default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 126 matches
- 2010
- Naoki Abe, Prem Melville, Cezar Pendus, Chandan K. Reddy, David L. Jensen, Vince P. Thomas, James J. Bennett, Gary F. Anderson, Brent R. Cooley, Melissa Kowalczyk, Mark Domick, Timothy Gardinier:
Optimizing debt collections using constrained reinforcement learning. KDD 2010: 75-84 - Iris Adä, Michael R. Berthold:
The new iris data: modular data generators. KDD 2010: 413-422 - Deepak Agarwal, Rahul Agrawal, Rajiv Khanna, Nagaraj Kota:
Estimating rates of rare events with multiple hierarchies through scalable log-linear models. KDD 2010: 213-222 - Deepak Agarwal, Bee-Chung Chen, Pradheep Elango:
Fast online learning through offline initialization for time-sensitive recommendation. KDD 2010: 703-712 - Arvind Agarwal, Jeff M. Phillips, Suresh Venkatasubramanian:
Universal multi-dimensional scaling. KDD 2010: 1149-1158 - Saeed Alaei, Ravi Kumar, Azarakhsh Malekian, Erik Vee:
Balanced allocation with succinct representation. KDD 2010: 523-532 - Josh Attenberg, Foster J. Provost:
Why label when you can search?: alternatives to active learning for applying human resources to build classification models under extreme class imbalance. KDD 2010: 423-432 - Collin Bennett, Robert L. Grossman, David Locke, Jonathan Seidman, Steve Vejcik:
Malstone: towards a benchmark for analytics on large data clouds. KDD 2010: 145-152 - Raghav Bhaskar, Srivatsan Laxman, Adam D. Smith, Abhradeep Thakurta:
Discovering frequent patterns in sensitive data. KDD 2010: 503-512 - Christian Böhm, Claudia Plant, Junming Shao, Qinli Yang:
Clustering by synchronization. KDD 2010: 583-592 - Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Beyond heuristics: learning to classify vulnerabilities and predict exploits. KDD 2010: 105-114 - Deng Cai, Chiyuan Zhang, Xiaofei He:
Unsupervised feature selection for multi-cluster data. KDD 2010: 333-342 - Longbing Cao, Yuming Ou, Philip S. Yu, Gang Wei:
Detecting abnormal coupled sequences and sequence changes in group-based manipulative trading behaviors. KDD 2010: 85-94 - David Chan, Rong Ge, Ori Gershony, Tim Hesterberg, Diane Lambert:
Evaluating online ad campaigns in a pipeline: causal models at scale. KDD 2010: 7-16 - Olivier Chapelle, Pannagadatta K. Shivaswamy, Srinivas Vadrevu, Kilian Q. Weinberger, Ya Zhang, Belle L. Tseng:
Multi-task learning for boosting with application to web search ranking. KDD 2010: 1189-1198 - Feng Chen, Chang-Tien Lu, Arnold P. Boedihardjo:
GLS-SOD: a generalized local statistical approach for spatial outlier detection. KDD 2010: 1069-1078 - Jianhui Chen, Ji Liu, Jieping Ye:
Learning incoherent sparse and low-rank patterns from multiple tasks. KDD 2010: 1179-1188 - Wei Chen, Chi Wang, Yajun Wang:
Scalable influence maximization for prevalent viral marketing in large-scale social networks. KDD 2010: 1029-1038 - Freddy Chong Tat Chua, Ee-Peng Lim:
Trust network inference for online rating data using generative models. KDD 2010: 889-898 - Xuan-Hong Dang, James Bailey:
A hierarchical information theoretic technique for the discovery of non linear alternative clusterings. KDD 2010: 573-582 - Santanu Das, Bryan L. Matthews, Ashok N. Srivastava, Nikunj C. Oza:
Multiple kernel learning for heterogeneous anomaly detection: algorithm and aviation safety case study. KDD 2010: 47-56 - Christopher DuBois, Padhraic Smyth:
Modeling relational events via latent classes. KDD 2010: 803-812 - Robert J. Durrant, Ata Kabán:
Compressed fisher linear discriminant analysis: classification of randomly projected data. KDD 2010: 1119-1128 - Qiong Fang, Wilfred Ng, Jianlin Feng:
Discovering significant relaxed order-preserving submatrices. KDD 2010: 433-442 - Hongliang Fei, Jun Huan:
Boosting with structure information in the functional space: an application to graph classification. KDD 2010: 643-652 - Konrad Feldman:
The quantification of advertising: (+ lessons from building businesses based on large scale data mining). KDD 2010: 5-6 - Yoav Freund:
Data winnowing. KDD 2010: 3-4 - Arik Friedman, Assaf Schuster:
Data mining with differential privacy. KDD 2010: 493-502 - Jing Gao, Feng Liang, Wei Fan, Chi Wang, Yizhou Sun, Jiawei Han:
On community outliers and their efficient detection in information networks. KDD 2010: 813-822 - Chuancong Gao, Jianyong Wang:
Direct mining of discriminative patterns for classifying uncertain data. KDD 2010: 861-870
skipping 96 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-27 23:50 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint