default search action
Fedja Hadzic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c30]Fedja Hadzic, Maya Krayneva:
Lateral AI: Simulating Diversity in Virtual Communities. AI (2) 2023: 41-53
2010 – 2019
- 2015
- [j9]Fedja Hadzic, Michael Hecker, Andrea Tagarelli:
Ordered subtree mining via transactional mapping using a structure-preserving tree database schema. Inf. Sci. 310: 97-117 (2015) - [j8]Dang Bach Bui, Fedja Hadzic, Andrea Tagarelli, Michael Hecker:
Evaluation of an associative classifier based on position-constrained frequent/closed subtree mining. J. Intell. Inf. Syst. 45(3): 397-421 (2015) - [p1]Izwan Nizal Mohd Shaharanee, Fedja Hadzic:
Irrelevant Feature and Rule Removal for Structural Associative Classification Using Structure-Preserving Flat Representation. Feature Selection for Data and Pattern Recognition 2015: 199-228 - 2014
- [j7]Izwan Nizal Mohd Shaharanee, Fedja Hadzic:
Evaluation and optimization of frequent, closed and maximal association rule based classification. Stat. Comput. 24(5): 821-843 (2014) - 2013
- [c29]Davor Meersman, Fedja Hadzic, Jeff Hughes, Iván S. Razo-Zapata, Pieter De Leenheer:
Health Service Discovery and Composition in Ambient Assisted Living: the Australian Type 2 Diabetes Case Study. HICSS 2013: 1337-1346 - [c28]Dang Bach Bui, Fedja Hadzic, Michael Hecker:
Evaluation of Position-Constrained Association-Rule-Based Classification for Tree-Structured Data. PAKDD Workshops 2013: 379-391 - 2012
- [j6]Henry Tan, Fedja Hadzic, Tharam S. Dillon:
Mining Induced/Embedded Subtrees using the Level of Embedding Constraint. Fundam. Informaticae 119(2): 187-231 (2012) - [c27]Fedja Hadzic, Pieter De Leenheer, Davor Meersman:
Patient and Business Rules Extraction and Formalisation Using SVN and SBVR for Automated Healthcare. ACIS 2012 - [c26]Dang Bach Bui, Fedja Hadzic, Michael Hecker:
Application of Tree-structured Data Mining for Analysis of Process Logs in XML format. AusDM 2012: 109-118 - [c25]Novita Ikasari, Fedja Hadzic:
An Assessment on Loan Performance from Combined Quantitative and Qualitative Data in XML. Discovery Science 2012: 268-283 - [c24]Dang Bach Bui, Fedja Hadzic, Vidyasagar M. Potdar:
A Framework for Application of Tree-Structured Data Mining to Process Log Analysis. IDEAL 2012: 423-434 - 2011
- [j5]Izwan Nizal Mohd Shaharanee, Fedja Hadzic, Tharam S. Dillon:
Interestingness measures for association rules based on statistical validity. Knowl. Based Syst. 24(3): 386-392 (2011) - [c23]Fedja Hadzic, Michael Hecker, Andrea Tagarelli:
XML Document Clustering Using Structure-Preserving Flat Representation of XML Content and Structure. ADMA (2) 2011: 403-416 - [c22]Fedja Hadzic:
A Structure Preserving Flat Data Format Representation for Tree-Structured Data. PAKDD Workshops 2011: 221-233 - [c21]Fedja Hadzic, Michael Hecker:
Alternative Approach to Tree-Structured Web Log Representation and Mining. Web Intelligence 2011: 235-242 - 2010
- [b1]Fedja Hadzic, Henry Tan, Tharam S. Dillon:
Mining of Data with Complex Structures. Studies in Computational Intelligence 333, Springer 2010, ISBN 978-3-642-17556-5, pp. 1-326 [contents] - [j4]Maja Hadzic, Fedja Hadzic, Tharam S. Dillon:
Mining of patient data: towards better treatment strategies for depression. Int. J. Funct. Informatics Pers. Medicine 3(2): 122-143 (2010) - [j3]Fedja Hadzic, Henry Tan, Tharam S. Dillon:
Model guided algorithm for mining unordered embedded subtrees. Web Intell. Agent Syst. 8(4): 413-430 (2010) - [c20]Qi H. Pan, Fedja Hadzic, Tharam S. Dillon:
Discovering Concept Mappings by Similarity Propagation among Substructures. IDEAL 2010: 324-333 - [c19]Izwan Nizal Mohd Shaharanee, Fedja Hadzic, Tharam S. Dillon:
A Statistical Interestingness Measures for XML Based Association Rules. PRICAI 2010: 194-205
2000 – 2009
- 2009
- [c18]Izwan Nizal Mohd Shaharanee, Fedja Hadzic, Tharam S. Dillon:
Interestingness of Association Rules Using Symmetrical Tau and Logistic Regression. Australasian Conference on Artificial Intelligence 2009: 422-431 - 2008
- [j2]Henry Tan, Fedja Hadzic, Tharam S. Dillon, Elizabeth Chang:
State of the art of data mining of tree structured information. Comput. Syst. Sci. Eng. 23(4) (2008) - [j1]Henry Tan, Fedja Hadzic, Tharam S. Dillon, Elizabeth Chang, Ling Feng:
Tree model guided candidate generation for mining frequent subtrees from XML documents. ACM Trans. Knowl. Discov. Data 2(2): 9:1-9:43 (2008) - [c17]Fedja Hadzic, Tharam S. Dillon:
Rule Optimizing Technique Motivated by Human Concept Formation. BIOSIGNALS (2) 2008: 31-36 - [c16]Maja Hadzic, Fedja Hadzic, Tharam S. Dillon:
Mining of Health Information from Ontologies. HEALTHINF (2) 2008: 155-160 - [c15]Fedja Hadzic, Tharam S. Dillon:
Human-Like Rule Optimization for Continuous Domains. BIOSTEC (Selected Papers) 2008: 330-343 - [c14]Maja Hadzic, Russel D'Souza, Fedja Hadzic, Tharam S. Dillon:
Thinking PubMed: an Innovative System for Mental Health Domain. CBMS 2008: 330-335 - [c13]Fedja Hadzic, Henry Tan, Tharam S. Dillon:
Mining Unordered Distance-Constrained Embedded Subtrees. Discovery Science 2008: 272-283 - [c12]Maja Hadzic, Fedja Hadzic, Tharam S. Dillon:
Tree Mining in Mental Health Domain. HICSS 2008: 230 - [c11]Fedja Hadzic, Tharam S. Dillon, Elizabeth Chang:
Knowledge Analysis with Tree Patterns. HICSS 2008: 369 - [c10]Fedja Hadzic, Tharam S. Dillon:
Using Competitive Learning between Symbolic Rules as a Knowledge Learning Method. IFIP AI 2008: 351-360 - [c9]Qi H. Pan, Fedja Hadzic, Tharam S. Dillon:
Conjoint Data Mining of Structured and Semi-structured Data. SKG 2008: 87-94 - [c8]Fedja Hadzic, Henry Tan, Tharam S. Dillon:
U3 - Mning Unordered Embedded Subtrees Using TMG Candidate Generation. Web Intelligence 2008: 285-292 - 2007
- [c7]Fedja Hadzic, Henry Tan, Tharam S. Dillon:
UNI3 - efficient algorithm for mining unordered induced subtrees using TMG candidate generation. CIDM 2007: 568-575 - [c6]Fedja Hadzic, Tharam S. Dillon, Elizabeth Chang:
Tree Mining Application to Matching of Heterogeneous Knowledge Representations. GrC 2007: 351-357 - [c5]Fedja Hadzic, Tharam S. Dillon:
CSOM for Mixed Data Types. ISNN (2) 2007: 965-978 - [c4]Fedja Hadzic, Tharam S. Dillon:
Application of Tree Mining to Matching of Knowledge Structures of Decision Tree Type. OTM Workshops (2) 2007: 1319-1328 - 2006
- [c3]Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabeth Chang:
Razor: mining distance-constrained embedded subtrees. ICDM Workshops 2006: 8-13 - [c2]Fedja Hadzic, Tharam S. Dillon, Amandeep S. Sidhu, Elizabeth Chang, Henry Tan:
Mining Substructures in Protein Data. ICDM Workshops 2006: 213-217 - [c1]Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabeth Chang, Ling Feng:
IMB3-Miner: Mining Induced/Embedded Subtrees by Constraining the Level of Embedding. PAKDD 2006: 450-461
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint