default search action
Knowledge and Information Systems, Volume 45
Volume 45, Number 1, October 2015
- Ahmed K. Farahat, Ahmed Elgohary, Ali Ghodsi, Mohamed S. Kamel:
Greedy column subset selection for large-scale data sets. 1-34 - Robert Moskovitch, Yuval Shahar:
Classification of multivariate time series via temporal abstraction and time intervals mining. 35-74 - Bei Pan, Ugur Demiryurek, Chetan Gupta, Cyrus Shahabi:
Forecasting spatiotemporal impact of traffic incidents for next-generation navigation systems. 75-104 - Abdullah Mueen, Nikan Chavoshi:
Enumeration of time series motifs of all lengths. 105-132 - Ruochen Liu, Lang Zhang, Bingjie Li, Yajuan Ma, Licheng Jiao:
Synergy of two mutations based immune multi-objective automatic fuzzy clustering algorithm. 133-157 - Michele Dallachiesa, Gabriela Jacques-Silva, Bugra Gedik, Kun-Lung Wu, Themis Palpanas:
Sliding windows over uncertain data streams. 159-190 - Muhammad Tanveer:
Application of smoothing techniques for linear programming twin support vector machines. 191-214 - Da Yan, James Cheng, Zhou Zhao, Wilfred Ng:
Efficient location-based search of trajectories with location importance. 215-245 - Ronaldo C. Prati, Gustavo E. A. P. A. Batista, Diego Furtado Silva:
Class imbalance revisited: a new experimental setup to assess the performance of treatment methods. 247-270
Volume 45, Number 2, November 2015
- Jafar Muhammadi, Hamid R. Rabiee, Seyyed Abbas Hosseini:
A unified statistical framework for crowd labeling. 271-294 - Sonia Bergamaschi, Riccardo Martoglia, Serena Sorrentino:
Exploiting semantics for filtering and searching knowledge in a software development context. 295-318 - Son T. Mai, Xiao He, Jing Feng, Claudia Plant, Christian Böhm:
Anytime density-based clustering of complex data. 319-355 - Reyhan Aydogan, Tim Baarslag, Koen V. Hindriks, Catholijn M. Jonker, Pinar Yolum:
Heuristics for using CP-nets in utility-based negotiation without knowing utilities. 357-388 - Christophe G. Giraud-Carrier, J. Goodliffe, B. M. Jones, S. Cueva:
Effective record linkage for mining campaign contribution data. 389-416 - Chuanwen Li, Yu Gu, Jianzhong Qi, Rui Zhang, Ge Yu:
A safe region based approach to moving KNN queries in obstructed space. 417-451 - Jitendra Agrawal, Shikha Agrawal, Ankita Singhai, Sanjeev Kumar Sharma:
SET-PSO-based approach for mining positive and negative association rules. 453-471 - Guangyu Wu, Pádraig Cunningham:
Integration of multiple network views in Wikipedia. 473-490 - Georgios M. Santipantakis, George A. Vouros:
Distributed reasoning with coupled ontologies: the E-SHIQ representation framework. 491-534
Volume 45, Number 3, December 2015
- Hai-Long Nguyen, Yew-Kwong Woon, Wee Keong Ng:
A survey on data stream clustering and classification. 535-569 - Charu C. Aggarwal, Yao Li, Philip S. Yu:
On the anonymizability of graphs. 571-588 - Maede Ashouri-Talouki, Ahmad Baraani-Dastjerdi, Ali Aydin Selçuk:
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services. 589-615 - Rong-Hua Li, Jeffrey Xu Yu:
Triangle minimization in large networks. 617-643 - Fragkiskos D. Malliaros, Vasileios Megalooikonomou, Christos Faloutsos:
Estimating robustness in large social graphs. 645-678 - Fangqing Gu, Hai-Lin Liu, Yiu-ming Cheung, Shengli Xie:
Optimal WCDMA network planning by multiobjective evolutionary algorithm with problem-specific genetic operation. 679-703 - Prasad M. Deshpande, Salil Joshi, Prateek Dewan, Karin Murthy, Mukesh K. Mohania, Sheshnarayan Agrawal:
The Mask of ZoRRo: preventing information leakage from documents. 705-730 - Dmitriy Fradkin, Fabian Mörchen:
Mining sequential patterns for classification. 731-749 - Yang Yang, Ryan N. Lichtenwalter, Nitesh V. Chawla:
Evaluating link prediction methods. 751-782 - Jafar Mansouri, Morteza Khademi:
Multiplicative distance: a method to alleviate distance instability for high-dimensional data. 783-805
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.