), Online publication date: 1-Jan-2023.
  77. Fathalla A, Salah A, Bekhit M, Eldesouky E, Talha A, Zenhom A, Ali A and Memmolo V (2023). Real-Time and Automatic System for Performance Evaluation of Karate Skills Using Motion Capture Sensors and Continuous Wavelet Transform, International Journal of Intelligent Systems, 2023, Online publication date: 1-Jan-2023.
  78. Stańczyk U and Baron G (2024). Should supervised discretisation always be trusted unreservedly? On combining characteristics of supervised and unsupervised discretisation algorithms in two-step processing, Procedia Computer Science, 225:C, (2136-2145), Online publication date: 1-Jan-2023.
  79. King L and Osborn W (2023). Ensemble Methods for Spatial Data Stream Classification, Procedia Computer Science, 224:C, (155-162), Online publication date: 1-Jan-2023.
  80. Wang B, Liang J and Yao Y (2023). A trilevel analysis of uncertainty measuresin partition-based granular computing, Artificial Intelligence Review, 56:1, (533-575), Online publication date: 1-Jan-2023.
  81. Koshy R and Elango S (2023). Multimodal tweet classification in disaster response systems using transformer-based bidirectional attention model, Neural Computing and Applications, 35:2, (1607-1627), Online publication date: 1-Jan-2023.
  82. ACM
    Liu C, Xia X, Lo D, Gao C, Yang X and Grundy J (2021). Opportunities and Challenges in Code Search Tools, ACM Computing Surveys, 54:9, (1-40), Online publication date: 31-Dec-2022.
  83. Khodabandehlou S and Alireza Hashemi Golpayegani S (2022). Market manipulation detection, Expert Systems with Applications: An International Journal, 210:C, Online publication date: 30-Dec-2022.
  84. Almutairi M, Stahl F and Bramer M CRC: Consolidated Rules Construction for Expressive Ensemble Classification Artificial Intelligence XXXIX, (138-152)
  85. Angelini M, Blasilli G, Lenti S, Palleschi A and Santucci G (2022). Effectiveness Error: Measuring and Improving RadViz Visual Effectiveness, IEEE Transactions on Visualization and Computer Graphics, 28:12, (4770-4786), Online publication date: 1-Dec-2022.
  86. Jabbari M and Moslemi H (2022). Adaptive mesh refinement in polygonal finite elements using clustering technique, Finite Elements in Analysis and Design, 212:C, Online publication date: 1-Dec-2022.
  87. Chalé M and Bastian N (2022). Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems, Expert Systems with Applications: An International Journal, 207:C, Online publication date: 30-Nov-2022.
  88. Braga F, Roman N and Falceta-Gonçalves D The Effects of Under and Over Sampling in Exoplanet Transit Identification with Low Signal-to-Noise Ratio Data Intelligent Systems, (107-121)
  89. Pujahari A and Sisodia D (2022). Item feature refinement using matrix factorization and boosted learning based user profile generation for content-based recommender systems, Expert Systems with Applications: An International Journal, 206:C, Online publication date: 15-Nov-2022.
  90. Hossain E, Hossain M, Zander P and Andersson K (2022). Machine learning with Belief Rule-Based Expert Systems to predict stock price movements, Expert Systems with Applications: An International Journal, 206:C, Online publication date: 15-Nov-2022.
  91. Hu Z, Shao M and Liang M Rule Acquisition in Generalized One-Sided Decision Systems Rough Sets, (176-190)
  92. ACM
    Chang Z, Li M, Wang J, Wang Q and Li S Putting them under microscope: a fine-grained approach for detecting redundant test cases in natural language Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (1161-1172)
  93. Samorani M, Harris S, Blount L, Lu H and Santoro M (2022). Overbooked and Overlooked, Manufacturing & Service Operations Management, 24:6, (2825-2842), Online publication date: 1-Nov-2022.
  94. Jiao L, Denœux T, Liu Z and Pan Q (2022). EGMM, Applied Soft Computing, 129:C, Online publication date: 1-Nov-2022.
  95. Mohammadian Fini R, Mahlouji M and Shahidinejad A (2022). Performance improvement in face recognition system using optimized Gabor filters, Multimedia Tools and Applications, 81:27, (38375-38408), Online publication date: 1-Nov-2022.
  96. Alqmase M, Alshayeb M and Ghouti L (2022). Quality assessment framework to rank software projects, Automated Software Engineering, 29:2, Online publication date: 1-Nov-2022.
  97. ACM
    Segarra-Faggioni V, Ratté S and De Jong F Semantic similarity analysis between the student's reports with the authoritative sources Proceedings of the 14th International Conference on Education Technology and Computers, (599-605)
  98. ACM
    Beckmann S, Till J and Bauer B Endpoint-Performance-Monitoring for a better End-User Experience Proceedings of the 2022 European Symposium on Software Engineering, (63-71)
  99. ACM
    Barret N, Manolescu I and Upadhyay P Abstra: Toward Generic Abstractions for Data of Any Model Proceedings of the 31st ACM International Conference on Information & Knowledge Management, (4803-4807)
  100. ACM
    Jiang Y, Li Q, Zhu H, Yu J, Li J, Xu Z, Dong H and Zheng B Adaptive Domain Interest Network for Multi-domain Recommendation Proceedings of the 31st ACM International Conference on Information & Knowledge Management, (3212-3221)
  101. Jenhani I, Khlifi G, Sidiropoulos P, Jansen H and Frangou G Non-specificity-based Supervised Discretization for Possibilistic Classification Scalable Uncertainty Management, (249-262)
  102. Abbasimehr H and Sheikh Baghery F (2022). A novel time series clustering method with fine-tuned support vector regression for customer behavior analysis, Expert Systems with Applications: An International Journal, 204:C, Online publication date: 15-Oct-2022.
  103. ACM
    Lima C and Soares D On the Nature of Duplicate Pull Requests: An Empirical Study Using Association Rules Proceedings of the 16th Brazilian Symposium on Software Components, Architectures, and Reuse, (68-75)
  104. KVTKN P and Ramakrishnudu T (2022). A novel method for detecting psychological stress at tweet level using neighborhood tweets, Journal of King Saud University - Computer and Information Sciences, 34:9, (6663-6680), Online publication date: 1-Oct-2022.
  105. Dhiman A and Toshniwal D (2022). AI-based Twitter framework for assessing the involvement of government schemes in electoral campaigns, Expert Systems with Applications: An International Journal, 203:C, Online publication date: 1-Oct-2022.
  106. Kannimuthu S and Chakravarthy D (2022). Discovery of Interesting Itemsets for Web Service Composition Using Hybrid Genetic Algorithm, Neural Processing Letters, 54:5, (3913-3939), Online publication date: 1-Oct-2022.
  107. Abdali S, Mukherjee S and Papalexakis E Vec2Node: Self-Training with Tensor Augmentation for Text Classification with Few Labels Machine Learning and Knowledge Discovery in Databases, (571-587)
  108. Ahmed A, Ashour O, Ali H and Firouz M (2022). An integrated optimization and machine learning approach to predict the admission status of emergency patients, Expert Systems with Applications: An International Journal, 202:C, Online publication date: 15-Sep-2022.
  109. Nam K (2022). Conversion paths of online consumers, Expert Systems with Applications: An International Journal, 202:C, Online publication date: 15-Sep-2022.
  110. Liu Y, Guo M, Hu S and Zhe W Enhancing Vehicle State Recognition in Logistics Industrial Parks via Dynamic Hidden Markov Model 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), (1-8)
  111. Bešinović N, De Donato L, Flammini F, Goverde R, Lin Z, Liu R, Marrone S, Nardone R, Tang T and Vittorini V (2022). Artificial Intelligence in Railway Transport: Taxonomy, Regulations, and Applications, IEEE Transactions on Intelligent Transportation Systems, 23:9, (14011-14024), Online publication date: 1-Sep-2022.
  112. Gad A, Sallam K, Chakrabortty R, Ryan M and Abohany A (2022). An improved binary sparrow search algorithm for feature selection in data classification, Neural Computing and Applications, 34:18, (15705-15752), Online publication date: 1-Sep-2022.
  113. Jyotiyana M, Kesswani N and Kumar M (2022). A deep learning approach for classification and diagnosis of Parkinson’s disease, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 26:18, (9155-9165), Online publication date: 1-Sep-2022.
  114. Hosseini F, Gharehchopogh F and Masdari M (2022). A Botnet Detection in IoT Using a Hybrid Multi-objective Optimization Algorithm, New Generation Computing, 40:3, (809-843), Online publication date: 1-Sep-2022.
  115. ACM
    Oswald C, Simon S and Bhattacharya A (2022). SpotSpam: Intention Analysis–driven SMS Spam Detection Using BERT Embeddings, ACM Transactions on the Web, 16:3, (1-27), Online publication date: 31-Aug-2022.
  116. Hai T, Zhou J, Li N, Jain S, Agrawal S and Dhaou I (2022). Cloud-based bug tracking software defects analysis using deep learning, Journal of Cloud Computing: Advances, Systems and Applications, 11:1, Online publication date: 30-Aug-2022.
  117. Silva D, Carvalho S and Silva N Comparative Analysis of Classification Algorithms Applied to Circular Trading Prediction Scenarios Electronic Government and the Information Systems Perspective, (95-109)
  118. Ahmed S, Sheikh K, Mirjalili S and Sarkar R (2022). Binary Simulated Normal Distribution Optimizer for feature selection, Expert Systems with Applications: An International Journal, 200:C, Online publication date: 15-Aug-2022.
  119. ACM
    Agarwal P, Gao B, Huo S, Reddy P, Dechu S, Obeidi Y, Muthusamy V, Isahagian V and Carbajales S A Process-Aware Decision Support System for Business Processes Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, (2673-2681)
  120. ACM
    Bumin A, Ritz A, Slonim D, Kahveci T and Huang K FiT Proceedings of the 13th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics, (1-10)
  121. Guan Y, Li Y, Li B and Lu Y A Clustering Method Based on Improved Density Estimation and Shared Nearest Neighbors Intelligent Computing Methodologies, (18-31)
  122. Catena T, Eramo V, Panella M and Rosato A (2022). Distributed LSTM-based cloud resource allocation in Network Function Virtualization Architectures, Computer Networks: The International Journal of Computer and Telecommunications Networking, 213:C, Online publication date: 4-Aug-2022.
  123. Moran M, Cohen T, Ben-Zion Y and Gordon G (2022). Curious instance selection, Information Sciences: an International Journal, 608:C, (794-808), Online publication date: 1-Aug-2022.
  124. Schwartz S (2022). An overview of graph covering and partitioning, Discrete Mathematics, 345:8, Online publication date: 1-Aug-2022.
  125. Andersen A and Plesner A (2022). Optimization of the organizational structure in hospitals to account for patients with multiple diseases, Artificial Intelligence in Medicine, 130:C, Online publication date: 1-Aug-2022.
  126. Japa L, Serqueira M, Mendonça I, Bezerra E, Aritsugi M and González P A conjugated evolutionary algorithm for hyperparameter optimization 2022 IEEE Congress on Evolutionary Computation (CEC), (1-9)
  127. Barkhordari M and Niamanesh M (2017). Aras, International Journal of Distributed Systems and Technologies, 8:2, (47-60), Online publication date: 8-Jul-2022.
  128. Sharma L, Bohat V, Habib M, Al-Zoubi A, Faris H and Aljarah I (2022). Evolutionary inspired approach for mental stress detection using EEG signal, Expert Systems with Applications: An International Journal, 197:C, Online publication date: 1-Jul-2022.
  129. Yang J, Ouyang C, van der Aalst W, ter Hofstede A and Yu Y (2022). OrdinoR, Decision Support Systems, 158:C, Online publication date: 1-Jul-2022.
  130. Akgun D, Hizal S and Cavusoglu U (2022). A new DDoS attacks intrusion detection model based on deep learning for cybersecurity, Computers and Security, 118:C, Online publication date: 1-Jul-2022.
  131. Alweshah M, Khalaileh S, Gupta B, Almomani A, Hammouri A and Al-Betar M (2022). The monarch butterfly optimization algorithm for solving feature selection problems, Neural Computing and Applications, 34:14, (11267-11281), Online publication date: 1-Jul-2022.
  132. ACM
    Zhao L (2021). Event Prediction in the Big Data Era, ACM Computing Surveys, 54:5, (1-37), Online publication date: 30-Jun-2022.
  133. ACM
    Li Z, Pan M, Pei Y, Zhang T, Wang L and Li X DeepLabel: Automated Issue Classification for Issue Tracking Systems Proceedings of the 13th Asia-Pacific Symposium on Internetware, (231-241)
  134. ACM
    Pradhan R, Lahiri A, Galhotra S and Salimi B Explainable AI: Foundations, Applications, Opportunities for Data Management Research Proceedings of the 2022 International Conference on Management of Data, (2452-2457)
  135. Bayomie D, Revoredo K and Mendling J Multi-perspective Process Analysis: Mining the Association Between Control Flow and Data Objects Advanced Information Systems Engineering, (72-89)
  136. ACM
    Tulha C, Carvalho M and de Castro L LEDA: A Learning Analytics Based Framework to Analyze Remote Labs Interaction Proceedings of the Ninth ACM Conference on Learning @ Scale, (379-383)
  137. (Rahkar Farshi) T, Agahian S and Dehkharghani R (2022). BinBRO, Expert Systems with Applications: An International Journal, 195:C, Online publication date: 1-Jun-2022.
  138. Zhou Z, Si G, Sun H, Qu K and Hou W (2022). A robust clustering algorithm based on the identification of core points and KNN kernel density estimation, Expert Systems with Applications: An International Journal, 195:C, Online publication date: 1-Jun-2022.
  139. Alipour-Vaezi M, Aghsami A and Jolai F (2022). Prioritizing and queueing the emergency departments’ patients using a novel data-driven decision-making methodology, a real case study, Expert Systems with Applications: An International Journal, 195:C, Online publication date: 1-Jun-2022.
  140. Rao M and Chaparala A (2022). A Novel Feature-Based SHM Assessment and Predication Approach for Robust Evaluation of Damage Data Diagnosis Systems, Wireless Personal Communications: An International Journal, 124:4, (3387-3411), Online publication date: 1-Jun-2022.
  141. Lee C and Chien C (2022). Pitfalls and protocols of data science in manufacturing practice, Journal of Intelligent Manufacturing, 33:5, (1189-1207), Online publication date: 1-Jun-2022.
  142. Bankins S, Formosa P, Griep Y and Richards D (2022). AI Decision Making with Dignity? Contrasting Workers’ Justice Perceptions of Human and AI Decision Making in a Human Resource Management Context, Information Systems Frontiers, 24:3, (857-875), Online publication date: 1-Jun-2022.
  143. dos Santos Lima J, Mauricio Villanueva J and Cavalcanti Catunda S Modeling a Virtual Flow Sensor in a Sugar-Energy Plant using Artificial Neural Network 2022 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), (1-6)
  144. Onan A (2022). Bidirectional convolutional recurrent neural network architecture with group-wise enhancement mechanism for text sentiment classification, Journal of King Saud University - Computer and Information Sciences, 34:5, (2098-2117), Online publication date: 1-May-2022.
  145. Alweshah M, Rababa L, Ryalat M, Al Momani A and Ababneh M (2022). African buffalo algorithm, Journal of King Saud University - Computer and Information Sciences, 34:5, (1808-1818), Online publication date: 1-May-2022.
  146. Anitha P and Patil M (2022). RFM model for customer purchase behavior using K-Means algorithm, Journal of King Saud University - Computer and Information Sciences, 34:5, (1785-1792), Online publication date: 1-May-2022.
  147. ACM
    Celes C, Boukerche A and Loureiro A (2021). Mobility Trace Analysis for Intelligent Vehicular Networks, ACM Computing Surveys, 54:3, (1-38), Online publication date: 30-Apr-2022.
  148. ACM
    Hwang W, Yun J, Kim J and Min B "Do you know existing accuracy metrics overrate time-series anomaly detections?" Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, (403-412)
  149. Leone M, Huber S, Arora A, García-Durán A and West R (2022). A critical re-evaluation of neural methods for entity alignment, Proceedings of the VLDB Endowment, 15:8, (1712-1725), Online publication date: 1-Apr-2022.
  150. Verma A, Amin S, Naeem M and Saha M (2022). Detecting COVID-19 from chest computed tomography scans using AI-driven android application, Computers in Biology and Medicine, 143:C, Online publication date: 1-Apr-2022.
  151. Qin B, Zeng F and Yan K (2022). Measures of uncertainty for a four-hybrid information system and their applications, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 26:8, (3643-3662), Online publication date: 1-Apr-2022.
  152. ACM
    Adiani D, Itzkovitz A, Bian D, Katz H, Breen M, Hunt S, Swanson A, Vogus T, Wade J and Sarkar N (2022). Career Interview Readiness in Virtual Reality (CIRVR): A Platform for Simulated Interview Training for Autistic Individuals and Their Employers, ACM Transactions on Accessible Computing, 15:1, (1-28), Online publication date: 31-Mar-2022.
  153. ACM
    Dan O, Parikh V and Davison B (2022). IP Geolocation through Geographic Clicks, ACM Transactions on Spatial Algorithms and Systems, 8:1, (1-22), Online publication date: 31-Mar-2022.
  154. ACM
    Chowdhury M, Ahmed C and Leung C (2021). A New Approach for Mining Correlated Frequent Subgraphs, ACM Transactions on Management Information Systems, 13:1, (1-28), Online publication date: 31-Mar-2022.
  155. ACM
    Chow K, Deshpande U, Seshadri S and Liu L DeepRest Proceedings of the Seventeenth European Conference on Computer Systems, (181-198)
  156. Nachouki M and Abou Naaj M (2022). Predicting Student Performance to Improve Academic Advising Using the Random Forest Algorithm, International Journal of Distance Education Technologies, 20:1, (1-17), Online publication date: 22-Mar-2022.
  157. Rivolli A, Garcia L, Soares C, Vanschoren J and de Carvalho A (2022). Meta-features for meta-learning, Knowledge-Based Systems, 240:C, Online publication date: 15-Mar-2022.
  158. Wong P, Luo H, Wang M and Cheng J (2022). Enriched and discriminative convolutional neural network features for pedestrian re‐identification and trajectory modeling, Computer-Aided Civil and Infrastructure Engineering, 37:5, (573-592), Online publication date: 14-Mar-2022.
  159. Jangra S and Toshniwal D (2022). Efficient algorithms for victim item selection in privacy-preserving utility mining, Future Generation Computer Systems, 128:C, (219-234), Online publication date: 1-Mar-2022.
  160. Yu L and Cao F (2022). Weighted matrix-object data clustering guided by matrix-object distributions, Engineering Applications of Artificial Intelligence, 109:C, Online publication date: 1-Mar-2022.
  161. Sarker I (2022). AI-Based Modeling: Techniques, Applications and Research Issues Towards Automation, Intelligent and Smart Systems, SN Computer Science, 3:2, Online publication date: 1-Mar-2022.
  162. Ghosh P, Alam Z, Sharma R and Phadikar S (2022). An efficient SGM based IDS in cloud environment, Computing, 104:3, (553-576), Online publication date: 1-Mar-2022.
  163. ACM
    Yang K, Gao Y, Liang L, Bian S, Chen L and Zheng B (2021). CrowdTC: Crowd-powered Learning for Text Classification, ACM Transactions on Knowledge Discovery from Data, 16:1, (1-23), Online publication date: 28-Feb-2022.
  164. ACM
    Bartels C Cluster Analysis for Customer Segmentation with Open Banking Data 2022 3rd Asia Service Sciences and Software Engineering Conference, (87-94)
  165. Kang Y, Lee J, Shin W and Kim S (2022). Community reinforcement, Knowledge-Based Systems, 237:C, Online publication date: 15-Feb-2022.
  166. Yang W and Nam W (2022). Data synthesis method preserving correlation of features, Pattern Recognition, 122:C, Online publication date: 1-Feb-2022.
  167. Li M, Zhu Y, Zhao T and Angelova M (2022). Weighted dynamic time warping for traffic flow clustering, Neurocomputing, 472:C, (266-279), Online publication date: 1-Feb-2022.
  168. Ashkouti F, Khamforoosh K, Sheikhahmadi A and Khamfroush H (2022). DHkmeans-ℓdiversity: distributed hierarchical K-means for satisfaction of the ℓ-diversity privacy model using Apache Spark, The Journal of Supercomputing, 78:2, (2616-2650), Online publication date: 1-Feb-2022.
  169. Taheri S and Aliakbary S (2022). Research trend prediction in computer science publications: a deep neural network approach, Scientometrics, 127:2, (849-869), Online publication date: 1-Feb-2022.
  170. Nosheen F, Qamar U and Raza M (2022). Redefining preliminaries of dominance-based rough set approach, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 26:3, (977-1002), Online publication date: 1-Feb-2022.
  171. Yu J, Ignatiev A, Stuckey P and Le Bodic P (2021). Learning Optimal Decision Sets and Lists with SAT, Journal of Artificial Intelligence Research, 72, (1251-1279), Online publication date: 4-Jan-2022.
  172. Zagal Flores R, Claramunt C, Mata Rivera M, Garay Jiménez L, Jiménez Hernández H, Herrera Navarro A, Argüelles Cruz A and Nilashi M (2022). A Geo-Social Characterization of Health Impact from Air Pollution in Mexico Valley, Mobile Information Systems, 2022, Online publication date: 1-Jan-2022.
  173. Khan M, Ali A, Alharbi Y and Farias G (2022). Predicting and Preventing Crime, Complexity, 2022, Online publication date: 1-Jan-2022.
  174. El-Tawab S, Mohamed H, Refky A, Abdel-Aziz A and Pai P (2022). Self-Healing of Active Distribution Networks by Accurate Fault Detection, Classification, and Location, Journal of Electrical and Computer Engineering, 2022, Online publication date: 1-Jan-2022.
  175. Yu D, Dong S, Yao S and Lawrynczuk M (2022). Improvement of K-Means Algorithm and Its Application in Air Passenger Grouping, Computational Intelligence and Neuroscience, 2022, Online publication date: 1-Jan-2022.
  176. Javeed A, Ali L, Mohammed Seid A, Ali A, Khan D, Imrana Y and Asghar M (2022). A Clinical Decision Support System (CDSS) for Unbiased Prediction of Caesarean Section Based on Features Extraction and Optimized Classification, Computational Intelligence and Neuroscience, 2022, Online publication date: 1-Jan-2022.
  177. Jhaveri R, Revathi A, Ramana K, Raut R, Dhanaraj R and Hakak S (2022). A Review on Machine Learning Strategies for Real-World Engineering Applications, Mobile Information Systems, 2022, Online publication date: 1-Jan-2022.
  178. Li X, Cao C, Shi Y, Bai W, Gao H, Qiu L, Wang C, Gao Y, Zhang S, Xue X and Chen L (2022). A Survey of Data-Driven and Knowledge-Aware eXplainable AI, IEEE Transactions on Knowledge and Data Engineering, 34:1, (29-49), Online publication date: 1-Jan-2022.
  179. Quesado I, Duarte J, Silva Á, Manuel M and Quintas C (2022). Data Mining Models for Automatic Problem Identification in Intensive Medicine, Procedia Computer Science, 210:C, (218-223), Online publication date: 1-Jan-2022.
  180. Osborn W (2022). Shedding strategies for optimizing join processing in spatial data streams, Procedia Computer Science, 203:C, (149-156), Online publication date: 1-Jan-2022.
  181. Nolle T, Luettgen S, Seeliger A and Mühlhäuser M (2022). BINet, Information Systems, 103:C, Online publication date: 1-Jan-2022.
  182. Biswas B, Mukhopadhyay A, Bhattacharjee S, Kumar A and Delen D (2022). A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums, Decision Support Systems, 152:C, Online publication date: 1-Jan-2022.
  183. Le Guilly M, Petit J and Scuturici V (2021). SQL query extensions for imprecise questions, Data & Knowledge Engineering, 137:C, Online publication date: 1-Jan-2022.
  184. Giordano D, Giobergia F, Pastor E, La Macchia A, Cerquitelli T, Baralis E, Mellia M and Tricarico D (2022). Data-driven strategies for predictive maintenance, Computers in Industry, 134:C, Online publication date: 1-Jan-2022.
  185. Wazir S, Beg M and Ahmad T (2022). A Review on Frequent Itemsets Generation Techniques and Their Comparative Analysis Using FIMAK, SN Computer Science, 3:1, Online publication date: 1-Jan-2022.
  186. Abusubaih M (2021). Intelligent Wireless Networks: Challenges and Future Research Topics, Journal of Network and Systems Management, 30:1, Online publication date: 1-Jan-2022.
  187. Zhang P High-Performance and Customizable Vector Retrieval Service Based on Faiss in Power Grid Scenarios Smart Computing and Communication, (329-339)
  188. ACM
    Ashi A and Elhag S Enhancing Customer Relationship Management Using Association Rule Mining and the Evolutionary Algorithm The 5th International Conference on Future Networks & Distributed Systems, (162-170)
  189. Espinheira P, Silva L and Cribari-Neto F (2021). Bias and variance residuals for machine learning nonlinear simplex regressions, Expert Systems with Applications: An International Journal, 185:C, Online publication date: 15-Dec-2021.
  190. Castillo-Rojas W and Hernández C (2021). Bibliographic Review on Data Mining Techniques Used with Weather Data, Programming and Computing Software, 47:8, (817-829), Online publication date: 1-Dec-2021.
  191. Kang Y, Jo Y, Cha J, Bae W, Lee W and Kim S (2021). ${\sf FORESEE}$FORESEE: An Effective and Efficient Framework for Estimating the Execution Times of IO Traces on the SSD, IEEE Transactions on Computers, 70:12, (2146-2160), Online publication date: 1-Dec-2021.
  192. Pegoraro M, Uysal M and van der Aalst W (2021). Conformance checking over uncertain event data, Information Systems, 102:C, Online publication date: 1-Dec-2021.
  193. Ulian D, Becker J, Marcolin C and Scornavacca E (2022). Exploring the effects of different Clustering Methods on a News Recommender System, Expert Systems with Applications: An International Journal, 183:C, Online publication date: 30-Nov-2021.
  194. ACM
    Osborn W and King L An Iterative Strategy for Deep Learning Classification on Spatial Data Streams The 23rd International Conference on Information Integration and Web Intelligence, (532-537)
  195. Uddin M, He Q, Han J and Chua C Mining cross-domain apps for software evolution Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, (743-755)
  196. ACM
    Kim E, Park S, Choi S, Chae D and Kim S MANIAC: A Man-Machine Collaborative System for Classifying Malware Author Groups Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (2441-2443)
  197. Notargiacomo P and Marin R (2022). Multiagent Intelligent Tutoring System for Financial Literacy, International Journal of Web-Based Learning and Teaching Technologies, 17:7, (1-13), Online publication date: 1-Nov-2021.
  198. ACM
    Gröger C (2021). There is no AI without data, Communications of the ACM, 64:11, (98-108), Online publication date: 1-Nov-2021.
  199. Ke Y, Huang J, Lin W and Jaysawal B (2020). Finding Possible Promoter Binding Sites in DNA Sequences by Sequential Patterns Mining With Specific Numbers of Gaps, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 18:6, (2459-2470), Online publication date: 1-Nov-2021.
  200. Zhao K, Xu Z, Yan M, Zhang T, Yang D and Li W (2021). A comprehensive investigation of the impact of feature selection techniques on crashing fault residence prediction models, Information and Software Technology, 139:C, Online publication date: 1-Nov-2021.
  201. Amer E, Zelinka I and El-Sappagh S (2021). A Multi-Perspective malware detection approach through behavioral fusion of API call sequence, Computers and Security, 110:C, Online publication date: 1-Nov-2021.
  202. Sarker I (2021). Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions, SN Computer Science, 2:6, Online publication date: 1-Nov-2021.
  203. Kim J and Moon N (2021). A deep bidirectional similarity learning model using dimensional reduction for multivariate time series clustering, Multimedia Tools and Applications, 80:26-27, (34269-34281), Online publication date: 1-Nov-2021.
  204. IBRAHIM M (2021). ODBOT: Outlier detection-based oversampling technique for imbalanced datasets learning, Neural Computing and Applications, 33:22, (15781-15806), Online publication date: 1-Nov-2021.
  205. ACM
    Hui A and Gao B When is Nearest Neighbor Meaningful Proceedings of the 30th ACM International Conference on Information & Knowledge Management, (3103-3106)
  206. Mollah A and Asad E (2021). Biomarker Identification From Gene Expression Based on Symmetrical Uncertainty, International Journal of Intelligent Information Technologies, 17:4, (1-19), Online publication date: 22-Oct-2021.
  207. Menon K and Mittal R (2022). Quantitative analysis of the kinematics and induced aerodynamic loading of individual vortices in vortex-dominated flows, Journal of Computational Physics, 443:C, Online publication date: 15-Oct-2021.
  208. Caglar Gencosman B and İnkaya T (2021). Characterization of Syrian refugees with work permit applications in Turkey, Expert Systems with Applications: An International Journal, 180:C, Online publication date: 15-Oct-2021.
  209. ACM
    Abdjalil Mansori H, M. Maatuk A, M. Sallabi O and Gebril E An Efficient Enhanced Algorithm for Clustering Large Datasets The 7th International Conference on Engineering & MIS 2021, (1-6)
  210. ACM
    Sulaiman Atloba F, Khalid Balkir N and A. El-Mouadib F An Enhanced Version of K-means Algorithm The 7th International Conference on Engineering & MIS 2021, (1-8)
  211. ACM
    khalid Balkir N and A. El-Mouadib F Money Laundering Detection System Using Data Mining Functionalities The 7th International Conference on Engineering & MIS 2021, (1-7)
  212. Sahu S (2021). Novel Ensemble Model With Genetic Algorithm and Principal Components Analysis for Classification of Chronic Kidney Disease, International Journal of Applied Evolutionary Computation, 12:4, (1-17), Online publication date: 1-Oct-2021.
  213. ACM
    Gonçalves S, Soares D and Silva D Temporal analysis on pull request patterns: an approach with sliding window Proceedings of the 15th Brazilian Symposium on Software Components, Architectures, and Reuse, (90-99)
  214. Naghavi Nozad S, Amir Haeri M and Folino G (2021). SDCOR, Knowledge-Based Systems, 228:C, Online publication date: 27-Sep-2021.
  215. ACM
    Irawan H and Atha Ganiza R Analyzing Tourist's Movement in Sarbagita Metropolitan Area based on Geotagged Photo in Flickr Proceedings of the 2021 6th International Conference on Cloud Computing and Internet of Things, (60-67)
  216. Axpe M Ethical Challenges from Artificial Intelligence to Legal Practice Hybrid Artificial Intelligent Systems, (196-206)
  217. He J, Yeh C, Wu Y, Wang L and Zhang W Mining Anomalies in Subspaces of High-Dimensional Time Series for Financial Transactional Data Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, (19-36)
  218. ACM
    Bartolome A, Shah S and Prioleau T (2021). GlucoMine, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5:3, (1-24), Online publication date: 9-Sep-2021.
  219. Shojaei M and Saneifar H (2021). MFSR, Expert Systems with Applications: An International Journal, 177:C, Online publication date: 1-Sep-2021.
  220. Latifi-Pakdehi A and Daneshpour N (2021). DBHC, Data & Knowledge Engineering, 135:C, Online publication date: 1-Sep-2021.
  221. Sarker I (2021). Data Science and Analytics: An Overview from Data-Driven Smart Computing, Decision-Making and Applications Perspective, SN Computer Science, 2:5, Online publication date: 1-Sep-2021.
  222. Kaushik M, Sharma R, Peious S, Shahin M, Yahia S and Draheim D (2021). A Systematic Assessment of Numerical Association Rule Mining Methods, SN Computer Science, 2:5, Online publication date: 1-Sep-2021.
  223. Buriro A, Gupta S, Yautsiukhin A and Crispo B (2021). Risk-Driven Behavioral Biometric-based One-Shot-cum-Continuous User Authentication Scheme, Journal of Signal Processing Systems, 93:9, (989-1006), Online publication date: 1-Sep-2021.
  224. Ben HajKacem M, Ben N’cir C and Essoussi N (2021). A parallel text clustering method using Spark and hashing, Computing, 103:9, (2007-2031), Online publication date: 1-Sep-2021.
  225. Ghosh K, Guha R, Bera S, Kumar N and Sarkar R (2021). S-shaped versus V-shaped transfer functions for binary Manta ray foraging optimization in feature selection problem, Neural Computing and Applications, 33:17, (11027-11041), Online publication date: 1-Sep-2021.
  226. ACM
    Fu T, Zampieri G, Hodgson D, Angione C and Zeng Y (2021). Modeling Customer Experience in a Contact Center through Process Log Mining, ACM Transactions on Intelligent Systems and Technology, 12:4, (1-21), Online publication date: 31-Aug-2021.
  227. Li J, Yue K, Li J and Duan L A Probabilistic Inference Based Approach for Querying Associative Entities in Knowledge Graph Web and Big Data, (75-89)
  228. Zhang Y, Zha Y, Li L and Xiong Z A New Density Clustering Method Using Mutual Nearest Neighbor Web and Big Data, (487-494)
  229. Aljarah I, Habib M, Hijazi N, Faris H, Qaddoura R, Hammo B, Abushariah M and Alfawareh M (2021). Intelligent detection of hate speech in Arabic social network, Journal of Information Science, 47:4, (483-501), Online publication date: 1-Aug-2021.
  230. Zhao X, Zhang Y, Hu Y, Wang S, Li Y, Qian S and Yin B (2021). Interactive Visual Exploration of Human Mobility Correlation Based on Smart Card Data, IEEE Transactions on Intelligent Transportation Systems, 22:8, (4825-4837), Online publication date: 1-Aug-2021.
  231. Pramanik A, Sarkar S, Maiti J and Mitra P (2021). RT-GSOM, Information Sciences: an International Journal, 566:C, (19-37), Online publication date: 1-Aug-2021.
  232. Aviv-Reuven S and Rosenfeld A (2021). Publication patterns’ changes due to the COVID-19 pandemic: a longitudinal and short-term scientometric analysis, Scientometrics, 126:8, (6761-6784), Online publication date: 1-Aug-2021.
  233. Si T, Miranda P, Galdino J and Nascimento A (2021). Grammar-based automatic programming for medical data classification: an experimental study, Artificial Intelligence Review, 54:6, (4097-4135), Online publication date: 1-Aug-2021.
  234. Mehta V, Bawa S and Singh J (2021). Stamantic clustering, Expert Systems with Applications: An International Journal, 174:C, Online publication date: 15-Jul-2021.
  235. Zheng Z, Shangguan Z and Luo J What Makes a Turing Award Winner? Social, Cultural, and Behavioral Modeling, (310-320)
  236. Stoddard J, Mustafa A and Goela N (2021). Tanium reveal, Proceedings of the VLDB Endowment, 14:12, (3096-3109), Online publication date: 1-Jul-2021.
  237. Singh H and Kaur P (2021). An Effective Clustering-Based Web Page Recommendation Framework for E-Commerce Websites, SN Computer Science, 2:4, Online publication date: 1-Jul-2021.
  238. Aksa K, Aitouche S, Bentoumi H and Sersa I (2021). Developing a Web Platform for the Management of the Predictive Maintenance in Smart Factories, Wireless Personal Communications: An International Journal, 119:2, (1469-1497), Online publication date: 1-Jul-2021.
  239. de Lima B, Neto A, Silva L and Machado V (2021). Deep semi‐supervised classification based in deep clustering and cross‐entropy, International Journal of Intelligent Systems, 36:8, (3961-4000), Online publication date: 30-Jun-2021.
  240. Kent C, Chaudhry M, Cukurova M, Bashir I, Pickard H, Jenkins C, du Boulay B, Moeini A and Luckin R Machine Learning Models and Their Development Process as Learning Affordances for Humans Artificial Intelligence in Education, (228-240)
  241. ACM
    Chow K, Deshpande U, Seshadri S and Liu L SRA: Smart Recovery Advisor for Cyber Attacks Proceedings of the 2021 International Conference on Management of Data, (2691-2695)
  242. ACM
    Colpo M, Alves B, Pereira K, Brandão A, de Aguiar M and Primo T Attribute selection based on genetic and classification algorithms in the prediction of hospitalization need of COVID-19 patients Proceedings of the XVII Brazilian Symposium on Information Systems, (1-8)
  243. Dadkhah S, Shoeleh F, Yadollahi M, Zhang X and Ghorbani A (2022). A real-time hostile activities analyses and detection system, Applied Soft Computing, 104:C, Online publication date: 1-Jun-2021.
  244. Yousaf M, Khan M, Rehman T, Ullah S and Jing L (2021). NRIC: A Noise Removal Approach for Nonlinear Isomap Method, Neural Processing Letters, 53:3, (2277-2304), Online publication date: 1-Jun-2021.
  245. Truong T, Lê L, Paja E and Giorgini P (2021). A data-driven, goal-oriented framework for process-focused enterprise re-engineering, Information Systems and e-Business Management, 19:2, (683-747), Online publication date: 1-Jun-2021.
  246. Kortemeyer G and Dröschler S (2021). A user-transaction-based recommendation strategy for an educational digital library, International Journal on Digital Libraries, 22:2, (147-157), Online publication date: 1-Jun-2021.
  247. Mirshahi S and Novák V (2021). A fuzzy method for evaluating similar behavior between assets, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 25:12, (7813-7823), Online publication date: 1-Jun-2021.
  248. Hwang J, Shwartz L, Wang Q, Batta R, Kumar H and Nidd M FIXME Proceedings of the 43rd International Conference on Software Engineering: Software Engineering in Practice, (228-237)
  249. Nanayakkara C, Christen P and Ranbaduge T Active Learning Based Similarity Filtering for Efficient and Effective Record Linkage Advances in Knowledge Discovery and Data Mining, (321-333)
  250. Ngueilbaye A, Wang H, Mahamat D and Junaidu S (2021). Modulo 9 model-based learning for missing data imputation, Applied Soft Computing, 103:C, Online publication date: 1-May-2021.
  251. Singh P (2021). A type-2 neutrosophic-entropy-fusion based multiple thresholding method for the brain tumor tissue structures segmentation, Applied Soft Computing, 103:C, Online publication date: 1-May-2021.
  252. Sarker I (2021). Machine Learning: Algorithms, Real-World Applications and Research Directions, SN Computer Science, 2:3, Online publication date: 1-May-2021.
  253. Sarker I, Abushark Y, Khan A, Alam M and Nowrozy R (2021). Mobile Deep Learning: Exploring Deep Neural Network for Predicting Context-Aware Smartphone Usage, SN Computer Science, 2:3, Online publication date: 1-May-2021.
  254. Seyfi M, Nayak R, Xu Y and Geva S (2021). Mining discriminative itemsets in data streams using the tilted-time window model, Knowledge and Information Systems, 63:5, (1241-1270), Online publication date: 1-May-2021.
  255. ACM
    Li C, Cheang B, Luo Z and Lim A (2021). An Exponential Factorization Machine with Percentage Error Minimization to Retail Sales Forecasting, ACM Transactions on Knowledge Discovery from Data, 15:2, (1-32), Online publication date: 30-Apr-2021.
  256. Manjur N, Mahbub M and Vassileva J Exploring the Impact of Color on User Ratings: A Personality and Culture-Based Approach Persuasive Technology, (200-206)
  257. Mahbub M, Manjur N and Vassileva J Towards Better Rating Scale Design: An Experimental Analysis of the Influence of User Preference and Visual Cues on User Response Persuasive Technology, (150-163)
  258. Wilkinson K, Sheets L, Fitch D and Popejoy L (2022). Systematic review of approaches to use of neighborhood-level risk factors with clinical data to predict clinical risk and recommend interventions, Journal of Biomedical Informatics, 116:C, Online publication date: 1-Apr-2021.
  259. Ripan R, Sarker I, Hossain S, Anwar M, Nowrozy R, Hoque M and Furhad M (2021). A Data-Driven Heart Disease Prediction Model Through K-Means Clustering-Based Anomaly Detection, SN Computer Science, 2:2, Online publication date: 1-Apr-2021.
  260. Etemad M, Soares A, Etemad E, Rose J, Torgo L and Matwin S (2021). SWS: an unsupervised trajectory segmentation algorithm based on change detection with interpolation kernels, Geoinformatica, 25:2, (269-289), Online publication date: 1-Apr-2021.
  261. Neubauer T, Peres S, Fantinato M, Lu X and Reijers H (2021). Interactive clustering: a scoping review, Artificial Intelligence Review, 54:4, (2765-2826), Online publication date: 1-Apr-2021.
  262. Kumar V (2021). Evaluation of computationally intelligent techniques for breast cancer diagnosis, Neural Computing and Applications, 33:8, (3195-3208), Online publication date: 1-Apr-2021.
  263. D’Ambrosio A, Amodio S, Iorio C, Pandolfo G and Siciliano R (2021). Adjusted Concordance Index: an Extensionl of the Adjusted Rand Index to Fuzzy Partitions, Journal of Classification, 38:1, (112-128), Online publication date: 1-Apr-2021.
  264. ACM
    Suaboot J, Fahad A, Tari Z, Grundy J, Mahmood A, Almalawi A, Zomaya A and Drira K (2020). A Taxonomy of Supervised Learning for IDSs in SCADA Environments, ACM Computing Surveys, 53:2, (1-37), Online publication date: 31-Mar-2021.
  265. ACM
    Pang G, Cao L and Aggarwal C Deep Learning for Anomaly Detection: Challenges, Methods, and Opportunities Proceedings of the 14th ACM International Conference on Web Search and Data Mining, (1127-1130)
  266. AbuHassan A, Alshayeb M and Ghouti L (2020). Software smell detection techniques, Journal of Software: Evolution and Process, 33:3, Online publication date: 3-Mar-2021.
  267. Kim H, Park J, Min K and Huh K (2021). Anomaly Monitoring Framework in Lane Detection With a Generative Adversarial Network, IEEE Transactions on Intelligent Transportation Systems, 22:3, (1603-1615), Online publication date: 1-Mar-2021.
  268. Harris S and Samorani M (2021). On selecting a probabilistic classifier for appointment no-show prediction, Decision Support Systems, 142:C, Online publication date: 1-Mar-2021.
  269. Yousri D, Abd Elaziz M, Abualigah L, Oliva D, Al-qaness M and Ewees A (2022). COVID-19 X-ray images classification based on enhanced fractional-order cuckoo search optimizer using heavy-tailed distributions, Applied Soft Computing, 101:C, Online publication date: 1-Mar-2021.
  270. Bhuvaneswari Amma N and Selvakumar S (2021). A statistical class center based triangle area vector method for detection of denial of service attacks, Cluster Computing, 24:1, (393-415), Online publication date: 1-Mar-2021.
  271. Kouhalvandi L, Ceylan O and Ozoguz S (2021). Optimization techniques for analog and RF circuit designs: an overview, Analog Integrated Circuits and Signal Processing, 106:3, (511-524), Online publication date: 1-Mar-2021.
  272. Duan L, Ma S, Aggarwal C and Sathe S (2021). Improving spectral clustering with deep embedding, cluster estimation and metric learning, Knowledge and Information Systems, 63:3, (675-694), Online publication date: 1-Mar-2021.
  273. Wang H, Wang J, Zhao Y and Xu H (2021). Tunneling parameters optimization based on multi-objective differential evolution algorithm, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 25:5, (3637-3656), Online publication date: 1-Mar-2021.
  274. Kuo R, Lin J and Nguyen T (2021). An application of sine cosine algorithm-based fuzzy possibilistic c-ordered means algorithm to cluster analysis, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 25:5, (3469-3484), Online publication date: 1-Mar-2021.
  275. Luo H and Paal S (2021). Reducing the effect of sample bias for small data sets with double‐weighted support vector transfer regression, Computer-Aided Civil and Infrastructure Engineering, 36:3, (248-263), Online publication date: 15-Feb-2021.
  276. Al-Zoubi A, Alqatawna J, Faris H and Hassonah M (2021). Spam profiles detection on social networks using computational intelligence methods, Journal of Information Science, 47:1, (58-81), Online publication date: 1-Feb-2021.
  277. Zhu Q, Liu Z and Yan J (2021). Machine learning for metal additive manufacturing: predicting temperature and melt pool fluid dynamics using physics-informed neural networks, Computational Mechanics, 67:2, (619-635), Online publication date: 1-Feb-2021.
  278. ACM
    Jourdan T, Boutet A, Bahi A and Frindel C (2020). Privacy-preserving IoT Framework for Activity Recognition in Personal Healthcare Monitoring, ACM Transactions on Computing for Healthcare, 2:1, (1-22), Online publication date: 22-Jan-2021.
  279. ACM
    Dimas Trisaktyo Nugroho J, Mahendra R and Budi I Web Mining in e-Procurement: A Case Study in Indonesia Proceedings of the 2021 3rd Asia Pacific Information Technology Conference, (101-107)
  280. Castellanos-Paez S, Rombourg R and Lalanda P ERA: Extracting Planning Macro-Operators from Adjacent and Non-adjacent Sequences Knowledge Management and Acquisition for Intelligent Systems, (30-45)
  281. Singh P and Singh N (2021). Role of Data Mining Techniques in Bioinformatics, International Journal of Applied Research in Bioinformatics, 11:1, (51-60), Online publication date: 1-Jan-2021.
  282. Chen R, Zhao S, Tian Z and Ding B (2021). A Multiscale Clustering Approach for Non-IID Nominal Data, Computational Intelligence and Neuroscience, 2021, Online publication date: 1-Jan-2021.
  283. Al-Saadi H, Elhadad A, Ghareeb A and Khalil A (2021). Rapid and Blind Watermarking Approach of the 3D Objects Using QR Code Images for Securing Copyright, Computational Intelligence and Neuroscience, 2021, Online publication date: 1-Jan-2021.
  284. Karimi-Bidhendi S, Guo J and Jafarkhani H (2021). Energy-Efficient Node Deployment in Heterogeneous Two-Tier Wireless Sensor Networks With Limited Communication Range, IEEE Transactions on Wireless Communications, 20:1, (40-55), Online publication date: 1-Jan-2021.
  285. Palomba F, Andrew Tamburri D, Arcelli Fontana F, Oliveto R, Zaidman A and Serebrenik A (2021). Beyond Technical Aspects: How Do Community Smells Influence the Intensity of Code Smells?, IEEE Transactions on Software Engineering, 47:1, (108-129), Online publication date: 1-Jan-2021.
  286. Bui Q, Vo B, Snasel V, Pedrycz W, Hong T, Nguyen N and Chen M (2020). SFCM: A Fuzzy Clustering Algorithm of Extracting the Shape Information of Data, IEEE Transactions on Fuzzy Systems, 29:1, (75-89), Online publication date: 1-Jan-2021.
  287. Subasi A, Balfaqih M, Balfagih Z and Alfawwaz K (2022). A Comparative Evaluation of Ensemble Classifiers for Malicious Webpage Detection, Procedia Computer Science, 194:C, (272-279), Online publication date: 1-Jan-2021.
  288. Gupta U, Bhattacharjee V and Bishnu P (2020). Outlier Detection in Wireless Sensor Networks Based on Neighbourhood, Wireless Personal Communications: An International Journal, 116:1, (443-454), Online publication date: 1-Jan-2021.
  289. Raj S, Ramesh D and Sethi K (2021). A Spark-based Apriori algorithm with reduced shuffle overhead, The Journal of Supercomputing, 77:1, (133-151), Online publication date: 1-Jan-2021.
  290. El-Rashidy M (2020). A novel system for fast and accurate decisions of gold-stock markets in the short-term prediction, Neural Computing and Applications, 33:1, (393-407), Online publication date: 1-Jan-2021.
  291. ACM
    Sainani H, Namayanja J, Sharma G, Misal V and Janeja V (2020). IP Reputation Scoring with Geo-Contextual Feature Augmentation, ACM Transactions on Management Information Systems, 11:4, (1-29), Online publication date: 31-Dec-2021.
  292. ACM
    Song D, Zhong H and Jia L The symptom, cause and repair of workaround Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, (1264-1266)
  293. ACM
    Li M, Shi L, Yang Y and Wang Q A deep multitask learning approach for requirements discovery and annotation from open forum Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, (336-348)
  294. Kumar S and Chauhan A Recommending Question-Answers for Enriching Textbooks Big Data Analytics, (308-328)
  295. Chan C, Gan B and Cai W Towards situation aware dispatching in a dynamic and complex manufacturing environment Proceedings of the Winter Simulation Conference, (528-539)
  296. ACM
    Uddin M, Qiang H, Jun H and Caslon C Feature Recommendation by Mining Updates and User Feedback from Competitor Apps MobiQuitous 2020 - 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, (18-28)
  297. ACM
    Lahlou L, Kara N, Arouch M and Edstrom C Cheetah Proceedings of the 2020 6th International Workshop on Container Technologies and Container Clouds, (19-24)
  298. Joshi G, Paul M, Kalita B, Ranga V, Rawat J and Rawat P (2021). Mapping the social landscape through social media, Journal of Information Science, 46:6, (776-789), Online publication date: 1-Dec-2020.
  299. Gijón C, Toril M, Luna-Ramírez S, Bejarano-Luque J and Marí-Altozano M (2020). Estimating Pole Capacity From Radio Network Performance Statistics by Supervised Learning, IEEE Transactions on Network and Service Management, 17:4, (2090-2101), Online publication date: 1-Dec-2020.
  300. Sethi K and Ramesh D (2020). A fast high average-utility itemset mining with efficient tighter upper bounds and novel list structure, The Journal of Supercomputing, 76:12, (10288-10318), Online publication date: 1-Dec-2020.
  301. Mehta V, Bawa S and Singh J (2020). Analytical review of clustering techniques and proximity measures, Artificial Intelligence Review, 53:8, (5995-6023), Online publication date: 1-Dec-2020.
  302. Abasi A, Khader A, Al-Betar M, Naim S, Alyasseri Z and Makhadmeh S (2020). A novel hybrid multi-verse optimizer with K-means for text documents clustering, Neural Computing and Applications, 32:23, (17703-17729), Online publication date: 1-Dec-2020.
  303. ACM
    Supianto A, Sa'diyah N, Dewi C, Rokhmawati R, Wicaksono S, Az-Zahra H, Wijoyo S, Hayashi Y and Hirashima T Improvements of fuzzy C-means clustering performance using particle swarm optimization on student grouping based on learning activity in a digital learning media Proceedings of the 5th International Conference on Sustainable Information Engineering and Technology, (239-243)
  304. ACM
    Díaz Redondo R, Fernández Vilas A and Abadía Rodríguez A Inferring Energy Consumption Patterns in Public Buildings Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, (33-39)
  305. ACM
    Kang H and Lee S (2020). Automated analysis with Apriori algorithm, ACM Inroads, 11:4, (20-26), Online publication date: 12-Nov-2020.
  306. Ganfure G, Wu C, Chang Y and Shih W DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), (1-6)
  307. ACM
    Shi L, Li M, Xing M, Wang Y, Wang Q, Peng X, Liao W, Pi G and Wang H Learning to extract transaction function from requirements: an industrial case on financial software Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (1444-1454)
  308. ACM
    Gu J, Luo C, Qin S, Qiao B, Lin Q, Zhang H, Li Z, Dang Y, Cai S, Wu W, Zhou Y, Chintalapati M and Zhang D Efficient incident identification from multi-dimensional issue reports via meta-heuristic search Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (292-303)
  309. ACM
    Zhao N, Chen J, Wang Z, Peng X, Wang G, Wu Y, Zhou F, Feng Z, Nie X, Zhang W, Sui K and Pei D Real-time incident prediction for online service systems Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (315-326)
  310. Costa D, Pereira C, Peixoto H and Machado J Anticipating Maintenance in Telecom Installation Processes Intelligent Data Engineering and Automated Learning – IDEAL 2020, (322-334)
  311. ACM
    Batista dos Santos V and Merschmann L Metalearning Applied to Multi-label Text Classification Proceedings of the XVI Brazilian Symposium on Information Systems, (1-8)
  312. Meenu Sreedharan , Khedr A and El Bannany M (2020). A Multi-Layer Perceptron Approach to Financial Distress Prediction with Genetic Algorithm, Automatic Control and Computer Sciences, 54:6, (475-482), Online publication date: 1-Nov-2020.
  313. Haiyun Z and Yizhe X (2020). Sports performance prediction model based on integrated learning algorithm and cloud computing Hadoop platform, Microprocessors & Microsystems, 79:C, Online publication date: 1-Nov-2020.
  314. Smiti A (2020). A critical overview of outlier detection methods, Computer Science Review, 38:C, Online publication date: 1-Nov-2020.
  315. Hou M, Ren J, Zhang D, Kong X, Zhang D and Xia F (2020). Network embedding, Computer Science Review, 38:C, Online publication date: 1-Nov-2020.
  316. Carvalho C, Seixas F, Conci A, Muchaluat-Saade D, Laks J and Boechat Y (2020). A dynamic decision model for diagnosis of dementia, Alzheimer's disease and Mild Cognitive Impairment, Computers in Biology and Medicine, 126:C, Online publication date: 1-Nov-2020.
  317. Santoso A and Felderer M (2019). Specification-driven predictive business process monitoring, Software and Systems Modeling (SoSyM), 19:6, (1307-1343), Online publication date: 1-Nov-2020.
  318. Zare H and Emadi S (2020). Determination of Customer Satisfaction using Improved K-means algorithm, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:22, (16947-16965), Online publication date: 1-Nov-2020.
  319. ACM
    Jachim P, Sharevski F and Treebridge P TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic Proceedings of the New Security Paradigms Workshop 2020, (59-75)
  320. Khruahong S and Tadkerd P Analysis of Scholarship Consideration Using J48 Decision Tree Algorithm for Data Mining Cooperative Design, Visualization, and Engineering, (230-238)
  321. ACM
    Zhao J and Ji S Clustering ensemble of massive high dimensional data based on BLB and stratified sampling framework Proceedings of the 2020 Conference on Artificial Intelligence and Healthcare, (154-160)
  322. ACM
    Menezes J, Trindade B, Pimentel J, Moura T, Plastino A, Murta L and Costa C What causes merge conflicts? Proceedings of the XXXIV Brazilian Symposium on Software Engineering, (203-212)
  323. ACM
    Silva K and Cota E Predicting Prime Path Coverage Using Regression Analysis Proceedings of the XXXIV Brazilian Symposium on Software Engineering, (263-272)
  324. ACM
    Khader M and Al-Naymat G (2020). Density-based Algorithms for Big Data Clustering Using MapReduce Framework, ACM Computing Surveys, 53:5, (1-38), Online publication date: 15-Oct-2020.
  325. Wan D, Razavi-Far R and Saif M Cooperative Clustering Missing Data Imputation 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC), (1039-1045)
  326. Hosseini Rad M and Abdolrazzagh-Nezhad M (2020). A new hybridization of DBSCAN and fuzzy earthworm optimization algorithm for data cube clustering, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:20, (15529-15549), Online publication date: 1-Oct-2020.
  327. Kloiber S, Settgast V, Schinko C, Weinzerl M, Fritz J, Schreck T and Preiner R (2020). Immersive analysis of user motion in VR applications, The Visual Computer: International Journal of Computer Graphics, 36:10-12, (1937-1949), Online publication date: 1-Oct-2020.
  328. ACM
    Dai H, Wong R, Wang H, Zheng Z and Vasilakos A (2019). Big Data Analytics for Large-scale Wireless Networks, ACM Computing Surveys, 52:5, (1-36), Online publication date: 30-Sep-2020.
  329. Lang A and Schubert E BETULA: Numerically Stable CF-Trees for BIRCH Clustering Similarity Search and Applications, (281-296)
  330. ACM
    Ramadhan E, Sutoyo E, Musnansyah A and Belgaman H Analysis of Hotspot Data for Drought Clustering Using K-Means Algorithm Proceedings of the 2020 International Conference on Engineering and Information Technology for Sustainable Industry, (1-6)
  331. Peng Y, Cheng S, Huang Y and Der Leu J Maintenance Method of Logistics Vehicle Based on Data Science and Quality Database Systems for Advanced Applications. DASFAA 2020 International Workshops, (131-145)
  332. Jia L, Zhong H, Wang X, Huang L and Lu X An Empirical Study on Bugs Inside TensorFlow Database Systems for Advanced Applications, (604-620)
  333. ACM
    Bhuiyan F and Rahman A Characterizing co-located insecure coding patterns in infrastructure as code scripts Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, (27-32)
  334. Ries L, Stumpf M, Bach J and Sax E Semantic Comparison of Driving Sequences by Adaptation of Word Embeddings 2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC), (1-7)
  335. Satu M, Rahman S, Khan M, Abedin M, Kaiser M and Mahmud M Towards Improved Detection of Cognitive Performance Using Bidirectional Multilayer Long-Short Term Memory Neural Network Brain Informatics, (297-306)
  336. ACM
    Vu Q and Bezemer C An Empirical Study of the Characteristics of Popular Game Jams and Their High-ranking Submissions on itch.io Proceedings of the 15th International Conference on the Foundations of Digital Games, (1-11)
  337. ACM
    Melo S, Kohwalter T, Clua E, Paes A and Murta L Player Behavior Profiling through Provenance Graphs and Representation Learning Proceedings of the 15th International Conference on the Foundations of Digital Games, (1-11)
  338. Iegorov O and Fischmeister S Parameterless Semi-supervised Anomaly Detection in Univariate Time Series Machine Learning and Knowledge Discovery in Databases, (644-659)
  339. Yu J, Ignatiev A, Stuckey P and Le Bodic P Computing Optimal Decision Sets with SAT Principles and Practice of Constraint Programming, (952-970)
  340. López-López P, Oñate P and Rocha Á (2020). Social media mining, debate and feelings: digital public opinion’s reaction in five presidential elections in Latin America, Cluster Computing, 23:3, (1875-1886), Online publication date: 1-Sep-2020.
  341. Raj S, Ramesh D, Sreenu M and Sethi K (2020). EAFIM: efficient apriori-based frequent itemset mining algorithm on Spark for big transactional data, Knowledge and Information Systems, 62:9, (3565-3583), Online publication date: 1-Sep-2020.
  342. Amiri M, Hasanipanah M and Bakhshandeh Amnieh H (2020). Predicting ground vibration induced by rock blasting using a novel hybrid of neural network and itemset mining, Neural Computing and Applications, 32:18, (14681-14699), Online publication date: 1-Sep-2020.
  343. Guha R, Ghosh M, Mutsuddi S, Sarkar R and Mirjalili S (2020). Embedded chaotic whale survival algorithm for filter–wrapper feature selection, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:17, (12821-12843), Online publication date: 1-Sep-2020.
  344. ACM
    Marques H, Campello R, Sander J and Zimek A (2020). Internal Evaluation of Unsupervised Outlier Detection, ACM Transactions on Knowledge Discovery from Data, 14:4, (1-42), Online publication date: 31-Aug-2020.
  345. ACM
    Zhang G and Gionis A Diverse Rule Sets Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (1532-1541)
  346. ACM
    Ban Y and He J Generic Outlier Detection in Multi-Armed Bandit Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (913-923)
  347. ACM
    Song S and Sun Y Imputing Various Incomplete Attributes via Distance Likelihood Maximization Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (535-545)
  348. Shukla S, Jain P, Babu C and Pamula R (2020). A Multivariate Regression Model for Identifying, Analyzing and Predicting Crimes, Wireless Personal Communications: An International Journal, 113:4, (2447-2461), Online publication date: 1-Aug-2020.
  349. Ke C and Chang C (2019). Optimizing target selection complexity of a recommendation system by skyline query and multi-criteria decision analysis, The Journal of Supercomputing, 76:8, (6453-6474), Online publication date: 1-Aug-2020.
  350. ACM
    Fletcher S and Islam M (2019). Decision Tree Classification with Differential Privacy, ACM Computing Surveys, 52:4, (1-33), Online publication date: 31-Jul-2020.
  351. ACM
    Koumarelas I, Jiang L and Naumann F (2020). Data Preparation for Duplicate Detection, Journal of Data and Information Quality, 12:3, (1-24), Online publication date: 29-Jul-2020.
  352. ACM
    Zhuang H, Wang X, Bendersky M and Najork M Feature Transformation for Neural Ranking Models Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval, (1649-1652)
  353. Pereira J and Saraiva F A Comparative Analysis of Unbalanced Data Handling Techniques for Machine Learning Algorithms to Electricity Theft Detection 2020 IEEE Congress on Evolutionary Computation (CEC), (1-8)
  354. Lim H and Suh C The Intellectual Structure of Business Analytics: 2002–2019 Machine Learning, Optimization, and Data Science, (540-550)
  355. Vanderlei Fernandes L, Sarmet M, Castanho C, Pezzuol Jacobi R and e Silva T Analysis of Clustering Techniques in MMOG with Restricted Data: The Case of Final Fantasy XIV Design, User Experience, and Usability. Design for Contemporary Interactive Environments, (586-604)
  356. Tangkaratt V, Han B, Khan M and Sugiyama M Variational imitation learning with diverse-quality demonstrations Proceedings of the 37th International Conference on Machine Learning, (9407-9417)
  357. Zhang C, Liu J, Wang Z and Sun L Look Ahead at the First-mile in Livecast with Crowdsourced Highlight Prediction IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, (1143-1152)
  358. Zonouzi M and Kargari M (2021). Modeling uncertainties based on data mining approach in emergency service resource allocation, Computers and Industrial Engineering, 145:C, Online publication date: 1-Jul-2020.
  359. Lange M, Koschel A and Astrova I Dealing with Data Streams: Complex Event Processing vs. Data Stream Mining Computational Science and Its Applications – ICCSA 2020, (3-14)
  360. Martins I, Bahiense L, Infante C and Arruda E (2020). Dimensionality reduction for multi-criteria problems, Expert Systems with Applications: An International Journal, 148:C, Online publication date: 15-Jun-2020.
  361. ACM
    Siddiqui T, Luh P, Wang Z, Karahalios K and Parameswaran A ShapeSearch: A Flexible and Efficient System for Shape-based Exploration of Trendlines Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, (51-65)
  362. Cupek R, Drewniak M, Fojcik M, Kyrkjebø E, Lin J, Mrozek D, Øvsthus K and Ziebinski A Autonomous Guided Vehicles for Smart Industries – The State-of-the-Art and Research Challenges Computational Science – ICCS 2020, (330-343)
  363. Havers B, Duvignau R, Najdataei H, Gulisano V, Papatriantafilou M and Koppisetty A (2020). DRIVEN, Future Generation Computer Systems, 107:C, (1-17), Online publication date: 1-Jun-2020.
  364. Majd A, Vahidi-Asl M, Khalilian A, Poorsarvi-Tehrani P and Haghighi H (2020). SLDeep, Expert Systems with Applications: An International Journal, 147:C, Online publication date: 1-Jun-2020.
  365. Sarker I, Colman A, Han J, Khan A, Abushark Y and Salah K (2019). BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model, Mobile Networks and Applications, 25:3, (1151-1161), Online publication date: 1-Jun-2020.
  366. Sarbazi M, Sadeghzadeh M and Mir Abedini S (2020). Improving resource allocation in software-defined networks using clustering, Cluster Computing, 23:2, (1199-1210), Online publication date: 1-Jun-2020.
  367. Safdar S, Yue T, Ali S and Lu H (2019). Using multi-objective search and machine learning to infer rules constraining product configurations, Automated Software Engineering, 27:1-2, (1-62), Online publication date: 1-Jun-2020.
  368. Bezzi D, Ceselli A and Righini G Automated Tuning of a Column Generation Algorithm Learning and Intelligent Optimization, (201-215)
  369. Ong H, Mustapha N, Hamdan H, Rosli R and Mustapha A (2020). Informative top-k class associative rule for cancer biomarker discovery on microarray data, Expert Systems with Applications: An International Journal, 146:C, Online publication date: 15-May-2020.
  370. Bhattacharjee P and Mitra P (2019). BISDBx: towards batch-incremental clustering for dynamic datasets using SNN-DBSCAN, Pattern Analysis & Applications, 23:2, (975-1009), Online publication date: 1-May-2020.
  371. Mansouri N, Javidi M and Mohammad Hasani Zade B (2019). Using data mining techniques to improve replica management in cloud environment, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:10, (7335-7360), Online publication date: 1-May-2020.
  372. ACM
    Chikersal P, Belgrave D, Doherty G, Enrique A, Palacios J, Richards D and Thieme A Understanding Client Support Strategies to Improve Clinical Outcomes in an Online Mental Health Intervention Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, (1-16)
  373. ACM
    Zhou Y, Mishra S, Verma M, Bhamidipati N and Wang W Recommending Themes for Ad Creative Design via Visual-Linguistic Representations Proceedings of The Web Conference 2020, (2521-2527)
  374. Hara K and Shiomoto K Intrusion Detection System using Semi-Supervised Learning with Adversarial Auto-encoder NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, (1-8)
  375. Padillo F, Luna J and Ventura S (2020). LAC, Knowledge-Based Systems, 193:C, Online publication date: 6-Apr-2020.
  376. Venkataramana L, Jacob S and Ramadoss R (2020). A Parallel Multilevel Feature Selection algorithm for improved cancer classification, Journal of Parallel and Distributed Computing, 138:C, (78-98), Online publication date: 1-Apr-2020.
  377. Chartier J, Mongeau P and Saint-Charles J (2020). Predicting semantic preferences in a socio-semantic system with collaborative filtering, International Journal of Information Management: The Journal for Information Professionals, 51:C, Online publication date: 1-Apr-2020.
  378. Spolaôr N, Lee H, Takaki W, Ensina L, Coy C and Wu F (2020). A systematic review on content-based video retrieval, Engineering Applications of Artificial Intelligence, 90:C, Online publication date: 1-Apr-2020.
  379. Nath K, Roy S and Nandi S (2020). InOvIn, Applied Soft Computing, 89:C, Online publication date: 1-Apr-2020.
  380. Najjar-Ghabel S, Farzinvash L and Razavi S (2019). HPDMS: high-performance data harvesting in wireless sensor networks with mobile sinks, The Journal of Supercomputing, 76:4, (2748-2776), Online publication date: 1-Apr-2020.
  381. Bazan J, Bazan-Socha S, Ochab M, Buregwa-Czuma S, Nowakowski T and Woźniak M (2019). Effective construction of classifiers with the k-NN method supported by a concept ontology, Knowledge and Information Systems, 62:4, (1497-1510), Online publication date: 1-Apr-2020.
  382. Yoo J, Boulware D and Kimmey D (2019). Parallel co-location mining with MapReduce and NoSQL systems, Knowledge and Information Systems, 62:4, (1433-1463), Online publication date: 1-Apr-2020.
  383. Mozaffari M, Nazemi E and Eftekhari-Moghadam A (2022). Feedback control loop design for workload change detection in self-tuning NoSQL wide column stores, Expert Systems with Applications: An International Journal, 142:C, Online publication date: 15-Mar-2020.
  384. Piórek M and Jabłoński B (2020). A Quaternion Clustering Framework, International Journal of Applied Mathematics and Computer Science, 30:1, (133-147), Online publication date: 1-Mar-2020.
  385. Winter K, Stertz F and Rinderle-Ma S (2020). Discovering instance and process spanning constraints from process execution logs, Information Systems, 89:C, Online publication date: 1-Mar-2020.
  386. zhou Y, Yang S, li y, chen Y, Yao J and Qazi A (2020). Does the review deserve more helpfulness when its title resembles the content? Locating helpful reviews by text mining, Information Processing and Management: an International Journal, 57:2, Online publication date: 1-Mar-2020.
  387. Zhang X and Ghorbani A (2020). An overview of online fake news, Information Processing and Management: an International Journal, 57:2, Online publication date: 1-Mar-2020.
  388. Park H and Jung J (2022). SAX-ARM, Expert Systems with Applications: An International Journal, 141:C, Online publication date: 1-Mar-2020.
  389. Manochandar S, Punniyamoorthy M and Jeyachitra R (2020). Development of new seed with modified validity measures for k-means clustering, Computers and Industrial Engineering, 141:C, Online publication date: 1-Mar-2020.
  390. Hireche C, Drias H and Moulai H (2020). Grid based clustering for satisfiability solving, Applied Soft Computing, 88:C, Online publication date: 1-Mar-2020.
  391. Gour A and Pardasani K (2020). Type II fuzzy set-based data analytics to explore amino acid associations in protein sequences of Swine Influenza Virus, Applied Soft Computing, 88:C, Online publication date: 1-Mar-2020.
  392. Faris H, Abukhurma R, Almanaseer W, Saadeh M, Mora A, Castillo P and Aljarah I (2019). Improving financial bankruptcy prediction in a highly imbalanced class distribution using oversampling and ensemble learning: a case from the Spanish market, Progress in Artificial Intelligence, 9:1, (31-53), Online publication date: 1-Mar-2020.
  393. Hao Z, Yang C, Liu L, Kustudic M and Niu B (2019). Exploiting skew-adaptive delimitation mechanism for learning expressive classification rules, Applied Intelligence, 50:3, (746-758), Online publication date: 1-Mar-2020.
  394. Sutcliffe A, Sawyer P, Stringer G, Couth S, Brown L, Gledson A, Bull C, Rayson P, Keane J, Zeng X and Leroi I (2018). Known and unknown requirements in healthcare, Requirements Engineering, 25:1, (1-20), Online publication date: 1-Mar-2020.
  395. Naik A, Kuppili V and Edla D (2019). Efficient feature selection using one-pass generalized classifier neural network and binary bat algorithm with a novel fitness function, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:6, (4575-4587), Online publication date: 1-Mar-2020.
  396. Raja P and Thangavel K (2019). Missing value imputation using unsupervised machine learning techniques, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:6, (4361-4392), Online publication date: 1-Mar-2020.
  397. Sivasankar E, Selvi C and Mahalakshmi S (2019). Rough set-based feature selection for credit risk prediction using weight-adjusted boosting ensemble method, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:6, (3975-3988), Online publication date: 1-Mar-2020.
  398. Nikou M, Mansourfar G and Bagherzadeh J (2019). Stock price prediction using DEEP learning algorithm and its comparison with machine learning algorithms, International Journal of Intelligent Systems in Accounting and Finance Management, 26:4, (164-174), Online publication date: 14-Feb-2020.
  399. Sekaran K and M. S (2020). Predicting drug responsiveness with deep learning from the effects on gene expression of Obsessive–Compulsive Disorder affected cases, Computer Communications, 151:C, (386-394), Online publication date: 1-Feb-2020.
  400. Abasi A, Khader A, Al-Betar M, Naim S, Makhadmeh S and Alyasseri Z (2020). Link-based multi-verse optimizer for text documents clustering, Applied Soft Computing, 87:C, Online publication date: 1-Feb-2020.
  401. Tang X, Li Y, Li W and Shen W (2020). A novel method for constructing the optimal hierarchical structure based on fuzzy granular space, Applied Soft Computing, 87:C, Online publication date: 1-Feb-2020.
  402. Anand P and Arora S (2019). A novel chaotic selfish herd optimizer for global optimization and feature selection, Artificial Intelligence Review, 53:2, (1441-1486), Online publication date: 1-Feb-2020.
  403. ACM
    Silva T, Viana A, Benevenuto F, Villas L, Salles J, Loureiro A and Quercia D (2019). Urban Computing Leveraging Location-Based Social Network Data, ACM Computing Surveys, 52:1, (1-39), Online publication date: 31-Jan-2020.
  404. ACM
    Varniab M, Hung C and Sharghi V (2020). Data mining and image analysis using genetic programming, ACM SIGAPP Applied Computing Review, 19:4, (40-49), Online publication date: 28-Jan-2020.
  405. ACM
    Bermudez R, Sison A and Medina R Extended PrefixSpan for Efficient Sequential Pattern Mining in a Game-based Learning Environment Proceedings of the 2020 2nd Asia Pacific Information Technology Conference, (118-122)
  406. ACM
    Rahman M and Mahmud A Classification on Educational Performance Evaluation Dataset using Feature Extraction Approach Proceedings of the International Conference on Computing Advancements, (1-6)
  407. ACM
    ElMenshawy D, Helmy W and El-Tazi N A Novel Approach for Collective Anomaly Detection in Internet of Things Proceedings of 2020 6th International Conference on Computing and Data Engineering, (86-90)
  408. ACM
    Guo S, Li X and Ma Z Association Rule Mining of Anaphora Based on ParCorFull Corpus Proceedings of 2020 6th International Conference on Computing and Data Engineering, (91-98)
  409. Guo C, Liu G, Chen C and Xue X (2020). Air Pollution Concentration Forecast Method Based on the Deep Ensemble Neural Network, Wireless Communications & Mobile Computing, 2020, Online publication date: 1-Jan-2020.
  410. Zhang C, Lv T, Yuan C, Ren Y, Wang S and Wang W (2020). The Influence of Demographic Characteristics on Employee Promotion, Wireless Communications & Mobile Computing, 2020, Online publication date: 1-Jan-2020.
  411. Aldabbagh G, Alghazzawi D, Hasan S, Alhaddad M, Malibari A, Cheng L and Comminiello D (2020). Optimal Learning Behavior Prediction System Based on Cognitive Style Using Adaptive Optimization-Based Neural Network, Complexity, 2020, Online publication date: 1-Jan-2020.
  412. Rajagopal S, Kundapur P, Hareesha K and Cimato S (2020). A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets, Security and Communication Networks, 2020, Online publication date: 1-Jan-2020.
  413. Majeed R, Abdullah N, Ashraf I, Zikria Y, Mushtaq M, Umer M and Huang C (2020). An Intelligent, Secure, and Smart Home Automation System, Scientific Programming, 2020, Online publication date: 1-Jan-2020.
  414. Sahmoud S and Topcuoglu H (2022). A general framework based on dynamic multi-objective evolutionary algorithms for handling feature drifts on data streams, Future Generation Computer Systems, 102:C, (42-52), Online publication date: 1-Jan-2020.
  415. Juszczuk P, Kozak J and Kania K (2021). Using similarity measures in prediction of changes in financial market stream data—Experimental approach, Data & Knowledge Engineering, 125:C, Online publication date: 1-Jan-2020.
  416. Grabot B (2020). Rule mining in maintenance, Computers and Industrial Engineering, 139:C, Online publication date: 1-Jan-2020.
  417. Xu Z, Dang Y, Munro P and Wang Y (2019). A data-driven approach for constructing the component-failure mode matrix for FMEA, Journal of Intelligent Manufacturing, 31:1, (249-265), Online publication date: 1-Jan-2020.
  418. Cao J, Wang S, Wen D, Peng Z, Yu P and Wang F (2019). Mutual clustering on comparative texts via heterogeneous information networks, Knowledge and Information Systems, 62:1, (175-202), Online publication date: 1-Jan-2020.
  419. Singh M (2018). Scalability and sparsity issues in recommender datasets: a survey, Knowledge and Information Systems, 62:1, (1-43), Online publication date: 1-Jan-2020.
  420. Koukaras P, Tjortjis C and Rousidis D (2019). Social Media Types: introducing a data driven taxonomy, Computing, 102:1, (295-340), Online publication date: 1-Jan-2020.
  421. Ghasemi E, Gholizadeh H and Adoko A (2019). Evaluation of rockburst occurrence and intensity in underground structures using decision tree approach, Engineering with Computers, 36:1, (213-225), Online publication date: 1-Jan-2020.
  422. Prasad R, Sarmah R and Chakraborty S Incremental k-Means Method Pattern Recognition and Machine Intelligence, (38-46)
  423. Chang Y, Li Z, Luo L, Luo S, Sowmya A, Wang Y and Chen F Exploring Latent Structure Similarity for Bayesian Nonparameteric Model with Mixture of NHPP Sequence Neural Information Processing, (432-444)
  424. Lau B, Marakkalage S, Zhou Y, Hassan N, Yuen C, Zhang M and Tan U (2019). A survey of data fusion in smart city applications, Information Fusion, 52:C, (357-374), Online publication date: 1-Dec-2019.
  425. Bagozi A, Bianchini D, De Antonellis V, Garda M and Marini A (2019). A Relevance-based approach for Big Data Exploration, Future Generation Computer Systems, 101:C, (51-69), Online publication date: 1-Dec-2019.
  426. da Silva R, Marins L, Almeida D, dos Santos Machado K and Werhli A (2020). A comparison of classifiers for predicting the class color of fluorescent proteins, Computational Biology and Chemistry, 83:C, Online publication date: 1-Dec-2019.
  427. Yu W (2019). A mathematical morphology based method for hierarchical clustering analysis of spatial points on street networks, Applied Soft Computing, 85:C, Online publication date: 1-Dec-2019.
  428. Meng F, Yuan G, Lv S, Wang Z and Xia S (2019). An overview on trajectory outlier detection, Artificial Intelligence Review, 52:4, (2437-2456), Online publication date: 1-Dec-2019.
  429. Kelkar B, Rodd S and Kulkarni U (2019). Estimating distance threshold for greedy subspace clustering, Expert Systems with Applications: An International Journal, 135:C, (219-236), Online publication date: 30-Nov-2019.
  430. Menouer T, Cérin C and Darmon P Accelerated Promethee Algorithm Based on Dimensionality Reduction Internet of Vehicles. Technologies and Services Toward Smart Cities, (190-203)
  431. Tkáčová Z, Šnajder Ľ and Guniš J Inquiry-Based Learning in Computer Science Classroom Informatics in Schools. New Ideas in School Informatics, (68-79)
  432. Rasouli P and Yu I Meaningful Data Sampling for a Faithful Local Explanation Method Intelligent Data Engineering and Automated Learning – IDEAL 2019, (28-38)
  433. ACM
    Oak R Poster Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, (2621-2623)
  434. ACM
    Qian C, Wen L and Kumar A BePT Proceedings of the 28th ACM International Conference on Information and Knowledge Management, (1873-1882)
  435. Panda S, Amatya D, Muwamba A and Chescheir G (2019). Estimation of evapotranspiration and its parameters for pine, switchgrass, and intercropping with remotely-sensed images based geospatial modeling, Environmental Modelling & Software, 121:C, Online publication date: 1-Nov-2019.
  436. Li Y, Huang J, Ikusan A, Mitchell M, Zhang J and Dai R (2022). ShellBreaker, Computers and Security, 87:C, Online publication date: 1-Nov-2019.
  437. Da Costa M, Dos Santos L, Schaefer J, Baierle I and Nara E (2019). Industry 4.0 technologies basic network identification, Scientometrics, 121:2, (977-994), Online publication date: 1-Nov-2019.
  438. García-Murillo D, Álvarez A, Cárdenas-Peña D, Hincapie-Restrepo W and Castellanos-Dominguez G Sparse-Based Feature Selection for Discriminating Between Crops and Weeds Using Field Images Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, (357-364)
  439. ACM
    Wan R and Li Y Clustering Data Stream with Rough Set Proceedings of the 2019 8th International Conference on Computing and Pattern Recognition, (52-56)
  440. Gao J, van Zelst S, Lu X and van der Aalst W Automated Robotic Process Automation: A Self-Learning Approach On the Move to Meaningful Internet Systems: OTM 2019 Conferences, (95-112)
  441. ACM
    Vegesna S, Nara A and Sk N (2019). A Novel Rule Mapping on TCAM for Power Efficient Packet Classification, ACM Transactions on Design Automation of Electronic Systems, 24:5, (1-23), Online publication date: 19-Oct-2019.
  442. ACM
    Badiang R, Gerardo B and Medina R Relocating Local Outliers Produced by Partitioning Methods Proceedings of the 2nd International Conference on Computing and Big Data, (12-16)
  443. Wilmet A, Viard T, Latapy M and Lamarche-Perrin R (2022). Outlier detection in IP traffic modelled as a link stream using the stability of degree distributions over time, Computer Networks: The International Journal of Computer and Telecommunications Networking, 161:C, (197-209), Online publication date: 9-Oct-2019.
  444. Bourennani F (2019). Solving Heterogeneous Big Data Mining Problems Using Multi-Objective Optimization, International Journal of Applied Metaheuristic Computing, 10:4, (18-37), Online publication date: 1-Oct-2019.
  445. Zhao S, Li S, Ramos J, Luo Z, Jiang Z, Dey A and Pan G (2019). User profiling from their use of smartphone applications, Pervasive and Mobile Computing, 59:C, Online publication date: 1-Oct-2019.
  446. Hao J, Bouzouane A and Gaboury S (2019). An incremental learning method based on formal concept analysis for pattern recognition in nonstationary sensor-based smart environments, Pervasive and Mobile Computing, 59:C, Online publication date: 1-Oct-2019.
  447. Yu X, Jiang F, Du J and Gong D (2019). A cross-domain collaborative filtering algorithm with expanding user and item features via the latent factor space of auxiliary domains, Pattern Recognition, 94:C, (96-109), Online publication date: 1-Oct-2019.
  448. He X, Tao Y, Wang Q and Lin H (2019). Multivariate spatial data visualization: a survey, Journal of Visualization, 22:5, (897-912), Online publication date: 1-Oct-2019.
  449. Huang Q, Xia X and Lo D (2019). Revisiting supervised and unsupervised models for effort-aware just-in-time defect prediction, Empirical Software Engineering, 24:5, (2823-2862), Online publication date: 1-Oct-2019.
  450. Oliveira R, Pereira A and Tavares J (2019). Computational diagnosis of skin lesions from dermoscopic images using combined features, Neural Computing and Applications, 31:10, (6091-6111), Online publication date: 1-Oct-2019.
  451. Alweshah M (2019). Construction biogeography-based optimization algorithm for solving classification problems, Neural Computing and Applications, 31:10, (5679-5688), Online publication date: 1-Oct-2019.
  452. Tsai C, Chang W, Wang Y and Chen H (2019). A high-performance parallel coral reef optimization for data clustering, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:19, (9327-9340), Online publication date: 1-Oct-2019.
  453. Roopa Devi E and Suganthe R (2019). Improved Relevance Vector Machine (IRVM) classifier for Intrusion Detection System, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:19, (9111-9119), Online publication date: 1-Oct-2019.
  454. Nikafshan Rad H and Jalali Z (2019). Modification of rock mass rating system using soft computing techniques, Engineering with Computers, 35:4, (1333-1357), Online publication date: 1-Oct-2019.
  455. ACM
    Hong J, Park S, Kim T, Noh Y, Kim S, Kim D and Kim W Malware classification for identifying author groups Proceedings of the Conference on Research in Adaptive and Convergent Systems, (169-174)
  456. ACM
    Varniab M, Hung C and Sharghi V Classification of multiclass datasets using genetic programming Proceedings of the Conference on Research in Adaptive and Convergent Systems, (76-82)
  457. Shi Y, He X, Zhang N, Yang C and Han J User-Guided Clustering in Heterogeneous Information Networks via Motif-Based Comprehensive Transcription Machine Learning and Knowledge Discovery in Databases, (361-377)
  458. Zheng S, Farahat A and Gupta C Generative Adversarial Networks for Failure Prediction Machine Learning and Knowledge Discovery in Databases, (621-637)
  459. Beaumont A and Al-Shaghdari T To What Extent Can Text Classification Help with Making Inferences About Students’ Understanding Machine Learning, Optimization, and Data Science, (372-383)
  460. Prata D, Rocha M, Ferreira L and Nogueira R Geospatial Dimension in Association Rule Mining: The Case Study of the Amazon Charcoal Tree Machine Learning, Optimization, and Data Science, (244-258)
  461. Sobhani E, Comon P, Jutten C and Babaie-Zadeh M Text Mining with Constrained Tensor Decomposition Machine Learning, Optimization, and Data Science, (219-231)
  462. Marcel P, Peralta V and Vassiliadis P A Framework for Learning Cell Interestingness from Cube Explorations Advances in Databases and Information Systems, (425-440)
  463. Khennak I, Drias H, Kechid A and Moulai H Clustering Algorithms for Query Expansion Based Information Retrieval Computational Collective Intelligence, (261-272)
  464. ACM
    Matoušek P, Ryšavý O and Grégr M Security Monitoring of IoT Communication Using Flows Proceedings of the 6th Conference on the Engineering of Computer Based Systems, (1-9)
  465. Werdiningsih I, Hendradi R, Purbandini , Nuqoba B and Ana E (2019). Identification of Risk Factors for Early Childhood Diseases Using Association Rules Algorithm with Feature Reduction, Cybernetics and Information Technologies, 19:3, (154-167), Online publication date: 1-Sep-2019.
  466. Robles-Berumen H, Zafra A, Fardoun H and Ventura S (2019). LEAC, Knowledge-Based Systems, 179:C, (117-119), Online publication date: 1-Sep-2019.
  467. Taradeh M, Mafarja M, Heidari A, Faris H, Aljarah I, Mirjalili S and Fujita H (2019). An evolutionary gravitational search-based feature selection, Information Sciences: an International Journal, 497:C, (219-239), Online publication date: 1-Sep-2019.
  468. Nitta G, Rao B, Sravani T, Ramakrishiah N and BalaAnand M (2019). LASSO-based feature selection and naïve Bayes classifier for crime prediction and its type, Service Oriented Computing and Applications, 13:3, (187-197), Online publication date: 1-Sep-2019.
  469. Xu Z, Pang S, Zhang T, Luo X, Liu J, Tang Y, Yu X and Xue L (2019). Cross Project Defect Prediction via Balanced Distribution Adaptation Based Transfer Learning, Journal of Computer Science and Technology, 34:5, (1039-1062), Online publication date: 1-Sep-2019.
  470. Panigrahi S, Verma K and Tripathi P (2019). Land cover change detection using focused time delay neural network, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:17, (7699-7713), Online publication date: 1-Sep-2019.
  471. ACM
    Wan R and Wang W Modifying FCM with grids and density peaks Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence, (76-80)
  472. Bhatta R, Ezeife C and Butt M Mining Sequential Patterns of Historical Purchases for E-commerce Recommendation Big Data Analytics and Knowledge Discovery, (57-72)
  473. Lin J and Wong R Frequent Item Mining When Obtaining Support Is Costly Big Data Analytics and Knowledge Discovery, (37-56)
  474. Khalilpour Darzi M, Niaki S and Khedmati M (2022). Binary classification of imbalanced datasets, Expert Systems with Applications: An International Journal, 128:C, (169-186), Online publication date: 15-Aug-2019.
  475. ACM
    Mao W, Wang M, Sun W, Qiu L, Pradhan S and Chen Y RNN-Based Room Scale Hand Motion Tracking The 25th Annual International Conference on Mobile Computing and Networking, (1-16)
  476. Guo C, Tang H, Lee C and Niu B Data Clustering Using the Cooperative Search Based Artificial Bee Colony Algorithm Intelligent Computing Methodologies, (660-671)
  477. Saheb T and Izadi L (2019). Paradigm of IoT big data analytics in the healthcare industry, Telematics and Informatics, 41:C, (70-85), Online publication date: 1-Aug-2019.
  478. Gupta A and Kohli S (2019). FORA, Information Fusion, 48:C, (27-38), Online publication date: 1-Aug-2019.
  479. Maciąg P, Kasabov N, Kryszkiewicz M and Bembenik R (2019). Air pollution prediction with clustering-based ensemble of evolving spiking neural networks and a case study for London area, Environmental Modelling & Software, 118:C, (262-280), Online publication date: 1-Aug-2019.
  480. Patil R, Dudeja H and Modi C (2019). Designing an efficient security framework for detecting intrusions in virtual network of cloud computing, Computers and Security, 85:C, (402-422), Online publication date: 1-Aug-2019.
  481. Rizvi S, Rienties B and Khoja S (2019). The role of demographics in online learning; A decision tree based approach, Computers & Education, 137:C, (32-47), Online publication date: 1-Aug-2019.
  482. Tang D (2019). Spherical evolution for solving continuous optimization problems, Applied Soft Computing, 81:C, Online publication date: 1-Aug-2019.
  483. Blanco-Mesa F, León-Castro E and Merigó J (2019). A bibliometric analysis of aggregation operators, Applied Soft Computing, 81:C, Online publication date: 1-Aug-2019.
  484. Lim S and Chi S (2022). Xgboost application on bridge management systems for proactive damage estimation, Advanced Engineering Informatics, 41:C, Online publication date: 1-Aug-2019.
  485. Park S, Park S, Kwon O and Sung Y (2019). Continuous risk profile and clustering-based method for investigating the effect of the automated enforcement system on urban traffic collisions, The Journal of Supercomputing, 75:8, (4350-4371), Online publication date: 1-Aug-2019.
  486. Yan M, Xia X, Lo D, Hassan A and Li S (2019). Characterizing and identifying reverted commits, Empirical Software Engineering, 24:4, (2171-2208), Online publication date: 1-Aug-2019.
  487. Sriwanna K, Boongoen T and Iam-On N (2019). Graph clustering-based discretization approach to microarray data, Knowledge and Information Systems, 60:2, (879-906), Online publication date: 1-Aug-2019.
  488. Mustafi D and Sahoo G (2019). A hybrid approach using genetic algorithm and the differential evolution heuristic for enhanced initialization of the k-means algorithm with applications in text clustering, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:15, (6361-6378), Online publication date: 1-Aug-2019.
  489. ACM
    Moosavi S, Samavatian M, Nandi A, Parthasarathy S and Ramnath R Short and Long-term Pattern Discovery Over Large-Scale Geo-Spatiotemporal Data Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (2905-2913)
  490. ACM
    Luo Y, Wang M, Zhou H, Yao Q, Tu W, Chen Y, Dai W and Yang Q AutoCross Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (1936-1945)
  491. Dias K, Pongelupe M, Caminhas W and de Errico L (2019). An innovative approach for real-time network traffic classification, Computer Networks: The International Journal of Computer and Telecommunications Networking, 158:C, (143-157), Online publication date: 20-Jul-2019.
  492. Almugren N and Alshamlan H FF-SVM: New FireFly-based Gene Selection Algorithm for Microarray Cancer Classification 2019 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB), (1-6)
  493. Karimi-Bidhendi S, Guo J and Jafarkhani H Using Quantization to Deploy Heterogeneous Nodes in Two-Tier Wireless Sensor Networks 2019 IEEE International Symposium on Information Theory (ISIT), (1502-1506)
  494. ACM
    Zhou A, Xu S, Wang S, Huang J, Yang S, Wei T, Zhang X and Ma H Robot Navigation in Radio Beam Space Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, (161-170)
  495. Paparrizos J and Franklin M (2019). GRAIL, Proceedings of the VLDB Endowment, 12:11, (1762-1777), Online publication date: 1-Jul-2019.
  496. Yoon S, Lee J and Lee B (2019). NETS, Proceedings of the VLDB Endowment, 12:11, (1303-1315), Online publication date: 1-Jul-2019.
  497. Dong W, Wu X and Kittler J (2019). Sparse subspace clustering via smoothed ℓ minimization, Pattern Recognition Letters, 125:C, (206-211), Online publication date: 1-Jul-2019.
  498. Liu B, Rong G, Dong L, Zhang H, Chen D, Chen T, Chen Y and Zhang T (2022). What are the factors affecting the handover process in open source development?, Journal of Systems and Software, 153:C, (238-254), Online publication date: 1-Jul-2019.
  499. Czibula G, Czibula I, Miholca D and Crivei L (2019). A novel concurrent relational association rule mining approach, Expert Systems with Applications: An International Journal, 125:C, (142-156), Online publication date: 1-Jul-2019.
  500. Espinosa R, García-Saiz D, Zorrilla M, Zubcoff J and Mazón J (2019). S3Mining, Computer Standards & Interfaces, 65:C, (143-158), Online publication date: 1-Jul-2019.
  501. Khalatbari L, Kangavari M, Hosseini S, Yin H and Cheung N (2019). MCP, Computers in Biology and Medicine, 110:C, (144-155), Online publication date: 1-Jul-2019.
  502. Tsai C and Shih K (2019). Mining a new biometrics to improve the accuracy of keystroke dynamics-based authentication system on free-text, Applied Soft Computing, 80:C, (125-137), Online publication date: 1-Jul-2019.
  503. Alswaitti M, Albughdadi M and Mat Isa N (2019). Variance-based differential evolution algorithm with an optional crossover for data clustering, Applied Soft Computing, 80:C, (1-17), Online publication date: 1-Jul-2019.
  504. Khan M (2019). Towards efficient XML parsing through minimization of JVM parameter space, The Journal of Supercomputing, 75:7, (3693-3711), Online publication date: 1-Jul-2019.
  505. Atallah D, Badawy M, El-Sayed A and Ghoneim M (2019). Predicting kidney transplantation outcome based on hybrid feature selection and KNN classifier, Multimedia Tools and Applications, 78:14, (20383-20407), Online publication date: 1-Jul-2019.
  506. Vakaimalar E , Mala K and Suresh Babu R (2019). Multifocus image fusion scheme based on discrete cosine transform and spatial frequency, Multimedia Tools and Applications, 78:13, (17573-17587), Online publication date: 1-Jul-2019.
  507. Wazarkar S and Keshavamurthy B (2019). A soft clustering technique with layered feature extraction for social image mining, Multimedia Tools and Applications, 78:14, (20333-20360), Online publication date: 1-Jul-2019.
  508. Manna T, Swetapadma A and Abdar M (2019). Decision Tree Predictive Learner-Based Approach for False Alarm Detection in ICU, Journal of Medical Systems, 43:7, (1-13), Online publication date: 1-Jul-2019.
  509. R D and P R (2019). An Optimized HCC Recurrence Prediction Using APO Algorithm Multiple Time Series Clinical Liver Cancer Dataset, Journal of Medical Systems, 43:7, (1-12), Online publication date: 1-Jul-2019.
  510. Zhang P, Guo Q, Zhang S and Wang H (2019). RETRACTED ARTICLE: Pattern mining model based on improved neural network and modified genetic algorithm for cloud mobile networks, Cluster Computing, 22:Suppl 4, (9651-9660), Online publication date: 1-Jul-2019.
  511. Çavuşoğlu Ü (2019). A new hybrid approach for intrusion detection using machine learning methods, Applied Intelligence, 49:7, (2735-2761), Online publication date: 1-Jul-2019.
  512. Hsueh Y and Huang H (2019). Personalized itinerary recommendation with time constraints using GPS datasets, Knowledge and Information Systems, 60:1, (523-544), Online publication date: 1-Jul-2019.
  513. Fan J (2019). OPE-HCA: an optimal probabilistic estimation approach for hierarchical clustering algorithm, Neural Computing and Applications, 31:7, (2095-2105), Online publication date: 1-Jul-2019.
  514. Al-Radaideh Q and Al-Abrat M (2019). An Arabic text categorization approach using term weighting and multiple reducts, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:14, (5849-5863), Online publication date: 1-Jul-2019.
  515. Grechikhin I and Savchenko A User Modeling on Mobile Device Based on Facial Clustering and Object Detection in Photos and Videos Pattern Recognition and Image Analysis, (429-440)
  516. ACM
    Azzalini D, Azzalini F, Mazuran M and Tanca L Tracking the Evolution of Financial Time Series Clusters Proceedings of the 5th Workshop on Data Science for Macro-modeling with Financial and Economic Datasets, (1-5)
  517. ACM
    Suri S and Bailis P DROP Proceedings of the 3rd International Workshop on Data Management for End-to-End Machine Learning, (1-10)
  518. Mantovani M, Combi C and Hauskrecht M Mining Compact Predictive Pattern Sets Using Classification Model Artificial Intelligence in Medicine, (386-396)
  519. ACM
    Silva N, Blascheck T, Jianu R, Rodrigues N, Weiskopf D, Raubal M and Schreck T Eye tracking support for visual analytics systems Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications, (1-10)
  520. ACM
    Ding R, Han S, Xu Y, Zhang H and Zhang D QuickInsights Proceedings of the 2019 International Conference on Management of Data, (317-332)
  521. Samoilescu R, Dascalu M, Sirbu M, Trausan-Matu S and Crossley S Modeling Collaboration in Online Conversations Using Time Series Analysis and Dialogism Artificial Intelligence in Education, (458-468)
  522. Aliperti A, Bechini A, Marcelloni F and Renda A A Fuzzy Density-based Clustering Algorithm for Streaming Data 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-6)
  523. ACM
    Mohan A, Abdelrazeq A and Hees F Recommendation System in Business Intelligence Solutions for Grocery shops Proceedings of the 3rd International Conference on E-commerce, E-Business and E-Government, (53-57)
  524. Asghari P, Rahmani A and Haj Seyyed Javadi H (2019). A medical monitoring scheme and health‐medical service composition model in cloud‐based IoT platform, Transactions on Emerging Telecommunications Technologies, 30:6, Online publication date: 18-Jun-2019.
  525. Jiang C, Ojika D, Kurth T, Prabhat , Vallecorsa S, Patel B and Lam H Acceleration of Scientific Deep Learning Models on Heterogeneous Computing Platform with Intel® FPGAs High Performance Computing, (587-600)
  526. ACM
    Lien Y, Chen Y and Huang P Compaction and Compression Techniques for File Systems based on Persistent Memories Proceedings of the 2019 2nd International Conference on Data Storage and Data Engineering, (9-14)
  527. ACM
    Jin Z, Cui Y and Yan Z Survey of Intrusion Detection Methods Based on Data Mining Algorithms Proceedings of the 2019 International Conference on Big Data Engineering, (98-106)
  528. Maciel-Guerra A, Figueredo G, Von Zuben F, Marti E, Twycross J and Alcocer M Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses 2019 IEEE Congress on Evolutionary Computation (CEC), (1157-1164)
  529. ACM
    Kumar K, Srinivasan R and Singh E High dimensional document classification using novel similarity function Proceedings of the 5th International Conference on Engineering and MIS, (1-6)
  530. Nalchigar S, Yu E, Obeidi Y, Carbajales S, Green J and Chan A Solution Patterns for Machine Learning Advanced Information Systems Engineering, (627-642)
  531. Noor U, Anwar Z, Malik A, Khan S and Saleem S (2022). A machine learning framework for investigating data breaches based on semantic analysis of adversary’s attack patterns in threat intelligence repositories, Future Generation Computer Systems, 95:C, (467-487), Online publication date: 1-Jun-2019.
  532. Razavi M, Sadoghi Yazdi H and Taherinia A (2019). Crowd analysis using Bayesian Risk Kernel Density Estimation, Engineering Applications of Artificial Intelligence, 82:C, (282-293), Online publication date: 1-Jun-2019.
  533. Kale A and Sonavane S (2019). IoT based Smart Farming , Computers and Electronics in Agriculture, 161:C, (225-232), Online publication date: 1-Jun-2019.
  534. Ben Hajkacem M, N'cir C and Essoussi N (2019). One-pass MapReduce-based clustering method for mixed large scale data, Journal of Intelligent Information Systems, 52:3, (619-636), Online publication date: 1-Jun-2019.
  535. Kadhim A (2019). Survey on supervised machine learning techniques for automatic text classification, Artificial Intelligence Review, 52:1, (273-292), Online publication date: 1-Jun-2019.
  536. Omar S, Fred K, Swaib K and Richard M Hybrid model of correlation based filter feature selection and machine learning classifiers applied on smart meter data set Proceedings of the 2nd Symposium on Software Engineering in Africa, (1-10)
  537. Silva B, Junior W and Dias K Network and Cloudlet Selection for Computation Offloading on a Software-Defined Edge Architecture Green, Pervasive, and Cloud Computing, (147-161)
  538. Wei W, Liang J, Guo X, Song P and Sun Y (2019). Hierarchical division clustering framework for categorical data, Neurocomputing, 341:C, (118-134), Online publication date: 14-May-2019.
  539. ACM
    Yang C, Hoang D, Mikolov T and Han J Place Deduplication with Embeddings The World Wide Web Conference, (3420-3426)
  540. ACM
    He S and Shin K Spatio-Temporal Capsule-based Reinforcement Learning for Mobility-on-Demand Network Coordination The World Wide Web Conference, (2806-2813)
  541. Kupka J and Rusnok P (2022). Fuzzy four-fold tables, International Journal of Approximate Reasoning, 108:C, (89-106), Online publication date: 1-May-2019.
  542. Hashemzadeh M, Golzari Oskouei A and Farajzadeh N (2019). New fuzzy C-means clustering method based on feature-weight and cluster-weight learning, Applied Soft Computing, 78:C, (324-345), Online publication date: 1-May-2019.
  543. Wu J, Tsai M, Huang Y, Islam S, Hassan M, Alelaiwi A and Fortino G (2019). Applying an ensemble convolutional neural network with Savitzky–Golay filter to construct a phonocardiogram prediction model, Applied Soft Computing, 78:C, (29-40), Online publication date: 1-May-2019.
  544. Kong X, Li M, Li J, Tian K, Hu X and Xia F (2019). CoPFun, World Wide Web, 22:3, (1029-1054), Online publication date: 1-May-2019.
  545. ACM
    Brown D, Japa A and Shi Y An Attempt at Improving Density-based Clustering Algorithms Proceedings of the 2019 ACM Southeast Conference, (172-175)
  546. ACM
    AbdulWahhab R Air Quality System Using IoT for Indoor Environmental Monitoring Proceedings of the 2019 5th International Conference on Computer and Technology Applications, (184-188)
  547. Kong X, Shi Y, Yu S, Liu J and Xia F (2022). Academic social networks, Journal of Network and Computer Applications, 132:C, (86-103), Online publication date: 15-Apr-2019.
  548. Costa G and Ortale R Mining Cluster Patterns in XML Corpora via Latent Topic Models of Content and Structure Advances in Knowledge Discovery and Data Mining, (237-248)
  549. ACM
    Wang H, Wang B, Li C, Xu L, He J and Yang M SOTagRec Proceedings of the 2019 4th International Conference on Mathematics and Artificial Intelligence, (146-152)
  550. Sahin C, Pollock L and Clause J (2019). Supporting software evolution through feedback on executing/skipping energy tests for proposed source code changes, Journal of Software: Evolution and Process, 31:4, Online publication date: 10-Apr-2019.
  551. ACM
    Mahmoud A, Venkatagiri R, Ahmed K, Misailovic S, Marinov D, Fletcher C and Adve S Minotaur Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, (1087-1103)
  552. Weiand A, Manssour I and Silveira M (2020). Visual Analysis for Monitoring Students in Distance Courses, International Journal of Distance Education Technologies, 17:2, (18-44), Online publication date: 1-Apr-2019.
  553. Aldowah H, Al-Samarraie H and Fauzy W (2022). Educational data mining and learning analytics for 21st century higher education, Telematics and Informatics, 37:C, (13-49), Online publication date: 1-Apr-2019.
  554. Wang P, Zhang P and Li Z (2019). A three-way decision method based on Gaussian kernel in a hybrid information system with images, Applied Soft Computing, 77:C, (734-749), Online publication date: 1-Apr-2019.
  555. Jiang L, Liu S and Chen C (2019). Recent research advances on interactive machine learning, Journal of Visualization, 22:2, (401-417), Online publication date: 1-Apr-2019.
  556. Sattarian M, Rezazadeh J, Farahbakhsh R and Bagheri A (2019). Indoor navigation systems based on data mining techniques in internet of things, Wireless Networks, 25:3, (1385-1402), Online publication date: 1-Apr-2019.
  557. Zhao K, Matsukawa T and Suzuki E (2019). Experimental validation for N-ary error correcting output codes for ensemble learning of deep neural networks, Journal of Intelligent Information Systems, 52:2, (367-392), Online publication date: 1-Apr-2019.
  558. Agnihotri D, Verma K, Tripathi P and Singh B (2019). Soft voting technique to improve the performance of global filter based feature selection in text corpus, Applied Intelligence, 49:4, (1597-1619), Online publication date: 1-Apr-2019.
  559. ACM
    Umer R, Mathrani A, Susnjak T and Lim S Mining Activity Log Data to Predict Student's Outcome in a Course Proceedings of the 2019 International Conference on Big Data and Education, (52-58)
  560. Kim J and Chung K (2019). Associative Feature Information Extraction Using Text Mining from Health Big Data, Wireless Personal Communications: An International Journal, 105:2, (691-707), Online publication date: 1-Mar-2019.
  561. Louhichi S, Gzara M and Ben-Abdallah H (2019). MDCUT2, Distributed and Parallel Databases, 37:1, (73-99), Online publication date: 1-Mar-2019.
  562. ACM
    Yang X, Zhou W, Shu N and Zhang H A Fast and Efficient Local Outlier Detection in Data Streams Proceedings of the 2019 International Conference on Image, Video and Signal Processing, (111-116)
  563. ACM
    Kumar L, Lal S, Goyal A and Murthy N Change-Proneness of Object-Oriented Software Using Combination of Feature Selection Techniques and Ensemble Learning Techniques Proceedings of the 12th Innovations in Software Engineering Conference (formerly known as India Software Engineering Conference), (1-11)
  564. Li C, Wei F, Dong W, Wang X, Liu Q and Zhang X (2019). Dynamic Structure Embedded Online Multiple-Output Regression for Streaming Data, IEEE Transactions on Pattern Analysis and Machine Intelligence, 41:2, (323-336), Online publication date: 1-Feb-2019.
  565. Chow K, He S, Tan J and Chan S (2019). Efficient Locality Classification for Indoor Fingerprint-Based Systems, IEEE Transactions on Mobile Computing, 18:2, (290-304), Online publication date: 1-Feb-2019.
  566. Zhao P, Zhang Y, Wu M, Hoi S, Tan M and Huang J (2019). Adaptive Cost-Sensitive Online Classification, IEEE Transactions on Knowledge and Data Engineering, 31:2, (214-228), Online publication date: 1-Feb-2019.
  567. Pan W, Chen L and Ming Z (2019). Personalized recommendation with implicit feedback via learning pairwise preferences over item-sets, Knowledge and Information Systems, 58:2, (295-318), Online publication date: 1-Feb-2019.
  568. Pereira M, Carrano E, Davis Júnior C and Vasconcelos J (2019). A comparative study of optimization models in genetic programming-based rule extraction problems, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:4, (1179-1197), Online publication date: 1-Feb-2019.
  569. Masum Z (2019). Mining stock category association on Tehran stock market, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:4, (1165-1177), Online publication date: 1-Feb-2019.
  570. ACM
    Pouyanfar S, Yang Y, Chen S, Shyu M and Iyengar S (2018). Multimedia Big Data Analytics, ACM Computing Surveys, 51:1, (1-34), Online publication date: 31-Jan-2019.
  571. ACM
    Liu P, Benson A and Charikar M Sampling Methods for Counting Temporal Motifs Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, (294-302)
  572. ACM
    Phan T Smart Mobility Improvement Proceedings of the 3rd International Conference on Machine Learning and Soft Computing, (16-20)
  573. Mukta M, Ali M and Mahmud J (2018). Temporal modeling of basic human values from social network usage, Journal of the Association for Information Science and Technology, 70:2, (151-163), Online publication date: 4-Jan-2019.
  574. Zhang S and Wan J (2020). Anomaly Region Detection Based on DMST, International Journal of Data Warehousing and Mining, 15:1, (39-57), Online publication date: 1-Jan-2019.
  575. Ali Shah S, Aziz W, Ahmed Nadeem M, Almaraashi M, Shim S, Habeebullah T and Mateos C (2019). A Novel Phase Space Reconstruction- (PSR-) Based Predictive Algorithm to Forecast Atmospheric Particulate Matter Concentration, Scientific Programming, 2019, Online publication date: 1-Jan-2019.
  576. Liu D, Xu P and Ren L (2018). TPFlow: Progressive Partition and Multidimensional Pattern Extraction for Large-Scale Spatio-Temporal Data Analysis, IEEE Transactions on Visualization and Computer Graphics, 25:1, (1-11), Online publication date: 1-Jan-2019.
  577. Naganandhini S and Shanmugavadivu P (2021). Effective Diagnosis of Alzheimer’s Disease using Modified Decision Tree Classifier, Procedia Computer Science, 165:C, (548-555), Online publication date: 1-Jan-2019.
  578. Kim J, Choi J, Yoo K and Nasridinov A (2019). AA-DBSCAN, The Journal of Supercomputing, 75:1, (142-169), Online publication date: 1-Jan-2019.
  579. Narayan S and Sathiyamoorthy E (2019). A novel recommender system based on FFT with machine learning for predicting and identifying heart diseases, Neural Computing and Applications, 31:1, (93-102), Online publication date: 1-Jan-2019.
  580. Al Ghayab H, Li Y, Siuly S and Abdulla S (2019). Epileptic seizures detection in EEGs blending frequency domain with information gain technique, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:1, (227-239), Online publication date: 1-Jan-2019.
  581. Dehshibi M and Shanbehzadeh J (2019). Cubic norm and kernel-based bi-directional PCA, The Visual Computer: International Journal of Computer Graphics, 35:1, (23-40), Online publication date: 1-Jan-2019.
  582. ACM
    Inovero C Forecasting Supplies Inventory Using Sequential Pattern Analysis Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, (291-294)
  583. ACM
    Marik R Feature Space Decomposition using Information Theory Proceedings of the 2018 International Conference on Algorithms, Computing and Artificial Intelligence, (1-10)
  584. Patel A, Chouhan S and Niyogi R Using Crowd Sourced Data for Music Mood Classification Big Data Analytics, (363-375)
  585. ACM
    Yu X, Sun Y, Bertino E and Li X (2018). Modeling User Intrinsic Characteristic on Social Media for Identity Linkage, ACM Transactions on Social Computing, 1:3, (1-25), Online publication date: 13-Dec-2018.
  586. ACM
    Ning J, Chen L and Chen J Relative Density-Based Outlier Detection Algorithm Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, (227-231)
  587. ACM
    Chau P, Duc B and Anh D Discord Discovery in Streaming Time Series based on an Improved HOT SAX Algorithm Proceedings of the 9th International Symposium on Information and Communication Technology, (24-30)
  588. Elrawy M, Awad A and Hamed H (2018). Intrusion detection systems for IoT-based smart environments, Journal of Cloud Computing: Advances, Systems and Applications, 7:1, (1-20), Online publication date: 1-Dec-2018.
  589. Suh Y and Lee K (2018). A survey of simulation provenance systems, Human-centric Computing and Information Sciences, 8:1, (1-29), Online publication date: 1-Dec-2018.
  590. Nguyen M, Diep T, Hoang Vinh T, Nakajima T and Thoai N Analyzing and Visualizing Web Server Access Log File Future Data and Security Engineering, (349-367)
  591. ACM
    Li X, Qiao H, Ma Z, Yang D, Pan Y and Ma Z Bayesian Belief Network Model of Indirect Speech Act Theory Proceedings of the 2018 International Conference on Artificial Intelligence and Virtual Reality, (127-130)
  592. Antoniazzi F and Viola F RDF Graph Visualization Tools: a Survey Proceedings of the 23rd Conference of Open Innovations Association FRUCT, (27-38)
  593. ACM
    Nurbojatmiko , Rustamaji E and Firmansyah A Analysis of Study Program Selection Patterns Using FP-Growth and ECLAT Methods Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services, (401-407)
  594. ACM
    Neto G, Viana J, Braga R and Oliveira C Surfaces categorization based on data collected by bike sensors Proceedings of the Euro American Conference on Telematics and Information Systems, (1-7)
  595. Luo Y, Zhang Y, Ding X, Cai X, Song C and Yuan X StrDip: A Fast Data Stream Clustering Algorithm Using the Dip Test of Unimodality Web Information Systems Engineering – WISE 2018, (193-208)
  596. ACM
    Jourdan T, Boutet A and Frindel C Toward privacy in IoT mobile devices for activity recognition Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, (155-165)
  597. ACM
    Richards D, Bilgin A and Ranjbartabar H Users' perceptions of empathic dialogue cues Proceedings of the 18th International Conference on Intelligent Virtual Agents, (35-42)
  598. Luo W, Sun L, Li Y, Zhang Y and Rong J A New Attempt for Pedestrian Level of Service in Subway Transfer Corridor Based on The Physiological Characteristics 2018 21st International Conference on Intelligent Transportation Systems (ITSC), (1939-1943)
  599. Chen Y, Tang S, Bouguila N, Wang C, Du J and Li H (2018). A fast clustering algorithm based on pruning unnecessary distance computations in DBSCAN for high-dimensional data, Pattern Recognition, 83:C, (375-387), Online publication date: 1-Nov-2018.
  600. Li F, Qiao H and Zhang B (2018). Discriminatively boosted image clustering with fully convolutional auto-encoders, Pattern Recognition, 83:C, (161-173), Online publication date: 1-Nov-2018.
  601. Singh D, Singh P and Sisodia D (2018). Evolutionary based optimal ensemble classifiers for HIV-1 protease cleavage sites prediction, Expert Systems with Applications: An International Journal, 109:C, (86-99), Online publication date: 1-Nov-2018.
  602. Benhar H, Idri A and Fernández-Alemán J (2018). A Systematic Mapping Study of Data Preparation in Heart Disease Knowledge Discovery, Journal of Medical Systems, 43:1, (1-17), Online publication date: 1-Nov-2018.
  603. Han L and Yin Z (2018). Learning to transfer microscopy image modalities, Machine Vision and Applications, 29:8, (1257-1267), Online publication date: 1-Nov-2018.
  604. ACM
    He S, Lin Q, Lou J, Zhang H, Lyu M and Zhang D Identifying impactful service system problems via log analysis Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (60-70)
  605. ACM
    Youssar S, Bahtaoui M, Jarmouni Y and Berrado A Clustering of Pharmaceutical products using Random Forest algorithm Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications, (1-6)
  606. Lv Y, Sun B, Luo Q, Wang J, Yu Z and Qian X CounterMiner Proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture, (613-626)
  607. ACM
    Shen J, Karimzadehgan M, Bendersky M, Qin Z and Metzler D Multi-Task Learning for Email Search Ranking with Auxiliary Query Clustering Proceedings of the 27th ACM International Conference on Information and Knowledge Management, (2127-2135)
  608. ACM
    Aslay C, Nasir M, De Francisci Morales G and Gionis A Mining Frequent Patterns in Evolving Graphs Proceedings of the 27th ACM International Conference on Information and Knowledge Management, (923-932)
  609. ACM
    da Silva D, Velloso P and de A. Rocha A Impact factors on live video streams for mobile devices Proceedings of the 24th Brazilian Symposium on Multimedia and the Web, (315-318)
  610. Valentin P, Kounalakis T and Nalpantidis L Weld Classification Using Gray Level Co-Occurrence Matrix and Local Binary Patterns 2018 IEEE International Conference on Imaging Systems and Techniques (IST), (1-6)
  611. ACM
    Arora A, Peddoju S, Chouhan V and Chaudhary A Hybrid Android Malware Detection by Combining Supervised and Unsupervised Learning Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, (798-800)
  612. Saeidpour P, Otarkhani A and Shokouhyar S (2018). Predicting Customers' Churn Using Data Mining Technique and its Effect on the Development of Marketing Applications in Value-Added Services in Telecom Industry, International Journal of Information Systems in the Service Sector, 10:4, (59-72), Online publication date: 1-Oct-2018.
  613. Sahu S and Shrivas A (2018). Analysis and Comparison of Clustering Techniques for Chronic Kidney Disease With Genetic Algorithm, International Journal of Computer Vision and Image Processing, 8:4, (16-25), Online publication date: 1-Oct-2018.
  614. ACM
    Kumar K, Srinivasan R and Singh E An efficient approach for dimensionality reduction and classification of high dimensional text documents Proceedings of the First International Conference on Data Science, E-learning and Information Systems, (1-5)
  615. ACM
    Nagaraja A, Kiran V, S P and Rajasekhar N A membership function for intrusion and anomaly detection of low frequency attacks Proceedings of the First International Conference on Data Science, E-learning and Information Systems, (1-6)
  616. Jiao F, Li H and Doboli A (2018). Modeling and Extraction of Causal Information in Analog Circuits, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37:10, (1915-1928), Online publication date: 1-Oct-2018.
  617. Tai C, Chang C and Chang Y (2018). Hybrid knowledge fusion and inference on cloud environment, Future Generation Computer Systems, 87:C, (568-579), Online publication date: 1-Oct-2018.
  618. Zhu T, Li G, Xiong P and Zhou W (2018). Answering differentially private queries for continual datasets release, Future Generation Computer Systems, 87:C, (816-827), Online publication date: 1-Oct-2018.
  619. Qin J, Liu Y and Grosvenor R (2022). Multi-source data analytics for AM energy consumption prediction, Advanced Engineering Informatics, 38:C, (840-850), Online publication date: 1-Oct-2018.
  620. Li L, Li Q, Wu Y, Ou Y and Chen D (2018). Mining Association Rules Based on Deep Pruning Strategies, Wireless Personal Communications: An International Journal, 102:3, (2157-2181), Online publication date: 1-Oct-2018.
  621. Majumdar A, Debnath T, Sood S and Baishnab K (2018). Kyasanur Forest Disease Classification Framework Using Novel Extremal Optimization Tuned Neural Network in Fog Computing Environment, Journal of Medical Systems, 42:10, (1-16), Online publication date: 1-Oct-2018.
  622. Faris H, Hassonah M, Al-Zoubi A, Mirjalili S and Aljarah I (2018). A multi-verse optimizer approach for feature selection and optimizing SVM parameters based on a robust system architecture, Neural Computing and Applications, 30:8, (2355-2369), Online publication date: 1-Oct-2018.
  623. ACM
    Peng C, Kang Z, Cai S and Cheng Q (2018). Integrate and Conquer, ACM Transactions on Intelligent Systems and Technology, 9:5, (1-25), Online publication date: 30-Sep-2018.
  624. Correia J, Santos M, Costa C and Andrade C Fast Online Analytical Processing for Big Data Warehousing 2018 International Conference on Intelligent Systems (IS), (435-442)
  625. Angiulli F and Narvaez E (2018). Pruning strategies for nearest neighbor competence preservation learners, Neurocomputing, 308:C, (8-20), Online publication date: 25-Sep-2018.
  626. ACM
    Chaushi B, Chaushi A, Dika Z and Ismaili F Investigation of Higher Education ERP implementation factors Proceedings of the 19th International Conference on Computer Systems and Technologies, (81-87)
  627. Yang C, Liu M, He F, Zhang X, Peng J and Han J Similarity Modeling on Heterogeneous Networks via Automatic Path Discovery Machine Learning and Knowledge Discovery in Databases, (37-54)
  628. Nguyen T, Nguyen D, Tong V, Tran D, Tran H and Mellouk A Mining Frequent Patterns for Scalable and Accurate Malware Detection System in Android 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), (370-375)
  629. Yang J, Ouyang C, Pan M, Yu Y and ter Hofstede A Finding the “Liberos”: Discover Organizational Models with Overlaps Business Process Management, (339-355)
  630. Nolle T, Seeliger A and Mühlhäuser M BINet: Multivariate Business Process Anomaly Detection Using Deep Learning Business Process Management, (271-287)
  631. Ben HajKacem M, Ben N’cir C and Essoussi N Scalable Random Sampling K-Prototypes Using Spark Big Data Analytics and Knowledge Discovery, (317-326)
  632. Chon K and Kim M (2018). BIGMiner, Cluster Computing, 21:3, (1507-1520), Online publication date: 1-Sep-2018.
  633. Kolomvatsos K (2018). An intelligent scheme for assigning queries, Applied Intelligence, 48:9, (2730-2745), Online publication date: 1-Sep-2018.
  634. Boselli R, Cesarini M, Mercorio F and Mezzanzanica M (2018). Classifying online Job Advertisements through Machine Learning, Future Generation Computer Systems, 86:C, (319-328), Online publication date: 1-Sep-2018.
  635. Yu J, Lee N, Pyo C and Lee Y (2018). WISE, The Journal of Supercomputing, 74:9, (4403-4418), Online publication date: 1-Sep-2018.
  636. Yu Q, Luo Y, Chen C and Wang X (2018). Trajectory outlier detection approach based on common slices sub-sequence, Applied Intelligence, 48:9, (2661-2680), Online publication date: 1-Sep-2018.
  637. ACM
    Carminati M, Polino M, Continella A, Lanzi A, Maggi F and Zanero S (2018). Security Evaluation of a Banking Fraud Analysis System, ACM Transactions on Privacy and Security, 21:3, (1-31), Online publication date: 31-Aug-2018.
  638. ACM
    Zhang W, Sheng Q, Yao L, Taylor K, Shemshadi A and Qin Y (2018). A Learning-Based Framework for Improving Querying on Web Interfaces of Curated Knowledge Bases, ACM Transactions on Internet Technology, 18:3, (1-20), Online publication date: 31-Aug-2018.
  639. Guacho G, Abdali S, Shah N and Papalexakis E Semi-supervised content-based detection of misinformation via tensor embeddings Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (322-325)
  640. Tran C, Zhang M, Andreae P, Xue B and Bui L (2018). An effective and efficient approach to classification with incomplete data, Knowledge-Based Systems, 154:C, (1-16), Online publication date: 15-Aug-2018.
  641. Siers M and Islam M (2018). Novel algorithms for cost-sensitive classification and knowledge discovery in class imbalanced datasets with an application to NASA software defects, Information Sciences: an International Journal, 459:C, (53-70), Online publication date: 1-Aug-2018.
  642. Lee S, Kim H, Choi M and Moon Y (2018). A time-series matching approach for symmetric-invariant boundary image matching, Multimedia Tools and Applications, 77:16, (20979-21001), Online publication date: 1-Aug-2018.
  643. El Houby E (2018). Framework of Computer Aided Diagnosis Systems for Cancer Classification Based on Medical Images, Journal of Medical Systems, 42:8, (1-11), Online publication date: 1-Aug-2018.
  644. Lan K, Wang D, Fong S, Liu L, Wong K and Dey N (2018). A Survey of Data Mining and Deep Learning in Bioinformatics, Journal of Medical Systems, 42:8, (1-20), Online publication date: 1-Aug-2018.
  645. ACM
    Ghaffarian S and Shahriari H (2017). Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques, ACM Computing Surveys, 50:4, (1-36), Online publication date: 31-Jul-2018.
  646. ACM
    Huang Y Impacts of Big Data on Data Mining Research Proceedings of the 3rd International Conference on Crowd Science and Engineering, (1-5)
  647. ACM
    Luo C, Chen Z, Tang L, Shrivastava A, Li Z, Chen H and Ye J TINET Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (1890-1899)
  648. ACM
    Yang C, Shi X, Jie L and Han J I Know You'll Be Back Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (914-922)
  649. Ben Ishay R, Herman M and Yosefy C A New Approach for Tuned Clustering Analysis Machine Learning and Data Mining in Pattern Recognition, (436-452)
  650. Bedi J and Toshniwal D Parallel Framework for Unsupervised Classification of Seismic Facies Machine Learning and Data Mining in Pattern Recognition, (452-467)
  651. Mahzoon M, Maher M, Eltayeby O, Dou W and Grace K A Framework for Interactive Exploratory Learning Analytics Learning and Collaboration Technologies. Learning and Teaching, (319-331)
  652. Sakuma T, Nishi K, Yamazaki S, Kimura K, Matsumoto S, Yoda K and Takeuchi I Finding Discriminative Animal Behaviors from Sequential Bio-Logging Trajectory Data Distributed, Ambient and Pervasive Interactions: Technologies and Contexts, (125-138)
  653. Xu C, Guan Z, Zhao W, Niu Y, Wang Q and Wang Z Deep multi-view concept learning Proceedings of the 27th International Joint Conference on Artificial Intelligence, (2898-2904)
  654. Perez A and Abreu R Leveraging qualitative reasoning to improve SFL Proceedings of the 27th International Joint Conference on Artificial Intelligence, (1935-1941)
  655. Zhang H, Wu H, Sun W and Zheng B Deeptravel Proceedings of the 27th International Joint Conference on Artificial Intelligence, (3655-3661)
  656. ACM
    Tex C, Schäler M and Böhm K Towards meaningful distance-preserving encryption Proceedings of the 30th International Conference on Scientific and Statistical Database Management, (1-12)
  657. Turkington R, Mulvenna M, Bond R, O'Neill S and Armour C The application of user event log data for mental health and wellbeing analysis Proceedings of the 32nd International BCS Human Computer Interaction Conference, (1-14)
  658. Sohrabi B, Vanani I and Abedin E (2018). Human Resources Management and Information Systems Trend Analysis Using Text Clustering, International Journal of Human Capital and Information Technology Professionals, 9:3, (1-24), Online publication date: 1-Jul-2018.
  659. Sahu S and Shrivas A (2018). Comparative Study of Classification Models with Genetic Search Based Feature Selection Technique, International Journal of Applied Evolutionary Computation, 9:3, (1-11), Online publication date: 1-Jul-2018.
  660. Hu Z, Bodyanskiy Y, Tyshchenko O and Boiko O (2018). A neuro-fuzzy Kohonen network for data stream possibilistic clustering and its online self-learning procedure, Applied Soft Computing, 68:C, (710-718), Online publication date: 1-Jul-2018.
  661. Lee C and Chen B (2018). Mutually-exclusive-and-collectively-exhaustive feature selection scheme, Applied Soft Computing, 68:C, (961-971), Online publication date: 1-Jul-2018.
  662. Damiani M, Hachem F, Issa H, Ranc N, Moorcroft P and Cagnacci F (2018). Cluster-based trajectory segmentation with local noise, Data Mining and Knowledge Discovery, 32:4, (1017-1055), Online publication date: 1-Jul-2018.
  663. Qiang J, Li Y, Yuan Y and Wu X (2018). Short text clustering based on Pitman-Yor process mixture model, Applied Intelligence, 48:7, (1802-1812), Online publication date: 1-Jul-2018.
  664. Paul A, Shill P, Rabin M and Murase K (2018). Adaptive weighted fuzzy rule-based system for the risk level assessment of heart disease, Applied Intelligence, 48:7, (1739-1756), Online publication date: 1-Jul-2018.
  665. ACM
    Enriko I, Suryanegara M and Gunawan D Heart Disease Diagnosis System with k-Nearest Neighbors Method Using Real Clinical Medical Records Proceedings of the 4th International Conference on Frontiers of Educational Technologies, (127-131)
  666. ACM
    Staudt P, Ludwig N, Huber J, Hagenmeyer V and Weinhardt C SCiBER Proceedings of the Ninth International Conference on Future Energy Systems, (618-621)
  667. Cheruku R, Edla D, Kuppili V and Dharavath R (2018). RST-BatMiner, Applied Soft Computing, 67:C, (764-780), Online publication date: 1-Jun-2018.
  668. Fuangkhon P (2018). Parallel reduced multi-class contour preserving classification, Applied Intelligence, 48:6, (1461-1490), Online publication date: 1-Jun-2018.
  669. ACM
    Júnior J, Cappelli C, Revoredo K and Nunes V Text mining as a transparency enabler to support decision making in a people management process Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, (1-8)
  670. ACM
    Scott E and Pfahl D Using developers' features to estimate story points Proceedings of the 2018 International Conference on Software and System Process, (106-110)
  671. ACM
    Khennak I and Drias H Data mining techniques and nature-inspired algorithms for query expansion Proceedings of the International Conference on Learning and Optimization Algorithms: Theory and Applications, (1-6)
  672. ACM
    Guermah H, Fissaa T, Guermah B, Hafiddi H and Nassar M Using Context Ontology and Linear SVM for Chronic Kidney Disease Prediction Proceedings of the International Conference on Learning and Optimization Algorithms: Theory and Applications, (1-6)
  673. ACM
    Moulai H and Drias H From Data Warehouse to Information Warehouse Proceedings of the International Conference on Learning and Optimization Algorithms: Theory and Applications, (1-6)
  674. Faragardi H, Lisper B, Sandström K and Nolte T (2018). A resource efficient framework to run automotive embedded software on multi-core ECUs, Journal of Systems and Software, 139:C, (64-83), Online publication date: 1-May-2018.
  675. Zhou Q, Quan W, Zhong Y, Xiao W, Mou C and Wang Y (2018). Predicting high-risk students using Internet access logs, Knowledge and Information Systems, 55:2, (393-413), Online publication date: 1-May-2018.
  676. Zhang C, Yan J, Li C, Wu H and Bie R (2018). End-to-end learning for image-based air quality level estimation, Machine Vision and Applications, 29:4, (601-615), Online publication date: 1-May-2018.
  677. ACM
    Pandove D, Goel S and Rani R (2018). Systematic Review of Clustering High-Dimensional and Large Datasets, ACM Transactions on Knowledge Discovery from Data, 12:2, (1-68), Online publication date: 30-Apr-2018.
  678. Xia H, Fang B, Roughan M, Cho K and Tune P (2018). A BasisEvolution framework for network traffic anomaly detection, Computer Networks: The International Journal of Computer and Telecommunications Networking, 135:C, (15-31), Online publication date: 22-Apr-2018.
  679. Wang Z, Ma L, Lin X and Zhong H Saliency Detection via Multi-Center Convex Hull Prior 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (1867-1871)
  680. Masood R, Vatsalan D, Ikram M and Kaafar M Incognito Proceedings of the 2018 World Wide Web Conference, (267-276)
  681. ACM
    De Vit A, Marcon C, Nunes R, Webber T, Sanchez G and Rolim C Energy saving on DTN using trajectory inference model Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (2132-2135)
  682. ACM
    de Jesus A, Júnior M and Brandão W Exploiting linkedin to predict employee resignation likelihood Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (1764-1771)
  683. ACM
    Rocha R, Siravenha A, Gomes A, Serejo G, Silva A, Rodrigues L, Braga J, Dias G, Carvalho S and de Souza C A deep-learning-based approach for automated wagon component inspection Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (276-283)
  684. ACM
    Madhavan M and G G A tf-idf based topic model for identifying lncRNAs from genomic background Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (40-46)
  685. ACM
    Androutsopoulou A and Charalabidis Y A framework for evidence based policy making combining big data, dynamic modelling and machine intelligence Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, (575-583)
  686. Boulaaba A and Faiz S (2018). Towards Big GeoData Mining and Processing, International Journal of Organizational and Collective Intelligence, 8:2, (60-73), Online publication date: 1-Apr-2018.
  687. Mafarja M, Aljarah I, Heidari A, Hammouri A, Faris H, Al-Zoubi A and Mirjalili S (2018). Evolutionary Population Dynamics and Grasshopper Optimization approaches for feature selection problems, Knowledge-Based Systems, 145:C, (25-45), Online publication date: 1-Apr-2018.
  688. Das A, Sengupta S and Bhattacharyya S (2018). A group incremental feature selection for classification using rough set theory based genetic algorithm, Applied Soft Computing, 65:C, (400-411), Online publication date: 1-Apr-2018.
  689. Ahmadi E, Goldengorin B, Süer G and Mosadegh H (2018). A hybrid method of 2-TSP and novel learning-based GA for job sequencing and tool switching problem, Applied Soft Computing, 65:C, (214-229), Online publication date: 1-Apr-2018.
  690. Hatem Y and Rady S (2018). Exploring feature dimensionality reduction methods for enhancing automatic sport image annotation, Multimedia Tools and Applications, 77:7, (9171-9188), Online publication date: 1-Apr-2018.
  691. Fan T (2018). Research and implementation of user clustering based on MapReduce in multimedia big data, Multimedia Tools and Applications, 77:8, (10017-10031), Online publication date: 1-Apr-2018.
  692. Wang S, Lo D, Vasilescu B and Serebrenik A (2018). EnTagRec ++, Empirical Software Engineering, 23:2, (800-832), Online publication date: 1-Apr-2018.
  693. Baranauskas J, Netto O, Nozawa S and Macedo A (2018). A tree-based algorithm for attribute selection, Applied Intelligence, 48:4, (821-833), Online publication date: 1-Apr-2018.
  694. Shi B, Han L and Yan H (2018). Adaptive clustering algorithm based on kNN and density, Pattern Recognition Letters, 104:C, (37-44), Online publication date: 1-Mar-2018.
  695. Zhang L, Srisukkham W, Neoh S, Lim C and Pandit D (2018). Classifier ensemble reduction using a modified firefly algorithm, Expert Systems with Applications: An International Journal, 93:C, (395-422), Online publication date: 1-Mar-2018.
  696. Park S, Synn J, Kwon O and Sung Y (2018). Apriori-based text mining method for the advancement of the transportation management plan in expressway work zones, The Journal of Supercomputing, 74:3, (1283-1298), Online publication date: 1-Mar-2018.
  697. Wang Y, Gemulla R and Li H On multi-relational link prediction with bilinear models Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence, (4227-4234)
  698. ACM
    Tang J and Wang K Personalized Top-N Sequential Recommendation via Convolutional Sequence Embedding Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, (565-573)
  699. Li T, Xu Z, Tang J and Wang Y (2018). Model-free control for distributed stream data processing using deep reinforcement learning, Proceedings of the VLDB Endowment, 11:6, (705-718), Online publication date: 1-Feb-2018.
  700. Li T, Xu Z, Tang J and Wang Y (2019). Model-free control for distributed stream data processing using deep reinforcement learning, Proceedings of the VLDB Endowment, 11:6, (705-718), Online publication date: 1-Feb-2018.
  701. Li T, Xu Z, Tang J and Wang Y (2018). Model-free control for distributed stream data processing using deep reinforcement learning, Proceedings of the VLDB Endowment, 11:6, (705-718), Online publication date: 1-Feb-2018.
  702. Segatori A, Marcelloni F and Pedrycz W (2018). On Distributed Fuzzy Decision Trees for Big Data, IEEE Transactions on Fuzzy Systems, 26:1, (174-192), Online publication date: 1-Feb-2018.
  703. Papamartzivanos D, Gmez Mrmol F and Kambourakis G (2018). Dendron, Future Generation Computer Systems, 79:P2, (558-574), Online publication date: 1-Feb-2018.
  704. Zhang D, Lee K and Lee I (2018). Hierarchical trajectory clustering for spatio-temporal periodic pattern mining, Expert Systems with Applications: An International Journal, 92:C, (1-11), Online publication date: 1-Feb-2018.
  705. Zhang P, Wang J, Guo K, Wu F and Min G (2018). Multi-functional secure data aggregation schemes for WSNs, Ad Hoc Networks, 69:C, (86-99), Online publication date: 1-Feb-2018.
  706. Oung Q, Muthusamy H, Basah S, Lee H and Vijean V (2018). Empirical Wavelet Transform Based Features for Classification of Parkinson's Disease Severity, Journal of Medical Systems, 42:2, (1-17), Online publication date: 1-Feb-2018.
  707. Li X, Han Q and Qiu B (2018). A clustering algorithm with affine space-based boundary detection, Applied Intelligence, 48:2, (432-444), Online publication date: 1-Feb-2018.
  708. Tabatabaee Malazi H and Davari M (2018). Combining emerging patterns with random forest for complex activity recognition in smart homes, Applied Intelligence, 48:2, (315-330), Online publication date: 1-Feb-2018.
  709. Zhao X, Xiao C, Lin X, Zhang W and Wang Y (2018). Efficient structure similarity searches, The VLDB Journal — The International Journal on Very Large Data Bases, 27:1, (53-78), Online publication date: 1-Feb-2018.
  710. Aziz M and Hassanien A (2018). Modified cuckoo search algorithm with rough sets for feature selection, Neural Computing and Applications, 29:4, (925-934), Online publication date: 1-Feb-2018.
  711. Seera M, Randhawa K and Lim C (2018). Improving the Fuzzy MinMax neural network performance with an ensemble of clustering trees, Neurocomputing, 275:C, (1744-1751), Online publication date: 31-Jan-2018.
  712. Wu D, Shang M, Luo X, Xu J, Yan H, Deng W and Wang G (2018). Self-training semi-supervised classification based on density peaks of data, Neurocomputing, 275:C, (180-191), Online publication date: 31-Jan-2018.
  713. ACM
    Pham N, Foo E, Suriadi S, Jeffrey H and Lahza H Improving performance of intrusion detection system using ensemble methods and feature selection Proceedings of the Australasian Computer Science Week Multiconference, (1-6)
  714. ACM
    Idri A, Chlioui I and Ouassif B A systematic map of data analytics in breast cancer Proceedings of the Australasian Computer Science Week Multiconference, (1-10)
  715. ACM
    Lin C, Wan L and Chen D (2017). C-Mine, ACM Transactions on Design Automation of Electronic Systems, 23:2, (1-23), Online publication date: 24-Jan-2018.
  716. ACM
    Yu X, Sun Y, Bertino E and Li X Modeling User Intrinsic Characteristic on Social Media for Identity Linkage Proceedings of the 2018 ACM International Conference on Supporting Group Work, (39-50)
  717. Bhagya Shree S and Sheshadri H (2018). Diagnosis of Alzheimer's disease using Naive Bayesian Classifier, Neural Computing and Applications, 29:1, (123-132), Online publication date: 1-Jan-2018.
  718. Ma H, Wang Y and Wang K (2018). Automatic detection of false positive RFID readings using machine learning algorithms, Expert Systems with Applications: An International Journal, 91:C, (442-451), Online publication date: 1-Jan-2018.
  719. Virmani D, Jain N, Parikh K, Upadhyaya S and Srivastav A (2018). Proficient Normalised Fuzzy K-Means With Initial Centroids Methodology, International Journal of Knowledge Discovery in Bioinformatics, 8:1, (42-59), Online publication date: 1-Jan-2018.
  720. Li L, Katangur A and Karuturi N (2018). SmartNotify, International Journal of Advanced Pervasive and Ubiquitous Computing, 10:1, (37-50), Online publication date: 1-Jan-2018.
  721. Yu X, Tian Z, Qiu J, Jiang F and Wang D (2018). A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
  722. Zanin M, Romance M, Moral S, Criado R and Buscarino A (2018). Credit Card Fraud Detection through Parenclitic Network Analysis, Complexity, 2018, Online publication date: 1-Jan-2018.
  723. Bonidia R, Rodrigues L, Avila-Santos A, Sanches D, Brancher J and Mustapha A (2018). Computational Intelligence in Sports, Advances in Human-Computer Interaction, 2018, Online publication date: 1-Jan-2018.
  724. Wosiak A, Zakrzewska D and Czarnowski I (2018). Integrating Correlation-Based Feature Selection and Clustering for Improved Cardiovascular Disease Diagnosis, Complexity, 2018, Online publication date: 1-Jan-2018.
  725. Hacibeyoglu M, Ibrahim M and Köstler H (2018). A Novel Multimean Particle Swarm Optimization Algorithm for Nonlinear Continuous Optimization, Scientific Programming, 2018, Online publication date: 1-Jan-2018.
  726. Hancer E, Xue B, Zhang M, Karaboga D and Akay B (2018). Pareto front feature selection based on artificial bee colony optimization, Information Sciences: an International Journal, 422:C, (462-479), Online publication date: 1-Jan-2018.
  727. Li F, Zhang X, Zhang X, Du C, Xu Y and Tian Y (2018). Cost-sensitive and hybrid-attribute measure multi-decision tree over imbalanced data sets, Information Sciences: an International Journal, 422:C, (242-256), Online publication date: 1-Jan-2018.
  728. Olszak C, Bartu T and Lorek P (2018). A comprehensive framework of information system design to provide organizational creativity support, Information and Management, 55:1, (94-108), Online publication date: 1-Jan-2018.
  729. Alswaitti M, Albughdadi M and Isa N (2018). Density-based particle swarm optimization algorithm for data clustering, Expert Systems with Applications: An International Journal, 91:C, (170-186), Online publication date: 1-Jan-2018.
  730. Rene Beulah J and Shalini Punithavathani D (2018). A Hybrid Feature Selection Method for Improved Detection of Wired/Wireless Network Intrusions, Wireless Personal Communications: An International Journal, 98:2, (1853-1869), Online publication date: 1-Jan-2018.
  731. Zhang C, Liu J, Chen F, Cui Y, Ngai E and Hu Y (2018). Dependency- and similarity-aware caching for HTTP adaptive streaming, Multimedia Tools and Applications, 77:1, (1453-1474), Online publication date: 1-Jan-2018.
  732. Dutta I, Dutta S and Raahemi B (2017). Detecting financial restatements using data mining techniques, Expert Systems with Applications: An International Journal, 90:C, (374-393), Online publication date: 30-Dec-2017.
  733. ACM
    Abdallah S, Malik M and Ertek G A Data Mining Framework for the Analysis of Patient Arrivals into Healthcare Centers Proceedings of the 2017 International Conference on Information Technology, (52-61)
  734. ACM
    Ertek G, Tunc M, Zhang A, Tanrikulu O and Asian S Data Mining of Project Management Data Proceedings of the 2017 International Conference on Information Technology, (35-41)
  735. Oswald C, Ajith Kumar I, Avinash J and Sivaselvan B A Graph-Based Frequent Sequence Mining Approach to Text Compression Mining Intelligence and Knowledge Exploration, (371-380)
  736. ACM
    Minh Q, Chi T and Toulouse M Toward a Crowdsourcing-Based Urban Flood Mitigation Platform Proceedings of the 8th International Symposium on Information and Communication Technology, (301-308)
  737. Saxena A, Prasad M, Gupta A, Bharill N, Patel O, Tiwari A, Er M, Ding W and Lin C (2017). A review of clustering techniques and developments, Neurocomputing, 267:C, (664-681), Online publication date: 6-Dec-2017.
  738. Sheikhpour R, Sarram M, Chahooki M and Sheikhpour R (2017). A kernelized non-parametric classifier based on feature ranking in anisotropic Gaussian kernel, Neurocomputing, 267:C, (545-555), Online publication date: 6-Dec-2017.
  739. ACM
    Chen L, Hou S and Ye Y SecureDroid Proceedings of the 33rd Annual Computer Security Applications Conference, (362-372)
  740. Guo X, Wei Q, Chen G, Zhang J and Qiao D (2017). Extracting representative information on intra-organizational blogging platforms, MIS Quarterly, 41:4, (1105-1127), Online publication date: 1-Dec-2017.
  741. Sriwanna K, Boongoen T and Iam-On N (2017). Graph clustering-based discretization of splitting and merging methods (GraphS and GraphM), Human-centric Computing and Information Sciences, 7:1, (1-39), Online publication date: 1-Dec-2017.
  742. Zelenkov Y, Fedorova E and Chekrizov D (2017). Two-step classification method based on genetic algorithm for bankruptcy forecasting, Expert Systems with Applications: An International Journal, 88:C, (393-401), Online publication date: 1-Dec-2017.
  743. Tongman S, Chanama S, Chanama M, Plaimas K and Lursinsap C (2017). Metabolic pathway synthesis based on predicting compound transformable pairs by using neural classifiers with imbalanced data handling, Expert Systems with Applications: An International Journal, 88:C, (45-57), Online publication date: 1-Dec-2017.
  744. Manohar E and Shalini Punithavathani D (2017). Hybrid Data Aggregation Technique to Categorize the Web Users to Discover Knowledge About the Web Users, Wireless Personal Communications: An International Journal, 97:4, (5289-5303), Online publication date: 1-Dec-2017.
  745. Ilavarasi A and Sathiyabhama B (2017). An evolutionary feature set decomposition based anonymization for classification workloads, Cluster Computing, 20:4, (3515-3525), Online publication date: 1-Dec-2017.
  746. Wen L, Min F and Wang S (2017). A two-stage discretization algorithm based on information entropy, Applied Intelligence, 47:4, (1169-1185), Online publication date: 1-Dec-2017.
  747. Fang Y, Cheng R, Chen Y, Luo S and Hu J (2017). Effective and efficient attributed community search, The VLDB Journal — The International Journal on Very Large Data Bases, 26:6, (803-828), Online publication date: 1-Dec-2017.
  748. ACM
    Agnihotri D, Verma K and Tripathi P Mutual information using sample variance for text feature selection Proceedings of the 3rd International Conference on Communication and Information Processing, (39-44)
  749. Venkatesh P, da Costa D, Zou Y and Ng J A framework to extract personalized behavioural patterns of user's IoT devices data Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering, (19-27)
  750. ACM
    Kang Y, Jo Y, Cha J, Bae W and Kim S A Framework for Estimating Execution Times of IO Traces on SSDs Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, (2123-2126)
  751. Kusumakumari V, Sherigar D, Chandran R and Patil N (2017). Frequent pattern mining on stream data using Hadoop CanTree-GTree, Procedia Computer Science, 115:C, (266-273), Online publication date: 1-Nov-2017.
  752. Kim Y and Enke D (2017). Instance Selection Using Genetic Algorithms for an Intelligent Ensemble Trading System, Procedia Computer Science, 114:C, (465-472), Online publication date: 1-Nov-2017.
  753. Liu W, Ye M, Wei J and Hu X (2017). Compressed constrained spectral clustering framework for large-scale data sets, Knowledge-Based Systems, 135:C, (77-88), Online publication date: 1-Nov-2017.
  754. Eftimov T, Koroec P and Koroui Seljak B (2017). A Novel Approach to statistical comparison of meta-heuristic stochastic optimization algorithms using deep statistics, Information Sciences: an International Journal, 417:C, (186-215), Online publication date: 1-Nov-2017.
  755. Lee P, Loh W and Chin J (2017). Feature selection in multimedia, Image and Vision Computing, 67:C, (29-42), Online publication date: 1-Nov-2017.
  756. Abualigah L, Khader A, Hanandeh E and Gandomi A (2017). A novel hybridization strategy for krill herd algorithm applied to clustering techniques, Applied Soft Computing, 60:C, (423-435), Online publication date: 1-Nov-2017.
  757. Khajehali N and Alizadeh S (2017). Extract critical factors affecting the length of hospital stay of pneumonia patient by data mining (case study, Artificial Intelligence in Medicine, 83:C, (2-13), Online publication date: 1-Nov-2017.
  758. Intayoad W, Becker T and Temdee P (2017). Social Context-Aware Recommendation for Personalized Online Learning, Wireless Personal Communications: An International Journal, 97:1, (163-179), Online publication date: 1-Nov-2017.
  759. Sudha M (2017). Evolutionary and Neural Computing Based Decision Support System for Disease Diagnosis from Clinical Data Sets in Medical Practice, Journal of Medical Systems, 41:11, (1-10), Online publication date: 1-Nov-2017.
  760. von Zernichow B and Roman D Usability of Visual Data Profiling in Data Cleaning and Transformation On the Move to Meaningful Internet Systems. OTM 2017 Conferences, (480-496)
  761. ACM
    Mlambo M, Gasela N, Esiefarienrhe M and Isong B On the Optimization of Improved Apriori Algorithm via Linked-list Trie Proceedings of the 1st International Conference on Big Data Research, (62-66)
  762. Mafarja M and Mirjalili S (2017). Hybrid Whale Optimization Algorithm with simulated annealing for feature selection, Neurocomputing, 260:C, (302-312), Online publication date: 18-Oct-2017.
  763. Assaf A, Zaidi S, Affes S and Kandil N Accurate range-free ANN-based localization in wireless sensor networks 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (1-6)
  764. Yaohui L, Zhengming M and Fang Y (2017). Adaptive density peak clustering based on K-nearest neighbors with aggregating strategy, Knowledge-Based Systems, 133:C, (208-220), Online publication date: 1-Oct-2017.
  765. Douven I (2017). Clustering colors, Cognitive Systems Research, 45:C, (70-81), Online publication date: 1-Oct-2017.
  766. ACM
    Chen Q, Wan Y, Zhang X, Lei Y, Zobel J and Verspoor K (2018). Comparative Analysis of Sequence Clustering Methods for Deduplication of Biological Databases, Journal of Data and Information Quality, 9:3, (1-27), Online publication date: 30-Sep-2017.
  767. ACM
    Yang J, Karimi R, Sæmundsson T, Wildani A and Vigfusson Y Mithril Proceedings of the 2017 Symposium on Cloud Computing, (66-79)
  768. ACM
    Yu P, Yang F, Cao C, Hu H and Ma X API Usage Change Rules Mining based on Fine-grained Call Dependency Analysis Proceedings of the 9th Asia-Pacific Symposium on Internetware, (1-9)
  769. Agnihotri D, Verma K and Tripathi P (2017). Variable Global Feature Selection Scheme for automatic classification of text documents, Expert Systems with Applications: An International Journal, 81:C, (268-281), Online publication date: 15-Sep-2017.
  770. ACM
    Esnaola-Gonzalez I, Bermúdez J, Fernández I, Fernández S and Arnaiz A Towards a Semantic Outlier Detection Framework in Wireless Sensor Networks Proceedings of the 13th International Conference on Semantic Systems, (152-159)
  771. ACM
    Sarker I, Kabir M, Colman A and Han J An effective call prediction model based on noisy mobile phone data Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, (193-196)
  772. ACM
    Razzaque M, Hira M and Dira M (2017). QoS in Body Area Networks, ACM Transactions on Sensor Networks, 13:3, (1-46), Online publication date: 1-Sep-2017.
  773. Si L, Yu J, Wu W, Ma J, Wu Q and Li S (2017). RMHC-MR, Procedia Computer Science, 111:C, (252-259), Online publication date: 1-Sep-2017.
  774. Ziafat H and Babamir S (2017). A method for the optimum selection of datacenters in geographically distributed clouds, The Journal of Supercomputing, 73:9, (4042-4081), Online publication date: 1-Sep-2017.
  775. ACM
    Schubert E, Sander J, Ester M, Kriegel H and Xu X (2017). DBSCAN Revisited, Revisited, ACM Transactions on Database Systems, 42:3, (1-21), Online publication date: 24-Aug-2017.
  776. Qin J, Liu Y and Grosvenor R Data analytics for energy consumption of digital manufacturing systems using Internet of Things method 2017 13th IEEE Conference on Automation Science and Engineering (CASE), (482-487)
  777. Topaloglu M and Ekmekci S (2017). Gender detection and identifying one's handwriting with handwriting analysis, Expert Systems with Applications: An International Journal, 79:C, (236-243), Online publication date: 15-Aug-2017.
  778. Weng B, Ahmed M and Megahed F (2017). Stock market one-day ahead movement prediction using disparate data sources, Expert Systems with Applications: An International Journal, 79:C, (153-163), Online publication date: 15-Aug-2017.
  779. ACM
    Shi Y, Chan P, Zhuang H, Gui H and Han J PReP Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (425-434)
  780. Zhu R, Wang L, Zhai C and Gu Q High-dimensional variance-reduced stochastic gradient expectation-maximization algorithm Proceedings of the 34th International Conference on Machine Learning - Volume 70, (4180-4188)
  781. Seera M, Lim C, Tan K and Liew W (2017). Classification of transcranial Doppler signals using individual and ensemble recurrent neural networks, Neurocomputing, 249:C, (337-344), Online publication date: 2-Aug-2017.
  782. Zhu D and Wong K (2017). An evaluation study on text categorization using automatically generated labeled dataset, Neurocomputing, 249:C, (321-336), Online publication date: 2-Aug-2017.
  783. Gu K, Zhou J, Qiao J, Zhai G, Lin W and Bovik A (2017). No-Reference Quality Assessment of Screen Content Pictures, IEEE Transactions on Image Processing, 26:8, (4005-4018), Online publication date: 1-Aug-2017.
  784. Costa E, Fonseca B, Santana M, de Arajo F and Rego J (2017). Evaluating the effectiveness of educational data mining techniques for early prediction of students' academic failure in introductory programming courses, Computers in Human Behavior, 73:C, (247-256), Online publication date: 1-Aug-2017.
  785. Seera M, Wong M and Nandi A (2017). Classification of ball bearing faults using a hybrid intelligent model, Applied Soft Computing, 57:C, (427-435), Online publication date: 1-Aug-2017.
  786. Cao F, Yu L, Huang J and Liang J (2017). k-mw-modes, Applied Soft Computing, 57:C, (605-614), Online publication date: 1-Aug-2017.
  787. Kretschmer R, Pfouga A, Rulhoff S and Stjepandi J (2017). Knowledge-based design for assembly in agile manufacturing by using Data Mining methods, Advanced Engineering Informatics, 33:C, (285-299), Online publication date: 1-Aug-2017.
  788. Settouti N, Chikh M and Barra V (2017). A new feature selection approach based on ensemble methods in semi-supervised classification, Pattern Analysis & Applications, 20:3, (673-686), Online publication date: 1-Aug-2017.
  789. Hajek P and Henriques R (2017). Mining corporate annual reports for intelligent detection of financial statement fraud A comparative study of machine learning methods, Knowledge-Based Systems, 128:C, (139-152), Online publication date: 15-Jul-2017.
  790. Domnguez D, Daz Redondo R, Vilas A and Khalifa M (2017). Sensing the city with Instagram, Expert Systems with Applications: An International Journal, 78:C, (319-333), Online publication date: 15-Jul-2017.
  791. ACM
    Burke N, Dehne F, Rau-Chaplin A and Robillard D Quantifying Eventual Consistency For Aggregate Queries Proceedings of the 21st International Database Engineering & Applications Symposium, (274-282)
  792. ACM
    Aderibigbe T and Chi H A Quick Outlier Detection in Wireless Body Area Networks Proceedings of the Practice and Experience in Advanced Research Computing 2017 on Sustainability, Success and Impact, (1-3)
  793. Alshdaifat E, Coenen F and Dures K (2017). A Directed Acyclic Graph DAG Ensemble Classification Model, International Journal of Data Warehousing and Mining, 13:3, (73-90), Online publication date: 1-Jul-2017.
  794. Rahmani M, Amine A and Hamou R (2017). New Approach Based on Termite's Hill Building for Prediction of Successful Simulations in Climate Models, International Journal of Swarm Intelligence Research, 8:3, (43-60), Online publication date: 1-Jul-2017.
  795. Hamou R, Amine A and Rahmani M (2017). A Novel Bio Inspired Algorithm Based on Echolocation Mechanism of Bats for Seismic States Prediction, International Journal of Swarm Intelligence Research, 8:3, (1-18), Online publication date: 1-Jul-2017.
  796. Menad H and Amine A (2017). A Bio Inspired Approach for Cardiotocogram Data Classification, International Journal of Organizational and Collective Intelligence, 7:3, (1-14), Online publication date: 1-Jul-2017.
  797. Arora S and Kumar D (2017). Hybridization of SOM and PSO for Detecting Fraud in Credit Card, International Journal of Information Systems in the Service Sector, 9:3, (17-36), Online publication date: 1-Jul-2017.
  798. ACM
    Safdar S, Lu H, Yue T and Ali S Mining cross product line rules with multi-objective search and machine learning Proceedings of the Genetic and Evolutionary Computation Conference, (1319-1326)
  799. ACM
    Tran C, Zhang M, Andreae P and Xue B Genetic programming based feature construction for classification with incomplete data Proceedings of the Genetic and Evolutionary Computation Conference, (1033-1040)
  800. Khodadoust J and Khodadoust A (2017). Fingerprint indexing based on minutiae pairs and convex core point, Pattern Recognition, 67:C, (110-126), Online publication date: 1-Jul-2017.
  801. Oliva J and Garcia Rosa J (2017). How an epileptic EEG segment, used as reference, can influence a cross-correlation classifier?, Applied Intelligence, 47:1, (178-196), Online publication date: 1-Jul-2017.
  802. ACM
    Xie B, Huang Y, Chase J, Choi J, Klasky S, Lofstead J and Oral S Predicting Output Performance of a Petascale Supercomputer Proceedings of the 26th International Symposium on High-Performance Parallel and Distributed Computing, (181-192)
  803. ACM
    Zhang C, Liu J, Ma M, Sun L and Li B Seeker Proceedings of the 27th Workshop on Network and Operating Systems Support for Digital Audio and Video, (25-30)
  804. Padillo F, Luna J and Ventura S An evolutionary algorithm for mining rare association rules: A Big Data approach 2017 IEEE Congress on Evolutionary Computation (CEC), (2007-2014)
  805. Zhang A, Song S, Wang J and Yu P (2017). Time series data cleaning, Proceedings of the VLDB Endowment, 10:10, (1046-1057), Online publication date: 1-Jun-2017.
  806. ACM
    Paparrizos J and Gravano L (2017). Fast and Accurate Time-Series Clustering, ACM Transactions on Database Systems, 42:2, (1-49), Online publication date: 1-Jun-2017.
  807. Sacha D, Al-Masoudi F, Stein M, Schreck T, Keim D, Andrienko G and Janetzko H (2017). Dynamic Visual Abstraction of Soccer Movement, Computer Graphics Forum, 36:3, (305-315), Online publication date: 1-Jun-2017.
  808. Pandit D, Zhang L, Liu C, Chattopadhyay S, Aslam N and Lim C (2017). A lightweight QRS detector for single lead ECG signals using a max-min difference algorithm, Computer Methods and Programs in Biomedicine, 144:C, (61-75), Online publication date: 1-Jun-2017.
  809. Khan S and Baig A (2017). Ant colony optimization based hierarchical multi-label classification algorithm, Applied Soft Computing, 55:C, (462-479), Online publication date: 1-Jun-2017.
  810. Jafari M, Ghavami B and Sattari V (2017). A hybrid framework for reverse engineering of robust Gene Regulatory Networks, Artificial Intelligence in Medicine, 79:C, (15-27), Online publication date: 1-Jun-2017.
  811. Tzirakis P and Tjortjis C (2017). T3C, Advances in Data Analysis and Classification, 11:2, (353-370), Online publication date: 1-Jun-2017.
  812. Sun L, Guo C, Liu C and Xiong H (2017). Fast affinity propagation clustering based on incomplete similarity matrix, Knowledge and Information Systems, 51:3, (941-963), Online publication date: 1-Jun-2017.
  813. Khan F, Qamar U and Bashir S (2017). A semi-supervised approach to sentiment analysis using revised sentiment strength based on SentiWordNet, Knowledge and Information Systems, 51:3, (851-872), Online publication date: 1-Jun-2017.
  814. Bao L, Xing Z, Xia X, Lo D and Li S Who will leave the company? Proceedings of the 14th International Conference on Mining Software Repositories, (170-181)
  815. Alkadhi R, Laţa T, Guzman E and Bruegge B Rationale in development chat messages Proceedings of the 14th International Conference on Mining Software Repositories, (436-446)
  816. Xu L, Dou W, Gao C, Wang J, Wei J, Zhong H and Huang T SpreadCluster Proceedings of the 14th International Conference on Mining Software Repositories, (158-169)
  817. ACM
    Gan J and Tao Y Dynamic Density Based Clustering Proceedings of the 2017 ACM International Conference on Management of Data, (1493-1507)
  818. ACM
    Fujiwara Y, Marumo N, Blondel M, Takeuchi K, Kim H, Iwata T and Ueda N Scaling Locally Linear Embedding Proceedings of the 2017 ACM International Conference on Management of Data, (1479-1492)
  819. ACM
    Chaudhuri S, Ding B and Kandula S Approximate Query Processing Proceedings of the 2017 ACM International Conference on Management of Data, (511-519)
  820. Loomba R, Shi L and Jennings B State-machine driven collaborative mobile sensing serving multiple Internet-of-Things applications 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), (1229-1237)
  821. ACM
    Chandrasekharan E, Samory M, Srinivasan A and Gilbert E The Bag of Communities Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, (3175-3187)
  822. Theissler A (2017). Detecting known and unknown faults in automotive systems using ensemble-based anomaly detection, Knowledge-Based Systems, 123:C, (163-173), Online publication date: 1-May-2017.
  823. Chi H, Lin Z, Jin H, Xu B and Qi M (2017). A decision support system for detecting serial crimes, Knowledge-Based Systems, 123:C, (88-101), Online publication date: 1-May-2017.
  824. Valsamis A, Tserpes K, Zissis D, Anagnostopoulos D and Varvarigou T (2017). Employing traditional machine learning algorithms for big data streams analysis, Journal of Systems and Software, 127:C, (249-257), Online publication date: 1-May-2017.
  825. García J, Fardoun H, Alghazzawi D, Cano J and García S (2017). MoNGEL, Pattern Analysis & Applications, 20:2, (441-452), Online publication date: 1-May-2017.
  826. Li X, Wu Y, Ester M, Kao B, Wang X and Zheng Y Semi-supervised Clustering in Attributed Heterogeneous Information Networks Proceedings of the 26th International Conference on World Wide Web, (1621-1629)
  827. ACM
    Radwan M and Heckel R Prediction of the domain name system (DNS) quality attributes Proceedings of the Symposium on Applied Computing, (578-585)
  828. ACM
    Lacerda Y, Marinho L, de S. Baptista C, Renso C and Perego R Exploiting photo location and direction for clustering-based points-of-interest discovery Proceedings of the Symposium on Applied Computing, (907-912)
  829. Kalyvas C, Kokkos A and Tzouramanis T (2017). A survey of official online sources of high-quality free-of-charge geospatial data for maritime geographic information systems applications, Information Systems, 65:C, (36-51), Online publication date: 1-Apr-2017.
  830. Bag V and Kulkarni U (2017). Stock Price Trend Prediction and Recommendation using Cognitive Process, International Journal of Rough Sets and Data Analysis, 4:2, (36-48), Online publication date: 1-Apr-2017.
  831. Christozov D and Rasheva-Yordanova K (2017). Data Literacy, International Journal of Digital Literacy and Digital Competence, 8:2, (14-38), Online publication date: 1-Apr-2017.
  832. Cao J, Wang S and Wang H (2017). Detecting Communities on Topic of Transportation With Sparse Crowd Annotations, IEEE Transactions on Intelligent Transportation Systems, 18:4, (1017-1022), Online publication date: 1-Apr-2017.
  833. Huang J, Zhu Q, Yang L, Cheng D and Wu Q (2017). A novel outlier cluster detection algorithm without top-n parameter, Knowledge-Based Systems, 121:C, (32-40), Online publication date: 1-Apr-2017.
  834. Kalyvas C, Kokkos A and Tzouramanis T (2017). A survey of official online sources of high-quality free-of-charge geospatial data for maritime geographic information systems applications, Information Systems, 65:C, (36-51), Online publication date: 1-Apr-2017.
  835. Ali R, Lee S and Chung T (2017). Accurate multi-criteria decision making methodology for recommending machine learning algorithm, Expert Systems with Applications: An International Journal, 71:C, (257-278), Online publication date: 1-Apr-2017.
  836. Tayefi M, Tajfard M, Saffar S, Hanachi P, Amirabadizadeh A, Esmaeily H, Taghipour A, Ferns G, Moohebati M and Ghayour-Mobarhan M (2017). hs-CRP is strongly associated with coronary heart disease (CHD), Computer Methods and Programs in Biomedicine, 141:C, (105-109), Online publication date: 1-Apr-2017.
  837. Jun M and Cheng J (2017). Selection of target LEED credits based on project information and climatic factors using data mining techniques, Advanced Engineering Informatics, 32:C, (224-236), Online publication date: 1-Apr-2017.
  838. Karimi M, Isazadeh A and Rahmani A (2017). QoS-aware service composition in cloud computing using data mining techniques and genetic algorithm, The Journal of Supercomputing, 73:4, (1387-1415), Online publication date: 1-Apr-2017.
  839. Khalifa M, Díaz Redondo R, Vilas A and Rodríguez S (2017). Identifying urban crowds using geo-located Social media data, Journal of Intelligent Information Systems, 48:2, (287-308), Online publication date: 1-Apr-2017.
  840. ACM
    El Alaoui M and Ben-azza H New initialization for clustering algorithms combining distance and density Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, (1-5)
  841. ACM
    Usman A, Zhang P and Theel O An efficient and updatable item-to-item frequency matrix for frequent itemset generation Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, (1-6)
  842. ACM
    Onan A A machine learning based approach to identify geo-location of Twitter users Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, (1-6)
  843. ACM
    Cheraghchi F, Iranzad A and Raahemi B Subspace selection in high-dimensional big data using genetic algorithm in apache spark Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, (1-7)
  844. Cosma G, Brown D, Archer M, Khan M and Graham Pockley A (2017). A survey on computational intelligence approaches for predictive modeling in prostate cancer, Expert Systems with Applications: An International Journal, 70:C, (1-19), Online publication date: 15-Mar-2017.
  845. Kirshners A, Parshutin S and Gorskis H (2017). Entropy-Based Classifier Enhancement to Handle Imbalanced Class Problem, Procedia Computer Science, 104:C, (586-591), Online publication date: 1-Mar-2017.
  846. Su Y, Luarn P, Lee Y and Yen S (2017). Creating an invalid defect classification model using text mining on server development, Journal of Systems and Software, 125:C, (197-206), Online publication date: 1-Mar-2017.
  847. Roriz Junior M, Endler M and Silva F (2017). An on-line algorithm for cluster detection of mobile nodes through complex event processing, Information Systems, 64:C, (303-320), Online publication date: 1-Mar-2017.
  848. Elola A, Del Ser J, Bilbao M, Perfecto C, Alexandre E and Salcedo-Sanz S (2017). Hybridizing Cartesian Genetic Programming and Harmony Search for adaptive feature construction in supervised learning problems, Applied Soft Computing, 52:C, (760-770), Online publication date: 1-Mar-2017.
  849. Zhu Y and Gao K (2017). Deep data analyzing algorithm based on scale space theory, Cluster Computing, 20:1, (1-11), Online publication date: 1-Mar-2017.
  850. Bunkhumpornpat C and Sinapiromsaran K (2017). DBMUTE, Knowledge and Information Systems, 50:3, (827-850), Online publication date: 1-Mar-2017.
  851. ACM
    Lee H, Kim E and Kim S Modified SMOTE-IPF Based Support Vector Machine for Detecting Interference Patterns Proceedings of the 9th International Conference on Machine Learning and Computing, (117-121)
  852. Asadi S and Shahrabi J (2017). Complexity-based parallel rule induction for multiclass classification, Information Sciences: an International Journal, 380:C, (53-73), Online publication date: 20-Feb-2017.
  853. (2017). A fuzzy SV-k-modes algorithm for clustering categorical data with set-valued attributes, Applied Mathematics and Computation, 295:C, (1-15), Online publication date: 15-Feb-2017.
  854. Gupta M, Kumar P and Bhasker B (2017). HeteClass, Expert Systems with Applications: An International Journal, 68:C, (106-122), Online publication date: 1-Feb-2017.
  855. Dag A, Oztekin A, Yucel A, Bulur S and Megahed F (2017). Predicting heart transplantation outcomes through data analytics, Decision Support Systems, 94:C, (42-52), Online publication date: 1-Feb-2017.
  856. Bigdeli E, Mohammadi M, Raahemi B and Matwin S (2017). A fast and noise resilient cluster-based anomaly detection, Pattern Analysis & Applications, 20:1, (183-199), Online publication date: 1-Feb-2017.
  857. Sadeghzadeh K and Fard N Analytical clustering procedures in massive failure data 2017 Annual Reliability and Maintainability Symposium (RAMS), (1-7)
  858. Tasnim S, Pissinou N and Iyengar S A novel cleaning approach of environmental sensing data streams 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), (632-633)
  859. Hajiaghajani F and Biswas S Device-to-device commercial content dissemination in social wireless networks 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), (414-419)
  860. Deepthi P, Thampi S, Thampi S and El-Alfy E (2017). Predicting cancer subtypes from microarray data using semi-supervised fuzzy C-means algorithm, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 32:4, (2797-2805), Online publication date: 1-Jan-2017.
  861. Weng C and Huang T (2017). Knowledge discovery of frequent itemsets with low utility for revenue analysis, Intelligent Data Analysis, 21:2, (411-425), Online publication date: 1-Jan-2017.
  862. Murugadass A, Pachiyappan A and Pau G (2017). Fuzzy Logic Based Coverage and Cost Effective Placement of Serving Nodes for 4G and Beyond Cellular Networks, Wireless Communications & Mobile Computing, 2017, Online publication date: 1-Jan-2017.
  863. Liu W, Ye M, Wei J, Hu X and Andina D (2017). Fast Constrained Spectral Clustering and Cluster Ensemble with Random Projection, Computational Intelligence and Neuroscience, 2017, Online publication date: 1-Jan-2017.
  864. Abdar M, Zomorodi-Moghadam M, Das R and Ting I (2017). Performance analysis of classification algorithms on early detection of liver disease, Expert Systems with Applications: An International Journal, 67:C, (239-251), Online publication date: 1-Jan-2017.
  865. López-Nava I, Arnrich B, Muñoz-Meléndez A and Güneysu A (2017). Variability Analysis of Therapeutic Movements using Wearable Inertial Sensors, Journal of Medical Systems, 41:1, (1-19), Online publication date: 1-Jan-2017.
  866. Salah S, Akbarinia R and Masseglia F (2017). A highly scalable parallel algorithm for maximally informative k-itemset mining, Knowledge and Information Systems, 50:1, (1-26), Online publication date: 1-Jan-2017.
  867. ACM
    Zhu W, Peng W, Chen L, Zheng K and Zhou X (2016). Exploiting Viral Marketing for Location Promotion in Location-Based Social Networks, ACM Transactions on Knowledge Discovery from Data, 11:2, (1-28), Online publication date: 26-Dec-2016.
  868. Chen X, Shang C, Wong B, Li W and Oh S (2016). Efficient Multicast Algorithms in Opportunistic Mobile Social Networks using Community and Social Features, Computer Networks: The International Journal of Computer and Telecommunications Networking, 111:C, (71-81), Online publication date: 24-Dec-2016.
  869. Xu S and Wang J (2016). A fast incremental extreme learning machine algorithm for data streams classification, Expert Systems with Applications: An International Journal, 65:C, (332-344), Online publication date: 15-Dec-2016.
  870. ACM
    Abreu P, Santos M, Abreu M, Andrade B and Silva D (2016). Predicting Breast Cancer Recurrence Using Machine Learning Techniques, ACM Computing Surveys, 49:3, (1-40), Online publication date: 13-Dec-2016.
  871. ACM
    Ozalp I, Gursoy M, Nergiz M and Saygin Y (2016). Privacy-Preserving Publishing of Hierarchical Data, ACM Transactions on Privacy and Security, 19:3, (1-29), Online publication date: 12-Dec-2016.
  872. ACM
    Huy V and Anh D An efficient implementation of anytime k-medoids clustering for time series under dynamic time warping Proceedings of the 7th Symposium on Information and Communication Technology, (22-29)
  873. ACM
    Hiep T, Duc N and Trung B Local search approach for the pairwise constrained clustering problem Proceedings of the 7th Symposium on Information and Communication Technology, (115-122)
  874. ACM
    Van Do L and Anh D Some improvements for time series subsequence join based on pearson correlation coefficients Proceedings of the 7th Symposium on Information and Communication Technology, (58-65)
  875. Del Testa D, Danieletto M, Di Nunzio G and Zorzi M Estimating the Number of Receiving Nodes in 802.11 Networks via Machine Learning Techniques 2016 IEEE Global Communications Conference (GLOBECOM), (1-7)
  876. Costa L, Gago M, Yelshyna D, Ferreira J, David Silva H, Rocha L, Sousa N and Bicho E (2016). Application of Machine Learning in Postural Control Kinematics for the Diagnosis of Alzheimer’s Disease, Computational Intelligence and Neuroscience, 2016, (2), Online publication date: 1-Dec-2016.
  877. Zhu Y, Ting K and Carman M (2016). Density-ratio based clustering for discovering clusters with varying densities, Pattern Recognition, 60:C, (983-997), Online publication date: 1-Dec-2016.
  878. Barddal J, Gomes H, Enembreck F and Barthès J (2016). SNCStream+, Information Systems, 62:C, (60-73), Online publication date: 1-Dec-2016.
  879. Farid D, Al-Mamun M, Manderick B and Nowe A (2016). An adaptive rule-based classifier for mining big biological data, Expert Systems with Applications: An International Journal, 64:C, (305-316), Online publication date: 1-Dec-2016.
  880. Xie H, Li J, Zhang Q and Wang Y (2016). Comparison among dimensionality reduction techniques based on Random Projection for cancer classification, Computational Biology and Chemistry, 65:C, (165-172), Online publication date: 1-Dec-2016.
  881. Mirroshandel S, Ghasemian F and Monji-Azad S (2016). Applying data mining techniques for increasing implantation rate by selecting best sperms for intra-cytoplasmic sperm injection treatment, Computer Methods and Programs in Biomedicine, 137:C, (215-229), Online publication date: 1-Dec-2016.
  882. Kamadi V, Allam A, Thummala S and P. V (2016). A computational intelligence technique for the effective diagnosis of diabetic patients using principal component analysis (PCA) and modified fuzzy SLIQ decision tree approach, Applied Soft Computing, 49:C, (137-145), Online publication date: 1-Dec-2016.
  883. Yang D, Li X, Sun X and Wan J (2016). Detecting impact factor manipulation with data mining techniques, Scientometrics, 109:3, (1989-2005), Online publication date: 1-Dec-2016.
  884. Kamila N, Jena L and Bhuyan H (2016). Pareto-based multi-objective optimization for classification in data mining, Cluster Computing, 19:4, (1723-1745), Online publication date: 1-Dec-2016.
  885. Zawawi N, Hamdy M, Ghary R and Tolba M (2016). Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 20:12, (5039-5050), Online publication date: 1-Dec-2016.
  886. Oliva J, Lee H, Spolaôr N, Coy C and Wu F (2016). Prototype system for feature extraction, classification and study of medical images, Expert Systems with Applications: An International Journal, 63:C, (267-283), Online publication date: 30-Nov-2016.
  887. ACM
    Gotoh Y and Okubo C A Searching Method for Bichromatic Reverse k-Nearest Neighbor with Network Voronoi Diagram Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, (71-78)
  888. ACM
    Bhattacharya T, Kulik L and Bailey J Real Time Autonomous Point of Interest Mining through Ambient Smartphone Sensing Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, (254-263)
  889. Kim Y, Baik B and Cho S (2016). Detecting financial misstatements with fraud intention using multi-class cost-sensitive learning, Expert Systems with Applications: An International Journal, 62:C, (32-43), Online publication date: 15-Nov-2016.
  890. Agrawal K, Garg S, Sharma S and Patel P (2016). Development and validation of OPTICS based spatio-temporal clustering technique, Information Sciences: an International Journal, 369:C, (388-401), Online publication date: 10-Nov-2016.
  891. ACM
    Beyene M, Portier P, Atnafu S and Calabretto S Dataset linking in a multilingual linked open data context Proceedings of the 8th International Conference on Management of Digital EcoSystems, (149-157)
  892. Angiulli F, Basta S, Lodi S and Sartori C (2016). GPU Strategies for Distance-Based Outlier Detection, IEEE Transactions on Parallel and Distributed Systems, 27:11, (3256-3268), Online publication date: 1-Nov-2016.
  893. Afzal U, Mahmood T and Shaikh Z (2016). Intelligent software product line configurations, Computer Standards & Interfaces, 48:C, (30-48), Online publication date: 1-Nov-2016.
  894. Fang Z, Fei F, Fang Y, Lee C, Xiong N, Shu L and Chen S (2016). Abnormal event detection in crowded scenes based on deep learning, Multimedia Tools and Applications, 75:22, (14617-14639), Online publication date: 1-Nov-2016.
  895. ACM
    Ayhan S and Samet H Time series clustering of weather observations in predicting climb phase of aircraft trajectories Proceedings of the 9th ACM SIGSPATIAL International Workshop on Computational Transportation Science, (25-30)
  896. ACM
    Bafna P, Shirwaikar S and Pramod D Semantic Clustering Driven Approaches to Recommender Systems Proceedings of the 9th Annual ACM India Conference, (1-9)
  897. ACM
    Desai A and Chaudhary S Distributed Decision Tree Proceedings of the 9th Annual ACM India Conference, (43-50)
  898. Galvão L and Merschmann L HSIM: A Supervised Imputation Method for Hierarchical Classification Scenario Discovery Science, (134-148)
  899. ACM
    Jha K and Jin W Mining Novel Knowledge from Biomedical Literature using Statistical Measures and Domain Knowledge Proceedings of the 7th ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics, (317-326)
  900. Sumana M. and Hareesha K.S. (2016). Accurate Classification Models for Distributed Mining of Privately Preserved Data, International Journal of Information Security and Privacy, 10:4, (58-73), Online publication date: 1-Oct-2016.
  901. Ghosh P, Shakti S and Phadikar S (2016). A Cloud Intrusion Detection System Using Novel PRFCM Clustering and KNN Based Dempster-Shafer Rule, International Journal of Cloud Applications and Computing, 6:4, (18-35), Online publication date: 1-Oct-2016.
  902. Liaqat R, Mehboob B, Saqib N and Khan M (2016). A Framework for Clustering Cardiac Patient's Records Using Unsupervised Learning Techniques, Procedia Computer Science, 98:C, (368-373), Online publication date: 1-Oct-2016.
  903. Kashmar N, Atieh M and Haidar A (2016). Identifying the Effective Parameters for Vertical Handover in Cellular Networks Using Data Mining Techniques, Procedia Computer Science, 98:C, (91-99), Online publication date: 1-Oct-2016.
  904. Salvador M, Budka M and Gabrys B (2016). Effects of Change Propagation Resulting from Adaptive Preprocessing in Multicomponent Predictive Systems, Procedia Computer Science, 96:C, (713-722), Online publication date: 1-Oct-2016.
  905. Kreimer A and Herman M (2016). A Novel Structure Learning Algorithm for Optimal Bayesian Network, Procedia Computer Science, 96:C, (43-52), Online publication date: 1-Oct-2016.
  906. Xiong T, Huang Y, Gou J and Hu J (2016). A unified Bayesian mixture model framework via spatial information for grayscale image segmentation, Journal of Visual Communication and Image Representation, 40:PA, (345-356), Online publication date: 1-Oct-2016.
  907. Li J, Fong S, Mohammed S and Fiaidhi J (2016). Improving the classification performance of biological imbalanced datasets by swarm optimization algorithms, The Journal of Supercomputing, 72:10, (3708-3728), Online publication date: 1-Oct-2016.
  908. Khadangi E, Bagheri A and Shahmohammadi A (2016). Biased sampling from facebook multilayer activity network using learning automata, Applied Intelligence, 45:3, (829-849), Online publication date: 1-Oct-2016.
  909. ACM
    D'Urso C (2016). EXPERIENCE, Journal of Data and Information Quality, 7:3, (1-22), Online publication date: 27-Sep-2016.
  910. Han J, Zuo W, Liu L, Xu Y and Peng T (2016). Building text classifiers using positive, unlabeled and 'outdated' examples, Concurrency and Computation: Practice & Experience, 28:13, (3691-3706), Online publication date: 10-Sep-2016.
  911. Dash C, Saran A, Sahoo P, Dehuri S and Cho S (2016). Design of self-adaptive and equilibrium differential evolution optimized radial basis function neural network classifier for imputed database, Pattern Recognition Letters, 80:C, (76-83), Online publication date: 1-Sep-2016.
  912. Jensi R and Jiji G (2016). An improved krill herd algorithm with global exploration capability for solving numerical function optimization problems and its application to data clustering, Applied Soft Computing, 46:C, (230-245), Online publication date: 1-Sep-2016.
  913. Angel Arul Jothi J and Mary Anita Rajam V (2016). Effective segmentation and classification of thyroid histopathology images, Applied Soft Computing, 46:C, (652-664), Online publication date: 1-Sep-2016.
  914. Aleksandrova M, Brun A, Chertov O and Boyer A Sets of contrasting rules to identify trigger factors Proceedings of the Twenty-second European Conference on Artificial Intelligence, (1728-1729)
  915. ACM
    Krishna G and Ravi V Outlier Detection using Evolutionary Computing Proceedings of the International Conference on Informatics and Analytics, (1-6)
  916. Li P, Xu M, Wu J and Shang L Using canonical correlation analysis for parallelized attribute reduction Proceedings of the 14th Pacific Rim International Conference on Trends in Artificial Intelligence, (433-445)
  917. ACM
    Zhan Q Algorithm of Attribute Reduction in Dominance Based Rough Sets Combined with Dominance Discernibility Matrix Proceedings of the International Conference on Internet Multimedia Computing and Service, (66-71)
  918. Xenaros A, Karampelas P and Lekea I Profiling individuals based on email analysis and ego networks Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1262-1269)
  919. Chinchilla L and Ferreira K Analysis of the behavior of customers in the social networks using data mining techniques Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (623-625)
  920. ACM
    Hyun Y and Kim N Detecting blog spam hashtags using topic modeling Proceedings of the 18th Annual International Conference on Electronic Commerce: e-Commerce in Smart connected World, (1-6)
  921. ACM
    Khaleel M, Hmeidi I and Najadat H An Automatic Text Classification System Based on Genetic Algorithm Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016, (1-7)
  922. Lopes L, Machado V, Rabêlo R, Fernandes R and Lima B (2016). Automatic labelling of clusters of discrete and continuous data with supervised machine learning, Knowledge-Based Systems, 106:C, (231-241), Online publication date: 15-Aug-2016.
  923. ACM
    Sun L, Liu C, Guo C, Xiong H and Xie Y Data-driven Automatic Treatment Regimen Development and Recommendation Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1865-1874)
  924. ACM
    Hung H, Shuai H, Yang D, Huang L, Lee W, Pei J and Chen M When Social Influence Meets Item Inference Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (915-924)
  925. ACM
    Chang S, Zhang Y, Tang J, Yin D, Chang Y, Hasegawa-Johnson M and Huang T Positive-Unlabeled Learning in Streaming Networks Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (755-764)
  926. Fang Y, Cheng R, Luo S and Hu J (2016). Effective community search for large attributed graphs, Proceedings of the VLDB Endowment, 9:12, (1233-1244), Online publication date: 1-Aug-2016.
  927. Chen Y, Wu C and Tang K (2016). Time-constrained cost-sensitive decision tree induction, Information Sciences: an International Journal, 354:C, (140-152), Online publication date: 1-Aug-2016.
  928. Newman R, Chang V, Walters R and Wills G (2016). Model and experimental development for Business Data Science, International Journal of Information Management: The Journal for Information Professionals, 36:4, (607-617), Online publication date: 1-Aug-2016.
  929. Li Y, Yang G, He H, Jiao L and Shang R (2016). A study of large-scale data clustering based on fuzzy clustering, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 20:8, (3231-3242), Online publication date: 1-Aug-2016.
  930. ACM
    He Z, Cai Z and Li Y Customized privacy preserving for classification based applications Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing, (37-42)
  931. Lei W, Qing F and Zhou J (2016). Improved Personalized Recommendation based on Causal Association Rule and Collaborative Filtering, International Journal of Distance Education Technologies, 14:3, (21-33), Online publication date: 1-Jul-2016.
  932. Moon S, Lee J, Kang M, Choy M and Lee J (2016). Parallel community detection on large graphs with MapReduce and GraphChi, Data & Knowledge Engineering, 104:C, (17-31), Online publication date: 1-Jul-2016.
  933. Cosma G and Acampora G (2016). A computational intelligence approach to efficiently predicting review ratings in e-commerce, Applied Soft Computing, 44:C, (153-162), Online publication date: 1-Jul-2016.
  934. Bie R, Xu S, Zhang G, Zhang M, Ma X and Zhang X (2016). Efficient Fine Arrhythmia Detection Based on DCG P-T Features, Journal of Medical Systems, 40:7, (1-11), Online publication date: 1-Jul-2016.
  935. ACM
    Zhang J, Xiao X and Xie X PrivTree Proceedings of the 2016 International Conference on Management of Data, (155-170)
  936. ACM
    Sejdovic S, Hegenbarth Y, Ristow G and Schmidt R Proactive disruption management system Proceedings of the 10th ACM International Conference on Distributed and Event-based Systems, (281-288)
  937. ACM
    Paparrizos J and Gravano L (2016). k-Shape, ACM SIGMOD Record, 45:1, (69-76), Online publication date: 2-Jun-2016.
  938. Liao Y, Li S, Wang W, Wang Y, Li G and Cheng B (2016). Detection of Driver Cognitive Distraction: A Comparison Study of Stop-Controlled Intersection and Speed-Limited Highway, IEEE Transactions on Intelligent Transportation Systems, 17:6, (1628-1637), Online publication date: 1-Jun-2016.
  939. West J and Bhattacharya M (2016). Some Experimental Issues in Financial Fraud Mining, Procedia Computer Science, 80:C, (1734-1744), Online publication date: 1-Jun-2016.
  940. Fernández A, Elkano M, Galar M, Sanz J, Alshomrani S, Bustince H and Herrera F (2016). Enhancing evolutionary fuzzy systems for multi-class problems, International Journal of Approximate Reasoning, 73:C, (108-122), Online publication date: 1-Jun-2016.
  941. Dag A, Topuz K, Oztekin A, Bulur S and Megahed F (2016). A probabilistic data-driven framework for scoring the preoperative recipient-donor heart transplant survival, Decision Support Systems, 86:C, (1-12), Online publication date: 1-Jun-2016.
  942. Silva A and Antunes C (2016). Constrained pattern mining in the new era, Knowledge and Information Systems, 47:3, (489-516), Online publication date: 1-Jun-2016.
  943. ACM
    Arshad S and Tjortjis C Clustering Software Metric Values Extracted from C# Code for Maintainability Assessment Proceedings of the 9th Hellenic Conference on Artificial Intelligence, (1-4)
  944. Lourenco V, Mann P, Paes A and Oliveira D SiAPP: An Information System for Crime Analytics Based on Logical Relational Learning Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (168-175)
  945. López-Nava I and Muñoz-Meléndez A Complex human action recognition on daily living environments using wearable inertial sensors Proceedings of the 10th EAI International Conference on Pervasive Computing Technologies for Healthcare, (138-145)
  946. ACM
    Zhang F, Zheng Q, Zou Y and Hassan A Cross-project defect prediction using a connectivity-based unsupervised classifier Proceedings of the 38th International Conference on Software Engineering, (309-320)
  947. ACM
    Saeed A, Rauf A, Khusro S and Mahfooz S Compressed Bitmaps Based Frequent Itemsets Mining on Hadoop Proceedings of the 10th International Conference on Informatics and Systems, (159-165)
  948. ACM
    Soll M, Naumann P, Schöning J, Samsonov P and Hecht B Helping Computers Understand Geographically-Bound Activity Restrictions Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, (2442-2446)
  949. Li D, Wang S, Yuan H and Li D (2016). Software and applications of spatial data mining, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 6:3, (84-114), Online publication date: 1-May-2016.
  950. ACM
    Hu X, Zhang Y, Chu S and Ke X Towards personalizing an e-quiz bank for primary school students Proceedings of the Sixth International Conference on Learning Analytics & Knowledge, (25-29)
  951. Jin L, Xue Y, Li Q and Feng L Integrating Human Mobility and Social Media for Adolescent Psychological Stress Detection Proceedings, Part II, of the 21st International Conference on Database Systems for Advanced Applications - Volume 9643, (367-382)
  952. (2016). Tutorial on practical tips of the most influential data preprocessing algorithms in data mining, Knowledge-Based Systems, 98:C, (1-29), Online publication date: 15-Apr-2016.
  953. ACM
    Moshtari S and Sami A Evaluating and comparing complexity, coupling and a new proposed set of coupling metrics in cross-project vulnerability prediction Proceedings of the 31st Annual ACM Symposium on Applied Computing, (1415-1421)
  954. D'Avanzo E and Pilato G (2016). The Good, the Ugly and the Bad Situation Awareness in the Big Data, International Journal of Knowledge Society Research, 7:2, (25-39), Online publication date: 1-Apr-2016.
  955. Chang V and Wills G (2016). A model to compare cloud and non-cloud storage of Big Data, Future Generation Computer Systems, 57:C, (56-76), Online publication date: 1-Apr-2016.
  956. Yang X, Yang G and Wu J (2016). Integrating rich and heterogeneous information to design a ranking system for multiple products, Decision Support Systems, 84:C, (117-133), Online publication date: 1-Apr-2016.
  957. ACM
    Shankar D and Bhavani S Consensus Clustering Approach for Discovering Overlapping Nodes in Social Networks Proceedings of the 3rd IKDD Conference on Data Science, 2016, (1-2)
  958. ACM
    Priyadarsini R, Valarmathi M and Sivakumari S Feature Creation based Slicing for Privacy Preserving Data Mining Proceedings of the 3rd IKDD Conference on Data Science, 2016, (1-8)
  959. ACM
    Alam A and Roy S Collusive User Removal and Trusted Composite Web Service Selection based on QoS attributes Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-6)
  960. ACM
    Misra R, Panda B and Tiwary M Big data and ICT applications Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-6)
  961. Biddut M, Islam N, Karim M and Miah M (2016). An Analysis of QoS in ZigBee Network Based on Deviated Node Priority, Journal of Electrical and Computer Engineering, 2016, (3), Online publication date: 1-Mar-2016.
  962. Kazemi M, Kazemi K, Yaghoobi M and Bazargan H (2016). A hybrid method for estimating the process change point using support vector machine and fuzzy statistical clustering, Applied Soft Computing, 40:C, (507-516), Online publication date: 1-Mar-2016.
  963. ACM
    Gupta D Event Search and Analytics Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, (705-705)
  964. Mahmoud S, Lotfi A and Langensiepen C (2016). User Activities Outliers Detection; Integration of Statistical and Computational Intelligence Techniques, Computational Intelligence, 32:1, (49-71), Online publication date: 1-Feb-2016.
  965. Tang M, Tahboub R, Aref W, Atallah M, Malluhi Q, Ouzzani M and Silva Y (2016). Similarity Group-by Operators for Multi-Dimensional Relational Data, IEEE Transactions on Knowledge and Data Engineering, 28:2, (510-523), Online publication date: 1-Feb-2016.
  966. Vatsalan D and Christen P (2016). Privacy-preserving matching of similar patients, Journal of Biomedical Informatics, 59:C, (285-298), Online publication date: 1-Feb-2016.
  967. Hamrouni T, Slimani S and Charrada F (2016). A survey of dynamic replication and replica selection strategies based on data mining techniques in data grids, Engineering Applications of Artificial Intelligence, 48:C, (140-158), Online publication date: 1-Feb-2016.
  968. Min S and Park J Narrative as a Complex Network: A Study of Victor Hugo's Les Misérables Proceedings of HCI Korea, (100-107)
  969. Singal H and Kohli S (2016). Mitigating Information Trust, International Journal of Technoethics, 7:1, (16-33), Online publication date: 1-Jan-2016.
  970. Sajedi H (2016). Biometric verification by palmprint using contourlet transform, Intelligent Decision Technologies, 10:4, (443-451), Online publication date: 1-Jan-2016.
  971. Ali A, Couceiro M, Hassanien A, Hemanth D, Hemanth D and Balas V (2016). Fuzzy C-Means based on Minkowski distance for liver CT image segmentation, Intelligent Decision Technologies, 10:4, (393-406), Online publication date: 1-Jan-2016.
  972. Silva L, Siqueira M, Pinto F, Barros F, Zimbrão G and Souza J (2016). Applying data mining techniques for spatial distribution analysis of plant species co-occurrences, Expert Systems with Applications: An International Journal, 43:C, (250-260), Online publication date: 1-Jan-2016.
  973. ACM
    Hu S, Su L, Liu H, Wang H and Abdelzaher T (2015). SmartRoad, ACM Transactions on Sensor Networks, 11:4, (1-27), Online publication date: 23-Dec-2015.
  974. Bhardwaj S and Dash S VDMR-DBSCAN Proceedings of the 4th International Conference on Big Data Analytics - Volume 9498, (134-150)
  975. Muhammad Fuad M Hierarchical Clustering of DNA Microarray Data Using a Hybrid of Bacterial Foraging and Differential Evolution Proceedings of the Fourth International Conference on Theory and Practice of Natural Computing - Volume 9477, (46-57)
  976. Carmona I and Riedel S Extracting interpretable models from matrix factorization models Proceedings of the 2015th International Conference on Cognitive Computation: Integrating Neural and Symbolic Approaches - Volume 1583, (78-84)
  977. ACM
    Khan Minhas M, Abbasi R, Aljohani N, Albeshri A and Mushtaq M INTWEEMS Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, (1-4)
  978. Bergmann S, Feldkamp N and Strassburger S Approximation of dispatching rules for manufacturing simulation using data mining methods Proceedings of the 2015 Winter Simulation Conference, (2329-2340)
  979. Feldkamp N, Bergmann S and Strassburger S Visual analytics of manufacturing simulation data Proceedings of the 2015 Winter Simulation Conference, (779-790)
  980. Ghasemian F, Mirroshandel S, Monji-Azad S, Azarnia M and Zahiri Z (2015). An efficient method for automatic morphological abnormality detection from human sperm images, Computer Methods and Programs in Biomedicine, 122:3, (409-420), Online publication date: 1-Dec-2015.
  981. Khatib E, Barco R, Gómez-Andrades A, Muñoz P and Serrano I (2015). Data mining for fuzzy diagnosis systems in LTE networks, Expert Systems with Applications: An International Journal, 42:21, (7549-7559), Online publication date: 30-Nov-2015.
  982. Nezamoddini N and Lam S (2015). Reliability and topology based network design using pattern mining guided genetic algorithm, Expert Systems with Applications: An International Journal, 42:21, (7483-7492), Online publication date: 30-Nov-2015.
  983. Phan T, Jäger M, Nadschläger S, Küng J and Dang T An Efficient Document Indexing-Based Similarity Search in Large Datasets Proceedings of the Second International Conference on Future Data and Security Engineering - Volume 9446, (16-31)
  984. Xu Z and Cao B A Parallel Tabu Search Algorithm with Solution Space Partition for Cohesive Clustering Problems Proceedings of the ICA3PP International Workshops and Symposiums on Algorithms and Architectures for Parallel Processing - Volume 9532, (333-343)
  985. Li Y, Guo C, Shi R, Liu X and Mei Y DBSCAN-M Proceedings, Part II, of the 15th International Conference on Algorithms and Architectures for Parallel Processing - Volume 9529, (66-77)
  986. ACM
    Götz M, Bodenstein C and Riedel M HPDBSCAN Proceedings of the Workshop on Machine Learning in High-Performance Computing Environments, (1-10)
  987. Chen C and Chung M (2015). Predicting the success of group buying auctions via classification, Knowledge-Based Systems, 89:C, (627-640), Online publication date: 1-Nov-2015.
  988. Lima A, de Castro L and Corchado J (2015). A polarity analysis framework for Twitter messages, Applied Mathematics and Computation, 270:C, (756-767), Online publication date: 1-Nov-2015.
  989. ACM
    Desai A, Jadav K and Chaudhary S An Empirical evaluation of CostBoost Extensions for Cost-Sensitive Classification Proceedings of the 8th Annual ACM India Conference, (73-77)
  990. ACM
    Shatnawi M and Hefeeda M Enhancing the Quality of Interactive Multimedia Services by Proactive Monitoring and Failure Prediction Proceedings of the 23rd ACM international conference on Multimedia, (521-530)
  991. ACM
    Oh H, Lee T and Kim S Finding underlying factors for reciprocal trust formation Proceedings of the 2015 Conference on research in adaptive and convergent systems, (86-91)
  992. Yu Y (2015). Intrusion detection of masqueraders using data mining and soft computing techniques, Journal of Computing Sciences in Colleges, 31:1, (31-36), Online publication date: 1-Oct-2015.
  993. Peters G (2015). Assessing Rough Classifiers, Fundamenta Informaticae, 137:4, (493-515), Online publication date: 1-Oct-2015.
  994. ACM
    Zarouchas T, Perikos I, Paraskevas M and Pegiazis T A hybrid training framework oriented to computer engineering educators Proceedings of the 19th Panhellenic Conference on Informatics, (33-37)
  995. Kalegele K, Sasai K, Takahashi H, Kitagata G and Kinoshita T (2015). Four Decades of Data Mining in Network and Systems Management, IEEE Transactions on Knowledge and Data Engineering, 27:10, (2700-2716), Online publication date: 1-Oct-2015.
  996. Aghabozorgi S, Seyed Shirkhorshidi A and Ying Wah T (2015). Time-series clustering - A decade review, Information Systems, 53:C, (16-38), Online publication date: 1-Oct-2015.
  997. Zhou D and Dai X (2015). Integrating granular computing and bioinformatics technology for typical process routes elicitation, Engineering Applications of Artificial Intelligence, 45:C, (46-56), Online publication date: 1-Oct-2015.
  998. ACM
    Haupt R, Scholtz B and Calitz A Using Business Intelligence to Support Strategic Sustainability Information Management Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists, (1-11)
  999. Maret P, Warisawa S, Muhlenbach F, Lopez G and Yamada I Improved Data Granularity Management Through a Generalized Model for Sensor Data and Data Mining Outputs in Telemonitoring Applications Proceedings of the 5th International Conference on Model and Data Engineering - Volume 9344, (166-177)
  1000. ACM
    Singh K, Shakya H and Biswas B An Efficient Approach to Discovering Frequent Patterns from Data Cube using Aggregation and Directed Graph Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, (31-35)
  1001. ACM
    Pathania S and Singh H A New Associative Classifier based on CFP-Growth++ Algorithm Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, (20-25)
  1002. ACM
    Sarode A and Mishra A Audit and Analysis of Impostors Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, (1-8)
  1003. ACM
    Al-Badarneh A, Alrazqi A and Najadat H Performance Impact of Texture Features on MRI Image Classification Proceedings of the The International Conference on Engineering & MIS 2015, (1-6)
  1004. Lu J, Hales A, Rew D, Keech M, Fröhlingsdorf C, Mills-Mullett A and Wette C Data Mining Techniques in Health Informatics Proceedings of the 6th International Conference on Information Technology in Bio- and Medical Informatics - Volume 9267, (56-70)
  1005. Yiyong Feng and Palomar D (2015). Normalization of Linear Support Vector Machines, IEEE Transactions on Signal Processing, 63:17, (4673-4688), Online publication date: 1-Sep-2015.
  1006. Dabbagh M, Hamdaoui B, Guizani M and Rayes A (2015). Energy-Efficient Resource Allocation and Provisioning Framework for Cloud Data Centers, IEEE Transactions on Network and Service Management, 12:3, (377-391), Online publication date: 1-Sep-2015.
  1007. MEMOCODE 2015 design contest Proceedings of the 2015 ACM/IEEE International Conference on Formal Methods and Models for Codesign, (48-51)
  1008. Hamrouni T, Slimani S and Charrada F (2015). A Critical Survey of Data Grid Replication Strategies Based on Data Mining Techniques, Procedia Computer Science, 51:C, (2779-2788), Online publication date: 1-Sep-2015.
  1009. Wong T (2015). Performance evaluation of classification algorithms by k-fold and leave-one-out cross validation, Pattern Recognition, 48:9, (2839-2846), Online publication date: 1-Sep-2015.
  1010. Kozawa Y, Hayashi F, Amagasa T and Kitagawa H Parallel Canopy Clustering on GPUs Proceedings, Part I, of the 26th International Conference on Database and Expert Systems Applications - Volume 9261, (334-348)
  1011. ACM
    Yang D, Xiao Y, Tong H, Cui W and Wang W Towards Topic Following in Heterogeneous Information Networks Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (363-366)
  1012. ACM
    Yang H and Yang C (2015). Using Health-Consumer-Contributed Data to Detect Adverse Drug Reactions by Association Mining with Temporal Analysis, ACM Transactions on Intelligent Systems and Technology, 6:4, (1-27), Online publication date: 13-Aug-2015.
  1013. ACM
    Jakhmola S and Pradhan T A Computational Approach of Data Smoothening and Prediction of Diabetes Dataset Proceedings of the Third International Symposium on Women in Computing and Informatics, (744-748)
  1014. ACM
    Sharma M and Kaur J A Novel Data Mining Approach for Detecting Spam Emails using Robust Chi-Square Features Proceedings of the Third International Symposium on Women in Computing and Informatics, (49-53)
  1015. ACM
    Narwal N, Sharma S and Singh A Entropy based content filtering for Mobile Web Page Adaptation Proceedings of the Third International Symposium on Women in Computing and Informatics, (588-594)
  1016. ACM
    Pratt K Proof Protocol for a Machine Learning Technique Making Longitudinal Predictions in Dynamic Contexts Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (2049-2058)
  1017. ACM
    Zhu W, Peng W, Chen L, Zheng K and Zhou X Modeling User Mobility for Location Promotion in Location-based Social Networks Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1573-1582)
  1018. ACM
    Zhou Y, Liu L and Buttler D Integrating Vertex-centric Clustering with Edge-centric Clustering for Meta Path Graph Analysis Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1563-1572)
  1019. ACM
    Fujiwara Y, Nakatsuji M, Shiokawa H, Ida Y and Toyoda M Adaptive Message Update for Fast Affinity Propagation Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (309-318)
  1020. Yanbo Wu , Hong Shen and Sheng Q (2015). A Cloud-Friendly RFID Trajectory Clustering Algorithm in Uncertain Environments, IEEE Transactions on Parallel and Distributed Systems, 26:8, (2075-2088), Online publication date: 1-Aug-2015.
  1021. ACM
    Cai Y, Ratan R, Shen C and Alameda J Grouping game players using parallelized k-means on supercomputers Proceedings of the 2015 XSEDE Conference: Scientific Advancements Enabled by Enhanced Cyberinfrastructure, (1-7)
  1022. ACM
    Zhan M, Cai Y and Guo D Discovering the influence of socioeconomic factors on online game behaviors Proceedings of the 2015 XSEDE Conference: Scientific Advancements Enabled by Enhanced Cyberinfrastructure, (1-7)
  1023. Ben Ishay R and Herman M A Novel Algorithm for the Integration of the Imputation of Missing Values and Clustering Proceedings of the 11th International Conference on Machine Learning and Data Mining in Pattern Recognition - Volume 9166, (115-129)
  1024. Kärkkäinen T and Saarela M Robust Principal Component Analysis of Data with Missing Values Proceedings of the 11th International Conference on Machine Learning and Data Mining in Pattern Recognition - Volume 9166, (140-154)
  1025. Loh W and Yu H (2015). Fast density-based clustering through dataset partition using graphics processing units, Information Sciences: an International Journal, 308:C, (94-112), Online publication date: 1-Jul-2015.
  1026. ACM
    Marques H, Campello R, Zimek A and Sander J On the internal evaluation of unsupervised outlier detection Proceedings of the 27th International Conference on Scientific and Statistical Database Management, (1-12)
  1027. Joia P, Petronetto F and Nonato L (2015). Uncovering Representative Groups in Multidimensional Projections, Computer Graphics Forum, 34:3, (281-290), Online publication date: 1-Jun-2015.
  1028. Chih-Hung Wu , Chen-Sen Ouyang , Li-Wen Chen and Li-Wei Lu (2015). A New Fuzzy Clustering Validity Index With a Median Factor for Centroid-Based Clustering, IEEE Transactions on Fuzzy Systems, 23:3, (701-718), Online publication date: 1-Jun-2015.
  1029. Dabbagh M, Hamdaoui B, Guizani M and Rayes A (2015). Software-defined networking security: pros and cons, IEEE Communications Magazine, 53:6, (73-79), Online publication date: 1-Jun-2015.
  1030. da Silva P, Gonçalves E, Rios E, Muhammad A, Moss A, Pritchard T, Glassborow B, Plastino A and Azeredo R (2015). Automatic classification of carbonate rocks permeability from 1H NMR relaxation data, Expert Systems with Applications: An International Journal, 42:9, (4299-4309), Online publication date: 1-Jun-2015.
  1031. ACM
    Paparrizos J and Gravano L k-Shape Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (1855-1870)
  1032. ACM
    Gan J and Tao Y DBSCAN Revisited Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (519-530)
  1033. Santos B, Colaco M, da Paixao B, Santos R, Nascimento A, dos Santos H, Filho W and de Medeiros A Comparing Text Mining Algorithms for Predicting Irregularities in Public Accounts Proceedings of the annual conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective - Volume 1, (667-674)
  1034. ACM
    Saravanou A, Valkanas G, Gunopulos D and Andrienko G Twitter Floods when it Rains Proceedings of the 24th International Conference on World Wide Web, (1233-1238)
  1035. ACM
    Singal H and Kohli S Escalation of TRUST analysis in web Proceedings of the 12th ACM International Conference on Computing Frontiers, (1-6)
  1036. Brandon D (2015). Teaching data analytics across the computing curricula, Journal of Computing Sciences in Colleges, 30:5, (6-12), Online publication date: 1-May-2015.
  1037. Cleland-Huang J (2015). Mining Domain Knowledge [Requirements], IEEE Software, 32:3, (16-19), Online publication date: 1-May-2015.
  1038. ACM
    Huber S, Fietta M and Hof S Next step recommendation and prediction based on process mining in adaptive case management Proceedings of the 7th International Conference on Subject-Oriented Business Process Management, (1-9)
  1039. Ferrari D and de Castro L (2015). Clustering algorithm selection by meta-learning systems, Information Sciences: an International Journal, 301:C, (181-194), Online publication date: 20-Apr-2015.
  1040. ACM
    de Lima Júnior M, Soares D, Plastino A and Murta L Developers assignment for analyzing pull requests Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1567-1572)
  1041. ACM
    Paiva R, Bittencourt I, da Silva A, Isotani S and Jaques P Improving pedagogical recommendations by classifying students according to their interactional behavior in a gamified learning environment Proceedings of the 30th Annual ACM Symposium on Applied Computing, (233-238)
  1042. ACM
    Soares D, de Lima Júnior M, Murta L and Plastino A Acceptance factors of pull requests in open-source projects Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1541-1546)
  1043. Lee C (2015). The Effects of the State of Union Address of USA Presidents to Their Performance Ratings, International Journal of Software Innovation, 3:2, (1-12), Online publication date: 1-Apr-2015.
  1044. Ravoori D and Chen Z (2015). Multi-View Meets Average Linkage, International Journal of Information Retrieval Research, 5:2, (26-42), Online publication date: 1-Apr-2015.
  1045. Chen T and Lee S (2015). A weighted LS-SVM based learning system for time series forecasting, Information Sciences: an International Journal, 299:C, (99-116), Online publication date: 1-Apr-2015.
  1046. Xu R and Lee S (2015). Dimensionality reduction by feature clustering for regression problems, Information Sciences: an International Journal, 299:C, (42-57), Online publication date: 1-Apr-2015.
  1047. Alexandre E, Cuadra L, Salcedo-Sanz S, Pastor-Sánchez A and Casanova-Mateo C (2015). Hybridizing Extreme Learning Machines and Genetic Algorithms to select acoustic features in vehicle classification applications, Neurocomputing, 152:C, (58-68), Online publication date: 25-Mar-2015.
  1048. Hao Liu , Yuezhi Zhou and Yaoxue Zhang (2015). Estimating users' home and work locations leveraging large-scale crowd-sourced smartphone data, IEEE Communications Magazine, 53:3, (71-79), Online publication date: 1-Mar-2015.
  1049. Fu X, Secci S, Huang D and Jana R (2015). Mobile cloud computing [Guest Edotorial], IEEE Communications Magazine, 53:3, (61-62), Online publication date: 1-Mar-2015.
  1050. Antonelli M, Ducange P, Marcelloni F and Segatori A (2015). A novel associative classification model based on a fuzzy frequent pattern mining algorithm, Expert Systems with Applications: An International Journal, 42:4, (2086-2097), Online publication date: 1-Mar-2015.
  1051. Sáez-Atienzar S, Martínez-Gómez J, Alonso-Barba J, Puerta J, Galindo M, Jordán J and de la Ossa L (2015). Automatic quantification of the subcellular localization of chimeric GFP protein supported by a two-level Naive Bayes classifier, Expert Systems with Applications: An International Journal, 42:3, (1531-1537), Online publication date: 15-Feb-2015.
  1052. Auddy A and Mukhopadhyay S Data Mining on ICT Usage in an Academic Campus Proceedings of the 11th International Conference on Distributed Computing and Internet Technology - Volume 8956, (443-447)
  1053. Peng T and Liu L (2015). A novel incremental conceptual hierarchical text clustering method using CFu-tree, Applied Soft Computing, 27:C, (269-278), Online publication date: 1-Feb-2015.
  1054. ACM
    Ye J, Stevenson G and Dobson S (2014). USMART, ACM Transactions on Interactive Intelligent Systems, 4:4, (1-27), Online publication date: 28-Jan-2015.
  1055. Valêncio C, Guimarães D, Zafalon G, Neves L and Colombini A OntoSDM Proceedings of the 41st International Conference on SOFSEM 2015: Theory and Practice of Computer Science - Volume 8939, (555-565)
  1056. Vijendra S and Laxman S (2015). Symmetry based automatic evolution of clusters, Computational Intelligence and Neuroscience, 2015, (13-13), Online publication date: 1-Jan-2015.
  1057. Rajee A and Francis F (2022). Building Inter Cluster Movement Estimation (ICME) Model-A Step by Step Approach, Procedia Computer Science, 46:C, (210-215), Online publication date: 1-Jan-2015.
  1058. Elhag S, Fernández A, Bawakid A, Alshomrani S and Herrera F (2015). On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems, Expert Systems with Applications: An International Journal, 42:1, (193-202), Online publication date: 1-Jan-2015.
  1059. Pakrashi A A New Hybrid Clustering Approach Based on Heuristic Kalman Algorithm Swarm, Evolutionary, and Memetic Computing, (445-455)
  1060. ACM
    Slankas J, Xiao X, Williams L and Xie T Relation extraction for inferring access control rules from natural language artifacts Proceedings of the 30th Annual Computer Security Applications Conference, (366-375)
  1061. Lee S and Kim J (2014). Early filtering of ephemeral malicious accounts on Twitter, Computer Communications, 54:C, (48-57), Online publication date: 1-Dec-2014.
  1062. ACM
    Kumar A, Roy S and Ranjan P Dimensionality reduction for high dimensional data Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, (1-6)
  1063. ACM
    Ali A, Schmid F, Al-Salman R and Kauppinen T Ambiguity and plausibility Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (143-152)
  1064. El-Kishky A, Song Y, Wang C, Voss C and Han J (2014). Scalable topical phrase mining from text corpora, Proceedings of the VLDB Endowment, 8:3, (305-316), Online publication date: 1-Nov-2014.
  1065. Huang X, Ye Y, Guo H, Cai Y, Zhang H and Li Y (2014). DSKmeans, Knowledge-Based Systems, 70:C, (293-300), Online publication date: 1-Nov-2014.
  1066. Pai H, Wu F and Hsueh P (2014). A relative patterns discovery for enhancing outlier detection in categorical data, Decision Support Systems, 67:C, (90-99), Online publication date: 1-Nov-2014.
  1067. Cheng G, Zhang Y and Qu Y Explass: Exploring Associations between Entities via Top-K Ontological Patterns and Facets The Semantic Web – ISWC 2014, (422-437)
  1068. Sahlol A, Suen C, Elbasyoni M and Sallam A Investigating of Preprocessing Techniques and Novel Features in Recognition of Handwritten Arabic Characters Proceedings of the 6th IAPR TC 3 International Workshop on Artificial Neural Networks in Pattern Recognition - Volume 8774, (264-276)
  1069. ACM
    Wang S, Sun J, Gao B and Ma J (2014). VSRank, ACM Transactions on Intelligent Systems and Technology, 5:3, (1-24), Online publication date: 1-Oct-2014.
  1070. ACM
    Gupta A, Zimmermann T, Bird C, Nagappan N, Bhat T and Emran S Mining energy traces to aid in software development Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, (1-8)
  1071. ACM
    Gaur H and Kumar M (2014). Assessing the understandability of a data warehouse logical model using a decision-tree approach, ACM SIGSOFT Software Engineering Notes, 39:5, (1-6), Online publication date: 17-Sep-2014.
  1072. ACM
    Srinivasan V, Moghaddam S, Mukherji A, Rachuri K, Xu C and Tapia E MobileMiner Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (389-400)
  1073. ACM
    Honarvar A and Sami A CBR Clone Based Software Flaw Detection Issues Proceedings of the 7th International Conference on Security of Information and Networks, (487-491)
  1074. Xu R, Wang S, Zheng X and Chen Y (2014). Distributed collaborative filtering with singular ratings for large scale recommendation, Journal of Systems and Software, 95, (231-241), Online publication date: 1-Sep-2014.
  1075. ACM
    Chen B, Yuan S and Wang J A Dynamic Pricing Model for Unifying Programmatic Guarantee and Real-Time Bidding in Display Advertising Proceedings of the Eighth International Workshop on Data Mining for Online Advertising, (1-9)
  1076. ACM
    Zheng L, Zeng C, Li L, Jiang Y, Xue W, Li J, Shen C, Zhou W, Li H, Tang L, Li T, Duan B, Lei M and Wang P Applying data mining techniques to address critical process optimization needs in advanced manufacturing Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, (1739-1748)
  1077. Yang M, Chou C and Chen M Cluster cascades Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (281-284)
  1078. Chang S (2014). Multiple overlapping online auction market, Decision Support Systems, 64:C, (57-66), Online publication date: 1-Aug-2014.
  1079. ACM
    Ruan G, Zhang H, Wernert E and Plale B TextRWeb Proceedings of the 2014 Annual Conference on Extreme Science and Engineering Discovery Environment, (1-8)
  1080. ACM
    Cai Y, Riedl B, Ratan R, Shen C and Picot A FeatureSelector Proceedings of the 2014 Annual Conference on Extreme Science and Engineering Discovery Environment, (1-7)
  1081. ACM
    Liu D, Bertino E and Yi X Privacy of outsourced k-means clustering Proceedings of the 9th ACM symposium on Information, computer and communications security, (123-134)
  1082. ACM
    Sharma R, Bhatia J and Biswas K Machine learning for constituency test of coordinating conjunctions in requirements specifications Proceedings of the 3rd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, (25-31)
  1083. Podsiadly P Estimation of Missing Values in SNP Array Proceedings, Part II, of the 27th International Conference on Modern Advances in Applied Intelligence - Volume 8482, (427-435)
  1084. ACM
    Lin C, Wan L and Chen D C-Mine Proceedings of the 51st Annual Design Automation Conference, (1-6)
  1085. Cai G, Hio C, Bermingham L, Lee K and Lee I (2014). Sequential pattern mining of geo-tagged photos with an arbitrary regions-of-interest detection method, Expert Systems with Applications: An International Journal, 41:7, (3514-3526), Online publication date: 1-Jun-2014.
  1086. Badia A (2014). Data, information, knowledge, Journal of the Association for Information Science and Technology, 65:6, (1279-1287), Online publication date: 1-Jun-2014.
  1087. ACM
    Merten T, Mager B, Bürsner S and Paech B Classifying unstructured data into natural language text and technical information Proceedings of the 11th Working Conference on Mining Software Repositories, (300-303)
  1088. ACM
    Sharma A, Ivančić F, Niculescu-Mizil A, Chen H and Jiang G (2014). Modeling and analytics for cyber-physical systems in the age of big data, ACM SIGMETRICS Performance Evaluation Review, 41:4, (74-77), Online publication date: 17-Apr-2014.
  1089. ACM
    Yang C, Yang H and Jiang L (2014). Postmarketing Drug Safety Surveillance Using Publicly Available Health-Consumer-Contributed Content in Social Media, ACM Transactions on Management Information Systems, 5:1, (1-21), Online publication date: 1-Apr-2014.
  1090. Seera M and Lim C (2014). A hybrid intelligent system for medical data classification, Expert Systems with Applications: An International Journal, 41:5, (2239-2249), Online publication date: 1-Apr-2014.
  1091. Sharma N and Gedeon T (2014). Modeling observer stress for typical real environments, Expert Systems with Applications: An International Journal, 41:5, (2231-2238), Online publication date: 1-Apr-2014.
  1092. Mittal A, Santra A, Bhatnagar V and Khanna D Exploratory Analysis of Light Curves Proceedings of the 9th International Workshop on Databases in Networked Information Systems - Volume 8381, (67-94)
  1093. Ougiaroglou S and Evangelidis G EHC Proceedings of the 8th International Symposium on Foundations of Information and Knowledge Systems - Volume 8367, (290-304)
  1094. Zhang J, Wong J, Li T and Pan Y (2014). A comparison of parallel large-scale knowledge acquisition using rough set theory on different MapReduce runtime systems, International Journal of Approximate Reasoning, 55:3, (896-907), Online publication date: 1-Mar-2014.
  1095. Aghabozorgi S and Teh Y (2014). Stock market co-movement assessment using a three-phase clustering method, Expert Systems with Applications: An International Journal, 41:4, (1301-1314), Online publication date: 1-Mar-2014.
  1096. ACM
    Naumann F (2014). Data profiling revisited, ACM SIGMOD Record, 42:4, (40-49), Online publication date: 28-Feb-2014.
  1097. Luo G (2014). A Roadmap for Designing a Personalized Search Tool for Individual Healthcare Providers, Journal of Medical Systems, 38:2, (1-19), Online publication date: 1-Feb-2014.
  1098. Margono H, Yi X and Raikundalia G Mining Indonesian cyber bullying patterns in social networks Proceedings of the Thirty-Seventh Australasian Computer Science Conference - Volume 147, (115-124)
  1099. Saha S, Dasgupta R, Ghose A, Mullick K and Dey K A Comparative Study of Tag SNP Selection Using Clustering Proceedings of the First International Conference on Applied Algorithms - Volume 8321, (209-222)
  1100. Román P, Dell R, Velásquez J and Loyola P (2014). Identifying user sessions from web server logs with integer programming, Intelligent Data Analysis, 18:1, (43-61), Online publication date: 1-Jan-2014.
  1101. Li W, Cheng X, Duan Z, Yang D and Guo G (2014). A framework for spatial interaction analysis based on large-scale mobile phone data, Computational Intelligence and Neuroscience, 2014, (21-21), Online publication date: 1-Jan-2014.
  1102. ACM
    Wang D, Kaplan L and Abdelzaher T (2014). Maximum likelihood analysis of conflicting observations in social sensing, ACM Transactions on Sensor Networks, 10:2, (1-27), Online publication date: 1-Jan-2014.
  1103. Inbarani H, Azar A and Jothi G (2014). Supervised hybrid feature selection based on PSO and rough sets for medical diagnosis, Computer Methods and Programs in Biomedicine, 113:1, (175-185), Online publication date: 1-Jan-2014.
  1104. Ravizza S, Chen J, Atkin J, Stewart P and Burke E (2014). Aircraft taxi time prediction, Applied Soft Computing, 14, (397-406), Online publication date: 1-Jan-2014.
  1105. Sharma N and Gedeon T (2014). Modeling a stress signal, Applied Soft Computing, 14, (53-61), Online publication date: 1-Jan-2014.
  1106. A.Silva M, Trevisan D, Prata D, Marques E, Lisboa M and Prata M Exploring an Ichthyoplankton Database from a Freshwater Reservoir in Legal Amazon Part II of the Proceedings of the 9th International Conference on Advanced Data Mining and Applications - Volume 8347, (384-395)
  1107. Hassoun M Prediction of product layer cycle time using data mining Proceedings of the 2013 Winter Simulation Conference: Simulation: Making Decisions in a Complex World, (3905-3911)
  1108. ACM
    Li J From Association Analysis to Causal Discovery Proceedings of Workshop on Machine Learning for Sensory Data Analysis, (1-2)
  1109. Sheth P, Cervantes-Cervantes M, Nagula A, Laing C and Wang J (2013). Novel features for identifying A-minors in three-dimensional RNA molecules, Computational Biology and Chemistry, 47:C, (240-245), Online publication date: 1-Dec-2013.
  1110. ACM
    Patwary M, Palsetia D, Agrawal A, Liao W, Manne F and Choudhary A Scalable parallel OPTICS data clustering using graph algorithmic techniques Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-12)
  1111. Drias H, Douib A and Hirèche C Swarm Intelligence with Clustering for Solving SAT Proceedings of the 14th International Conference on Intelligent Data Engineering and Automated Learning --- IDEAL 2013 - Volume 8206, (585-593)
  1112. Hu X, Zhang H, Wu X, Chen J, Xiao Y, Xue Y and Li T A Novel Approach for Customer Segmentation Based on Biclustering Web Information Systems Engineering – WISE 2013 Workshops, (302-312)
  1113. ACM
    Radovanović M, von Trzebiatowski G, Kurbalija V, Ivanović M, Burkhard H, Schmidt D and Hinrichs C Quality checking and mining nephrology biopsy data Proceedings of the 6th Balkan Conference in Informatics, (110-113)
  1114. ACM
    Aoki S, Saga R, Ichinotsubo T, Niu W and Tsuji H Dependency Extraction from Growth Trajectory using Sequential Pattern Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, (1-6)
  1115. Campos Merschmann L and Freitas A An Extended Local Hierarchical Classifier for Prediction of Protein and Gene Functions Proceedings of the 15th International Conference on Data Warehousing and Knowledge Discovery - Volume 8057, (159-171)
  1116. ACM
    Apala K, Jose M, Motnam S, Chan C, Liszka K and de Gregorio F Prediction of movies box office performance using social media Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1209-1214)
  1117. ACM
    Aridhi S, Sghaier H, Maddouri M and Nguifo E Computational phenotype prediction of ionizing-radiation-resistant bacteria with a multiple-instance learning model Proceedings of the 12th International Workshop on Data Mining in Bioinformatics, (18-24)
  1118. ACM
    Lee P, Lakshmanan L and Milios E KeySee Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (1478-1481)
  1119. ACM
    Wang C, Danilevsky M, Desai N, Zhang Y, Nguyen P, Taula T and Han J A phrase mining framework for recursive construction of a topical hierarchy Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (437-445)
  1120. Zhang Y and Cao J Personalized Recommendation Based on Behavior Sequence Similarity Measures International Workshop on Behavior and Social Informatics on Behavior and Social Computing - Volume 8178, (165-177)
  1121. Sokolova M, GonzáLez-Martí I, Contreras JordáN O and FernáNdez Bustos J (2013). A case study of muscle dysmorphia disorder diagnostics, Expert Systems with Applications: An International Journal, 40:10, (4226-4231), Online publication date: 1-Aug-2013.
  1122. ACM
    Keng J, Wee T, Jiang L and Balan R The case for mobile forensics of private data leaks Proceedings of the 4th Asia-Pacific Workshop on Systems, (1-7)
  1123. ACM
    Cai Y, Brown C, Ahmed I, Atouba Y, Pilny A and Poole M SocialMapExplorer Proceedings of the Conference on Extreme Science and Engineering Discovery Environment: Gateway to Discovery, (1-6)
  1124. Gao J and Denzinger J Improving the efficiency of distributed data mining using an adjustment work flow Proceedings of the 9th international conference on Machine Learning and Data Mining in Pattern Recognition, (69-83)
  1125. de Carvalho J and Ruiz D Discovering frequent itemsets on uncertain data Proceedings of the 9th international conference on Machine Learning and Data Mining in Pattern Recognition, (390-404)
  1126. Allah W, El Sayed Y and Mohamed Ghaleb F An efficient and scalable algorithm for mining maximal Proceedings of the 9th international conference on Machine Learning and Data Mining in Pattern Recognition, (352-366)
  1127. Zhang Y and Cheng E An optimized method for selection of the initial centers of k-means clustering Proceedings of the 2013 international conference on Integrated Uncertainty in Knowledge Modelling and Decision Making, (149-156)
  1128. Potyka N, Beierle C and Kern-Isberner G On the problem of reversing relational inductive knowledge representation Proceedings of the 12th European conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty, (485-496)
  1129. Chiang M, Liou J, Wang J, Peng W and Shan M (2013). Exploring heterogeneous information networks and random walk with restart for academic search, Knowledge and Information Systems, 36:1, (59-82), Online publication date: 1-Jul-2013.
  1130. Vakilian M, Chen N, Zilouchian Moghaddam R, Negara S and Johnson R A compositional paradigm of automating refactorings Proceedings of the 27th European conference on Object-Oriented Programming, (527-551)
  1131. ACM
    Coria S, Ramírez-Vásquez S, Luna-Trejo J, Mondragón-Becerra R, Pérez-Meza M and Ávila-Barrón O Delta score Proceedings of the 14th Annual International Conference on Digital Government Research, (102-110)
  1132. Wasan P, Uttamchandani M, Moochhala S, Yap V and Yap P (2013). Application of statistics and machine learning for risk stratification of heritable cardiac arrhythmias, Expert Systems with Applications: An International Journal, 40:7, (2476-2486), Online publication date: 1-Jun-2013.
  1133. Nam J, Pan S and Kim S Transfer defect learning Proceedings of the 2013 International Conference on Software Engineering, (382-391)
  1134. Joshua L and Varghese K (2013). Selection of Accelerometer Location on Bricklayers Using Decision Trees, Computer-Aided Civil and Infrastructure Engineering, 28:5, (372-388), Online publication date: 1-May-2013.
  1135. ACM
    Mian R, Martin P, Zulkernine F and Vazquez-Poletti J Towards building performance models for data-intensive workloads in public clouds Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering, (259-270)
  1136. Ott D Automatic requirement categorization of large natural language specifications at mercedes-benz for review improvements Proceedings of the 19th international conference on Requirements Engineering: Foundation for Software Quality, (50-64)
  1137. Sharma N, Gedeon T and Mendis B (2013). Evolutionary algorithms using cluster patterns for timetabling, Intelligent Decision Technologies, 7:2, (137-150), Online publication date: 1-Apr-2013.
  1138. Tseng F (2013). Mining frequent itemsets in large databases, Expert Systems with Applications: An International Journal, 40:5, (1654-1661), Online publication date: 1-Apr-2013.
  1139. Vijendra S and Laxman S (2013). Subspace clustering of high-dimensional data, Applied Computational Intelligence and Soft Computing, 2013, (16-16), Online publication date: 1-Jan-2013.
  1140. Djenouri Y, Drias H, Habbas Z and Mosteghanemi H Bees Swarm Optimization for Web Association Rule Mining Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03, (142-146)
  1141. Sharma N and Gedeon T (2012). Objective measures, sensors and computational techniques for stress recognition and classification, Computer Methods and Programs in Biomedicine, 108:3, (1287-1301), Online publication date: 1-Dec-2012.
  1142. Ashraf M, Chetty G, Tran D and Sharma D Hybrid approach for diagnosing thyroid, hepatitis, and breast cancer based on correlation based feature selection and Naïve bayes Proceedings of the 19th international conference on Neural Information Processing - Volume Part IV, (272-280)
  1143. Patwary M, Palsetia D, Agrawal A, Liao W, Manne F and Choudhary A A new scalable parallel DBSCAN algorithm using the disjoint-set data structure Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-11)
  1144. ACM
    Liu L, Lin C and Vasudevan S Word level feature discovery to enhance quality of assertion mining Proceedings of the International Conference on Computer-Aided Design, (210-217)
  1145. ACM
    Marcel P, Missaoui R and Rizzi S Towards intensional answers to OLAP queries for analytical sessions Proceedings of the fifteenth international workshop on Data warehousing and OLAP, (49-56)
  1146. ACM
    Wang S, Sun J, Gao B and Ma J Adapting vector space model to ranking-based collaborative filtering Proceedings of the 21st ACM international conference on Information and knowledge management, (1487-1491)
  1147. ACM
    Cheng S, Termehchy A and Hristidis V Predicting the effectiveness of keyword queries on databases Proceedings of the 21st ACM international conference on Information and knowledge management, (1213-1222)
  1148. ACM
    Dong W, Fan W, Shi L, Zhou C and Yan X A general framework to encode heterogeneous information sources for contextual pattern mining Proceedings of the 21st ACM international conference on Information and knowledge management, (65-74)
  1149. ACM
    Lin C, Ji M, Danilevsky M and Han J Efficient mining of correlated sequential patterns based on null hypothesis Proceedings of the 2012 international workshop on Web-scale knowledge representation, retrieval and reasoning, (17-24)
  1150. ACM
    Baik J, Kim Y, Han C, Choi J, Jang E and Lee S An automatic classification system for consumer regulatory focus by analyzing web shopping logs Proceedings of the 2012 ACM Research in Applied Computation Symposium, (60-64)
  1151. ACM
    Lacerda Y, Feitosa R, Esmeraldo G, Baptista C and Marinho L Compass clustering Proceedings of the 18th Brazilian symposium on Multimedia and the web, (281-288)
  1152. Potyka N and Beierle C An approach to learning relational probabilistic FO-PCL knowledge bases Proceedings of the 6th international conference on Scalable Uncertainty Management, (625-632)
  1153. Al-Badarneh A, Najadat H and Alraziqi A A Classifier to Detect Tumor Disease in MRI Brain Images Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (784-787)
  1154. ACM
    Jan T, Wang D, Lin C and Lin H A simple methodology for soft cost-sensitive classification Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (141-149)
  1155. Li A, Haraguchi M and Okubo Y Top-N minimization approach for indicative correlation change mining Proceedings of the 8th international conference on Machine Learning and Data Mining in Pattern Recognition, (102-116)
  1156. Mondal K, Pasquier N, Mukhopadhyay A, Maulik U and Bandhopadyay S A new approach for association rule mining and bi-clustering using formal concept analysis Proceedings of the 8th international conference on Machine Learning and Data Mining in Pattern Recognition, (86-101)
  1157. Welcker L, Koch S and Dellmann F Improving classifier performance by knowledge-driven data preparation Proceedings of the 12th Industrial conference on Advances in Data Mining: applications and theoretical aspects, (151-165)
  1158. ACM
    Al-Jaloud F, Hezam R and Aoun-Allah M Classifying Arabic web pages toolkit Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics, (1-4)
  1159. ACM
    Akerkar R, Bădică C and Burdescu D Desiderata for research in web intelligence, mining and semantics Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics, (1-5)
  1160. Lin S (2012). Data mining for student retention management, Journal of Computing Sciences in Colleges, 27:4, (92-99), Online publication date: 1-Apr-2012.
  1161. Ougiaroglou S and Evangelidis G A simple noise-tolerant abstraction algorithm for fast k-NN classification Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II, (210-221)
  1162. Rand G (2012). Book Reviews, Interfaces, 42:2, (217-225), Online publication date: 1-Mar-2012.
  1163. Davey J, Mansmann F, Kohlhammer J and Keim D Visual analytics The Future Internet, (93-104)
  1164. ACM
    Kalegele K, Sveholm J, Takahashi H, Sasai K, Kitagata G and Kinoshita T On-demand numerosity reduction for object learning Proceedings of the workshop on Internet of Things and Service Platforms, (1-8)
  1165. ACM
    Vatsavai R STPMiner Proceedings of the 2nd international workshop on Petascal data analytics: challenges and opportunities, (29-34)
  1166. ACM
    Su L, Gao J, Yang Y, Abdelzaher T, Ding B and Han J Hierarchical aggregate classification with limited supervision for data reduction in wireless sensor networks Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, (40-53)
  1167. ACM
    Lian D and Xie X Collaborative activity recognition via check-in history Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Location-Based Social Networks, (45-48)
  1168. Zhao Y, Niu Z, Peng X and Dai L A discretization algorithm of numerical attributes for digital library evaluation based on data mining technology Proceedings of the 13th international conference on Asia-pacific digital libraries: for cultural heritage, knowledge dissemination, and future creation, (70-76)
  1169. Yap B, Ong S and Husain N (2011). Using data mining to improve assessment of credit worthiness via credit scoring models, Expert Systems with Applications: An International Journal, 38:10, (13274-13283), Online publication date: 15-Sep-2011.
  1170. Chen S, Tseng T, Ke H and Sun C (2011). Social trend tracking by time series based social tagging clustering, Expert Systems with Applications: An International Journal, 38:10, (12807-12817), Online publication date: 15-Sep-2011.
  1171. Köksal G, Batmaz İ and Testik M (2011). A review of data mining applications for quality improvement in manufacturing industry, Expert Systems with Applications: An International Journal, 38:10, (13448-13467), Online publication date: 15-Sep-2011.
  1172. Kim C, Lee H, Seol H and Lee C (2011). Identifying core technologies based on technological cross-impacts, Expert Systems with Applications: An International Journal, 38:10, (12559-12564), Online publication date: 15-Sep-2011.
  1173. ACM
    Saraee M, Moghimi M and Bagheri A Modeling batch annealing process using data mining techniques for cold rolled steel sheets Proceedings of the First International Workshop on Data Mining for Service and Maintenance, (18-22)
  1174. ACM
    Wang J and Li C An iterative voting method based on word density for text classification Proceedings of the International Conference on Web Intelligence, Mining and Semantics, (1-5)
  1175. ACM
    Bagui S and Islam M Query optimization in large databases using association rule mining Proceedings of the 48th Annual Southeast Regional Conference, (1-2)
  1176. Saxena A and Wang J (2010). Dimensionality Reduction with Unsupervised Feature Selection and Applying Non-Euclidean Norms for Classification Accuracy, International Journal of Data Warehousing and Mining, 6:2, (22-40), Online publication date: 1-Apr-2010.
  1177. ACM
    Šilhavá J, Beran V, Chmelař P, Herout A, Hradiš M, Juránek R and Zemčík P Platform for evaluation of image classifiers Proceedings of the 23rd Spring Conference on Computer Graphics, (93-99)
  1178. Ma C, Liang X and Ma Y A Succinct Distributive Big Data Clustering Algorithm Based on Local-Remote Coordination 2015 IEEE International Conference on Systems, Man, and Cybernetics, (1839-1844)
  1179. Zhang X, Wang Y, Sun R and Wang D Clustered device-to-device caching based on file preferences 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (1-6)
  1180. Liao Y, Li S, Li G, Wang W, Cheng B and Chen F Detection of driver cognitive distraction: An SVM based real-time algorithm and its comparison study in typical driving scenarios 2016 IEEE Intelligent Vehicles Symposium (IV), (394-399)
  1181. Xu J, Chen D and Chau M Identifying features for detecting fraudulent loan requests on P2P platforms 2016 IEEE Conference on Intelligence and Security Informatics (ISI), (79-84)
  1182. Milanov S and Georgieva O Pattern frequency representation for time series classification 2016 IEEE 8th International Conference on Intelligent Systems (IS), (478-483)
  1183. Mure S, Grenier T, Guttmann C and Benoit-Cattin H Unsupervised time-series clustering of distorted and asynchronous temporal patterns 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (1263-1267)
  1184. Tran C, Zhang M and Andreae P Directly evolving classifiers for missing data using genetic programming 2016 IEEE Congress on Evolutionary Computation (CEC), (5278-5285)
Contributors
  • University of Illinois Urbana-Champaign
  • Simon Fraser University
  • Simon Fraser University

Recommendations

Robert M. Lynch

A very good textbook on data mining, this third edition reflects the changes that are occurring in the data mining field. It adds cited material from about 2006, a new section on visualization, and pattern mining with the more recent cluster methods. It's a well-written text, with all of the supporting materials an instructor is likely to want, including Web material support, extensive problem sets, and solution manuals. Though it serves as a data mining text, readers with little experience in the area will find it readable and enlightening. That being said, readers are expected to have some coding experience, as well as database design and statistics analysis knowledge. The material is organized into 13 chapters, with chapters 1 through 3 serving as an introduction to mining, data organization (objects and attributes), statistics, data visualization, and processing. Chapter 4 focuses on data warehousing, and chapter 5 examines data cube technology. Chapters 6 through 13 attend to data mining concepts and methods. These chapters focus on mining patterns and associations, advanced patterns, concept classification, and model evaluation with advanced methods; cluster analysis and outlier detection are discussed at length. Lastly, mining trends and recent research opportunities are presented. Two additional items are worthy of note: the text's bibliography is an excellent reference list for mining research, and the index is very complete, which makes it easy to locate information. Also, researchers and analysts from other disciplines"?for example, epidemiologists, financial analysts, and psychometric researchers"?may find the material very useful. Online Computing Reviews Service

Sergio Ilarri

This interesting and comprehensive introduction to data mining emphasizes the interest in multidimensional data mining--the integration of online analytical processing (OLAP) and data mining. Some chapters cover basic methods, and others focus on advanced techniques. The structure, along with the didactic presentation, makes the book suitable for both beginners and specialized readers. Chapter 1, "Introduction," provides a general overview of data mining and related technologies. Chapter 2, "Getting to Know Your Data," presents different types of attributes, statistical descriptions of data, visualization techniques, and similarity and dissimilarity measures. Chapter 3, "Data Preprocessing," presents different techniques for data cleaning, data integration, data reduction, data transformation, and data discretization. Chapter 4, "Data Warehousing and Online Analytical Processing," introduces data warehouses and OLAP. Chapter 5, "Data Cube Technology," examines data cube technology and methods to compute data cubes. Chapter 6, "Mining Frequent Patterns, Associations, and Correlations: Basic Concepts and Methods," covers basic aspects of frequent patterns, associations, and correlations, as well as pattern evaluation measures. Chapter 7, "Advanced Pattern Mining," describes advanced methods for mining different types of patterns (multilevel, multidimensional, rare, colossal, and approximate). It also considers the problem of semantic annotation of frequent patterns and applications of pattern mining. Chapter 8, "Classification: Basic Concepts," presents basic classification methods (decision trees, Bayesian classifiers, and rule-based classifiers), evaluation metrics, and ensemble methods used to increase the accuracy of the classification. Chapter 9, "Classification: Advanced Methods," describes advanced techniques for classification: Bayesian belief networks, backpropagation, support vector machines, classification using frequent patterns, and lazy/instance-based learners (based on k -nearest neighbors and case-based reasoning). This chapter also offers a brief description of other approaches (based on genetic algorithms and rough sets) and discusses multiclass classification, semi-supervised classification, active learning, and transfer learning. Chapter 10, "Cluster Analysis: Basic Concepts and Methods," introduces the problem of grouping objects into subsets, providing an overview of basic clustering methods (partitioning, hierarchical, density-based, and grid-based methods) and cluster evaluation. Chapter 11, "Advanced Cluster Analysis," discusses probabilistic methods, high-dimensional data (data with ten or more attributes), graph and network data, and clustering constraints. Chapter 12, "Outlier Detection," studies techniques for the detection of anomalies, including statistical, proximity-based, clustering-based, and classification-based approaches. In addition, this chapter describes the problem of contextual/conditional and collective outliers, and how to detect outliers in high-dimensional data. Finally, chapter 13, "Data Mining Trends and Research Frontiers," introduces the problem of mining complex data types (for example, biological sequences, graphs and networks, spatiotemporal data, and Web data), other methodologies for data mining not covered in the book, data mining applications, the impact of data mining on society, and open research issues. Researchers in data mining or related areas could use this book as a reference. It could also be used as a textbook in a data mining course. Each chapter ends with a useful summary, some exercises, and bibliographic notes. Moreover, the book's Web site (http://www.cs.uiuc.edu/~hanj/bk3/) provides additional resources for instructors. I must emphasize that the book focuses on concepts and techniques; thus, it does not cover the use of specific data mining software tools. In addition, the authors have decided to "leave the handling of complex data types to a separate forthcoming book." Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.