Data Mining: Practical Machine Learning Tools and Techniques offers a thorough grounding in machine learning concepts as well as practical advice on applying machine learning tools and techniques in real-world data mining situations. This highly anticipated third edition of the most acclaimed work on data mining and machine learning will teach you everything you need to know about preparing inputs, interpreting outputs, evaluating results, and the algorithmic methods at the heart of successful data mining. Thorough updates reflect the technical changes and modernizations that have taken place in the field since the last edition, including new material on Data Transformations, Ensemble Learning, Massive Data Sets, Multi-instance Learning, plus a new version of the popular Weka machine learning software developed by the authors. Witten, Frank, and Hall include both tried-and-true techniques of today as well as methods at the leading edge of contemporary research. *Provides a thorough grounding in machine learning concepts as well as practical advice on applying the tools and techniques to your data mining projects *Offers concrete tips and techniques for performance improvement that work by transforming the input or output in machine learning methods *Includes downloadable Weka software toolkit, a collection of machine learning algorithms for data mining tasks-in an updated, interactive interface. Algorithms in toolkit cover: data pre-processing, classification, regression, clustering, association rules, visualization
- Abe, N., Zadrozny, B., & Langford, J. (2006). Outlier detection by active learning. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 767-772). New York: ACM Press. Google Scholar
- Adriaans, P., & Zantige, D. (1996). Data mining. Harlow, England: Addison-Wesley. Google Scholar
- Agrawal, R., & Srikant, R. (1994). Fast algorithms for mining association rules in large databases. In J. Bocca, M. Jarke, & C. Zaniolo (Eds.), Proceedings of the International Conference on Very Large Data Bases (pp. 478-499). Santiago, Chile. San Francisco: Morgan Kaufmann. Google Scholar
- Agrawal, R., Imielinski, T., & Swami, A. (1993a). Database mining: A performance perspective. IEEE Transactions on Knowledge and Data Engineering, 5(6), 914-925. Google ScholarDigital Library
- Agrawal, R., Imielinski, T., & Swami, A. (1993b). Mining association rules between sets of items in large databases. In P. Buneman, & S. Jajodia (Eds.), Proceedings of the ACM SIGMOD International Conference on Management of Data (pp. 207-216). Washington, DC. New York: ACM Press. Google Scholar
- Aha, D. (1992). Tolerating noisy, irrelevant, and novel attributes in instance-based learning algorithms. International Journal of Man-Machine Studies, 36(2), 267-287. Google ScholarDigital Library
- Almuallin, H., & Dietterich, T. G. (1991). Learning with many irrelevant features. In Proceedings of the Ninth National Conference on Artificial Intelligence (pp. 547-552). Anaheim, CA. Menlo Park, CA: AAAI Press. Google Scholar
- Almuallin, H., & Dietterich, T. G. (1992). Efficient algorithms for identifying relevant features. In Proceedings of the Ninth Canadian Conference on Artificial Intelligence (pp. 38-45). Vancouver, BC. San Francisco: Morgan Kaufmann.Google Scholar
- Andrews, S., Tsochantaridis, I., & Hofmann, T. (2003). Support vector machines for multiple-instance learning. In Proceedings of the Conference on Neural Information Processing Systems (pp. 561-568). Vancouver, BC. Cambridge, MA: MIT Press.Google Scholar
- Ankerst, M., Breunig, M. M., Kriegel, H.-P., & Sander, J. (1999). OPTICS: Ordering points to identify the clustering structure. In Proceedings of the ACM SIGMOD International Conference on Management of Data (pp. 49-60). New York: ACM Press. Google Scholar
- Appelt, D. (1999). An introduction to information extraction. Artificial Intelligence Communications, 12(3), 161-172. Google ScholarDigital Library
- Arthur, D., & Vassilvitskii, S. (2007). K-means++: The advantages of careful seeding. In Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms (pp. 1027-1035). New Orleans. Philadelphia: Society for Industrial and Applied Mathematics. Google Scholar
- Asuncion, A., & Newman, D. J. (2007). UCI Machine Learning Repository [http://www.ics.uci.edu/~mlearn/MLRepository.html]. Irvine: University of California, School of Information and Computer Science.Google Scholar
- Asmis, E. (1984). Epicurus' scientific method. Ithaca, NY: Cornell University Press.Google Scholar
- Atkeson, C. G., Schaal, S. A., & Moore, A. W. (1997). Locally weighted learning. AI Review, 11, 11-71. Google ScholarDigital Library
- Auer, P., & Ortner, R. (2004). A boosting approach to multiple instance learning. In Proceedings of the European Conference on Machine Learning (pp. 63-74). Pisa, Italy. Berlin: Springer-Verlag.Google Scholar
- Barnett, V., & Lewis, T. (1994). Outliers in Statistical Data. West Sussex, England: John Wiley, & Sons.Google Scholar
- Bay, S. D. (1999). Nearest neighbor classification from multiple feature subsets. Intelligent Data Analysis, 3(3), 191-209. Google ScholarCross Ref
- Bay, S. D., & Schwabacher, M. (2003). Near linear time detection of distance-based outliers and applications to security. In Proceedings of the Workshop on Data Mining for Counter Terrorism and Security. San Francisco. Philadelphia: Society for Industrial and Applied Mathematics.Google Scholar
- Bayes, T. (1763). An essay towards solving a problem in the doctrine of chances. Philosophical Transactions of the Royal Society of London, 53, 370-418.Google Scholar
- Beck, J. R., & Schultz, E. K. (1986). The use of ROC curves in test performance evaluation. Archives of Pathology and Laboratory Medicine, 110, 13-20.Google Scholar
- Bergadano, F., & Gunetti, D. (1996). Inductive logic programming: From machine learning to software engineering. Cambridge, MA: MIT Press. Google Scholar
- Berry, M. J. A., & Linoff, G. (1997). Data mining techniques for marketing, sales, and customer support. New York: John Wiley. Google Scholar
- Beygelzimer, A., Kakade, S., & Langford, J. (2006). Cover trees for nearest neighbor. In Proceedings of the 23rd International Conference on Machine Learning (pp. 97-104). New York: ACM Press. Google Scholar
- Bifet, A., Holmes, G., Kirkby, R., & Pfahringer, B. (2010). MOA: Massive online analysis. Journal of Machine Learning Research, 9, 1601-1604. Google Scholar
- Bigus, J. P. (1996). Data mining with neural networks. New York: McGraw-Hill. Google Scholar
- Bishop, C. M. (1995). Neural networks for pattern recognition. New York: Oxford University Press. Google Scholar
- Bishop, C. M. (2006). Pattern recognition and machine learning. Springer-Verlag. Google Scholar
- BLI (Bureau of Labour Information) (1988). Collective Bargaining Review (November). Ottawa: Labour Canada, Bureau of Labour Information.Google Scholar
- Blockeel, H., Page, D., & Srinivasan, A. (2005). Multi-instance tree learning. In Proceedings of the 22nd International Conference on Machine Learning (pp. 57-64). Bonn. New York: ACM Press. Google Scholar
- Blum, A., & Mitchell, T. (1998). Combining labeled and unlabeled data with co-training. In Proceedings of the Eleventh Annual Conference on Computational Learning Theory (pp. 92-100). Madison, WI. San Francisco: Morgan Kaufmann. Google Scholar
- Bouckaert, R. R. (1995). Bayesian belief networks: From construction to inference. Ph.D. Dissertation, Computer Science Department, University of Utrecht, The Netherlands.Google Scholar
- Bouckaert, R. R. (2004). Bayesian network classifiers in Weka. Working Paper 14/2004, Department of Computer Science, University of Waikato, New Zealand.Google Scholar
- Bouckaert, R. R. (2010). DensiTree: Making sense of sets of phylogenetic trees. Bioinformatics, 26(10), 1372-1373. Google ScholarDigital Library
- Brachman, R. J., & Levesque, H. J. (Eds.) (1985). Readings in knowledge representation. San Francisco: Morgan Kaufmann. Google Scholar
- Brefeld, U., & Scheffer, T. (2004). Co-EM support vector learning. In R. Greiner, & D. Schuurmans (Eds.), Proceedings of the Twenty-First International Conference on Machine Learning (pp. 121-128). Banff, AB. New York: ACM Press. Google Scholar
- Breiman, L. (1996a). Stacked regression. Machine Learning, 24(1), 49-64. Google ScholarDigital Library
- Breiman, L. (1996b). Bagging predictors. Machine Learning, 24(2), 123-140. Google ScholarDigital Library
- Breiman, L. (1996c). [Bias, variance, and] arcing classifiers. Technical Report 460. Department of Statistics, University of California, Berkeley.Google Scholar
- Breiman, L. (1999). Pasting small votes for classification in large databases and online. Machine Learning, 36(1-2), 85-103. Google ScholarCross Ref
- Breiman, L. (2001). Random forests. Machine Learning, 45(1), 5-32. Google ScholarDigital Library
- Breiman, L., Friedman, J. H., Olshen, R. A., & Stone, C. J. (1984). Classification and regression trees. Monterey, CA: Wadsworth.Google Scholar
- Brin, S., Motwani, R., Ullman, J. D., & Tsur, S. (1997). Dynamic itemset counting and implication rules for market basket data. ACM SIGMOD Record, 26(2), 255-264. Google ScholarDigital Library
- Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertext search engine. Computer Networks and ISDN Systems, 33, 107-117. Google ScholarDigital Library
- Brodley, C. E., & Friedl, M. A. (1996). Identifying and eliminating mislabeled training instances. In Proceedings of the Thirteenth National Conference on Artificial Intelligence (pp. 799-805). Portland, OR. Menlo Park, CA: AAAI Press. Google Scholar
- Brownstown, L., Farrell, R., Kant, E., & Martin, N. (1985). Programming expert systems in OPS5. Reading, MA: Addison-Wesley. Google Scholar
- Buntine, W. (1992). Learning classification trees. Statistics and Computing, 2(2), 63-73.Google ScholarCross Ref
- Burges, C. J. C. (1998). A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2(2), 121-167. Google ScholarDigital Library
- Cabena, P., Hadjinian, P., Stadler, R., Verhees, J., & Zanasi, A. (1998). Discovering data mining: From concept to implementation. Upper Saddle River, NJ: Prentice-Hall. Google Scholar
- Cardie, C. (1993). Using decision trees to improve case-based learning. In P. Utgoff (Ed.), Proceedings of the Tenth International Conference on Machine Learning (pp. 25-32). Amherst, MA. San Francisco: Morgan Kaufmann.Google Scholar
- Califf, M. E., & Mooney, R. J. (1999). Relational learning of pattern-match rules for information extraction. In Proceedings of the Sixteenth National Conference on Artificial Intelligence (pp. 328-334). Orlando. Menlo Park, CA: AAAI Press. Google Scholar
- Cavnar, W. B., & Trenkle, J. M. (1994). N-Gram-based text categorization. In Proceedings of the Third Symposium on Document Analysis and Information Retrieval (pp. 161-175). Las Vegas: UNLV Publications/Reprographics.Google Scholar
- Ceglar, A., & Roddick, J. F. (2006). Association mining. ACM Computing Surveys, 38(2). New York: ACM Press. Google Scholar
- Cendrowska, J. (1987). PRISM: An algorithm for inducing modular rules. International Journal of Man-Machine Studies, 27(4), 349-370.Google Scholar
- Chakrabarti, S. (2003). Mining the web: discovering knowledge from hypertext data. San Francisco: Morgan Kaufmann. Google Scholar
- Chang, C.-C., & Lin, C.-J. (2001). LIBSVM: A library for support vector machines. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm. Google Scholar
- Chawla, N. V., Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). SMOTE: Synthetic minority over-sampling technique. Journal of Artificial Intelligence, 16, 321-357. Google ScholarDigital Library
- Cheeseman, P., & Stutz, J. (1995). Bayesian classification (AutoClass): Theory and results. In U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, & R. Uthurusamy (Eds.), Advances in Knowledge Discovery and Data Mining (pp. 153-180). Menlo Park, CA: AAAI Press. Google Scholar
- Chen, M. S., Jan, J., & Yu, P. S. (1996). Data mining: An overview from a database perspective. IEEE Transactions on Knowledge and Data Engineering, 8(6), 866-883. Google ScholarDigital Library
- Chen, Y., Bi, J., & Wang, J. Z. (2006). MILES: Multiple-instance learning via embedded instance selection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(12), 1931-1947. Google ScholarDigital Library
- Cherkauer, K. J., & Shavlik, J. W. (1996). Growing simpler decision trees to facilitate knowledge discovery. In E. Simoudis, J. W. Han, & U. Fayyad (Eds.), Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (pp. 315-318). Portland, OR. Menlo Park, CA: AAAI Press.Google Scholar
- Chevaleyre, Y., & Zucker, J.-D. (2001). Solving multiple-instance and multiple-part learning problems with decision trees and rule sets: Application to the mutagenesis problem. In Proceedings of the Biennial Conference of the Canadian Society for Computational Studies of Intelligence (pp. 204-214). Ottawa. Berlin: Springer-Verlag. Google Scholar
- Cleary, J. G., & Trigg, L. E. (1995). K*: An instance-based learner using an entropic distance measure. In A. Prieditis, & S. Russell (Eds.), Proceedings of the Twelfth International Conference on Machine Learning (pp. 108-114). Tahoe City, CA. San Francisco: Morgan Kaufmann.Google Scholar
- Cohen, J. (1960). A coefficient of agreement for nominal scales. Educational and Psychological Measurement, 20, 37-46.Google Scholar
- Cohen, W. W. (1995). Fast effective rule induction. In A. Prieditis, & S. Russell (Eds.), Proceedings of the Twelfth International Conference on Machine Learning (pp. 115-123). Tahoe City, CA. San Francisco: Morgan Kaufmann.Google Scholar
- Cooper, G. F., & Herskovits, E. (1992). A Bayesian method for the induction of probabilistic networks from data. Machine Learning, 9(4), 309-347. Google ScholarDigital Library
- Cortes, C., & Vapnik, V. (1995). Support vector networks. Machine Learning, 20(3), 273-297. Google ScholarDigital Library
- Cover, T. M., & Hart, P. E. (1967). Nearest neighbor pattern classification. IEEE Transactions on Information Theory, IT-13, 21-27. Google ScholarDigital Library
- Cristianini, N., & Shawe-Taylor, J. (2000). An introduction to support vector machines and other kernel-based learning methods. Cambridge, UK: Cambridge University Press. Google Scholar
- Cypher, A. (Ed.), (1993). Watch what I do: Programming by demonstration. Cambridge, MA: MIT Press. Google Scholar
- Dasgupta, S. (2002). Performance guarantees for hierarchical clustering. In J. Kivinen, & R. H. Sloan (Eds.), Proceedings of the Fifteenth Annual Conference on Computational Learning Theory (pp. 351-363). Sydney. Berlin: Springer-Verlag. Google Scholar
- Dasu, T., Koutsofios, E., & Wright, J. (2006). Zen and the art of data mining. In Proceedings of the KDD Workshop on Data Mining for Business Applications (pp. 37-43). Philadelphia. Proceedings at: http://labs.accenture.com/kdd2006_workshop/dmba_proceedings.pdfGoogle Scholar
- Datta, S., Kargupta, H., & Sivakumar, K. (2003). Homeland defense, privacy-sensitive data mining, and random value distortion. In Proceedings of the Workshop on Data Mining for Counter Terrorism and Security. San Francisco. Philadelphia: Society for International and Applied Mathematics.Google Scholar
- Day, W. H. E., & Edelsbrünner, H. (1984). Efficient algorithms for agglomerative hierarchical clustering methods. Journal of Classification, 1(1), 7-24.Google Scholar
- Demiroz, G., & Guvenir, A. (1997). Classification by voting feature intervals. In M. van Someren, & G. Widmer (Eds.), Proceedings of the Ninth European Conference on Machine Learning (pp. 85-92). Prague. Berlin: Springer-Verlag. Google Scholar
- de Raedt, L. (2008). Logical and relational learning. New York: Springer-Verlag. Google Scholar
- Devroye, L., Györfi, L., & Lugosi, G. (1996). A probabilistic theory of pattern recognition. New York: Springer-Verlag.Google Scholar
- Dhar, V., & Stein, R. (1997). Seven methods for transforming corporate data into business intelligence. Upper Saddle River, NJ: Prentice-Hall. Google Scholar
- Diederich, J., Kindermann, J., Leopold, E., & Paass, G. (2003). Authorship attribution with support vector machines. Applied Intelligence, 19(1), 109-123. Google ScholarCross Ref
- Dietterich, T. G. (2000). An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization. Machine Learning, 40(2), 139-158. Google ScholarDigital Library
- Dietterich, T. G., & Bakiri, G. (1995). Solving multiclass learning problems via errorcorrecting output codes. Journal of Artificial Intelligence Research, 2, 263-286. Google ScholarDigital Library
- Dietterich, T. G., & Kong, E. B. (1995). Error-correcting output coding corrects bias and variance. In Proceedings of the Twelfth International Conference on Machine Learning (pp. 313-321). Tahoe City, CA. San Francisco: Morgan Kaufmann.Google Scholar
- Dietterich, T. G., Lathrop, R. H., & Lozano-Perez, T. (1997). Solving the multiple-instance problem with axis-parallel rectangles. Artificial Intelligence Journal, 89(1-2), 31-71. Google ScholarDigital Library
- Domingos, P. (1997). Knowledge acquisition from examples via multiple models. In D. H. Fisher (Ed.), Proceedings of the Fourteenth International Conference on Machine Learning (pp. 98-106). Nashville. San Francisco: Morgan Kaufmann. Google Scholar
- Domingos, P. (1999). MetaCost: A general method for making classifiers cost-sensitive. In U. M. Fayyad, S. Chaudhuri, & D. Madigan (Eds.), Proceedings of the Fifth International Conference on Knowledge Discovery and Data Mining (pp. 155-164). San Diego. New York: ACM Press. Google Scholar
- Domingos, P., & Hulten, G. (2000). Mining high-speed data streams. In International Conference on Knowledge Discovery and Data Mining (pp. 71-80). Boston. New York: ACM Press. Google ScholarDigital Library
- Dong, L., Frank, E., & Kramer, S. (2005). Ensembles of balanced nested dichotomies for multi-class problems. In Proceedings of the Ninth European Conference on Principles and Practice of Knowledge Discovery in Databases (pp. 84-95). Porto, Portugal. Berlin: Springer-Verlag. Google Scholar
- Dougherty, J., Kohavi, R., & Sahami, M. (1995). Supervised and unsupervised discretization of continuous features. In A. Prieditis, & S. Russell (Eds.), Proceedings of the Twelfth International Conference on Machine Learning (pp. 194-202). Tahoe City, CA. San Francisco: Morgan Kaufmann.Google Scholar
- Drucker, H. (1997). Improving regressors using boosting techniques. In D. H. Fisher (Ed.), Proceedings of the Fourteenth International Conference on Machine Learning (pp. 107- 115). Nashville. San Francisco: Morgan Kaufmann. Google Scholar
- Drummond, C., & Holte, R. C. (2000). Explicitly representing expected cost: An alternative to ROC representation. In R. Ramakrishnan, S. Stolfo, R. Bayardo, & I. Parsa (Eds.), Proceedings of the Sixth International Conference on Knowledge Discovery and Data Mining (pp. 198-207). Boston. New York: ACM Press. Google Scholar
- Duda, R. O., & Hart, P. E. (1973). Pattern classification and scene analysis. New York: John Wiley.Google Scholar
- Duda, R. O., Hart, P. E., & Stork, D. G. (2001). Pattern Classification (2nd ed.). New York: John Wiley. Google Scholar
- Dumais, S. T., Platt, J., Heckerman, D., & Sahami, M. (1998). Inductive learning algorithms and representations for text categorization. In Proceedings of the ACM Seventh International Conference on Information and Knowledge Management (pp. 148-155). Bethesda, MD. New York: ACM Press. Google Scholar
- Efron, B., & Tibshirani, R. (1993). An introduction to the bootstrap. London: Chapman and Hall.Google Scholar
- Egan, J. P. (1975). Signal detection theory and ROC analysis. Series in Cognition and Perception. New York: Academic Press.Google Scholar
- Ester, M., Kriegel, H.-P., Sander, J., & Xu, X. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96) (pp. 226-231). Menlo Park, CA: AAAI Press.Google Scholar
- Fan, R.-E., Chang, K.-W., Hsieh, C.-J., Wang, X.-R., & Lin, C.-J. (2008). LIBLINEAR: A library for large linear classification. Journal of Machine Learning Research, 9, 1871-1874. Google ScholarDigital Library
- Fayyad, U. M., & Irani, K. B. (1993). Multi-interval discretization of continuous-valued attributes for classification learning. In Proceedings of the Thirteenth International Joint Conference on Artificial Intelligence (pp. 1022-1027). Chambery, France. San Francisco: Morgan Kaufmann.Google Scholar
- Fayyad, U. M., & Smyth, P. (1995). From massive datasets to science catalogs: Applications and challenges. In Proceedings of the Workshop on Massive Datasets (pp. 129-141). Washington, DC: NRC, Committee on Applied and Theoretical Statistics.Google Scholar
- Fayyad, U. M., Piatetsky-Shapiro, G., Smyth, P., & Uthurusamy, R. (Eds.), (1996). Advances in knowledge discovery and data mining. Menlo Park, CA: AAAI Press/MIT Press. Google Scholar
- Fisher, D. (1987). Knowledge acquisition via incremental conceptual clustering. Machine Learning, 2(2), 139-172. Google ScholarDigital Library
- Fisher, R. A. (1936). The use of multiple measurements in taxonomic problems. Annual Eugenics, 7 (part II), 179-188. Reprinted in Contributions to Mathematical Statistics, 1950. New York: John Wiley.Google Scholar
- Fix, E., & Hodges, J. L. Jr. (1951). Discriminatory analysis; non-parametric discrimination: Consistency properties. Technical Report 21-49-004(4), USAF School of Aviation Medicine, Randolph Field, TX.Google Scholar
- Flach, P. A., & Lachiche, N. (1999). Confirmation-guided discovery of first-order rules with Tertius. Machine Learning, 42, 61-95. Google ScholarCross Ref
- Fletcher, R. (1987). Practical methods of optimization (2nd ed.). New York: John Wiley. Google Scholar
- Foulds, J., & Frank, E. (2008). Revisiting multiple-instance learning via embedded instance selection. In Proceedings of the Australasian Joint Conference on Artificial Intelligence (pp. 300-310). Auckland. Berlin: Springer-Verlag. Google Scholar
- Foulds, J., & Frank, E. (2010). A review of multi-instance learning assumptions. Knowledge Engineering Review, 25(1), 1-25. Google ScholarDigital Library
- Fradkin, D., & Madigan, D. (2003). Experiments with random projections for machine learning. In L. Getoor, T. E. Senator, P. Domingos, & C. Faloutsos (Eds.), Proceedings of the Ninth International Conference on Knowledge Discovery and Data Mining (pp. 517-522). Washington, DC. New York: ACM Press. Google Scholar
- Frank E. (2000). Pruning decision trees and lists. Ph.D. Dissertation, Department of Computer Science, University of Waikato, New Zealand.Google Scholar
- Frank, E., & Hall, M. (2001). A simple approach to ordinal classification. In L. de Raedt, & P. A. Flach (Eds.), Proceedings of the Twelfth European Conference on Machine Learning (pp. 145-156). Freiburg, Germany. Berlin: Springer-Verlag. Google Scholar
- Frank, E., Hall, M., & Pfahringer, B. (2003). Locally weighted Naïve Bayes. In U. Kjærulff, & C. Meek (Eds.), Proceedings of the Nineteenth Conference on Uncertainty in Artificial Intelligence (pp. 249-256). Acapulco. San Francisco: Morgan Kaufmann. Google Scholar
- Frank, E., Holmes, G., Kirkby, R., & Hall, M. (2002). Racing Committees for Large Datasets. In S. Lange, K. Satoh, & C. H. Smith (Eds.), Proceedings of the Fifth International Conference on Discovery Science (pp. 153-164). Lübeck, Germany. Berlin: Springer-Verlag. Google Scholar
- Frank, E., & Kramer, S. (2004). Ensembles of nested dichotomies for multi-class problems. In Proceedings of the Twenty-First International Conference on Machine Learning (pp. 305-312). Banff, AB. New York: ACM Press. Google Scholar
- Frank, E., Paynter, G. W., Witten, I. H., Gutwin, C., & Nevill-Manning, C. G. (1999). Domainspecific key phrase extraction. In Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence (pp. 668-673). Stockholm. San Francisco: Morgan Kaufmann. Google Scholar
- Frank, E., Wang, Y., Inglis, S., Holmes, G., & Witten, I. H. (1998). Using model trees for classification. Machine Learning, 32(1), 63-76. Google ScholarDigital Library
- Frank, E., & Witten, I. H. (1998). Generating accurate rule sets without global optimization. In J. Shavlik (Ed.), Proceedings of the Fifteenth International Conference on Machine Learning (pp. 144-151). Madison, WI. San Francisco: Morgan Kaufmann. Google Scholar
- Frank, E., & Witten, I. H. (1999). Making better use of global discretization. In I. Bratko, & S. Dzeroski (Eds.), Proceedings of the Sixteenth International Conference on Machine Learning (pp. 115- 123). Bled, Slovenia. San Francisco: Morgan Kaufmann. Google Scholar
- Frank, E., & Xu, X. (2003). Applying propositional learning algorithms to multi-instance data. Technical Report 06/03, Department of Computer Science, University of Waikato, New Zealand.Google Scholar
- Freitag, D. (2002). Machine learning for information extraction in informal domains. Machine Learning, 39(2/3), 169-202. Google ScholarCross Ref
- Freund, Y., & Mason, L. (1999). The alternating decision tree learning algorithm. In I. Bratko, & S. Dzeroski (Eds.), Proceedings of the Sixteenth International Conference on Machine Learning (pp. 124-133). Bled, Slovenia. San Francisco: Morgan Kaufmann. Google Scholar
- Freund, Y., & Schapire, R. E. (1996). Experiments with a new boosting algorithm. In L. Saitta (Ed.), Proceedings of the Thirteenth International Conference on Machine Learning (pp. 148-156). Bari, Italy. San Francisco: Morgan Kaufmann.Google Scholar
- Freund, Y., & Schapire, R. E. (1999). Large margin classification using the perceptron algorithm. Machine Learning, 37(3), 277-296. Google ScholarDigital Library
- Friedman, J. H. (1996). Another approach to polychotomous classification. Technical report, Department of Statistics, Stanford University, Stanford, CA.Google Scholar
- Friedman, J. H. (2001). Greedy function approximation: A gradient boosting machine. Annals of Statistics, 29(5), 1189-1232.Google ScholarDigital Library
- Friedman, J. H., Bentley, J. L., & Finkel, R. A. (1977). An algorithm for finding best matches in logarithmic expected time. ACM Transactions on Mathematical Software, 3(3), 209-266. Google ScholarDigital Library
- Friedman, J. H., Hastie, T., & Tibshirani, R. (2000). Additive logistic regression: A statistical view of boosting. Annals of Statistics, 28(2), 337-374.Google Scholar
- Friedman, N., Geiger, D., & Goldszmidt, M. (1997). Bayesian Network Classifiers. Machine Learning, 29(2), 131-163. Google ScholarDigital Library
- Fulton, T., Kasif, S., & Salzberg, S. (1995). Efficient algorithms for finding multiway splits for decision trees. In A. Prieditis, & S. Russell (Eds.), Proceedings of the Twelfth International Conference on Machine Learning (pp. 244-251). Tahoe City, CA. San Francisco: Morgan Kaufmann.Google Scholar
- Fürnkranz, J. (2002). Round robin classification. Journal of Machine Learning Research, 2, 721-747. Google ScholarDigital Library
- Fürnkranz, J. (2003). Round robin ensembles. Intelligent Data Analysis, 7(5), 385-403. Google ScholarDigital Library
- Fürnkranz, J., & Flach, P. A. (2005). ROC 'n' rule learning: Towards a better understanding of covering algorithms. Machine Learning, 58(1), 39-77. Google ScholarDigital Library
- Fürnkranz, J., & Widmer, G. (1994). Incremental reduced-error pruning. In H. Hirsh, & W. Cohen (Eds.), Proceedings of the Eleventh International Conference on Machine Learning (pp. 70-77). New Brunswick, NJ. San Francisco: Morgan Kaufmann.Google Scholar
- Gaines, B. R., & Compton, P. (1995). Induction of ripple-down rules applied to modeling large data bases. Journal of Intelligent Information Systems, 5(3), 211-228. Google ScholarDigital Library
- Gama, J. (2004). Functional trees. Machine Learning, 55(3), 219-250. Google ScholarDigital Library
- Gärtner, T., Flach, P. A., Kowalczyk, A., & Smola, A. J. (2002). Multi-instance kernels. In Proceedings of the International Conference on Machine Learning (pp. 179-186). Sydney. San Francisco: Morgan Kaufmann. Google Scholar
- Genkin, A., Lewis, D. D., & Madigan, D. (2007). Large-scale Bayesian logistic regression for text categorization. Technometrics, 49(3), 291-304.Google Scholar
- Gennari, J. H., Langley, P., & Fisher, D. (1990). Models of incremental concept formation. Artificial Intelligence, 40, 11-61. Google ScholarDigital Library
- Ghani, R. (2002). Combining labeled and unlabeled data for multiclass text categorization. In C. Sammut, & A. Hoffmann (Eds.), Proceedings of the Nineteenth International Conference on Machine Learning (pp. 187-194). Sydney. San Francisco: Morgan Kaufmann. Google Scholar
- Gilad-Bachrach, R., Navot, A., & Tishby, N. (2004). Margin based feature selection: Theory and algorithms. In R. Greiner, & D. Schuurmans (Eds.), Proceedings of the Twenty-First International Conference on Machine Learning (pp. 337-344). Banff, AB. New York: ACM Press. Google Scholar
- Giraud-Carrier, C. (1996). FLARE: Induction with prior knowledge. In J. Nealon, & J. Hunt (Eds.), Research and Development in Expert Systems XIII (pp. 11-24). Cambridge, England: SGES Publications.Google Scholar
- Gluck, M., & Corter, J. (1985). Information, uncertainty and the utility of categories. In Proceedings of the Annual Conference of the Cognitive Science Society (pp. 283-287). Irvine, CA. Hillsdale, NJ: Lawrence Erlbaum.Google Scholar
- Goldberg, D. E. (1989). Genetic algorithms in search, optimization and machine learning. Reading, MA: Addison-Wesley. Google Scholar
- Good P. (1994). Permutation tests: A practical guide to resampling methods for testing hypotheses. New York: Springer-Verlag.Google Scholar
- Grossman, D., & Domingos, P. (2004). Learning Bayesian network classifiers by maximizing conditional likelihood. In R. Greiner, & D. Schuurmans (Eds.), Proceedings of the Twenty-First International Conference on Machine Learning (pp. 361-368). Banff, AB. New York: ACM Press. Google Scholar
- Groth, R. (1998). Data mining: A hands-on approach for business professionals. Upper Saddle River, NJ: Prentice-Hall. Google Scholar
- Guo, Y., & Greiner, R. (2004). Discriminative model selection for belief net structures. Canada: Department of Computing Science, TR04-22, University of Alberta.Google Scholar
- Gütlein, M., Frank, E., Hall, M., & Karwath, A. (2009). Large-scale attribute selection using wrappers. In Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining (pp. 332-339). Nashville. Washington, DC: IEEE Computer Society.Google Scholar
- Guyon, I., Weston, J., Barnhill, S., & Vapnik, V. (2002). Gene selection for cancer classification using support vector machines. Machine Learning, 46(1-3), 389-422. Google ScholarDigital Library
- Hall, M. (2000). Correlation-based feature selection for discrete and numeric class machine learning. In P. Langley (Ed.), Proceedings of the Seventeenth International Conference on Machine Learning (pp. 359-366). Stanford, CA. San Francisco: Morgan Kaufmann. Google Scholar
- Hall, M., Holmes, G., & Frank, E. (1999). Generating rule sets from model trees. In N. Y. Foo (Ed.), Proceedings of the Twelfth Australian Joint Conference on Artificial Intelligence (pp. 1-12). Sydney. Berlin: Springer-Verlag. Google Scholar
- Hall, M., & Frank, E. (2008). Combining Naïve Bayes and decision tables. In Proceedings of the 21st Florida Artificial Intelligence Research Society Conference (pp. 318-319). Miami. Menlo Park, CA: AAAI Press.Google Scholar
- Han, J., Pei, J., & Yin, Y. (2000). Mining frequent patterns without candidate generation. In Proceedings of the ACM-SIGMOD International Conference on Management of Data (pp. 1-12). Dallas. New York: ACM Press. Google ScholarDigital Library
- Han, J., Pei, J., Yin, Y., & Mao, R. (2004). Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data Mining and Knowledge Discovery, 8(1), 53-87. Google ScholarDigital Library
- Han, J., & Kamber, M. (2006). Data mining: Concepts and techniques (2nd ed.). San Francisco: Morgan Kaufmann. Google Scholar
- Hand, D. J. (2006). Classifier Technology and the Illusion of Progress. Statistical Science, 21(1), 1-14.Google ScholarCross Ref
- Hand, D. J., Manilla, H., & Smyth, P. (2001). Principles of Data Mining. Cambridge, MA: MIT Press. Google Scholar
- Hartigan, J. A. (1975). Clustering algorithms. New York: John Wiley. Google Scholar
- Hastie, T., & Tibshirani, R. (1998). Classification by pairwise coupling. Annals of Statistics, 26(2), 451-471.Google ScholarDigital Library
- Hastie, T., Tibshirani, R., & Friedman, J. (2009). The elements of statistical learning (2nd ed.). New York: Springer-Verlag.Google Scholar
- Heckerman, D., Geiger, D., & Chickering, D. M. (1995). Learning Bayesian networks: The combination of knowledge and statistical data. Machine Learning, 20(3), 197-243. Google ScholarDigital Library
- Hempstalk, K., Frank, E., & Witten, I. H. (2008). One-class classification by combining density and class probability estimation. In Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (pp. 505-519). Antwerp. Berlin: Springer-Verlag. Google Scholar
- Hempstalk, K., & Frank, E. (2008). Discriminating against new classes: One-class versus multi-class classification. In Proceedings of the Twenty-first Australasian Joint Conference on Artificial Intelligence. Auckland (pp. 225-236). New York: Springer-Verlag. Google Scholar
- Ho, T. K. (1998). The random subspace method for constructing decision forests. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(8), 832-844. Google ScholarDigital Library
- Hochbaum, D. S., & Shmoys, D. B. (1985). A best possible heuristic for the k-center problem. Mathematics of Operations Research, 10(2), 180-184.Google ScholarDigital Library
- Hoerl, A. E., & Kennard, R. W. (1970). Ridge regression: applications to nonorthogonal problems. Technometrics, 12(1), 69-82.Google ScholarDigital Library
- Holmes, G., & Nevill-Manning, C. G. (1995). Feature selection via the discovery of simple classification rules. In G. E. Lasker, & X. Liu (Eds.), Proceedings of the International Symposium on Intelligent Data Analysis (pp. 75-79). Baden-Baden, Germany: International Institute for Advanced Studies in Systems Research and Cybernetics. Baden-Baden. Windsor, Ont: International Institute for Advanced Studies in Systems Research and Cybernetics.Google Scholar
- Holmes, G., Pfahringer, B., Kirkby, R., Frank, E., & Hall, M. (2002). Multiclass alternating decision trees. In T. Elomaa, H. Mannila, & H. Toivonen (Eds.), Proceedings of the Thirteenth European Conference on Machine Learning (pp. 161-172). Helsinki. Berlin: Springer-Verlag. Google Scholar
- Holte, R. C. (1993). Very simple classification rules perform well on most commonly used datasets. Machine Learning, 11, 63-91. Google ScholarDigital Library
- Huffman, S. B. (1996). Learning information extraction patterns from examples. In S. Wertmer, E. Riloff, & G. Scheler (Eds.), Connectionist, statistical, and symbolic approaches to learning for natural language processing (pp. 246-260). Berlin: Springer-Verlag. Google Scholar
- Jabbour, K., Riveros, J. F. V., Landsbergen, D., & Meyer, W. (1988). ALFA: Automated load forecasting assistant. IEEE Transactions on Power Systems, 3(3), 908-914.Google ScholarCross Ref
- Jiang, L., & Zhang, H. (2006). Weightily averaged one-dependence estimators. In Proceedings of the 9th Biennial Pacific Rim International Conference on Artificial Intelligence (pp. 970-974). Guilin, China. Berlin: Springer-Verlag. Google Scholar
- John, G. H. (1995). Robust decision trees: Removing outliers from databases. In U. M. Fayyad, & R. Uthurusamy (Eds.), Proceedings of the First International Conference on Knowledge Discovery and Data Mining (pp. 174-179). Montreal. Menlo Park, CA: AAAI Press.Google Scholar
- John, G. H. (1997). Enhancements to the data mining process. Ph.D. Dissertation, Computer Science Department, Stanford University, Stanford, CA. Google Scholar
- John, G. H., Kohavi, R., & Pfleger, P. (1994). Irrelevant features and the subset selection problem. In H. Hirsh, & W. Cohen (Eds.), Proceedings of the Eleventh International Conference on Machine Learning (pp. 121-129). New Brunswick, NJ. San Francisco: Morgan Kaufmann.Google Scholar
- John, G. H., & Langley, P. (1995). Estimating continuous distributions in Bayesian classifiers. In P. Besnard, & S. Hanks (Eds.), Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence (pp. 338-345). Montreal. San Francisco: Morgan Kaufmann. Google Scholar
- Johns, M. V. (1961). An empirical Bayes approach to nonparametric two-way classification. In H. Solomon (Ed.), Studies in item analysis and prediction. Palo Alto, CA: Stanford University Press.Google Scholar
- Kass, R., & Wasserman, L. (1995). A reference Bayesian test for nested hypotheses and its relationship to the Schwarz criterion. Journal of the American Statistical Association, 90, 928-934.Google ScholarCross Ref
- Keerthi, S. S., Shevade, S. K., Bhattacharyya, C., & Murthy, K. R. K. (2001). Improvements to Platt's SMO algorithm for SVM classifier design. Neural Computation, 13(3), 637-649. Google ScholarDigital Library
- Kerber, R. (1992). Chimerge: Discretization of numeric attributes. In W. Swartout (Ed.), Proceedings of the Tenth National Conference on Artificial Intelligence (pp. 123-128). San Jose, CA. Menlo Park, CA: AAAI Press. Google Scholar
- Kibler, D., & Aha, D. W. (1987). Learning representative exemplars of concepts: An initial case study. In P. Langley (Ed.), Proceedings of the Fourth Machine Learning Workshop (pp. 24-30). Irvine, CA. San Francisco: Morgan Kaufmann.Google Scholar
- Kimball, R., & Ross, M. (2002). The data warehouse toolkit (2nd ed.). New York: John Wiley. Google Scholar
- Kira, K., & Rendell, L. (1992). A practical approach to feature selection. In D. Sleeman, & P. Edwards (Eds.), Proceedings of the Ninth International Workshop on Machine Learning (pp. 249-258). Aberdeen, Scotland. San Francisco: Morgan Kaufmann. Google Scholar
- Kirkby, R. (2007). Improving Hoeffding trees. Ph.D. Dissertation, Department of Computer Science, University of Waikato, New Zealand.Google Scholar
- Kittler, J. (1978). Feature set search algorithms. In C. H. Chen (Ed.), Pattern recognition and signal processing (pp. 41-60). Amsterdam: Sijthoff an Noordhoff.Google Scholar
- Kivinen, J., Smola, A. J., & Williamson, R. C. (2002). Online learning with kernels. IEEE Transactions on Signal Processing, 52, 2165-2176. Google ScholarDigital Library
- Kleinberg, J. (1998). Authoritative sources in a hyperlinked environment. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (pp. 604-632). Extended version published in Journal of the ACM 46 (1999). Google ScholarDigital Library
- Koestler, A. (1964). The act of creation. London: Hutchinson.Google Scholar
- Kohavi, R. (1995a). A study of cross-validation and bootstrap for accuracy estimation and model selection. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence (pp. 1137-1143). Montreal. San Francisco: Morgan Kaufmann. Google Scholar
- Kohavi, R. (1995b). The power of decision tables. In N. Lavrac, & S. Wrobel (Eds.), Proceedings of the Eighth European Conference on Machine Learning (pp. 174-189). Iráklion, Crete. Berlin: Springer-Verlag. Google Scholar
- Kohavi, R. (1996). Scaling up the accuracy of Naïve Bayes classifiers: A decision-tree hybrid. In E. Simoudis, J. W. Han, & U. Fayyad (Eds.), Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (pp. 202-207). Portland, OR. Menlo Park, CA: AAAI Press.Google Scholar
- Kohavi, R., & John, G. H. (1997). Wrappers for feature subset selection. Artificial Intelligence, 97(1-2), 273-324. Google ScholarDigital Library
- Kohavi, R., & Kunz, C. (1997). Option decision trees with majority votes. In D. Fisher (Ed.), Proceedings of the Fourteenth International Conference on Machine Learning (pp. 161-191). Nashville. San Francisco: Morgan Kaufmann. Google Scholar
- Kohavi, R., & Provost, F. (Eds.), (1998). Machine learning: Special issue on applications of machine learning and the knowledge discovery process. Machine Learning, 30(2/3), 127-274.Google ScholarCross Ref
- Kohavi, R., & Sahami, M. (1996). Error-based and entropy-based discretization of continuous features. In E. Simoudis, J. W. Han, & U. Fayyad (Eds.), Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (pp. 114-119). Portland, OR. Menlo Park, CA: AAAI Press.Google Scholar
- Komarek, P., & Moore, A. (2000). A dynamic adaptation of AD-trees for efficient machine learning on large data sets. In P. Langley (Ed.), Proceedings of the Seventeenth International Conference on Machine Learning (pp. 495-502). Stanford, CA. San Francisco: Morgan Kaufmann. Google Scholar
- Kononenko, I. (1995). On biases in estimating multi-valued attributes. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence (pp. 1034-1040). Montreal. San Francisco: Morgan Kaufmann. Google Scholar
- Koppel, M., & Schler, J. (2004). Authorship verification as a one-class classification problem. In R. Greiner, & D. Schuurmans (Eds.), Proceedings of the Twenty-First International Conference on Machine Learning (pp. 489-495). Banff, AB. New York: ACM Press. Google Scholar
- Krogel, M.-A., & Wrobel, S. (2002). Feature selection for propositionalization. In Proceedings of the International Conference on Discovery Science (pp. 430-434). Lübeck, Germany. Berlin: Springer-Verlag. Google Scholar
- Kubat, M., Holte, R. C., & Matwin, S. (1998). Machine learning for the detection of oil spills in satellite radar images. Machine Learning, 30, 195-215. Google ScholarDigital Library
- Kuncheva, L. I., & Rodriguez, J. J. (2007). An experimental study on rotation forest ensembles. In Proceedings of the Seventh International Workshop on Multiple Classifier Systems (pp. 459-468). Prague. Berlin/Heidelberg: Springer-Verlag. Google Scholar
- Kushmerick, N., Weld, D. S., & Doorenbos, R. (1997). Wrapper induction for information extraction. In Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence (pp. 729-735). Nagoya, Japan. San Francisco: Morgan Kaufmann.Google Scholar
- Laguna, M., & Marti, R. (2003). Scatter search: Methodology and implementations in C. Dordrecht, The Netherlands: Kluwer Academic Press. Google Scholar
- Landwehr, N., Hall, M., & Frank, E. (2005). Logistic model trees. Machine Learning, 59(1-2), 161-205. Google ScholarDigital Library
- Langley, P. (1996). Elements of machine learning. San Francisco: Morgan Kaufmann. Google Scholar
- Langley, P., Iba, W., & Thompson, K. (1992). An analysis of Bayesian classifiers. In W. Swartout (Ed.), Proceedings of the Tenth National Conference on Artificial Intelligence (pp. 223-228). San Jose, CA. Menlo Park, CA: AAAI Press. Google Scholar
- Langley, P., & Sage, S. (1994). Induction of selective Bayesian classifiers. In R. L. de Mantaras, & D. Poole (Eds.), Proceedings of the Tenth Conference on Uncertainty in Artificial Intelligence (pp. 399-406). Seattle. San Francisco: Morgan Kaufmann. Google Scholar
- Langley, P., & Simon, H. A. (1995). Applications of machine learning and rule induction. Communications of the ACM, 38(11), 55-64. Google ScholarDigital Library
- Lavrac, N., Motoda, H., Fawcett, T., Holte, R., Langley, P., & Adriaans, P. (Eds.), (2004). Special issue on lessons learned from data mining applications and collaborative problem solving. Machine Learning, 57(1/2). Google Scholar
- Lawson, C. L., & Hanson, R. J. (1995). Solving least squares problems. Philadelphia: SIAM Publications.Google Scholar
- le Cessie, S., & van Houwelingen, J. C. (1992). Ridge estimators in logistic regression. Applied Statistics, 41(1), 191-201.Google Scholar
- Li, M., & Vitanyi, P. M. B. (1992). Inductive reasoning and Kolmogorov complexity. Journal of Computer and System Sciences, 44, 343-384. Google ScholarDigital Library
- Lieberman, H. (Ed.), (2001). Your wish is my command: Programming by example. San Francisco: Morgan Kaufmann.Google Scholar
- Littlestone, N. (1988). Learning quickly when irrelevant attributes abound: A new linear-threshold algorithm. Machine Learning, 2(4), 285-318. Google ScholarDigital Library
- Littlestone, N. (1989). Mistake bounds and logarithmic linear-threshold learning algorithms. Ph, D. Dissertation, University of California, Santa Cruz. Google Scholar
- Liu, B. (2009) Web data mining: Exploring hyperlinks, contents, and usage data. Berlin: Springer-Verlag. Google Scholar
- Liu, B., Hsu, W., & Ma, Y. M. (1998). Integrating classification and association rule mining. In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98) (pp. 80-86). New York. Menlo Park, CA: AAAI Press.Google Scholar
- Liu, H., & Setiono, R. (1996). A probabilistic approach to feature selection: A filter solution. In L. Saitta (Ed.), Proceedings of the Thirteenth International Conference on Machine Learning (pp. 319-327), Bari, Italy. San Francisco: Morgan Kaufmann.Google Scholar
- Liu, H., & Steiono, R. (1997). Feature selection via discretization. IEEE Transactions on Knowledge and Data Engineering, 9(4), 642-645. Google ScholarDigital Library
- Luan, J. (2002). Data mining and its applications in higher education. New directions for institutional research, 2002(113), 17-36.Google Scholar
- Mann, T. (1993). Library research models: A guide to classification, cataloging, and computers. New York: Oxford University Press.Google Scholar
- Marill, T., & Green, D. M. (1963). On the effectiveness of receptors in recognition systems. IEEE Transactions on Information Theory, 9(11), 11-17. Google ScholarDigital Library
- Maron, O. (1998). Learning from ambiguity. Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA. Google Scholar
- Maron, O., & Lozano-Peréz, T. (1997). A framework for multiple-instance learning. In Proceedings of the Conference on Neural Information Processing Systems (pp. 570-576). Denver. Cambridge, MA: MIT Press. Google Scholar
- Martin, B. (1995). Instance-based learning: Nearest neighbour with generalisation. M.Sc. Thesis, Department of Computer Science, University of Waikato, New Zealand.Google Scholar
- McCallum A., & Nigam, K. (1998). A comparison of event models for Naïve Bayes text classification. In Proceedings of the AAAI-98 Workshop on Learning for Text Categorization (pp. 41-48). Madison, WI. Menlo Park, CA: AAAI Press.Google Scholar
- Medelyan, O., & Witten, I. H. (2008). Domain independent automatic keyphrase indexing with small training sets. Journal of the American Society for Information Science and Technology, 59, 1026-1040. Google ScholarDigital Library
- Mehta, M., Agrawal, R., & Rissanen, J. (1996). SLIQ: A fast scalable classifier for data mining. In P. Apers, M. Bouzeghoub, & G. Gardarin (Eds.), Proceedings of the Fifth International Conference on Extending Database Technology (pp. 18-32). Avignon, France. New York: Springer-Verlag. Google Scholar
- Melville, P., & Mooney, R. J. (2005). Creating diversity in ensembles using artificial data. Information Fusion, 6(1), 99-111.Google Scholar
- Michalski, R. S., & Chilausky, R. L. (1980). Learning by being told and learning from examples: An experimental comparison of the two methods of knowledge acquisition in the context of developing an expert system for soybean disease diagnosis. International Journal of Policy Analysis and Information Systems, 4(2).Google Scholar
- Michie, D. (1989). Problems of computer-aided concept formation. In J. R. Quinlan (Ed.), Applications of expert systems (Vol. 2) (pp. 310-333). Wokingham, UK: Addison-Wesley.Google Scholar
- Minsky, M., & Papert, S. (1969). Perceptrons. Cambridge, MA: MIT Press.Google Scholar
- Mitchell, T. M. (1997). Machine Learning. New York: McGraw-Hill. Google Scholar
- Mitchell T. M., Caruana, R., Freitag, D., McDermott, J., & Zabowski, D. (1994). Experience with a learning personal assistant. Communications of the ACM, 37 (7), 81-91. Google ScholarDigital Library
- Moore, A. W. (1991). Efficient memory-based learning for robot control. Ph.D. Dissertation, Computer Laboratory, University of Cambridge, UK.Google Scholar
- Moore, A. W. (2000). The anchors hierarchy: Using the triangle inequality to survive high-dimensional data. In C. Boutilier, & M. Goldszmidt (Eds.), Proceedings of the Sixteenth Conference on Uncertainty in Artificial Intelligence (pp. 397-405). Stanford, CA. San Francisco: Morgan Kaufmann. Google Scholar
- Moore, A. W., & Lee, M. S. (1994). Efficient algorithms for minimizing cross validation error. In W. W. Cohen, & H. Hirsh (Eds.), Proceedings of the Eleventh International Conference on Machine Learning (pp. 190-198). New Brunswick, NJ. San Francisco: Morgan Kaufmann.Google Scholar
- Moore, A. W. & Lee, M. S. (1998). Cached sufficient statistics for efficient machine learning with large datasets. Journal Artificial Intelligence Research, 8, 67-91. Google ScholarDigital Library
- Moore, A. W., & Pelleg, D. (2000). X-means: Extending k-means with efficient estimation of the number of clusters. In P. Langley (Ed.), Proceedings of the Seventeenth International Conference on Machine Learning (pp. 727-734). Stanford, CA. San Francisco: Morgan Kaufmann. Google Scholar
- Mutter, S., Hall, M., & Frank, E. (2004). Using classification to evaluate the output of confidence-based association rule mining. In Proceedings of the Seventeenth Australian Joint Conference on Artificial Intelligence (pp. 538-549). Cairns, Australia. Berlin: Springer-Verlag. Google Scholar
- Nadeau, C., & Bengio, Y. (2003). Inference for the generalization error. Machine Learning, 52(3), 239-281. Google ScholarDigital Library
- Nahm, U. Y., & Mooney, R. J. (2000). Using information extraction to aid the discovery of prediction rules from texts. In Proceedings of the Workshop on Text Mining at the Sixth International Conference on Knowledge Discovery and Data Mining (pp. 51-58). Boston. Workshop proceedings at: http://www.cs.cmu.edu/~dunja/WshKDD2000.htmlGoogle Scholar
- Niculescu-Mizil, A., & Caruana, R. (2005). Predicting good probabilities with supervised learning. In Proceedings of the 22nd International Conference on Machine Learning (pp. 625-632). Bonn. New York: ACM Press. Google Scholar
- Nie, N. H., Hull, C., Jenkins, H., Steinbrenner, J. G. K., & Bent, D. H. (1970). Statistical package for the social sciences. New York: McGraw-Hill.Google Scholar
- Nigam, K., & Ghani, R. (2000). Analyzing the effectiveness and applicability of co-training. In Proceedings of the Ninth International Conference on Information and Knowledge Management (pp. 86-93). McLean, VA. New York: ACM Press. Google ScholarDigital Library
- Nigam, K., McCallum, A. K., Thrun, S., & Mitchell, T. M. (2000). Text classification from labeled and unlabeled documents using EM. Machine Learning, 39(2/3), 103-134. Google ScholarCross Ref
- Nilsson, N. J. (1965). Learning machines. New York: McGraw-Hill.Google Scholar
- Nisbet, R., Elder, J., & Miner, G. (2009). Handbook of statistical analysis and data mining applications. New York: Academic Press. Google Scholar
- Oates, T., & Jensen, D. (1997). The effects of training set size on decision tree complexity. In Proceedings of the Fourteenth International Conference on Machine Learning (pp. 254-262). Nashville. San Francisco: Morgan Kaufmann. Google Scholar
- Ohm, P. (2009). Broken promises of privacy: Responding to the surprising failure of anonymization. University of Colorado Law Legal Studies Research Paper No. 09-12, August.Google Scholar
- Omohundro, S. M. (1987). Efficient algorithms with neural network behavior. Journal of Complex Systems, 1(2), 273-347.Google Scholar
- Paynter G. W. (2000). Automating iterative tasks with programming by demonstration. Ph.D. Dissertation, Department of Computer Science, University of Waikato, New Zealand.Google Scholar
- Pearson, R. (2005). Mining imperfect data. Society for Industrial and Applied Mechanics, Philadelphia.Google Scholar
- Pei, J., Han, J., Mortazavi-Asi, B., Wang, J., Pinto, H., Chen, Q., et al. (2004). Mining sequential patterns by pattern-growth: The PrefixSpan approach. IEEE Transactions on Knowledge and Data Engineering, 16(11), 1424-1440. Google ScholarDigital Library
- Piatetsky-Shapiro, G., & Frawley, W. J. (Eds.) (1991). Knowledge discovery in databases. Menlo Park, CA: AAAI Press/MIT Press. Google Scholar
- Platt, J. (1998). Fast training of support vector machines using sequential minimal optimization. In B. Schölkopf, C. Burges, & A. Smola (Eds.), Advances in kernel methods: Support vector learning (pp. 185-209). Cambridge, MA: MIT Press. Google Scholar
- Power, D. J. (2002). What is the true story about data mining, beer and diapers? DSS News, 3(23); see http://www.dssresources.com/newsletters/66.php.Google Scholar
- Provost, F., & Fawcett, T. (1997). Analysis and visualization of classifier performance: Comparison under imprecise class and cost distributions. In D. Heckerman, H. Mannila, D. Pregibon, & R. Uthurusamy (Eds.), Proceedings of the Third International Conference on Knowledge Discovery and Data Mining (pp. 43-48). Huntington Beach, CA. Menlo Park, CA: AAAI Press.Google Scholar
- Pyle, D. (1999). Data preparation for data mining. San Francisco, CA: Morgan Kaufmann. Google Scholar
- Quinlan, J. R. (1986). Induction of decision trees. Machine Learning, 1(1), 81-106. Google ScholarDigital Library
- 8Quinlan, J. R. (1992). Learning with continuous classes. In N. Adams, & L. Sterling (Eds.), Proceedings of the Fifth Australian Joint Conference on Artificial Intelligence (pp. 343-348). Hobart, Tasmania. Singapore: World Scientific.Google Scholar
- Quinlan, J. R. (1993). C4.5: Programs for machine learning. San Francisco: Morgan Kaufmann. Google Scholar
- Quinlan, J. R. (1996). Improved use of continuous attributes in C4.5. Journal of Artificial Intelligence Research, 4, 77-90. Google ScholarDigital Library
- Ramon, J., & de Raedt, L. (2000). Multi instance neural networks. In Proceedings of the ICML Workshop on Attribute-Value and Relational Learning (pp. 53-60). Stanford, CA.Google Scholar
- Ray, S., & Craven, M. (2005). Supervised learning versus multiple instance learning: An empirical comparison. In Proceedings of the International Conference on Machine Learning (pp. 697-704). Bonn. New York: ACM Press. Google Scholar
- Read, J., Pfahringer, B., Holmes, G., & Frank, E. (2009). Classifier chains for multilabel classification. In Proceedings of the 13th European Conference on Principles and Practice of Knowledge Discovery in Databases and 20th European Conference on Machine Learning (pp. 254-269). Bled, Slovenia. Berlin: Springer-Verlag. Google Scholar
- Rennie, J. D. M., Shih, L., Teevan, J., & Karger, D. R. (2003). Tackling the poor assumptions of Naïve Bayes text classifiers. In T. Fawcett, & N. Mishra (Eds.), Proceedings of the Twentieth International Conference on Machine Learning (pp. 616-623). Washington, DC. Menlo Park, CA: AAAI Press.Google Scholar
- Ricci, F., & Aha, D. W. (1998). Error-correcting output codes for local learners. In C. Nedellec, & C. Rouveird (Eds.), Proceedings of the European Conference on Machine Learning (pp. 280-291). Chemnitz, Germany. Berlin: Springer-Verlag. Google Scholar
- Richards, D., & Compton, P. (1998). Taking up the situated cognition challenge with ripple-down rules. International Journal of Human-Computer Studies, 49(6), 895-926. Google ScholarDigital Library
- Rifkin, R., & Klautau, A. (2004). In defense of one-vs.-all classification. Journal of Machine Learning Research, 5, 101-141. Google ScholarDigital Library
- Ripley, B. D. (1996). Pattern recognition and neural networks. Cambridge, UK: Cambridge University Press. Google Scholar
- Rissanen, J. (1985). The minimum description length principle. In S. Kotz, & N. L. Johnson (Eds.), Encylopedia of Statistical Sciences (Vol. 5) (pp. 523-527). New York: John Wiley.Google Scholar
- Rodriguez, J. J., Kuncheva, L. I., & Alonso, C. J. (2006). Rotation forest: A new classifier ensemble method. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(10), 1619-1630. Google ScholarDigital Library
- Rousseeuw, P. J., & Leroy, A. M. (1987). Robust regression and outlier detection. New York: John Wiley. Google Scholar
- Russell, S., & Norvig, P. (2009). Artificial intelligence: A modern approach (3rd ed.). Upper Saddle River, NJ: Prentice-Hall. Google Scholar
- Sahami, M., Dumais, S., Heckerman, D., & Horvitz, E. (1998). A Bayesian approach to filtering junk e-mail. In Proceedings of the AAAI-98 Workshop on Learning for Text Categorization (pp. 55-62). Madison, WI. Menlo Park, CA: AAAI Press.Google Scholar
- Saitta, L., & Neri, F. (1998). Learning in the "real world." Machine Learning, 30(2/3), 133-163. Google ScholarCross Ref
- Salzberg, S. (1991). A nearest hyperrectangle learning method. Machine Learning, 6(3), 251-276. Google ScholarDigital Library
- Schapire, R. E., Freund, Y., Bartlett, P., & Lee, W. S. (1997). Boosting the margin: A new explanation for the effectiveness of voting methods. In D. H. Fisher (Ed.), Proceedings of the Fourteenth International Conference on Machine Learning (pp. 322-330). Nashville. San Francisco: Morgan Kaufmann. Google Scholar
- Scheffer, T. (2001). Finding association rules that trade support optimally against confidence. In L. de Raedt, & A. Siebes (Eds.), Proceedings of the Fifth European Conference on Principles of Data Mining and Knowledge Discovery (pp. 424-435). Freiburg, Germany. Berlin: Springer-Verlag. Google Scholar
- Schölkopf, B., Bartlett, P., Smola, A. J., & Williamson, R. (1999). Shrinking the tube: A new support vector regression algorithm. Advances in Neural Information Processing Systems, 11, 330-336. Cambridge, MA: MIT Press. Google Scholar
- Schölkopf, B., Williamson, R., Smola, A., Shawe-Taylor, J., & Platt, J. (2000). Support vector method for novelty detection. Advances in Neural Information Processing Systems, 12, 582-588. Cambridge, MA: MIT Press.Google Scholar
- Schölkopf, B., & Smola, A. J. (2002). Learning with kernels: Support vector machines, regularization, optimization, and beyond. Cambridge, MA: MIT Press. Google Scholar
- Sebastiani, F. (2002). Machine learning in automated text categorization. ACM Computing Surveys, 34(1), 1-47. Google ScholarDigital Library
- Seewald A. K. (2002). How to make stacking better and faster while also taking care of an unknown weakness. In Proceedings of the Nineteenth International Conference on Machine Learning (pp. 54-561). Sydney. San Francisco: Morgan Kaufmann. Google Scholar
- Seewald, A. K., & Fürnkranz, J. (2001). An evaluation of grading classifiers. In F. Hoffmann, D. J. Hand, N. M. Adams, D. H. Fisher, & G. Guimarães (Eds.), Proceedings of the Fourth International Conference on Advances in Intelligent Data Analysis (pp. 115-124). Cascais, Portugal. Berlin: Springer-Verlag. Google Scholar
- Shafer, R., Agrawal, R., & Metha, M. (1996). SPRINT: A scalable parallel classifier for data mining. In T. M. Vijayaraman, A. P. Buchmann, C. Mohan, & N. L. Sarda (Eds.), Proceedings of the Second International Conference on Very Large Databases (pp. 544-555). Mumbai (Bombay). San Francisco: Morgan Kaufmann. Google Scholar
- Shalev-Shwartz, S., Singer, Y., & Srebro, N. (2007). Pegasos: Primal estimated sub-gradient solver for SVM. In Proceedings of the 24th international conference on Machine Learning (pp. 807-814). New York: ACM Press. Google Scholar
- Shawe-Taylor, J., & Cristianini, N. (2004). Kernel methods for pattern analysis. Cambridge, UK: Cambridge University Press. Google Scholar
- Slonim, N., Friedman, N., & Tishby, N. (2002). Unsupervised document classification using sequential information maximization. In Proceedings of the 25th International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 120-136). New York: ACM Press. Google Scholar
- Smola, A. J., & B. Schölkopf. (2004). A tutorial on support vector regression. Statistics and Computing, 14(3), 199-222. Google ScholarDigital Library
- Soderland, S., Fisher, D., Aseltine, J., & Lehnert, W. (1995). Crystal: Inducing a conceptual dictionary. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence (pp. 1314-1319). Montreal. Menlo Park, CA: AAAI Press. Google Scholar
- Srikant, R., & Agrawal, R. (1996). Mining sequential patterns: Generalizations and performance improvements. In P. M. Apers, M. Bouzeghoub, & G. Gardarin (Eds.), Proceedings of the Fifth International Conference on Extending Database Technology. Avignon, France. Lecture Notes in Computer Science. Vol. 1057 (pp. 3-17). London: Springer-Verlag. Google Scholar
- Stevens, S. S. (1946). On the theory of scales of measurement. Science, 103, 677-680.Google Scholar
- Stone, P., & Veloso, M. (2000). Multiagent systems: A survey from a machine learning perspective. Autonomous Robots, 8(3), 345-383. Google ScholarDigital Library
- Stout, Q. F. (2008). Unimodal regression via prefix isotonic regression. Computational Statistics and Data Analysis, 53, 289-297. Google ScholarDigital Library
- Su, J., Zhang, H., Ling, C. X., & Matwin, S. (2008). Discriminative parameter learning for Bayesian networks. In Proceedings of the 25th International Conference on Machine Learning (pp. 1016-1023). Helsinki. New York: ACM Press. Google Scholar
- Swets, J. (1988). Measuring the accuracy of diagnostic systems. Science, 240, 1285-1293.Google Scholar
- Ting, K. M. (2002). An instance-weighting method to induce cost-sensitive trees. IEEE Transactions on Knowledge and Data Engineering, 14(3), 659-665. Google ScholarDigital Library
- Ting, K. M., & Witten, I. H. (1997a). Stacked generalization: When does it work? In Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence (pp. 866-871). Nagoya, Japan. San Francisco: Morgan Kaufmann. Google Scholar
- Ting, K. M., & Witten, I. H. (1997b). Stacking bagged and dagged models. In D. H. Fisher (Ed.), Proceedings of the Fourteenth International Conference on Machine Learning (pp. 367-375). Nashville. San Francisco: Morgan Kaufmann. Google Scholar
- Turney, P. D. (1999). Learning to extract key phrases from text. Technical Report ERB-1057, Institute for Information Technology, National Research Council of Canada, Ottawa.Google Scholar
- U.S. House of Representatives Subcommittee on Aviation (2002). Hearing on aviation security with a focus on passenger profiling, February 27, 2002; see http://www.house.gov/transportation/aviation/02-27-02/02-27-02memo.html.Google Scholar
- Utgoff, P. E. (1989). Incremental induction of decision trees. Machine Learning, 4(2), 161-186. Google ScholarDigital Library
- Utgoff, P. E., Berkman, N. C., & Clouse, J. A. (1997). Decision tree induction based on efficient tree restructuring. Machine Learning, 29(1), 5-44. Google ScholarDigital Library
- Vafaie, H., & DeJong, K. (1992). Genetic algorithms as a tool for feature selection in machine learning. In Proceedings of the International Conference on Tools with Artificial Intelligence (pp. 200-203). Arlington, VA: IEEE Computer Society Press.Google Scholar
- van Rijsbergen, C. A. (1979). Information retrieval. London: Butterworths. Google Scholar
- Vapnik, V. (1999). The nature of statistical learning theory (2nd ed.). New York: Springer-Verlag. Google Scholar
- Vitter, J. S. (1985). Random sampling with a reservoir. ACM Transactions on Mathematical Software, 1(11), 37-57. Google ScholarDigital Library
- Wang, J., & Zucker, J.-D. (2000). Solving the multiple-instance problem: A lazy learning approach. In Proceedings of the International Conference on Machine Learning (pp. 1119-1125). Stanford, CA. San Francisco: Morgan Kaufmann. Google Scholar
- Wang, J., Han, J., & Pei, J. (2003). CLOSET+: Searching for the best strategies for mining frequent closed itemsets. In Proceedings of the International Conference on Knowledge Discovery and Data Mining (pp. 236-245). Washington, DC. New York: ACM Press. Google Scholar
- Wang, Y., & Witten, I. H. (1997). Induction of model trees for predicting continuous classes. In M. van Someren, & G. Widmer (Eds.), Proceedings of the of the Poster Papers of the European Conference on Machine Learning (pp. 128-137). University of Economics, Faculty of Informatics and Statistics, Prague. Berlin: Springer.Google Scholar
- Wang, Y., & Witten, I. H. (2002). Modeling for optimal probability prediction. In C. Sammut, & A. Hoffmann (Eds.), Proceedings of the Nineteenth International Conference on Machine Learning (pp. 650-657). Sydney. San Francisco: Morgan Kaufmann. Google Scholar
- Webb, G. I. (1999). Decision tree grafting from the all-tests-but-one partition. In Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence (pp. 702-707). San Francisco: Morgan Kaufmann. Google Scholar
- Webb, G. I. (2000). MultiBoosting: A technique for combining boosting and wagging. Machine Learning, 40(2), 159-196. Google ScholarDigital Library
- Webb, G. I., Boughton, J., & Wang, Z. (2005). Not so naïve Bayes: Aggregating one-dependence estimators. Machine Learning, 58(1), 5-24. Google ScholarDigital Library
- Weidmann, N., Frank, E., & Pfahringer, B. (2003). A two-level learning method for generalized multi-instance problems. In Proceedings of the European Conference on Machine Learning (pp. 468-479). Cavtat, Croatia. Berlin: Springer-Verlag.Google Scholar
- Weiser, M., & Brown, J. S. (1997). The coming age of calm technology. In P. J. Denning, & R. M. Metcalfe (Eds.), Beyond calculation: The next fifty years (pp. 75-86). New York: Copernicus. Google Scholar
- Weiss, S. M., & Indurkhya, N. (1998). Predictive data mining: A practical guide. San Francisco: Morgan Kaufmann. Google Scholar
- Wettschereck, D., & Dietterich, T. G. (1995). An experimental comparison of the nearest-neighbor and nearest-hyperrectangle algorithms. Machine Learning, 19(1), 5-28. Google ScholarDigital Library
- Wild, C. J., & Seber, G. A. F. (1995). Introduction to probability and statistics. Department of Statistics, University of Auckland, New Zealand.Google Scholar
- Winston, P. H. (1992). Artificial intelligence. Reading, MA: Addison-Wesley. Google Scholar
- Witten, I. H. (2004). Text mining. In M. P. Singh (Ed.), Practical handbook of Internet computing (pp. 14-1-14-22). Boca Raton, FL: CRC Press.Google Scholar
- Witten, I. H., Bray, Z., Mahoui, M., & Teahan, W. (1999a). Text mining: A new frontier for lossless compression. In J. A. Storer, & M. Cohn (Eds.), Proceedings of the Data Compression Conference (pp. 198-207). Snowbird, UT. Los Alamitos, CA: IEEE Press. Google Scholar
- Witten, I. H., Moffat, A., & Bell, T. C. (1999b). Managing gigabytes: Compressing and indexing documents and images (2nd ed.). San Francisco: Morgan Kaufmann. Google Scholar
- Wolpert, D. H. (1992). Stacked generalization. Neural Networks, 5, 241-259. Google ScholarDigital Library
- Wu, X. V., Kumar, J. R., Quinlan, J., Ghosh, Q., Yang, H., Motoda, G. J., et al. (2008). Top 10 algorithms in data mining. Knowledge and Information Systems, 14(1), 1-37. Google ScholarDigital Library
- Wu, X., & Kumar, V. (Eds.), (2009). The top ten algorithms in data mining. New York: Chapman and Hall. Google Scholar
- Xu, X., & Frank, E. (2004). Logistic regression and boosting for labeled bags of instances. In Proceedings of the 8th Pacific-Asia Conference on Knowledge Discovery and Data Mining (pp. 272-281). Sydney. Berlin: Springer-Verlag.Google Scholar
- Yan, X., & Han, J. (2002). gSpan: Graph-based substructure pattern mining. In Proceedings of the IEEE International Conference on Data Mining (pp. 721-724). Maebashi City, Japan. Washington, DC: IEEE Computer Society. Google Scholar
- Yan, X., & Han, J. (2003). CloseGraph: Mining closed frequent graph patterns. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 286-295). Washington, DC. New York: ACM Press. Google Scholar
- Yan, X., Han, J., & Afshar, R. (2003). CloSpan: Mining closed sequential patterns in large datasets. In Proceedings of the SIAM International Conference on Data Mining (pp. 166-177). San Francisco. Philadelphia: Society for Industrial and Applied Mathematics.Google Scholar
- Yang, Y., & Webb, G. I. (2001). Proportional k-interval discretization for Naïve Bayes classifiers. In L. de Raedt, & P. Flach (Eds.), Proceedings of the Twelfth European Conference on Machine Learning (pp. 564-575). Freiburg, Germany. Berlin: Springer-Verlag. Google Scholar
- Yang, Y., Guan, X., & You, J. (2002). CLOPE: A fast and effective clustering algorithm for transactional data. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 682-687). Edmonton, AB. New York: ACM Press. Google Scholar
- Yurcik, W., Barlow, J., Zhou, Y., Raje, H., Li, Y., Yin, X., et al. (2003). Scalable data management alternatives to support data mining heterogeneous logs for computer network security. In Proceedings of the Workshop on Data Mining for Counter Terrorism and Security. San Francisco. Philadelphia: Society for International and Applied Mathematics.Google Scholar
- Zadrozny, B., & Elkan, C. (2002). Transforming classifier scores into accurate multiclass probability estimates. In Proceedings of the Eighth ACM International Conference on Knowledge Discovery and Data Mining (pp. 694-699). Edmonton, AB. New York: ACM Press. Google Scholar
- Zaki, M. J., Parthasarathy, S., Ogihara, M., & Li, W. (1997). New algorithms for fast discovery of association rules. In Proceedings Knowledge Discovery in Databases (pp. 283-286). Newport Beach, CA. Menlo Park, CA: AAAI Press.Google Scholar
- Zhang, H., Jiang, L., & Su, J. (2005). Hidden Naïve Bayes. In Proceedings of the 20th National Conference on Artificial Intelligence (pp. 919-924). Pittsburgh. Menlo Park, CA: AAAI Press. Google Scholar
- Zhang, T., Ramakrishnan, R., & Livny, M. (1996). BIRCH: An efficient data clustering method for very large databases. In Proceedings of the ACM SIGMOD International Conference on Management of Data (pp. 103-114). Montreal. New York: ACM Press. Google Scholar
- Zhang, T. (2004). Solving large scale linear prediction problems using stochastic gradient descent algorithms. In Proceedings of the 21st International Conference on Machine Learning (pp. 919-926). Banff, AB. Madison, WI: Omnipress. Google Scholar
- Zheng, F., & Webb, G. (2006). Efficient lazy elimination for averaged one-dependence estimators. In Proceedings of the 23rd International Conference on Machine Learning (pp. 1113-1120). New York: ACM Press. Google Scholar
- Zheng, Z., & Webb, G. (2000). Lazy learning of Bayesian rules. Machine Learning, 41(1), 53-84. Google ScholarCross Ref
- Zhou, Z.-H., & Zhang, M.-L. (2007). Solving multi-instance problems with classifier ensemble based on constructive clustering. Knowledge and Information Systems, 11(2), 155-170. Google ScholarDigital Library
Cited By
- Sha Y, Du J, Yang Z and Jiang F Cluster Center Initialization for Fuzzy K-Modes Clustering Using Outlier Detection Technique Pattern Recognition and Computer Vision, (3-18)
- İfraz M, Ersöz S, Aktepe A and Çetinyokuş T (2024). Sequential predictive maintenance and spare parts management with data mining methods: a case study in bus fleet, The Journal of Supercomputing, 80:15, (22099-22123), Online publication date: 1-Oct-2024.
- Ayoughi N, Nejati S, Sabetzadeh M and Saavedra P Enhancing Automata Learning with Statistical Machine Learning: A Network Security Case Study Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, (172-182)
- Świtoński A and Josiński H Human Sex Recognition Based on Dimensionality and Uncertainty of Gait Motion Capture Data Computational Science – ICCS 2024, (18-30)
- Angelopoulos G and Estivill-Castro V Human-Robot Dialogue that Elicits The Alignment of Moral Principles For Driverless Vehicles Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction, (196-200)
- Amini M, Naseri S and Nejati S (2024). Evaluating the impact of flaky simulators on testing autonomous driving systems, Empirical Software Engineering, 29:2, Online publication date: 1-Mar-2024.
- Singh T and Uppaluri R (2024). Feed-forward ANN and traditional machine learning-based prediction of biogas generation rate from meteorological and organic waste parameters, The Journal of Supercomputing, 80:2, (2538-2571), Online publication date: 1-Jan-2024.
- Pinto V, Gamage C, Stephenson M and Renz J The Difficulty of Novelty Detection and Adaptation in Physical Environments AI 2023: Advances in Artificial Intelligence, (28-40)
- de Leoni M, Vinci F, Leemans S and Mannhardt F Investigating the Influence of Data-Aware Process States on Activity Probabilities in Simulation Models: Does Accuracy Improve? Business Process Management, (129-145)
- Lee J, Shin S, Briand L and Nejati S (2023). Probabilistic Safe WCET Estimation for Weakly Hard Real-Time Systems at Design Stages, ACM Transactions on Software Engineering and Methodology, 0:0
- Ji Q, Jiang L and Zhang W Instance Weighting-Based Noise Correction for Crowdsourcing Advanced Intelligent Computing Technology and Applications, (285-297)
- Chennareddy V, Tirunagari S, Mohan S, Windridge D and Balla Y Interpretable Chronic Kidney Disease Risk Prediction from Clinical Data Using Machine Learning Multi-disciplinary Trends in Artificial Intelligence, (683-691)
- Yates D and Islam M (2022). Data Mining on Smartphones: An Introduction and Survey, ACM Computing Surveys, 55:5, (1-38), Online publication date: 30-Jun-2023.
- Mannhardt F, Leemans S, Schwanen C and de Leoni M Modelling Data-Aware Stochastic Processes - Discovery and Conformance Checking Application and Theory of Petri Nets and Concurrency, (77-98)
- Costa F, Nassar S and Dantas M (2023). A Sensor Ranking Approach for Edge–Fog–Cloud Environments, SN Computer Science, 4:4, Online publication date: 24-May-2023.
- Mortensen K, Zardbani F, Haque M, Agustsson S, Mottin D, Hofmann P and Karras P (2023). Marigold: Efficient k-Means Clustering in High Dimensions, Proceedings of the VLDB Endowment, 16:7, (1740-1748), Online publication date: 1-Mar-2023.
- Jhajharia K and Mathur P (2022). Machine Learning Approaches to Predict Crop Yield Using Integrated Satellite and Climate Data, International Journal of Ambient Computing and Intelligence, 13:1, (1-17), Online publication date: 23-Nov-2022.
- Cong K, Das D, Park J and Pereira H SortingHat Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (563-577)
- Yang W, Li C and Jiang L (2022). Learning from crowds with decision trees, Knowledge and Information Systems, 64:8, (2123-2140), Online publication date: 1-Aug-2022.
- Cesarelli G, Donisi L, Coccia A, Amitrano F, Biancardi A, Lanzillo B and D'Addio G Ataxia and Parkinson's disease patients classification using tree-based machine learning algorithms fed by spatiotemporal features: a pilot study 2022 IEEE International Symposium on Medical Measurements and Applications (MeMeA), (1-6)
- Mortazavi R, Mortazavi S and Troncoso A (2022). Wrapper-based feature selection using regression trees to predict intrinsic viscosity of polymer, Engineering with Computers, 38:3, (2553-2565), Online publication date: 1-Jun-2022.
- Varde A, Pandey A and Du X (2022). Prediction Tool on Fine Particle Pollutants and Air Quality for Environmental Engineering, SN Computer Science, 3:3, Online publication date: 1-May-2022.
- Gavel S, Raghuvanshi A and Tiwari S (2022). Maximum correlation based mutual information scheme for intrusion detection in the data networks, Expert Systems with Applications: An International Journal, 189:C, Online publication date: 1-Mar-2022.
- Bai L, Cui L, Jiao Y, Rossi L and Hancock E (2022). Learning Backtrackless Aligned-Spatial Graph Convolutional Networks for Graph Classification, IEEE Transactions on Pattern Analysis and Machine Intelligence, 44:2, (783-798), Online publication date: 1-Feb-2022.
- Le H, Shar L, Bianculli D, Briand L and Nguyen C (2022). Automated reverse engineering of role-based access control policies of web applications, Journal of Systems and Software, 184:C, Online publication date: 1-Feb-2022.
- Falessi D, Ahluwalia A and Penta M (2021). The Impact of Dormant Defects on Defect Prediction: A Study of 19 Apache Projects, ACM Transactions on Software Engineering and Methodology, 31:1, (1-26), Online publication date: 31-Jan-2022.
- Jhaveri R, Revathi A, Ramana K, Raut R, Dhanaraj R and Hakak S (2022). A Review on Machine Learning Strategies for Real-World Engineering Applications, Mobile Information Systems, 2022, Online publication date: 1-Jan-2022.
- Aguilar D, Loyola-González O, Medina-Pérez M, Cañete-Sifuentes L and Choo K (2021). PBC4occ, Future Generation Computer Systems, 125:C, (71-90), Online publication date: 1-Dec-2021.
- Gan H, Zhang J, Towsey M, Truskinger A, Stark D, van Rensburg B, Li Y and Roe P (2021). A novel frog chorusing recognition method with acoustic indices and machine learning, Future Generation Computer Systems, 125:C, (485-495), Online publication date: 1-Dec-2021.
- Zhang C, Oh S and Fu Z (2022). Hierarchical polynomial-based fuzzy neural networks driven with the aid of hybrid network architecture and ranking-based neuron selection strategies, Applied Soft Computing, 113:PA, Online publication date: 1-Dec-2021.
- Zhang H, Jiang L and Li C (2021). Collaboratively weighted naive Bayes, Knowledge and Information Systems, 63:12, (3159-3182), Online publication date: 1-Dec-2021.
- Cleofas-Sanchez L, Pineda-Briseño A and Sanchez J Identifying Optimal Clusters in Purchase Transaction Data Advances in Computational Intelligence, (3-22)
- Sicilia R, Merone M, Valenti R and Soda P (2021). Rule-based space characterization for rumour detection in health, Engineering Applications of Artificial Intelligence, 105:C, Online publication date: 1-Oct-2021.
- Maitre J, Rendu C, Bouchard K, Bouchard B and Gaboury S (2021). Object recognition in performed basic daily activities with a handcrafted data glove prototype, Pattern Recognition Letters, 147:C, (181-188), Online publication date: 1-Jul-2021.
- Rossi A, Soares C, Souza B and Ponce de Leon Ferreira de Carvalho A (2021). Micro-MetaStream, Information Sciences: an International Journal, 565:C, (262-277), Online publication date: 1-Jul-2021.
- Garcia-Ceja E, Thambawita V, Hicks S, Jha D, Jakobsen P, Hammer H, Halvorsen P and Riegler M HTAD: A Home-Tasks Activities Dataset with Wrist-Accelerometer and Audio Features MultiMedia Modeling, (196-205)
- Ezzini S, Abualhaija S, Arora C, Sabetzadeh M and Briand L Using Domain-specific Corpora for Improved Handling of Ambiguity in Requirements Proceedings of the 43rd International Conference on Software Engineering, (1485-1497)
- Nivaashini M and Thangaraj P (2021). Computational intelligence techniques for automatic detection of Wi-Fi attacks in wireless IoT networks, Wireless Networks, 27:4, (2761-2784), Online publication date: 1-May-2021.
- Vandehei B, Costa D and Falessi D (2021). Leveraging the Defects Life Cycle to Label Affected Versions and Defective Classes, ACM Transactions on Software Engineering and Methodology, 30:2, (1-35), Online publication date: 30-Apr-2021.
- Ma W, Papadakis M, Tsakmalis A, Cordy M and Traon Y (2021). Test Selection for Deep Learning Systems, ACM Transactions on Software Engineering and Methodology, 30:2, (1-22), Online publication date: 30-Apr-2021.
- Carvalho T and Moniz N The Compromise of Data Privacy in Predictive Performance Advances in Intelligent Data Analysis XIX, (426-438)
- Yang X, Yu Z, Wang J and Menzies T (2021). Understanding static code warnings, Expert Systems with Applications: An International Journal, 167:C, Online publication date: 1-Apr-2021.
- Guo W, Vanhoucke M, Coelho J and Luo J (2021). Automatic detection of the best performing priority rule for the resource-constrained project scheduling problem, Expert Systems with Applications: An International Journal, 167:C, Online publication date: 1-Apr-2021.
- Jiang F, Yu X, Zhao H, Gong D and Du J (2021). Ensemble learning based on random super-reduct and resampling, Artificial Intelligence Review, 54:4, (3115-3140), Online publication date: 1-Apr-2021.
- Sultana K, Anu V and Chong T (2020). Using software metrics for predicting vulnerable classes and methods in Java projects, Journal of Software: Evolution and Process, 33:3, Online publication date: 3-Mar-2021.
- Al-Zoubi A, Alqatawna J, Faris H and Hassonah M (2021). Spam profiles detection on social networks using computational intelligence methods, Journal of Information Science, 47:1, (58-81), Online publication date: 1-Feb-2021.
- Kratsch S, Masařík T, Muzi I, Pilipczuk M and Sorge M Optimal discretization is fixed-parameter tractable Proceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, (1702-1719)
- Li Y, Sun Z, Liu X, Chen W, Horng D, Lai K and Zhang N (2021). Feature Selection Based on a Large-Scale Many-Objective Evolutionary Algorithm, Computational Intelligence and Neuroscience, 2021, Online publication date: 1-Jan-2021.
- Yaman M, Rattay F and Subasi A (2022). Comparison of Bagging and Boosting Ensemble Machine Learning Methods for Face Recognition, Procedia Computer Science, 194:C, (202-209), Online publication date: 1-Jan-2021.
- Zeng X, Fang B, Shen H and Zhang M Distream Proceedings of the 18th Conference on Embedded Networked Sensor Systems, (409-421)
- Costa D, Pereira C, Peixoto H and Machado J Anticipating Maintenance in Telecom Installation Processes Intelligent Data Engineering and Automated Learning – IDEAL 2020, (322-334)
- Demissie B, Ceccato M and Shar L (2020). Security analysis of permission re-delegation vulnerabilities in Android apps, Empirical Software Engineering, 25:6, (5084-5136), Online publication date: 1-Nov-2020.
- Silva D, Soares D and Gonçalves S Measuring Unique Changes Proceedings of the 14th Brazilian Symposium on Software Components, Architectures, and Reuse, (121-130)
- Zhang J, Liu X and Li X (2020). Predictive Analytics with Strategically Missing Data, INFORMS Journal on Computing, 32:4, (1143-1156), Online publication date: 1-Oct-2020.
- Mohammed K, Ayesh A and Boiten E Utility Promises of Self-Organising Maps in Privacy Preserving Data Mining Data Privacy Management, Cryptocurrencies and Blockchain Technology, (55-72)
- Manocha A, Kumar G, Bhatia M and Sharma A (2020). Video-assisted smart health monitoring for affliction determination based on fog analytics, Journal of Biomedical Informatics, 109:C, Online publication date: 1-Sep-2020.
- Feng Y, Shi Q, Gao X, Wan J, Fang C and Chen Z DeepGini: prioritizing massive tests to enhance the robustness of deep neural networks Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, (177-188)
- Lin J, Liu Y and Cleland-Huang J Supporting Program Comprehension through Fast Query response in Large-Scale Systems Proceedings of the 28th International Conference on Program Comprehension, (285-295)
- Tsay J, Braz A, Hirzel M, Shinnar A and Mummert T AIMMX Proceedings of the 17th International Conference on Mining Software Repositories, (81-92)
- Xia H, Zhang Y, Zhou Y, Chen X, Wang Y, Zhang X, Cui S, Hong G, Zhang X, Yang M and Yang Z How Android developers handle evolution-induced API compatibility issues Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (886-898)
- Martins I, Bahiense L, Infante C and Arruda E (2020). Dimensionality reduction for multi-criteria problems, Expert Systems with Applications: An International Journal, 148:C, Online publication date: 15-Jun-2020.
- Adamović S, Miškovic V, Maček N, Milosavljević M, Šarac M, Saračević M and Gnjatović M (2020). An efficient novel approach for iris recognition based on stylometric features and machine learning techniques, Future Generation Computer Systems, 107:C, (144-157), Online publication date: 1-Jun-2020.
- Li X, Cheng S, Lv Z, Song H, Jia T and Lu N (2020). Data analytics of urban fabric metrics for smart cities, Future Generation Computer Systems, 107:C, (871-882), Online publication date: 1-Jun-2020.
- Chang J, Chen M, Chen L and Chien W (2019). Recognizing important factors of influencing trust in O2O models: an example of OpenTable, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:11, (7907-7923), Online publication date: 1-Jun-2020.
- Ong H, Mustapha N, Hamdan H, Rosli R and Mustapha A (2020). Informative top-k class associative rule for cancer biomarker discovery on microarray data, Expert Systems with Applications: An International Journal, 146:C, Online publication date: 15-May-2020.
- Pandey S, Mishra R and Tripathi A (2020). BPDET, Expert Systems with Applications: An International Journal, 144:C, Online publication date: 15-Apr-2020.
- Ayala D, Borrego A, Hernández I and Ruiz D (2020). A neural network for semantic labelling of structured information, Expert Systems with Applications: An International Journal, 143:C, Online publication date: 1-Apr-2020.
- Fan Z, Chiong R, Hu Z and Lin Y (2020). A fuzzy weighted relative error support vector machine for reverse prediction of concrete components, Computers and Structures, 230:C, Online publication date: 1-Apr-2020.
- de Leoni M and Dündar S Event-log abstraction using batch session identification and clustering Proceedings of the 35th Annual ACM Symposium on Applied Computing, (36-44)
- Van Goidsenhoven S, Bogdanova D, Deeva G, Broucke S, De Weerdt J and Snoeck M Predicting student success in a blended learning environment Proceedings of the Tenth International Conference on Learning Analytics & Knowledge, (17-25)
- Barbez A, Khomh F and Guéhéneuc Y (2020). A machine-learning based ensemble method for anti-patterns detection, Journal of Systems and Software, 161:C, Online publication date: 1-Mar-2020.
- Mariani L, Pezzè M, Riganelli O and Xin R (2020). Predicting failures in multi-tier distributed systems, Journal of Systems and Software, 161:C, Online publication date: 1-Mar-2020.
- Roitero K, Brunello A, Serra G and Mizzaro S (2020). Effectiveness evaluation without human relevance judgments, Information Processing and Management: an International Journal, 57:2, Online publication date: 1-Mar-2020.
- Park H and Jung J (2022). SAX-ARM, Expert Systems with Applications: An International Journal, 141:C, Online publication date: 1-Mar-2020.
- Liang J, Xue Y and Wang J (2020). Genetic programming based feature construction methods for foreground object segmentation, Engineering Applications of Artificial Intelligence, 89:C, Online publication date: 1-Mar-2020.
- Loreto M, Lisboa T and Moreira V (2020). Early prediction of ICU readmissions using classification algorithms, Computers in Biology and Medicine, 118:C, Online publication date: 1-Mar-2020.
- Xie R, Khalil I, Badsha S and Atiquzzaman M (2020). An intelligent healthcare system with data priority based on multi vital biosignals, Computer Methods and Programs in Biomedicine, 185:C, Online publication date: 1-Mar-2020.
- Hao Z, Yang C, Liu L, Kustudic M and Niu B (2019). Exploiting skew-adaptive delimitation mechanism for learning expressive classification rules, Applied Intelligence, 50:3, (746-758), Online publication date: 1-Mar-2020.
- Yu T, Petoumenos P, Janjic V, Leather H and Thomson J COLAB: a collaborative multi-factor scheduler for asymmetric multicore processors Proceedings of the 18th ACM/IEEE International Symposium on Code Generation and Optimization, (268-279)
- Sağbaş E, Korukoglu S and Balli S (2020). Stress Detection via Keyboard Typing Behaviors by Using Smartphone Sensors and Machine Learning Techniques, Journal of Medical Systems, 44:4, Online publication date: 19-Feb-2020.
- Silber-Varod V, Malayev S and Lerner A (2020). Positioning oneself in different roles, Speech Communication, 117:C, (1-12), Online publication date: 1-Feb-2020.
- Martin N, Depaire B, Caris A and Schepers D (2020). Retrieving the resource availability calendars of a process from an event log, Information Systems, 88:C, Online publication date: 1-Feb-2020.
- Riaboff L, Poggi S, Madouasse A, Couvreur S, Aubin S, Bédère N, Goumand E, Chauvin A and Plantier G (2020). Development of a methodological framework for a robust prediction of the main behaviours of dairy cows using a combination of machine learning algorithms on accelerometer data, Computers and Electronics in Agriculture, 169:C, Online publication date: 1-Feb-2020.
- Alauthman M, Aslam N, Al-kasassbeh M, Khan S, Al-Qerem A and Raymond Choo K (2020). An efficient reinforcement learning-based Botnet detection approach, Journal of Network and Computer Applications, 150:C, Online publication date: 15-Jan-2020.
- Umar M, Zhanfang C and Liu Y Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering, (5-13)
- Yue X, Xiao X, Chen Y and Qian J (2020). Robust Neighborhood Covering Reduction with Determinantal Point Process sampling, Knowledge-Based Systems, 188:C, Online publication date: 5-Jan-2020.
- El Hindi K, Abu Shawar B, Aljulaidan R, Alsalamn H and MacLennan B (2020). Improved Distance Functions for Instance-Based Text Classification, Computational Intelligence and Neuroscience, 2020, Online publication date: 1-Jan-2020.
- Maldonado S, Peters G and Weber R (2020). Credit scoring using three-way decisions with probabilistic rough sets, Information Sciences: an International Journal, 507:C, (700-714), Online publication date: 1-Jan-2020.
- Yue X, Chen Y, Miao D and Fujita H (2020). Fuzzy neighborhood covering for three-way classification, Information Sciences: an International Journal, 507:C, (795-808), Online publication date: 1-Jan-2020.
- Casado-Vara R, Martin-del Rey A, Affes S, Prieto J and Corchado J (2022). IoT network slicing on virtual layers of homogeneous data for improved algorithm operation in smart buildings, Future Generation Computer Systems, 102:C, (965-977), Online publication date: 1-Jan-2020.
- Gelmini S, Formentin S, Strada S, Tanelli M and Savaresi S (2022). fierClass, Engineering Applications of Artificial Intelligence, 87:C, Online publication date: 1-Jan-2020.
- Alqahtani F and Alsulaiman F (2022). Is image-based CAPTCHA secure against attacks based on machine learning? An experimental study, Computers and Security, 88:C, Online publication date: 1-Jan-2020.
- Bilal M and Oyedele L (2021). Guidelines for applied machine learning in construction industry—A case of profit margins estimation, Advanced Engineering Informatics, 43:C, Online publication date: 1-Jan-2020.
- Kumar G (2019). An improved ensemble approach for effective intrusion detection, The Journal of Supercomputing, 76:1, (275-291), Online publication date: 1-Jan-2020.
- Cunha C (2019). Building Autonomic Elements from Video-Streaming Servers, Journal of Network and Systems Management, 28:1, (160-192), Online publication date: 1-Jan-2020.
- Qayyum H, Majid M, Haq E and Anwar S (2019). Generation of personalized video summaries by detecting viewer’s emotion using electroencephalography, Journal of Visual Communication and Image Representation, 65:C, Online publication date: 1-Dec-2019.
- Liu C, Zhao Q, Yan B, Elsayed S and Sarker R (2019). Transfer learning-assisted multi-objective evolutionary clustering framework with decomposition for high-dimensional data, Information Sciences: an International Journal, 505:C, (440-456), Online publication date: 1-Dec-2019.
- Bolón-Canedo V and Alonso-Betanzos A (2019). Ensembles for feature selection, Information Fusion, 52:C, (1-12), Online publication date: 1-Dec-2019.
- Tarkhaneh O and Moser I (2019). An improved differential evolution algorithm using Archimedean spiral and neighborhood search based mutation approach for cluster analysis, Future Generation Computer Systems, 101:C, (921-939), Online publication date: 1-Dec-2019.
- Yang Q, Scholz M, Shao J, Wang G and Liu X (2019). A generic framework to analyse the spatiotemporal variations of water quality data on a catchment scale, Environmental Modelling & Software, 122:C, Online publication date: 1-Dec-2019.
- Lin X, Li C, Ren W, Luo X and Qi Y (2020). A new feature selection method based on symmetrical uncertainty and interaction gain, Computational Biology and Chemistry, 83:C, Online publication date: 1-Dec-2019.
- Khosravi K, Daggupati P, Alami M, Awadh S, Ghareb M, Panahi M, Pham B, Rezaie F, Qi C and Yaseen Z (2019). Meteorological data mining and hybrid data-intelligence models for reference evaporation simulation, Computers and Electronics in Agriculture, 167:C, Online publication date: 1-Dec-2019.
- Trindade Á and Campelo F (2019). Tuning metaheuristics by sequential optimisation of regression models, Applied Soft Computing, 85:C, Online publication date: 1-Dec-2019.
- Jabal A, Davari M, Bertino E, Makaya C, Calo S, Verma D, Russo A and Williams C (2019). Methods and Tools for Policy Analysis, ACM Computing Surveys, 51:6, (1-35), Online publication date: 30-Nov-2019.
- Der Weth C, Abdul A, Kashyap A and Kankanhalli M (2019). CloseUp—A Community-Driven Live Online Search Engine, ACM Transactions on Internet Technology, 19:3, (1-21), Online publication date: 22-Nov-2019.
- Matos L, Cortez P, Mendes R and Moreau A Using Deep Learning for Ordinal Classification of Mobile Marketing User Conversion Intelligent Data Engineering and Automated Learning – IDEAL 2019, (60-67)
- Mungloo-Dilmohamud Z, Jaufeerally-Fakim Y and Peña-Reyes C Exploring the Stability of Feature Selection Methods across a Palette of Gene Expression Datasets Proceedings of the 2019 6th International Conference on Biomedical and Bioinformatics Engineering, (7-12)
- Yang R, Zhang C, Gao R, Zhang L and Song Q (2019). Predicting FAD Interacting Residues with Feature Selection and Comprehensive Sequence Descriptors, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16:6, (2046-2056), Online publication date: 1-Nov-2019.
- Chen Y and Chang C (2019). Early prediction of the future popularity of uploaded videos, Expert Systems with Applications: An International Journal, 133:C, (59-74), Online publication date: 1-Nov-2019.
- Chamikara M, Bertok P, Liu D, Camtepe S and Khalil I (2022). An efficient and scalable privacy preserving algorithm for big data and data streams, Computers and Security, 87:C, Online publication date: 1-Nov-2019.
- D’Angelo G, Pilla R, Tascini C and Rampone S (2019). A proposal for distinguishing between bacterial and viral meningitis using genetic programming and decision trees, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:22, (11775-11791), Online publication date: 1-Nov-2019.
- Ziwei B and Chua H An Application for Classifying Depression in Tweets Proceedings of the 2nd International Conference on Computing and Big Data, (37-41)
- Cambronero J and Rinard M (2019). AL: autogenerating supervised learning programs, Proceedings of the ACM on Programming Languages, 3:OOPSLA, (1-28), Online publication date: 10-Oct-2019.
- Ykhlef H, Bouchaffra D and Ykhlef F Selection of Optimal Sub-ensembles of Classifiers through Evolutionary Game Theory 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), (2267-2272)
- Gu X and Blackmore K (2019). Developing a scholar classification scheme from publication patterns in academic science, Journal of the Association for Information Science and Technology, 70:11, (1262-1276), Online publication date: 6-Oct-2019.
- Hu X, Pedrycz W and Wang X (2019). Random ensemble of fuzzy rule-based models, Knowledge-Based Systems, 181:C, Online publication date: 1-Oct-2019.
- Hussain S (2019). A novel robust kernel for classifying high-dimensional data using Support Vector Machines, Expert Systems with Applications: An International Journal, 131:C, (116-131), Online publication date: 1-Oct-2019.
- Martínez F, Frías M, Pérez M and Rivera A (2019). A methodology for applying k-nearest neighbor to time series forecasting, Artificial Intelligence Review, 52:3, (2019-2037), Online publication date: 1-Oct-2019.
- Yu L, Jiang L, Wang D and Zhang L (2019). Toward naive Bayes with attribute value weighting, Neural Computing and Applications, 31:10, (5699-5713), Online publication date: 1-Oct-2019.
- Roccetti M, Delnevo G, Casini L, Zagni N and Cappiello G A Paradox in ML Design Proceedings of the 5th EAI International Conference on Smart Objects and Technologies for Social Good, (201-206)
- Bai L, Jiao Y, Cui L and Hancock E Learning Aligned-Spatial Graph Convolutional Networks for Graph Classification Machine Learning and Knowledge Discovery in Databases, (464-482)
- Matinnejad R, Nejati S, Briand L and Bruckmann T (2019). Test Generation and Test Prioritization for Simulink Models with Dynamic Behavior, IEEE Transactions on Software Engineering, 45:9, (919-944), Online publication date: 1-Sep-2019.
- Bruns R, Dunkel J and Offel N (2022). Learning of complex event processing rules with genetic programming, Expert Systems with Applications: An International Journal, 129:C, (186-199), Online publication date: 1-Sep-2019.
- Chen C, Liu Y, Kumar M, Qin J and Ren Y (2019). Energy consumption modelling using deep learning embedded semi-supervised learning, Computers and Industrial Engineering, 135:C, (757-765), Online publication date: 1-Sep-2019.
- Maitre J, Bouchard K and Bédard L (2022). Mineral grains recognition using computer vision and machine learning, Computers & Geosciences, 130:C, (84-93), Online publication date: 1-Sep-2019.
- Honarvar A and Sami A (2019). Towards Sustainable Smart City by Particulate Matter Prediction Using Urban Big Data, Excluding Expensive Air Pollution Infrastructures, Big Data Research, 17:C, (56-65), Online publication date: 1-Sep-2019.
- Quintero-Domínguez L, Morell C and Ventura S (2022). WordificationMI: multi-relational data mining through multiple-instance propositionalization, Progress in Artificial Intelligence, 8:3, (375-387), Online publication date: 1-Sep-2019.
- Alghofaily B and Ding C (2019). Data mining service recommendation based on dataset features, Service Oriented Computing and Applications, 13:3, (261-277), Online publication date: 1-Sep-2019.
- Ji H, Huang S, Wu Y, Hui Z and Zheng C (2019). A new weighted naive Bayes method based on information diffusion for software defect prediction, Software Quality Journal, 27:3, (923-968), Online publication date: 1-Sep-2019.
- Xylogiannopoulos K, Karampelas P and Alhajj R Multivariate motif detection in local weather big data Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (749-756)
- Gandhi S and Harrison B Guided open story generation using probabilistic graphical models Proceedings of the 14th International Conference on the Foundations of Digital Games, (1-7)
- Malhotra R and Khanna M (2019). Dynamic selection of fitness function for software change prediction using Particle Swarm Optimization, Information and Software Technology, 112:C, (51-67), Online publication date: 1-Aug-2019.
- Rauf I, Troubitsyna E and Porres I (2019). A systematic mapping study of API usability evaluation methods, Computer Science Review, 33:C, (49-68), Online publication date: 1-Aug-2019.
- Pliakos K, Joo S, Park J, Cornillie F, Vens C and Van den Noortgate W (2019). Integrating machine learning into item response theory for addressing the cold start problem in adaptive learning systems, Computers & Education, 137:C, (91-103), Online publication date: 1-Aug-2019.
- Gangavarapu T and Patil N (2019). A novel filter–wrapper hybrid greedy ensemble approach optimized using the genetic algorithm to reduce the dimensionality of high-dimensional biomedical datasets, Applied Soft Computing, 81:C, Online publication date: 1-Aug-2019.
- Hafiz F, Swain A, Naik C and Patel N (2019). Efficient feature selection of power quality events using two dimensional (2D) particle swarms, Applied Soft Computing, 81:C, Online publication date: 1-Aug-2019.
- García V, Sánchez J, Rodríguez-Picón L, Méndez-González L and Ochoa-Domínguez H (2019). Using regression models for predicting the product quality in a tubing extrusion process, Journal of Intelligent Manufacturing, 30:6, (2535-2544), Online publication date: 1-Aug-2019.
- Jiang L and Li C (2019). Two improved attribute weighting schemes for value difference metric, Knowledge and Information Systems, 60:2, (949-970), Online publication date: 1-Aug-2019.
- Saeed S and Ong H (2019). A bi-objective hybrid algorithm for the classification of imbalanced noisy and borderline data sets, Pattern Analysis & Applications, 22:3, (979-998), Online publication date: 1-Aug-2019.
- Du Y, Issarny V and Sailhan F (2019). When the Power of the Crowd Meets the Intelligence of the Middleware, ACM SIGOPS Operating Systems Review, 53:1, (85-90), Online publication date: 25-Jul-2019.
- Bravo F, Barrio A and Ayala J A study on the parallelization of moeas to predict the patient's response to the onabotulinumtoxina treatment Proceedings of the 2019 Summer Simulation Conference, (1-12)
- Hosseini S and Azizi M (2019). The hybrid technique for DDoS detection with supervised learning algorithms, Computer Networks: The International Journal of Computer and Telecommunications Networking, 158:C, (35-45), Online publication date: 20-Jul-2019.
- Camara C, Warwick K, Bruña R, Aziz T and Pereda E (2019). Closed-loop deep brain stimulation based on a stream-clustering system, Expert Systems with Applications: An International Journal, 126:C, (187-199), Online publication date: 15-Jul-2019.
- Pacheco J, Benitez V and Félix L Anomaly Behavior Analysis for IoT Network Nodes Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, (1-6)
- Canizo B, Escudero L, Pellerano R and Wuilloud R (2022). Data mining approach based on chemical composition of grape skin for quality evaluation and traceability prediction of grapes, Computers and Electronics in Agriculture, 162:C, (514-522), Online publication date: 1-Jul-2019.
- Ndenga M, Ganchev I, Mehat J, Wabwoba F and Akdag H (2019). Performance and cost-effectiveness of change burst metrics in predicting software faults, Knowledge and Information Systems, 60:1, (275-302), Online publication date: 1-Jul-2019.
- Hancer E (2019). Differential evolution for feature selection, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:13, (5233-5248), Online publication date: 1-Jul-2019.
- Perona I, Yera A, Arbelaitz O, Muguerza J, Pérez J and Valencia X Towards automatic problem detection in web navigation based on client-side interaction data Proceedings of the XX International Conference on Human Computer Interaction, (1-4)
- Zhu H, Wang H and Carroll J Creating Persona Skeletons from Imbalanced Datasets - A Case Study using U.S. Older Adults' Health Data Proceedings of the 2019 on Designing Interactive Systems Conference, (61-70)
- Zhang X, Shi H, Zhu X and Li P (2019). Active semi-supervised learning based on self-expressive correlation with generative adversarial networks, Neurocomputing, 345:C, (103-113), Online publication date: 14-Jun-2019.
- Koźlak J, Sniezynski B, Wilk-Kołodziejczyk D, Leśniak A and Jaśkowiec K Multi-agent Environment for Decision-Support in Production Systems Using Machine Learning Methods Computational Science – ICCS 2019, (517-529)
- Liu Y, Lee T, Law T and Lee K (2019). Acoustical Assessment of Voice Disorder With Continuous Speech Using ASR Posterior Features, IEEE/ACM Transactions on Audio, Speech and Language Processing, 27:6, (1047-1059), Online publication date: 1-Jun-2019.
- Yuan M, Boston-Fisher N, Luo Y, Verma A and Buckeridge D (2019). A systematic review of aberration detection algorithms used in public health surveillance, Journal of Biomedical Informatics, 94:C, Online publication date: 1-Jun-2019.
- Mardini M and Raś Z (2019). Extraction of actionable knowledge to reduce hospital readmissions through patients personalization, Information Sciences: an International Journal, 485:C, (1-17), Online publication date: 1-Jun-2019.
- Wang J, Li M, Wang S, Menzies T and Wang Q (2019). Images don’t lie, Information and Software Technology, 110:C, (139-155), Online publication date: 1-Jun-2019.
- Gupta S, Buriro A and Crispo B (2019). DriverAuth, Computers and Security, 83:C, (122-139), Online publication date: 1-Jun-2019.
- Verde L and De Pietro G (2022). A neural network approach to classify carotid disorders from Heart Rate Variability analysis, Computers in Biology and Medicine, 109:C, (226-234), Online publication date: 1-Jun-2019.
- dos Santos U, Pessin G, da Costa C and da Rosa Righi R (2019). AgriPrediction, Computers and Electronics in Agriculture, 161:C, (202-213), Online publication date: 1-Jun-2019.
- Rupnik R, Kukar M, Vračar P, Košir D, Pevec D and Bosnić Z (2019). AgroDSS, Computers and Electronics in Agriculture, 161:C, (260-271), Online publication date: 1-Jun-2019.
- Nordbeck P, Soter L, Viklund J, Beckmann E, Kallen R, Chemero A and Richardson M (2019). Effects of task constraint on action dynamics, Cognitive Systems Research, 55:C, (192-204), Online publication date: 1-Jun-2019.
- Du M, Vidal J and Markovsky B Wikitheoria Proceedings of the 7th ACIS International Conference on Applied Computing and Information Technology, (1-5)
- Johanssen J, Bernius J and Bruegge B Toward usability problem identification based on user emotions derived from facial expressions Proceedings of the 4th International Workshop on Emotion Awareness in Software Engineering, (1-7)
- Malhotra R and Kamal S (2019). An empirical study to investigate oversampling methods for improving software defect prediction using imbalanced data, Neurocomputing, 343:C, (120-140), Online publication date: 28-May-2019.
- Feitoza M, da Silva W and Calumby R Exploring Deep Features and Transfer Learning for Plant Species Recognition Proceedings of the XV Brazilian Symposium on Information Systems, (1-8)
- Sciancalepore S, Ibrahim O, Oligeri G and Di Pietro R Detecting Drones Status via Encrypted Traffic Analysis Proceedings of the ACM Workshop on Wireless Security and Machine Learning, (67-72)
- Roselli D, Matthews J and Talagala N Managing Bias in AI Companion Proceedings of The 2019 World Wide Web Conference, (539-544)
- Xu W, Liang H, Zhao Y, Yu D and Monteiro D DMove Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, (1-14)
- Berkovsky S, Taib R, Koprinska I, Wang E, Zeng Y, Li J and Kleitman S Detecting Personality Traits Using Eye-Tracking Data Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, (1-12)
- Ponzanelli L, Bavota G, Mocci A, Oliveto R, Penta M, Haiduc S, Russo B and Lanza M (2019). Automatic Identification and Classification of Software Development Video Tutorial Fragments, IEEE Transactions on Software Engineering, 45:5, (464-488), Online publication date: 1-May-2019.
- Wang H and Hong M (2019). Online ad effectiveness evaluation with a two-stage method using a Gaussian filter and decision tree approach, Electronic Commerce Research and Applications, 35:C, Online publication date: 1-May-2019.
- Phang D, Wang K, Wang Q, Kauffman R and Naldi M (2019). How to derive causal insights for digital commerce in China? A research commentary on computational social science methods, Electronic Commerce Research and Applications, 35:C, Online publication date: 1-May-2019.
- Stange R, Cereda P and Neto J (2019). An Adaptive Algorithm for Rule Learning, Electronic Notes in Theoretical Computer Science (ENTCS), 342:C, (39-55), Online publication date: 28-Apr-2019.
- Asrafi N Comparing Performances of Graph Mining Algorithms to Detect Malware Proceedings of the 2019 ACM Southeast Conference, (268-269)
- Abidin D Effects of Image Filters on Various Image Datasets Proceedings of the 2019 5th International Conference on Computer and Technology Applications, (1-5)
- Nóbrega J and Oliveira A (2019). A sequential learning method with Kalman filter and extreme learning machine for regression and time series forecasting, Neurocomputing, 337:C, (235-250), Online publication date: 14-Apr-2019.
- Gan Y, Zhang Y, Cheng D, Shetty A, Rathi P, Katarki N, Bruno A, Hu J, Ritchken B, Jackson B, Hu K, Pancholi M, He Y, Clancy B, Colen C, Wen F, Leung C, Wang S, Zaruvinsky L, Espinosa M, Lin R, Liu Z, Padilla J and Delimitrou C An Open-Source Benchmark Suite for Microservices and Their Hardware-Software Implications for Cloud & Edge Systems Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, (3-18)
- Gan Y, Zhang Y, Hu K, Cheng D, He Y, Pancholi M and Delimitrou C Seer Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, (19-33)
- Costaguta R, Santana-Mansilla P, Lescano G and Missio D (2021). Mining Associations Between Collaborative Skills and Group Roles in Collaborative E-Learning Environments, Journal of Information Technology Research, 12:2, (159-174), Online publication date: 1-Apr-2019.
- Aldowah H, Al-Samarraie H and Fauzy W (2022). Educational data mining and learning analytics for 21st century higher education, Telematics and Informatics, 37:C, (13-49), Online publication date: 1-Apr-2019.
- Cai L, Qi Y, Wei W, Wu J and Li J (2019). mrMoulder, Future Generation Computer Systems, 93:C, (570-582), Online publication date: 1-Apr-2019.
- Mcintosh A, Hassan S and Hindle A (2019). What can Android mobile app developers do about the energy consumption of machine learning?, Empirical Software Engineering, 24:2, (562-601), Online publication date: 1-Apr-2019.
- Zhang L, Jiang L and Li C (2019). A discriminative model selection approach and its application to text classification, Neural Computing and Applications, 31:4, (1173-1187), Online publication date: 1-Apr-2019.
- Azad S, Al Fanah M and Lei C Physical Role Limitation - It's Classification and Prediction using Machine Learning Proceedings of the 2019 International Conference on Big Data and Education, (70-76)
- Adnane M, El M, El Fkihi S and Thami R Prediction Demand for Classified Ads Using Machine Learning Proceedings of the 2nd International Conference on Networking, Information Systems & Security, (1-6)
- Gil Y, Honaker J, Gupta S, Ma Y, D'Orazio V, Garijo D, Gadewar S, Yang Q and Jahanshad N Towards human-guided machine learning Proceedings of the 24th International Conference on Intelligent User Interfaces, (614-624)
- Itani S, Lecron F and Fortemps P (2019). Specifics of medical data mining for diagnosis aid, Expert Systems with Applications: An International Journal, 118:C, (300-314), Online publication date: 15-Mar-2019.
- Matyukhina A, Stakhanova N, Dalla Preda M and Perley C Adversarial Authorship Attribution in Open-Source Projects Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, (291-302)
- Berger P and Kompan M (2019). User Modeling for Churn Prediction in E-Commerce, IEEE Intelligent Systems, 34:2, (44-52), Online publication date: 1-Mar-2019.
- Sanin C, Haoxi Z, Shafiq I, Waris M, Silva de Oliveira C and Szczerbicki E (2022). Experience based knowledge representation for Internet of Things and Cyber Physical Systems with case studies, Future Generation Computer Systems, 92:C, (604-616), Online publication date: 1-Mar-2019.
- Papouskova M and Hajek P (2019). Two-stage consumer credit risk modelling using heterogeneous ensemble learning, Decision Support Systems, 118:C, (33-45), Online publication date: 1-Mar-2019.
- Lee K, Han C, Jun J, Lee J and Lee S (2019). Batch-Free Event Sequence Pattern Mining for Communication Stream Data with Instant and Persistent Events, Wireless Personal Communications: An International Journal, 105:2, (673-689), Online publication date: 1-Mar-2019.
- Huang J, Xue Y, Hu X, Jin H, Lu X and Liu Z (2019). Sentiment analysis of Chinese online reviews using ensemble learning framework, Cluster Computing, 22:2, (3043-3058), Online publication date: 1-Mar-2019.
- Serrano E, Suárez-Figueroa M, González-Pachón J and Gómez-Pérez A (2019). Toward proactive social inclusion powered by machine learning, Knowledge and Information Systems, 58:3, (651-667), Online publication date: 1-Mar-2019.
- Basiri J, Taghiyareh F and Faili H (2019). RACER, Neural Computing and Applications, 31:3, (895-908), Online publication date: 1-Mar-2019.
- Nguyen T Model-Based Book Recommender Systems using Naïve Bayes enhanced with Optimal Feature Selection Proceedings of the 2019 8th International Conference on Software and Computer Applications, (217-222)
- Sarsam S Reinforcing the Decision-making Process in Chemometrics Proceedings of the 2019 8th International Conference on Software and Computer Applications, (11-16)
- Jiang L, Zhang L, Li C and Wu J (2019). A Correlation-Based Feature Weighting Filter for Naive Bayes, IEEE Transactions on Knowledge and Data Engineering, 31:2, (201-213), Online publication date: 1-Feb-2019.
- Cui C, Liu B and Li G A Novel Feature Selection Method for Software Fault Prediction Model 2019 Annual Reliability and Maintainability Symposium (RAMS), (1-6)
- Ooi B, Abdul Rahim N, Zakaria A, Masnan M, Abdul Shukor S, Batyrshin I, Cross V, Kreinovich V and Rifqi M (2019). Random subspace oracle (RSO) ensemble to solve small sample-sized classification problems, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 36:4, (3225-3234), Online publication date: 1-Jan-2019.
- Zhao Y, Bo B, Feng Y, Xu C, Yu B and Chen J (2019). A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
- Rashid M, Rizzo G, Torchiano M, Mihindukulasooriya N, Corcho O and García-Castro R (2022). Completeness and consistency analysis for evolving knowledge bases, Web Semantics: Science, Services and Agents on the World Wide Web, 54:C, (48-71), Online publication date: 1-Jan-2019.
- Fazayeli H, Syed-Mohamad S and Md Akhir N (2019). Towards Auto-labelling Issue Reports for Pull-Based Software Development using Text Mining Approach, Procedia Computer Science, 161:C, (585-592), Online publication date: 1-Jan-2019.
- Ragab A, Yacout S, Ouali M and Osman H (2019). Prognostics of multiple failure modes in rotating machinery using a pattern-based classifier and cumulative incidence functions, Journal of Intelligent Manufacturing, 30:1, (255-274), Online publication date: 1-Jan-2019.
- Kim A, Choi W, Park J, Kim K and Lee U (2018). Interrupting Drivers for Interactions, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2:4, (1-28), Online publication date: 27-Dec-2018.
- Zhao Y, Baldini I, Sattigeri P, Padhi I, Lee Y and Smith E Data Driven Techniques for Organizing Scientific Articles Relevant to Biomimicry Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, (347-353)
- korba A Energy Fraud Detection in Advanced Metering Infrastructure AMI Proceedings of the 7th International Conference on Software Engineering and New Technologies, (1-6)
- Pooput P and Muenchaisri P Finding Impact Factors for Rejection of Pull Requests on GitHub Proceedings of the 2018 VII International Conference on Network, Communication and Computing, (70-76)
- Zhang Q and Dai J Feature Selection Based on Fuzzy Conditional Distinction Degree Neural Information Processing, (72-83)
- Luo G (2018). Progress Indication for Machine Learning Model Building, ACM SIGKDD Explorations Newsletter, 20:2, (1-12), Online publication date: 11-Dec-2018.
- Dalstam A, Engberg M, Nåfors D, Johansson B and Sundblom A A stepwise implementation of the virtual factory in manufacturing industry Proceedings of the 2018 Winter Simulation Conference, (3229-3240)
- Parlar T, Özel S and Song F (2018). QER, Human-centric Computing and Information Sciences, 8:1, (1-19), Online publication date: 1-Dec-2018.
- Habayeb M, Murtaza S, Miranskyy A and Bener A (2018). On the Use of Hidden Markov Model to Predict the Time to Fix Bugs, IEEE Transactions on Software Engineering, 44:12, (1224-1244), Online publication date: 1-Dec-2018.
- Budhiraja S and Mago V Extracting Learning Outcomes Using Machine Learning and White Space Analysis Proceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good, (7-12)
- Lagus J, Longi K, Klami A and Hellas A (2018). Transfer-Learning Methods in Programming Course Outcome Prediction, ACM Transactions on Computing Education, 18:4, (1-18), Online publication date: 13-Nov-2018.
- Koitz-Hristov R and Wotawa F (2018). Applying algorithm selection to abductive diagnostic reasoning, Applied Intelligence, 48:11, (3976-3994), Online publication date: 1-Nov-2018.
- Romero F and Delimitrou C Mage Proceedings of the 27th International Conference on Parallel Architectures and Compilation Techniques, (1-13)
- Hussain M, Hussain S, Zhang W, Zhu W, Theodorou P and Abidi S Mining Moodle Data to Detect the Inactive and Low-performance Students during the Moodle Course Proceedings of the 2nd International Conference on Big Data Research, (133-140)
- Noei E, Da Costa D and Zou Y Winning the app production rally Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (283-294)
- Keller B, Lonczynski J, D'Angelo T and Delabrida S Evaluation of Wearable Devices for Belt Conveyor Inspection Using Augmented Reality Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, (1-9)
- Cascaes R, Lameira K, Sarmanho R, Pinheiro K, Mota M, Pereira A and Neto N Adaptation and Automation of a Cancellation Test for Evaluation of Exploratory Visual Behavior Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, (1-9)
- Wang W, Guo H, Li Z, Shen Y and Barenji A Towards Open and Automated Customer Service Proceedings of the 2nd International Conference on Computer Science and Application Engineering, (1-6)
- Kuutila M, Mäntylä M, Claes M, Elovainio M and Adams B Using experience sampling to link software repositories with emotions and work well-being Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, (1-10)
- Primeau N, Falcon R, Abielmona R and Petriu E (2018). A Review of Computational Intelligence Techniques in Wireless Sensor and Actuator Networks, IEEE Communications Surveys & Tutorials, 20:4, (2822-2854), Online publication date: 1-Oct-2018.
- Angiulli F and Narvaez E (2018). Pruning strategies for nearest neighbor competence preservation learners, Neurocomputing, 308:C, (8-20), Online publication date: 25-Sep-2018.
- Dang C, Seiderer A and André E Theodor Proceedings of the 5th international Workshop on Sensor-based Activity Recognition and Interaction, (1-7)
- Murauer M, Haslgrübler M and Ferscha A Natural Pursuits for Eye Tracker Calibration Proceedings of the 5th international Workshop on Sensor-based Activity Recognition and Interaction, (1-10)
- Sarmah U, Bhattacharyya D and Kalita J (2018). A survey of detection methods for XSS attacks, Journal of Network and Computer Applications, 118:C, (113-143), Online publication date: 15-Sep-2018.
- Krachunov M, Nisheva M and Vassilev D Machine Learning-Driven Noise Separation in High Variation Genomics Sequencing Datasets Artificial Intelligence: Methodology, Systems, and Applications, (173-185)
- Qu Y, Liu T, Chi J, Jin Y, Cui D, He A and Zheng Q node2defect: using network embedding to improve software defect prediction Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, (844-849)
- Ma L, Juefei-Xu F, Zhang F, Sun J, Xue M, Li B, Chen C, Su T, Li L, Liu Y, Zhao J and Wang Y DeepGauge: multi-granularity testing criteria for deep learning systems Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, (120-131)
- Zhang M, Zhang Y, Zhang L, Liu C and Khurshid S DeepRoad: GAN-based metamorphic testing and input validation framework for autonomous driving systems Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, (132-142)
- Ben Slima I and Borgi A Features’ Associations in Fuzzy Ensemble Classifiers Database and Expert Systems Applications, (369-377)
- Urbanowicz R, Olson R, Schmitt P, Meeker M and Moore J (2018). Benchmarking relief-based feature selection methods for bioinformatics data mining, Journal of Biomedical Informatics, 85:C, (168-188), Online publication date: 1-Sep-2018.
- Boselli R, Cesarini M, Mercorio F and Mezzanzanica M (2018). Classifying online Job Advertisements through Machine Learning, Future Generation Computer Systems, 86:C, (319-328), Online publication date: 1-Sep-2018.
- Wosiak A, Glinka K and Zakrzewska D (2018). Multi-label classification methods for improving comorbidities identification, Computers in Biology and Medicine, 100:C, (279-288), Online publication date: 1-Sep-2018.
- Qiu C, Jiang L and Cai Z Using Differential Evolution to Estimate Labeler Quality for Crowdsourcing PRICAI 2018: Trends in Artificial Intelligence, (165-173)
- Syed T and Nair S Personalized Recommendation System for Advanced Learning Management Systems Proceedings of the 8th International Conference on Information Communication and Management, (90-95)
- Cui L, Bai L, Rossi L, Zhang Z, Jiao Y and Hancock E A Preliminary Survey of Analyzing Dynamic Time-Varying Financial Networks Using Graph Kernels Structural, Syntactic, and Statistical Pattern Recognition, (237-247)
- Oviatt S, Hang K, Zhou J, Yu K and Chen F (2018). Dynamic Handwriting Signal Features Predict Domain Expertise, ACM Transactions on Interactive Intelligent Systems, 8:3, (1-21), Online publication date: 8-Aug-2018.
- Ip R, Ang L, Seng K, Broster J and Pratley J (2018). Big data and machine learning for crop protection, Computers and Electronics in Agriculture, 151:C, (376-383), Online publication date: 1-Aug-2018.
- Benmessahel I, Xie K and Chellal M (2018). A new evolutionary neural networks based on intrusion detection systems using multiverse optimization, Applied Intelligence, 48:8, (2315-2327), Online publication date: 1-Aug-2018.
- Wu M and Lu J Automated Machine Learning Algorithm Mining for Classification Problem Machine Learning and Data Mining in Pattern Recognition, (380-392)
- Theodorou T, Mporas I, Potamitis I and Fakotakis N Data-Driven Audio Feature Selection for Audio Quality Recognition in Broadcast News Proceedings of the 10th Hellenic Conference on Artificial Intelligence, (1-6)
- Tomlinson A, Bryans J and Shaikh S Using a one-class compound classifier to detect in-vehicle network attacks Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1926-1929)
- Abu Shanab A and Khoshgoftaar T Filter-Based Subset Selection for Easy, Moderate, and Hard Bioinformatics Data 2018 IEEE International Conference on Information Reuse and Integration (IRI), (372-377)
- Abu Shanab A and Khoshgoftaar T Is Gene Selection Enough for Imbalanced Bioinformatics Data? 2018 IEEE International Conference on Information Reuse and Integration (IRI), (346-355)
- Ribeiro S and Pappa G (2018). Strategies for combining Twitter users geo-location methods, Geoinformatica, 22:3, (563-587), Online publication date: 1-Jul-2018.
- Sahu S and Shrivas A (2018). Comparative Study of Classification Models with Genetic Search Based Feature Selection Technique, International Journal of Applied Evolutionary Computation, 9:3, (1-11), Online publication date: 1-Jul-2018.
- Hu Z, Bodyanskiy Y, Tyshchenko O and Boiko O (2018). A neuro-fuzzy Kohonen network for data stream possibilistic clustering and its online self-learning procedure, Applied Soft Computing, 68:C, (710-718), Online publication date: 1-Jul-2018.
- Camara C, Peris-Lopez P, Gonzalez-Manzano L and Tapiador J (2018). Real-time electrocardiogram streams for continuous authentication, Applied Soft Computing, 68:C, (784-794), Online publication date: 1-Jul-2018.
- Duque R, Arbelaez A and Díaz J (2018). Online over time processing of combinatorial problems, Constraints, 23:3, (310-334), Online publication date: 1-Jul-2018.
- Fiacco J and Rosé C Towards domain general detection of transactive knowledge building behavior Proceedings of the Fifth Annual ACM Conference on Learning at Scale, (1-11)
- Vrbančič G, Fister I and Podgorelec V Swarm Intelligence Approaches for Parameter Setting of Deep Learning Neural Network Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics, (1-8)
- Asiri M, Nemati H and Sadri F Feature Reduction Improves Classification Accuracy in Healthcare Proceedings of the 22nd International Database Engineering & Applications Symposium, (193-198)
- Behroozi M and Parnin C Can we predict stressful technical interview settings through eye-tracking? Proceedings of the Workshop on Eye Movements in Programming, (1-5)
- Sivaprasad S, Joshi T, Agrawal R and Pedanekar N Multimodal Continuous Prediction of Emotions in Movies using Long Short-Term Memory Networks Proceedings of the 2018 ACM on International Conference on Multimedia Retrieval, (413-419)
- Giacomelli D and Faria E Study and Characterization of the Main Tools for Human Activity Recognition using Accelerometer Sensors Proceedings of the XIV Brazilian Symposium on Information Systems, (1-8)
- Yamak Z, Saunier J and Vercouter L (2018). SocksCatch, Knowledge-Based Systems, 149:C, (124-142), Online publication date: 1-Jun-2018.
- de Sá A, Pereira A and Pappa G (2018). A customized classification algorithm for credit card fraud detection, Engineering Applications of Artificial Intelligence, 72:C, (21-29), Online publication date: 1-Jun-2018.
- Gil D, Girela J, Azorín J, De Juan A and De Juan J (2018). Identifying central and peripheral nerve fibres with an artificial intelligence approach, Applied Soft Computing, 67:C, (276-285), Online publication date: 1-Jun-2018.
- Rathore S, Loia V and Park J (2018). SpamSpotter, Applied Soft Computing, 67:C, (920-932), Online publication date: 1-Jun-2018.
- Tian Y, Pei K, Jana S and Ray B DeepTest Proceedings of the 40th International Conference on Software Engineering, (303-314)
- Rath M, Rendall J, Guo J, Cleland-Huang J and Mäder P Traceability in the wild Proceedings of the 40th International Conference on Software Engineering, (834-845)
- Abdessalem R, Nejati S, Briand L and Stifter T Testing vision-based control systems using learnable evolutionary algorithms Proceedings of the 40th International Conference on Software Engineering, (1016-1026)
- González M, Bergmeir C, Triguero I, Rodríguez Y and Benítez J (2018). Self-labeling techniques for semi-supervised time series classification, Knowledge and Information Systems, 55:2, (493-528), Online publication date: 1-May-2018.
- Puri M, Du X, Varde A and de Melo G Mapping Ordinances and Tweets using Smart City Characteristics to Aid Opinion Mining Companion Proceedings of the The Web Conference 2018, (1721-1728)
- Zhang C, Xue Q, Waghmare A, Meng R, Jain S, Han Y, Li X, Cunefare K, Ploetz T, Starner T, Inan O and Abowd G FingerPing Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, (1-10)
- Kosch T, Hassib M, Woźniak P, Buschek D and Alt F Your Eyes Tell Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, (1-13)
- Zhao J, Bhatt C, Cooper M and Shamma D Flexible Learning with Semantic Visual Exploration and Sequence-Based Recommendation of MOOC Videos Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, (1-13)
- Huang T, Chang J and Bigham J Evorus Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, (1-13)
- Ruan Y, Durresi A and Alfantoukh L (2018). Using Twitter trust network for stock market analysis, Knowledge-Based Systems, 145:C, (207-218), Online publication date: 1-Apr-2018.
- McAllister P, Zheng H, Bond R and Moorhead A (2018). Combining deep residual neural network features with supervised machine learning algorithms to classify diverse food image datasets, Computers in Biology and Medicine, 95:C, (217-233), Online publication date: 1-Apr-2018.
- Gupta M, Govil M and Singh G (2018). Text-mining and pattern-matching based prediction models for detecting vulnerable files in web applications, Journal of Web Engineering, 17:1-2, (28-44), Online publication date: 1-Mar-2018.
- Diab D and El Hindi K (2018). Using differential evolution for improving distance measures of nominal values, Applied Soft Computing, 64:C, (14-34), Online publication date: 1-Mar-2018.
- Ferreira R, Pimentel M and Cristo M (2018). A wikification prediction model based on the combination of latent, dyadic, and monadic features, Journal of the Association for Information Science and Technology, 69:3, (380-394), Online publication date: 1-Mar-2018.
- Fong S, Biuk-Aghai R and Millham R Swarm Search Methods in Weka for Data Mining Proceedings of the 2018 10th International Conference on Machine Learning and Computing, (122-127)
- Fuhr N (2018). Some Common Mistakes In IR Evaluation, And How They Can Be Avoided, ACM SIGIR Forum, 51:3, (32-41), Online publication date: 22-Feb-2018.
- Mezei J and Nikou S (2018). Fuzzy optimization to improve mobile health and wellness recommendation systems, Knowledge-Based Systems, 142:C, (108-116), Online publication date: 15-Feb-2018.
- Ebrahimi S, Vahabi H, Prockup M and Nieto O Predicting Audio Advertisement Quality Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, (153-161)
- Gupta A, Banerjee I and Rubin D (2018). Automatic information extraction from unstructured mammography reports using distributed semantics, Journal of Biomedical Informatics, 78:C, (78-86), Online publication date: 1-Feb-2018.
- Oliveira R, Papa J, Pereira A and Tavares J (2018). Computational methods for pigmented skin lesion classification in images, Neural Computing and Applications, 29:3, (613-636), Online publication date: 1-Feb-2018.
- Estivill-Castro V, Lombardi M and Marani A Improving binary classification of web pages using an ensemble of feature selection algorithms Proceedings of the Australasian Computer Science Week Multiconference, (1-10)
- Urraca R, Sodupe-Ortega E, Antonanzas J, Antonanzas-Torres F and Martinez-de-Pison F (2018). Evaluation of a novel GA-based methodology for model structure selection, Neurocomputing, 271:C, (9-17), Online publication date: 3-Jan-2018.
- De Luise D, Saad B, Pescio P and Saliwonczyk C (2018). Autistic Language Processing by Patterns Detection, International Journal of Artificial Life Research, 8:1, (36-61), Online publication date: 1-Jan-2018.
- Tang D, Zhang M, Xu J, Zhang X, Yang F, Li H, Feng L, Wang K, Zheng Y and Vlamos P (2018). Application of Data Mining Technology on Surveillance Report Data of HIV/AIDS High-Risk Group in Urumqi from 2009 to 2015, Complexity, 2018, Online publication date: 1-Jan-2018.
- Jiménez-Bravo D, De Paz J, Villarrubia G and Bajo J (2018). Dealing with Demand in Electric Grids with an Adaptive Consumption Management Platform, Complexity, 2018, (13), Online publication date: 1-Jan-2018.
- Wosiak A, Zakrzewska D and Czarnowski I (2018). Integrating Correlation-Based Feature Selection and Clustering for Improved Cardiovascular Disease Diagnosis, Complexity, 2018, Online publication date: 1-Jan-2018.
- Hernndez N, Alonso J and Ocaa M (2017). Fuzzy classifier ensembles for hierarchical WiFi-based semantic indoor localization, Expert Systems with Applications: An International Journal, 90:C, (394-404), Online publication date: 30-Dec-2017.
- Nikravesh A, Ajila S and Lung C (2017). An autonomic prediction suite for cloud resource provisioning, Journal of Cloud Computing: Advances, Systems and Applications, 6:1, (1-20), Online publication date: 1-Dec-2017.
- Feng C and Liao S (2017). Scalable Gaussian Kernel Support Vector Machines with Sublinear Training Time Complexity, Information Sciences: an International Journal, 418:C, (480-494), Online publication date: 1-Dec-2017.
- Lughofer E, Richter R, Neissl U, Heidl W, Eitzinger C and Radauer T (2017). Explaining classifier decisions linguistically for stimulating and improving operators labeling behavior, Information Sciences: an International Journal, 420:C, (16-36), Online publication date: 1-Dec-2017.
- Wen L, Min F and Wang S (2017). A two-stage discretization algorithm based on information entropy, Applied Intelligence, 47:4, (1169-1185), Online publication date: 1-Dec-2017.
- Altaher A (2017). An improved Android malware detection scheme based on an evolving hybrid neuro-fuzzy classifier (EHNFC) and permission-based features, Neural Computing and Applications, 28:12, (4147-4157), Online publication date: 1-Dec-2017.
- El Fouki M, Aknin N and El. Kadiri K Intelligent Adapted e-Learning System based on Deep Reinforcement Learning Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems, (1-6)
- Liu X, Liu K, Li M, Lu F, Liao M and Yang R SHE Proceedings of the 1st ACM SIGSPATIAL Workshop on Prediction of Human Mobility, (1-10)
- Zhou B and Buyya R A Group-based Fault Tolerant Mechanism for Heterogeneous Mobile Clouds Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, (373-382)
- Cristo M, Hanada R, Carvalho A, Lores F and Pimentel M Fast Word Recognition for Noise channel-based Models in Scenarios with Noise Specific Domain Knowledge Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, (607-616)
- Jondya A and Iswanto B (2017). Indonesians Traditional Music Clustering Based on Audio Features, Procedia Computer Science, 116:C, (174-181), Online publication date: 1-Nov-2017.
- Hadi W, Issa G and Ishtaiwi A (2017). ACPRISM, Information Sciences: an International Journal, 417:C, (287-300), Online publication date: 1-Nov-2017.
- Khvostikov A, Krylov A, Kamalov J and Megroyan A (2017). Ultrasound despeckling by anisotropic diffusion and total variation methods for liver fibrosis diagnostics, Image Communication, 59:C, (3-11), Online publication date: 1-Nov-2017.
- Kavakiotis I, Samaras P, Triantafyllidis A and Vlahavas I (2017). FIFS, Computers in Biology and Medicine, 90:C, (146-154), Online publication date: 1-Nov-2017.
- Sun Y, Chen C, Wang Q and Boehm B Improving missing issue-commit link recovery using positive and unlabeled data Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, (147-152)
- Kraemer F, Ammar D, Braten A, Tamkittikhun N and Palma D Solar energy prediction for constrained IoT nodes based on public weather forecasts Proceedings of the Seventh International Conference on the Internet of Things, (1-8)
- Dilli R, Filho H, Pernas A and Yamin A EXEHDA-RR Proceedings of the 23rd Brazillian Symposium on Multimedia and the Web, (293-300)
- Mcheick H, Saleh L, Ajami H and Mili H HCES Proceedings of the 1st International Conference on Internet of Things and Machine Learning, (1-10)
- Pendharkar P (2017). Bayesian posterior misclassification error risk distributions for ensemble classifiers, Engineering Applications of Artificial Intelligence, 65:C, (484-492), Online publication date: 1-Oct-2017.
- Oliveira R, Pereira A and Tavares J (2017). Skin lesion computational diagnosis of dermoscopic images, Computer Methods and Programs in Biomedicine, 149:C, (43-53), Online publication date: 1-Oct-2017.
- Arar m and Ayan K (2017). A feature dependent Naive Bayes approach and its application to the software defect prediction problem, Applied Soft Computing, 59:C, (197-209), Online publication date: 1-Oct-2017.
- Chang W, Tay K and Lim C (2017). A New Evolving Tree-Based Model with Local Re-learning for Document Clustering and Visualization, Neural Processing Letters, 46:2, (379-409), Online publication date: 1-Oct-2017.
- Lenhard J, Hassan M, Blom M and Herold S Are code smell detection tools suitable for detecting architecture degradation? Proceedings of the 11th European Conference on Software Architecture: Companion Proceedings, (138-144)
- Hou C, Jiao Y, Nie F, Luo T and Zhou Z (2017). 2D Feature Selection by Sparse Matrix Regression, IEEE Transactions on Image Processing, 26:9, (4255-4268), Online publication date: 1-Sep-2017.
- Watanabe Y and Kun L (2017). Long-term influence of user identification based on touch operation on smart phone, Procedia Computer Science, 112:C, (2529-2536), Online publication date: 1-Sep-2017.
- Liu Y, Bi J and Fan Z (2017). Multi-class sentiment classification, Expert Systems with Applications: An International Journal, 80:C, (323-339), Online publication date: 1-Sep-2017.
- Ucar E and Ozhan E (2017). The Analysis of Firewall Policy Through Machine Learning and Data Mining, Wireless Personal Communications: An International Journal, 96:2, (2891-2909), Online publication date: 1-Sep-2017.
- Yan K and Ryoo H (2017). Strong valid inequalities for Boolean logical pattern generation, Journal of Global Optimization, 69:1, (183-230), Online publication date: 1-Sep-2017.
- Castellini J, Poggioni V and Sorbi G Fake Twitter followers detection by denoising autoencoder Proceedings of the International Conference on Web Intelligence, (195-202)
- Matinnejad R, Nejati S and Briand L Automated testing of hybrid Simulink/Stateflow controllers: industrial case studies Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, (938-943)
- Vizer L and Sears A (2017). Efficacy of personalized models in discriminating high cognitive demand conditions using text-based interactions, International Journal of Human-Computer Studies, 104:C, (80-96), Online publication date: 1-Aug-2017.
- Costa E, Fonseca B, Santana M, de Arajo F and Rego J (2017). Evaluating the effectiveness of educational data mining techniques for early prediction of students' academic failure in introductory programming courses, Computers in Human Behavior, 73:C, (247-256), Online publication date: 1-Aug-2017.
- Ali M and Mohamed Y (2017). A method for clustering unlabeled BIM objects using entropy and TF-IDF with RDF encoding, Advanced Engineering Informatics, 33:C, (154-163), Online publication date: 1-Aug-2017.
- Doycheva K, Horn G, Koch C, Schumann A and Knig M (2017). Assessment and weighting of meteorological ensemble forecast members based on supervised machine learning with application to runoff simulations and flood warning, Advanced Engineering Informatics, 33:C, (427-439), Online publication date: 1-Aug-2017.
- Mills C, Bavota G, Haiduc S, Oliveto R, Marcus A and Lucia A (2017). Predicting Query Quality for Applications of Text Retrieval to Software Engineering Tasks, ACM Transactions on Software Engineering and Methodology, 26:1, (1-45), Online publication date: 20-Jul-2017.
- de Sá A, Pappa G and Freitas A Towards a method for automatically selecting and configuring multi-label classification algorithms Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1125-1132)
- Taleb R, Seddiki L, Guelton K and Akdag H Merging fuzzy observer-based state estimation and database classification for fault detection and diagnosis of an actuated seat 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-6)
- Jarraya A, Arour K, Bouzeghoub A and Borgi A Feature selection based on Choquet integral for human activity recognition 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-6)
- Zahera H and El-Sisi A (2017). Accelerating Training Process in Logistic Regression Model using OpenCL Framework, International Journal of Grid and High Performance Computing, 9:3, (34-45), Online publication date: 1-Jul-2017.
- Taylor P, Griffiths N, Bhalerao A, Xu Z, Gelencser A and Popham T (2017). Investigating the Feasibility of Vehicle Telemetry Data as a Means of Predicting Driver Workload, International Journal of Mobile Human Computer Interaction, 9:3, (54-72), Online publication date: 1-Jul-2017.
- Vargas-Vera M, Salles C, Parot J and Letelier S (2017). A E-Business Case of Study, International Journal of Knowledge Society Research, 8:3, (1-20), Online publication date: 1-Jul-2017.
- Krömer P, Heckenbergerová J and Musilek P Accurate mixed weibull distribution fitting by differential evolution Proceedings of the Genetic and Evolutionary Computation Conference, (1161-1168)
- Safdar S, Lu H, Yue T and Ali S Mining cross product line rules with multi-objective search and machine learning Proceedings of the Genetic and Evolutionary Computation Conference, (1319-1326)
- Chen Y, Yue X, Fujita H and Fu S (2017). Three-way decision support for diagnosis on focal liver lesions, Knowledge-Based Systems, 127:C, (85-99), Online publication date: 1-Jul-2017.
- Fatima M, Hasan K, Anwar S and Nawab R (2017). Multilingual author profiling on Facebook, Information Processing and Management: an International Journal, 53:4, (886-904), Online publication date: 1-Jul-2017.
- Hung C (2017). Word of mouth quality classification based on contextual sentiment lexicons, Information Processing and Management: an International Journal, 53:4, (751-763), Online publication date: 1-Jul-2017.
- Oliva J and Garcia Rosa J (2017). How an epileptic EEG segment, used as reference, can influence a cross-correlation classifier?, Applied Intelligence, 47:1, (178-196), Online publication date: 1-Jul-2017.
- Kocher M and Savoy J Author clustering using Spatium Proceedings of the 17th ACM/IEEE Joint Conference on Digital Libraries, (265-268)
- Barcelos M, Bernardini F, Barcelos A and Vaz Silva G City Ranking Based on Financial Flux Indicator Clustering Proceedings of the 18th Annual International Conference on Digital Government Research, (452-460)
- Npoles G, Falcon R, Papageorgiou E, Bello R and Vanhoof K (2017). Rough cognitive ensembles, International Journal of Approximate Reasoning, 85:C, (79-96), Online publication date: 1-Jun-2017.
- Tzirakis P and Tjortjis C (2017). T3C, Advances in Data Analysis and Classification, 11:2, (353-370), Online publication date: 1-Jun-2017.
- El-Alfy E and Qureshi M (2017). Robust content authentication of gray and color images using lbp-dct markov-based features, Multimedia Tools and Applications, 76:12, (14535-14556), Online publication date: 1-Jun-2017.
- Cashman M, Catlett J, Cohen M, Buan N, Sakkaff Z, Pierobon M and Kelley C BioSIMP Proceedings of the 12th International Workshop on Software Engineering for Science, (2-8)
- Taylor P, Griffiths N, Barakat L and Miles S Bootstrapping Trust with Partial and Subjective Observability Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, (1745-1747)
- Das A, Pathak P, Chuah C and Mohapatra P (2017). Privacy-aware contextual localization using network traffic analysis, Computer Networks: The International Journal of Computer and Telecommunications Networking, 118:C, (24-36), Online publication date: 8-May-2017.
- Pes B, Dess N and Angioni M (2017). Exploiting the ensemble paradigm for stable feature selection, Information Fusion, 35:C, (132-147), Online publication date: 1-May-2017.
- Lombardi I and Vernero F (2017). What and who with, International Journal of Human-Computer Studies, 101:C, (62-75), Online publication date: 1-May-2017.
- (2017). Emotion recognition using mobile phones, Computers and Electrical Engineering, 60:C, (1-13), Online publication date: 1-May-2017.
- Oliveira T, Satoh K, Novais P, Neves J and Hosobe H (2017). A dynamic default revision mechanism for speculative computation, Autonomous Agents and Multi-Agent Systems, 31:3, (656-695), Online publication date: 1-May-2017.
- Neto R, Jorge Adeodato P and Carolina Salgado A (2017). A framework for data transformation in Credit Behavioral Scoring applications based on Model Driven Development, Expert Systems with Applications: An International Journal, 72:C, (293-305), Online publication date: 15-Apr-2017.
- Bazhenova E and Weske M Optimal acquisition of input data for decision taking in business processes Proceedings of the Symposium on Applied Computing, (703-710)
- Hamami D, Baghdad A and Shankland C (2017). Decision Support based on Bio-PEPA Modeling and Decision Tree Induction, International Journal of Information Systems in the Service Sector, 9:2, (71-101), Online publication date: 1-Apr-2017.
- Ragab A, De Carné De Carnavalet X, Yacout S and Ouali M (2017). Face recognition using multi-class Logical Analysis of Data, Pattern Recognition and Image Analysis, 27:2, (276-288), Online publication date: 1-Apr-2017.
- Antonucci A and Corani G (2017). The multilabel naive credal classifier, International Journal of Approximate Reasoning, 83:C, (320-336), Online publication date: 1-Apr-2017.
- Ngo-Ye T, Sinha A and Sen A (2017). Predicting the helpfulness of online reviews using a scripts-enriched text regression model, Expert Systems with Applications: An International Journal, 71:C, (98-110), Online publication date: 1-Apr-2017.
- (2017). Prototype selection to improve monotonic nearest neighbor, Engineering Applications of Artificial Intelligence, 60:C, (128-135), Online publication date: 1-Apr-2017.
- Qiu C, Jiang L and Li C (2017). Randomly selected decision tree for test-cost sensitive learning, Applied Soft Computing, 53:C, (27-33), Online publication date: 1-Apr-2017.
- Elsayed H and Syed L An automatic early risk classification of hard coronary heart diseases using framingham scoring model Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, (1-8)
- Bandaru S, Ng A and Deb K (2017). Data mining methods for knowledge discovery in multi-objective optimization, Expert Systems with Applications: An International Journal, 70:C, (139-159), Online publication date: 15-Mar-2017.
- Su Y, Luarn P, Lee Y and Yen S (2017). Creating an invalid defect classification model using text mining on server development, Journal of Systems and Software, 125:C, (197-206), Online publication date: 1-Mar-2017.
- tajduhar I, Mamula M, Mileti D and nal G (2017). Semi-automated detection of anterior cruciate ligament injury from MRI, Computer Methods and Programs in Biomedicine, 140:C, (151-164), Online publication date: 1-Mar-2017.
- Erikson V. De S. Rosa R and Ferreira De Lucena V (2017). Contextualizing and capturing individual user interactions in shared iTV environments, Multimedia Tools and Applications, 76:6, (8573-8595), Online publication date: 1-Mar-2017.
- Li C, Jiang L, Li H, Wu J and Zhang P (2017). Toward value difference metric with attribute weighting, Knowledge and Information Systems, 50:3, (795-825), Online publication date: 1-Mar-2017.
- Bunkhumpornpat C and Sinapiromsaran K (2017). DBMUTE, Knowledge and Information Systems, 50:3, (827-850), Online publication date: 1-Mar-2017.
- Iliou T, Anagnostopoulos C, Stephanakis I and Anastassopoulos G (2017). A novel data preprocessing method for boosting neural network performance, Information Sciences: an International Journal, 380:C, (92-100), Online publication date: 20-Feb-2017.
- Wang B and Klabjan D Regularization for unsupervised deep neural nets Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, (2681-2681)
- Zhang X, Li Y, Kotagiri R, Wu L, Tari Z and Cheriet M (2017). KRNN, Pattern Recognition, 62:C, (33-44), Online publication date: 1-Feb-2017.
- Yazdanbakhsh O, Zhou Y and Dick S (2017). An intelligent system for livestock disease surveillance, Information Sciences: an International Journal, 378:C, (26-47), Online publication date: 1-Feb-2017.
- Quintana-Amate S, Bermell-Garcia P, Tiwari A and Turner C (2017). A new knowledge sourcing framework for knowledge-based engineering, Computers and Industrial Engineering, 104:C, (35-50), Online publication date: 1-Feb-2017.
- Calatroni L, Gennip Y, Schönlieb C, Rowland H and Flenner A (2017). Graph Clustering, Variational Image Segmentation Methods and Hough Transform Scale Detection for Object Measurement in Images, Journal of Mathematical Imaging and Vision, 57:2, (269-291), Online publication date: 1-Feb-2017.
- Du J and He J Proportioning documents over categories based on word embeddings Proceedings of the Australasian Computer Science Week Multiconference, (1-5)
- Benavoli A, Corani G, Demšar J and Zaffalon M (2017). Time for a change, The Journal of Machine Learning Research, 18:1, (2653-2688), Online publication date: 1-Jan-2017.
- Alhajri R, Alhunaiyyan A and AlMousa E (2017). Understanding the Impact of Individual Differences on Learner Performance Using Hypermedia Systems, International Journal of Web-Based Learning and Teaching Technologies, 12:1, (1-18), Online publication date: 1-Jan-2017.
- Alhajri R, Alhunaiyyan A and AlMousa E (2017). Understanding the Impact of Individual Differences on Learner Performance Using Hypermedia Systems, International Journal of Web-Based Learning and Teaching Technologies, 12:1, (1-18), Online publication date: 1-Jan-2017.
- Alhajri R, Alhunaiyyan A and AlMousa E (2017). Understanding the Impact of Individual Differences on Learner Performance Using Hypermedia Systems, International Journal of Web-Based Learning and Teaching Technologies, 12:1, (1-18), Online publication date: 1-Jan-2017.
- Pabreja K (2017). Comparison of Different Classification Techniques for Educational Data, International Journal of Information Systems in the Service Sector, 9:1, (54-67), Online publication date: 1-Jan-2017.
- Czyzewski A, Kostek B, Kurowski A, Szczuko P, Lech M, Odya P and Kwiatkowska A (2017). Multimodal approach for polysensory stimulation and diagnosis of subjects with severe communication disorders, Procedia Computer Science, 121:C, (238-243), Online publication date: 1-Jan-2017.
- Kocher M and Savoy J (2017). A simple and efficient algorithm for authorship verification, Journal of the Association for Information Science and Technology, 68:1, (259-269), Online publication date: 1-Jan-2017.
- Cho H, Park H, Kim C and Kim K (2016). Investigation of the Effect of “Fog of War” in the Prediction of StarCraft Strategy Using Machine Learning, Computers in Entertainment, 14:1, (1-16), Online publication date: 29-Dec-2016.
- Brynjolfsson E, Geva T and Reichman S (2016). Crowd-squared, MIS Quarterly, 40:4, (941-961), Online publication date: 1-Dec-2016.
- Farid D, Al-Mamun M, Manderick B and Nowe A (2016). An adaptive rule-based classifier for mining big biological data, Expert Systems with Applications: An International Journal, 64:C, (305-316), Online publication date: 1-Dec-2016.
- Erdal H and Karahanolu l (2016). Bagging ensemble models for bank profitability, Applied Soft Computing, 49:C, (861-867), Online publication date: 1-Dec-2016.
- Dolado J, Rodriguez D, Harman M, Langdon W and Sarro F (2016). Evaluation of estimation models using the Minimum Interval of Equivalence, Applied Soft Computing, 49:C, (956-967), Online publication date: 1-Dec-2016.
- Zhao L, Jiang L and Dong X (2016). Supervised feature selection method via potential value estimation, Cluster Computing, 19:4, (2039-2049), Online publication date: 1-Dec-2016.
- Oliva J, Lee H, Spolaôr N, Coy C and Wu F (2016). Prototype system for feature extraction, classification and study of medical images, Expert Systems with Applications: An International Journal, 63:C, (267-283), Online publication date: 30-Nov-2016.
- Bai J and Wang J (2016). Improving malware detection using multi-view ensemble learning, Security and Communication Networks, 9:17, (4227-4241), Online publication date: 25-Nov-2016.
- (2016). A multiobjective weighted voting ensemble classifier based on differential evolution algorithm for text sentiment classification, Expert Systems with Applications: An International Journal, 62:C, (1-16), Online publication date: 15-Nov-2016.
- Leme L, Renso C, Nunes B, Lopes G, Casanova M and Vidal V Searching for Data Sources for the Semantic Enrichment of Trajectories Proceedings of the 17th International Conference on Web Information Systems Engineering - Volume 10042, (238-246)
- Shin K and Miyazaki S (2016). A Fast and Accurate Feature Selection Algorithm Based on Binary Consistency Measure, Computational Intelligence, 32:4, (646-667), Online publication date: 1-Nov-2016.
- K. N, Islam M, Hamou-Lhadj A and Hamdaqa M An effective method for detecting duplicate crash reports using crash traces and hidden Markov models Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, (75-84)
- Thakur G, Sparks K, Li R, Stewart R and Urban M Demonstrating PlanetSense Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (1-4)
- Hanada R, Pimentel M, Cristo M and Lores F Effective Spelling Correction for Eye-based Typing using domain-specific Information about Error Distribution Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, (1723-1732)
- (2016). Autonomously evolving classifier TEDAClass, Information Sciences: an International Journal, 366:C, (1-11), Online publication date: 20-Oct-2016.
- Tzalavra A, Dalakleidi K, Zacharaki E, Tsiaparas N, Constantinidis F, Paragios N and Nikita K Comparison of Multi-resolution Analysis Patterns for Texture Classification of Breast Tumors Based on DCE-MRI Machine Learning in Medical Imaging, (296-304)
- Pardede R, Tóth L, Jeney G, Kovács F and Hosszú G (2016). Four-Layer Grapheme Model for Computational Paleography, Journal of Information Technology Research, 9:4, (64-82), Online publication date: 1-Oct-2016.
- Suzuki N and Tsuda K (2016). Radio Quality Clustering to Induce the Behavior Toward Optimal Wireless Connection, Procedia Computer Science, 96:C, (939-945), Online publication date: 1-Oct-2016.
- Baron G (2016). On Influence of Representations of Discretized Data on Performance of a Decision System, Procedia Computer Science, 96:C, (1418-1427), Online publication date: 1-Oct-2016.
- Ojeme B and Mbogho A (2016). Selecting Learning Algorithms for Simultaneous Identification of Depression and Comorbid Disorders, Procedia Computer Science, 96:C, (1294-1303), Online publication date: 1-Oct-2016.
- García-Rudolph A and Gibert K (2016). Understanding effects of cognitive rehabilitation under a knowledge discovery approach, Engineering Applications of Artificial Intelligence, 55:C, (165-185), Online publication date: 1-Oct-2016.
- Calix R, Cabrera A and Iqbal I Analysis of Parallel Architectures for Network Intrusion Detection Proceedings of the 5th Annual Conference on Research in Information Technology, (7-12)
- Truong D and Cheng G (2016). Detecting domain-flux botnet based on DNS traffic features in managed network, Security and Communication Networks, 9:14, (2338-2347), Online publication date: 25-Sep-2016.
- Onan A, Korukoğlu S and Bulut H (2016). Ensemble of keyword extraction methods and classifiers in text classification, Expert Systems with Applications: An International Journal, 57:C, (232-247), Online publication date: 15-Sep-2016.
- Bertini Junior J, Nicoletti M and Zhao L (2016). An embedded imputation method via Attribute-based Decision Graphs, Expert Systems with Applications: An International Journal, 57:C, (159-177), Online publication date: 15-Sep-2016.
- Kong G, Jiang L and Li C (2016). Beyond accuracy, Pattern Recognition Letters, 80:C, (165-171), Online publication date: 1-Sep-2016.
- Li C, Sheng V, Jiang L and Li H (2016). Noise filtering to improve data and model quality for crowdsourcing, Knowledge-Based Systems, 107:C, (96-103), Online publication date: 1-Sep-2016.
- Simha R and Shatkay H Improved multi-label classification using inter-dependence structure via a generative mixture model Proceedings of the Twenty-second European Conference on Artificial Intelligence, (1336-1343)
- Valero-Mas J, Calvo-Zaragoza J and Rico-Juan J (2016). On the suitability of Prototype Selection methods for kNN classification with distributed data, Neurocomputing, 203:C, (150-160), Online publication date: 26-Aug-2016.
- Moonen L, Di Alesio S, Binkley D and Rolfsnes T Practical guidelines for change recommendation using association rule mining Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, (732-743)
- Ben Abdessalem R, Nejati S, Briand L and Stifter T Testing advanced driver assistance systems using multi-objective search and neural networks Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, (63-74)
- Dittakan K and Coenen F Early detection of osteoarthritis using local binary patterns Proceedings of the 14th Pacific Rim International Conference on Trends in Artificial Intelligence, (93-105)
- Khaleel M, Hmeidi I and Najadat H An Automatic Text Classification System Based on Genetic Algorithm Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016, (1-7)
- Arnaiz-González Á, Díez-Pastor J, Rodríguez J and García-Osorio C (2016). Instance selection for regression, Neurocomputing, 201:C, (66-81), Online publication date: 12-Aug-2016.
- Giustarini L, Parisot O, Ghoniem M, Hostache R, Trebs I and Otjacques B (2016). A user-driven case-based reasoning tool for infilling missing values in daily mean river flow records, Environmental Modelling & Software, 82:C, (308-320), Online publication date: 1-Aug-2016.
- Jones D, Ghandehari H and Facelli J (2016). A review of the applications of data mining and machine learning for the prediction of biomedical properties of nanoparticles, Computer Methods and Programs in Biomedicine, 132:C, (93-103), Online publication date: 1-Aug-2016.
- Wang J (2016). Extracting significant pattern histories from timestamped texts using MapReduce, The Journal of Supercomputing, 72:8, (3236-3260), Online publication date: 1-Aug-2016.
- Jensen U, Kugler P, Ring M and Eskofier B (2016). Approaching the accuracy---cost conflict in embedded classification system design, Pattern Analysis & Applications, 19:3, (839-855), Online publication date: 1-Aug-2016.
- Yao G, Zeng H, Chao F, Su C, Lin C and Zhou C (2016). Integration of classifier diversity measures for feature selection-based classifier ensemble reduction, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 20:8, (2995-3005), Online publication date: 1-Aug-2016.
- Medeiros I, Neves N and Correia M DEKANT: a static analysis tool that learns to detect web application vulnerabilities Proceedings of the 25th International Symposium on Software Testing and Analysis, (1-11)
- Gerlein E, McGinnity M, Belatreche A and Coleman S (2016). Evaluating machine learning classification for financial trading, Expert Systems with Applications: An International Journal, 54:C, (193-207), Online publication date: 15-Jul-2016.
- Silva L, Santos A, Bravo R, Silva A, Muchaluat-Saade D and Conci A (2016). Hybrid analysis for indicating patients with breast cancer using temperature time series, Computer Methods and Programs in Biomedicine, 130:C, (142-153), Online publication date: 1-Jul-2016.
- Teich E, Degaetano-Ortlieb S, Fankhauser P, Kermes H and Lapshinova-Koltunski E (2016). The linguistic construal of disciplinarity, Journal of the Association for Information Science and Technology, 67:7, (1668-1678), Online publication date: 1-Jul-2016.
- Perovšek M, Kranjc J, Erjavec T, Cestnik B and Lavrač N (2016). TextFlows, Science of Computer Programming, 121:C, (128-152), Online publication date: 1-Jun-2016.
- Bai L, Escolano F and Hancock E (2016). Depth-based hypergraph complexity traces from directed line graphs, Pattern Recognition, 54:C, (229-240), Online publication date: 1-Jun-2016.
- Sorato D, Goularte F, Nassar S and Fileto R Analysis of Methods and Tools for Relevant Words Recognition in Microblogs Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (345-352)
- Machado R, Pinheiro R, Machado K and Borges E Contacts Deduplication in Mobile Devices Using Textual Similarity and Machine Learning Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (160-167)
- Matinnejad R, Nejati S, Briand L and Bruckmann T Automated test suite generation for time-continuous simulink models Proceedings of the 38th International Conference on Software Engineering, (595-606)
- Middleton S and Krivcovs V (2016). Geoparsing and Geosemantics for Social Media, ACM Transactions on Information Systems, 34:3, (1-26), Online publication date: 5-May-2016.
- Otebolaku A and Andrade M (2016). User context recognition using smartphone sensors and classification models, Journal of Network and Computer Applications, 66:C, (33-51), Online publication date: 1-May-2016.
- Kovanović V, Joksimović S, Waters Z, Gašević D, Kitto K, Hatala M and Siemens G Towards automated content analysis of discussion transcripts Proceedings of the Sixth International Conference on Learning Analytics & Knowledge, (15-24)
- Mohammad R, Thabtah F and Mccluskey L An Improved Self-Structuring Neural Network Revised Selected Papers of the PAKDD 2016 Workshops on Trends and Applications in Knowledge Discovery and Data Mining - Volume 9794, (35-47)
- Shi B, Ifrim G and Hurley N Learning-to-Rank for Real-Time High-Precision Hashtag Recommendation for Streaming News Proceedings of the 25th International Conference on World Wide Web, (1191-1202)
- Chen H, Wang G, Ma C, Cai Z, Liu W and Wang S (2016). An efficient hybrid kernel extreme learning machine approach for early diagnosis of Parkinson's disease, Neurocomputing, 184:C, (131-144), Online publication date: 5-Apr-2016.
- Arslan O, Guralnik D and Koditschek D (2016). Coordinated Robot Navigation via Hierarchical Clustering, IEEE Transactions on Robotics, 32:2, (352-371), Online publication date: 1-Apr-2016.
- Buczak A and Guven E (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection, IEEE Communications Surveys & Tutorials, 18:2, (1153-1176), Online publication date: 1-Apr-2016.
- Buza K (2016). Classification of gene expression data, Computer Methods and Programs in Biomedicine, 127:C, (105-113), Online publication date: 1-Apr-2016.
- Tomuro N, Lytinen S and Hornsburg K Automatic Summarization of Privacy Policies using Ensemble Learning Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, (133-135)
- Mahmud J, Fei G, Xu A, Pal A and Zhou M Predicting Attitude and Actions of Twitter Users Proceedings of the 21st International Conference on Intelligent User Interfaces, (2-6)
- Seeliger A, Schmidt B, Schweizer I and Mühlhäuser M What Belongs Together Comes Together Proceedings of the 21st International Conference on Intelligent User Interfaces, (60-70)
- Kim Y, Ha J, Yoon Y, Kim N, Im H, Sim S and Choi R (2016). Improved Correction of Atmospheric Pressure Data Obtained by Smartphones through Machine Learning, Computational Intelligence and Neuroscience, 2016, (4), Online publication date: 1-Mar-2016.
- Netten N, van den Braak S, Choenni S and van Someren M A Big Data Approach to Support Information Distribution in Crisis Response Proceedings of the 9th International Conference on Theory and Practice of Electronic Governance, (266-275)
- Wang Y, Burke M and Kraut R Modeling Self-Disclosure in Social Networking Sites Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, (74-85)
- Tsubaki K, Terada T and Tsukamoto M An Activity Recognition Method by Measuring Circumference of Body Parts Proceedings of the 7th Augmented Human International Conference 2016, (1-7)
- Holland-Minkley A and Lombardi T Improving Engagement in Introductory Courses with Homework Resubmission Proceedings of the 47th ACM Technical Symposium on Computing Science Education, (534-539)
- Márquez-Vera C, Cano A, Romero C, Noaman A, Mousa Fardoun H and Ventura S (2016). Early dropout prediction using data mining, Expert Systems: The Journal of Knowledge Engineering, 33:1, (107-124), Online publication date: 1-Feb-2016.
- Cerpa N, Bardeen M, Astudillo C and Verner J (2016). Evaluating different families of prediction methods for estimating software project outcomes, Journal of Systems and Software, 112:C, (48-64), Online publication date: 1-Feb-2016.
- Alberdi A, Aztiria A and Basarab A (2016). Towards an automatic early stress recognition system for office environments based on multimodal measurements, Journal of Biomedical Informatics, 59:C, (49-75), Online publication date: 1-Feb-2016.
- Pimentel B and de Souza R (2016). Multivariate Fuzzy C-Means algorithms with weighting, Neurocomputing, 174:PB, (946-965), Online publication date: 22-Jan-2016.
- Pohl D, Bouchachia A and Hellwagner H (2016). Online indexing and clustering of social media data for emergency management, Neurocomputing, 172:C, (168-179), Online publication date: 8-Jan-2016.
- Catania C, Zanni-Merk C, Bertrand de Beuvron F and Collet P (2016). Ontologies to Lead Knowledge Intensive Evolutionary Algorithms, International Journal of Knowledge and Systems Science, 7:1, (78-100), Online publication date: 1-Jan-2016.
- Chen N, Chen A and Ribeiro B (2016). Towards tangible benefits of corporate failure prediction with business sector, Intelligent Decision Technologies, 10:4, (431-442), Online publication date: 1-Jan-2016.
- Eiland E and Liebrock L (2016). Efficacious discriminant analysis (classifier) measures for end users, Advances in Artificial Intelligence, 2016, (1-1), Online publication date: 1-Jan-2016.
- Park H and Kim K (2016). Active player modeling in the iterated prisoner's dilemma, Computational Intelligence and Neuroscience, 2016, (38-38), Online publication date: 1-Jan-2016.
- Diaz-Honrubia A, Martinez J, Cuenca P, Gamez J and Puerta J (2016). Adaptive Fast Quadtree Level Decision Algorithm for H.264 to HEVC Video Transcoding, IEEE Transactions on Circuits and Systems for Video Technology, 26:1, (154-168), Online publication date: 1-Jan-2016.
- (2016). Decision forest, Information Fusion, 27:C, (111-125), Online publication date: 1-Jan-2016.
- Nagpal A and Gaur D A New Proposed Feature Subset Selection Algorithm Based on Maximization of Gain Ratio Proceedings of the 4th International Conference on Big Data Analytics - Volume 9498, (181-197)
- Cresci S, Di Pietro R, Petrocchi M, Spognardi A and Tesconi M (2015). Fame for sale, Decision Support Systems, 80:C, (56-71), Online publication date: 1-Dec-2015.
- He W, Hogg P, Juette A, Denton E and Zwiggelaar R (2015). Breast image pre-processing for mammographic tissue segmentation, Computers in Biology and Medicine, 67:C, (61-73), Online publication date: 1-Dec-2015.
- Gjoreski H, Kaluža B, Gams M, Milić R and Luštrek M (2015). Context-based ensemble method for human energy expenditure estimation, Applied Soft Computing, 37:C, (960-970), Online publication date: 1-Dec-2015.
- Monge D, Holec M, Železný F and Garino C (2015). Ensemble learning of runtime prediction models for gene-expression analysis workflows, Cluster Computing, 18:4, (1317-1329), Online publication date: 1-Dec-2015.
- Bhattacharya S and Selvakumar S (2015). LAWRA, Security and Communication Networks, 8:18, (3459-3468), Online publication date: 1-Dec-2015.
- Kim H and Choi J (2015). Hierarchical multi-class LAD based on OvA-binary tree using genetic algorithm, Expert Systems with Applications: An International Journal, 42:21, (8134-8145), Online publication date: 30-Nov-2015.
- Inuiguchi M, Hamakawa T and Ubukata S Imprecise Rules for Data Privacy Rough Sets and Knowledge Technology, (129-139)
- Martínez-Usó A, Hernández-Orallo J, Ramírez-Quintana M and Plumed F Pentaho + R Proceedings of the 16th Conference of the Spanish Association for Artificial Intelligence on Advances in Artificial Intelligence - Volume 9422, (234-244)
- Koopaei N and Hamou-Lhadj A CrashAutomata Proceedings of the 25th Annual International Conference on Computer Science and Software Engineering, (201-210)
- Vranjković V, Struharik R and Novak L (2015). Hardware acceleration of homogeneous and heterogeneous ensemble classifiers, Microprocessors & Microsystems, 39:8, (782-795), Online publication date: 1-Nov-2015.
- Cheng H and Kumar A (2015). Process mining on noisy logs - Can log sanitization help to improve performance?, Decision Support Systems, 79:C, (138-149), Online publication date: 1-Nov-2015.
- Goel N and Sehgal P (2015). Fuzzy classification of pre-harvest tomatoes for ripeness estimation - An approach based on automatic rule learning using decision tree, Applied Soft Computing, 36:C, (45-56), Online publication date: 1-Nov-2015.
- Lima A, de Castro L and Corchado J (2015). A polarity analysis framework for Twitter messages, Applied Mathematics and Computation, 270:C, (756-767), Online publication date: 1-Nov-2015.
- Gollapalli S, Caragea C, Mitra P and Giles C (2015). Improving Researcher Homepage Classification with Unlabeled Data, ACM Transactions on the Web, 9:4, (1-32), Online publication date: 26-Oct-2015.
- Malinka F Prediction of protein stability changes upon one-point mutations using machine learning Proceedings of the 2015 Conference on research in adaptive and convergent systems, (102-107)
- Peters G (2015). Assessing Rough Classifiers, Fundamenta Informaticae, 137:4, (493-515), Online publication date: 1-Oct-2015.
- Koumpouri A, Mporas I and Megalooikonomou V Feature selection for improving opinion identification from web authors' posts Proceedings of the 19th Panhellenic Conference on Informatics, (117-122)
- Perovšek M, Vavpetič A, Kranjc J, Cestnik B and Lavrač N (2015). Wordification, Expert Systems with Applications: An International Journal, 42:17, (6442-6456), Online publication date: 1-Oct-2015.
- Lughofer E, Weigl E, Heidl W, Eitzinger C and Radauer T (2015). Integrating new classes on the fly in evolving fuzzy classifier designs and their application in visual inspection, Applied Soft Computing, 35:C, (558-582), Online publication date: 1-Oct-2015.
- Iliou T, Anagnostopoulos C, Nerantzaki M and Anastassopoulos G A Novel Machine Learning Data Preprocessing Method for Enhancing Classification Algorithms Performance Proceedings of the 16th International Conference on Engineering Applications of Neural Networks (INNS), (1-5)
- Kleiminger W, Beckel C and Santini S Household occupancy monitoring using electricity meters Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (975-986)
- Andrienko G and Andrienko N Visualization support to interactive cluster analysis Proceedings of the 2015th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part III, (337-340)
- Taylor P, Griffiths N, Bhalerao A, Xu Z, Gelencser A and Popham T Warwick-JLR driver monitoring dataset (DMD) Proceedings of the 7th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, (89-92)
- Wong T (2015). Performance evaluation of classification algorithms by k-fold and leave-one-out cross validation, Pattern Recognition, 48:9, (2839-2846), Online publication date: 1-Sep-2015.
- Mao C, Chen J, Towey D, Chen J and Xie X (2015). Search-based QoS ranking prediction for web services in cloud environments, Future Generation Computer Systems, 50:C, (111-126), Online publication date: 1-Sep-2015.
- Daka E, Campos J, Fraser G, Dorn J and Weimer W Modeling readability to improve unit tests Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, (107-118)
- McGookin D, Gkatzia D and Hastie H Exploratory Navigation for Runners Through Geographic Area Classification with Crowd-Sourced Data Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, (357-361)
- Cohen A and Vitanyi P (2015). Normalized Compression Distance of Multisets with Applications, IEEE Transactions on Pattern Analysis and Machine Intelligence, 37:8, (1602-1614), Online publication date: 1-Aug-2015.
- Quintana-Amate S, Bermell-Garcia P and Tiwari A (2015). Transforming expertise into Knowledge-Based Engineering tools, Knowledge-Based Systems, 84:C, (89-97), Online publication date: 1-Aug-2015.
- Qiu C, Jiang L and Li C (2015). Not always simple classification, Expert Systems with Applications: An International Journal, 42:13, (5433-5440), Online publication date: 1-Aug-2015.
- Aktepe A, Ersöz S and Toklu B (2015). Customer satisfaction and loyalty analysis with classification algorithms and Structural Equation Modeling, Computers and Industrial Engineering, 86:C, (95-106), Online publication date: 1-Aug-2015.
- Savoy J (2015). Text clustering, Journal of the Association for Information Science and Technology, 66:8, (1645-1654), Online publication date: 1-Aug-2015.
- Shahzad R, Fatima M, Lavesson N and Boldt M Consensus Decision Making in Random Forests Revised Selected Papers of the First International Workshop on Machine Learning, Optimization, and Big Data - Volume 9432, (347-358)
- Dasari S, Lavesson N, Andersson P and Persson M Tree-Based Response Surface Analysis Revised Selected Papers of the First International Workshop on Machine Learning, Optimization, and Big Data - Volume 9432, (118-129)
- Koprinska I, Rana M and Agelidis V (2015). Correlation and instance based feature selection for electricity load forecasting, Knowledge-Based Systems, 82:C, (29-40), Online publication date: 1-Jul-2015.
- Wang G, Zhang Z, Sun J, Yang S and Larson C (2015). POS-RS, Information Processing and Management: an International Journal, 51:4, (458-479), Online publication date: 1-Jul-2015.
- Dessì N and Pes B (2015). Similarity of feature selection methods, Expert Systems with Applications: An International Journal, 42:10, (4632-4642), Online publication date: 15-Jun-2015.
- King M, Abrahams A and Ragsdale C (2015). Ensemble learning methods for pay-per-click campaign management, Expert Systems with Applications: An International Journal, 42:10, (4818-4829), Online publication date: 15-Jun-2015.
- Asghari M and Alizadeh S A New Similarity Measure by Combining Formal Concept Analysis and Clustering for Case-Based Reasoning Proceedings of the 28th International Conference on Current Approaches in Applied Artificial Intelligence - Volume 9101, (503-513)
- Dessì N and Pes B Stability in Biomarker Discovery Proceedings of the 28th International Conference on Current Approaches in Applied Artificial Intelligence - Volume 9101, (191-200)
- Joia P, Petronetto F and Nonato L (2015). Uncovering Representative Groups in Multidimensional Projections, Computer Graphics Forum, 34:3, (281-290), Online publication date: 1-Jun-2015.
- da Silva P, Gonçalves E, Rios E, Muhammad A, Moss A, Pritchard T, Glassborow B, Plastino A and Azeredo R (2015). Automatic classification of carbonate rocks permeability from 1H NMR relaxation data, Expert Systems with Applications: An International Journal, 42:9, (4299-4309), Online publication date: 1-Jun-2015.
- Silva F, Grassi Sella M, Francoy T and Costa A (2015). Evaluating classification and feature selection techniques for honeybee subspecies identification using wing images, Computers and Electronics in Agriculture, 114:C, (68-77), Online publication date: 1-Jun-2015.
- Huelss J and Paulheim H What SPARQL Query Logs Tell and Do Not Tell About Semantic Relatedness in LOD The Semantic Web: ESWC 2015 Satellite Events, (297-308)
- do Prado C, Peres S and Fantinato M Decision Making in Public Administration Supported by Knowledge Discovery Proceedings of the annual conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective - Volume 1, (399-406)
- Zhang L, Pathak P, Wu M, Zhao Y and Mohapatra P AccelWord Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, (301-315)
- Moussouri T and Roussos G (2015). Conducting Visitor Studies Using Smartphone-Based Location Sensing, Journal on Computing and Cultural Heritage , 8:3, (1-16), Online publication date: 7-May-2015.
- Dee Miller L, Soh L and Scott S (2015). Genetic Algorithm Classifier System for Semi-Supervised Learning, Computational Intelligence, 31:2, (201-232), Online publication date: 1-May-2015.
- Zanoni M, Arcelli Fontana F and Stella F (2015). On applying machine learning techniques for design pattern detection, Journal of Systems and Software, 103:C, (102-117), Online publication date: 1-May-2015.
- Assunção M, Calheiros R, Bianchi S, Netto M and Buyya R (2015). Big Data computing and clouds, Journal of Parallel and Distributed Computing, 79:C, (3-15), Online publication date: 1-May-2015.
- Pérez A, Gojenola K, Casillas A, Oronoz M and Díaz de Ilarraza A (2015). Computer aided classification of diagnostic terms in spanish, Expert Systems with Applications: An International Journal, 42:6, (2949-2958), Online publication date: 15-Apr-2015.
- Ferreira R, Pimentel M and Cristo M Exploring graph topology via matrix factorization to improve wikification Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1099-1104)
- Soares D, de Lima Júnior M, Murta L and Plastino A Acceptance factors of pull requests in open-source projects Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1541-1546)
- do Nascimento M, Batista L and Cavalcanti N A new approach to biometric recognition based on hand geometry Proceedings of the 30th Annual ACM Symposium on Applied Computing, (59-65)
- Li H, Zhang Q and Lu K Integrating mobile sensing and social network for personalized health-care application Proceedings of the 30th Annual ACM Symposium on Applied Computing, (527-534)
- Gimenes G, Gualdron H, Rodrigues J and Gazziro M Multimodal graph-based analysis over the DBLP repository Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1129-1135)
- Sidney C, Mendes D, Ribeiro L and Härder T Performance prediction for set similarity joins Proceedings of the 30th Annual ACM Symposium on Applied Computing, (967-972)
- Hansen D (2015). Introducing machine learning via baseball's hall of fame, Journal of Computing Sciences in Colleges, 30:4, (7-14), Online publication date: 1-Apr-2015.
- Farkash M, Hickerson B and Samynathan B Data mining diagnostics and bug MRIs for HW bug localization Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, (79-84)
- Zhi Wang , Lifeng Sun , Chuan Wu and Shiqiang Yang (2015). Enhancing Internet-Scale Video Service Deployment Using Microblog-Based Prediction, IEEE Transactions on Parallel and Distributed Systems, 26:3, (775-785), Online publication date: 1-Mar-2015.
- Antonelli M, Ducange P, Marcelloni F and Segatori A (2015). A novel associative classification model based on a fuzzy frequent pattern mining algorithm, Expert Systems with Applications: An International Journal, 42:4, (2086-2097), Online publication date: 1-Mar-2015.
- Barak S and Modarres M (2015). Developing an approach to evaluate stocks by forecasting effective features with data mining methods, Expert Systems with Applications: An International Journal, 42:3, (1325-1339), Online publication date: 15-Feb-2015.
- Xu C, Pathak P and Mohapatra P Finger-writing with Smartwatch Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, (9-14)
- Auddy A and Mukhopadhyay S Data Mining on ICT Usage in an Academic Campus Proceedings of the 11th International Conference on Distributed Computing and Internet Technology - Volume 8956, (443-447)
- Moeyersoms J, Junqué de Fortuny E, Dejaeger K, Baesens B and Martens D (2015). Comprehensible software fault and effort prediction, Journal of Systems and Software, 100:C, (80-90), Online publication date: 1-Feb-2015.
- Dutta R, Smith D, Rawnsley R, Bishop-Hurley G, Hills J, Timms G and Henry D (2015). Dynamic cattle behavioural classification using supervised ensemble classifiers, Computers and Electronics in Agriculture, 111:C, (18-28), Online publication date: 1-Feb-2015.
- Wang J, Lin Y and Hou S (2015). A data mining approach for training evaluation in simulation-based training, Computers and Industrial Engineering, 80:C, (171-180), Online publication date: 1-Feb-2015.
- FarahinAzahar T, Mahinderjit-Singh M and Hassan R RFID-enabled supply chain detection using clustering algorithms Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, (1-8)
- Cai C, Xu Y, Ke D and Su K (2015). Deep neural networks with multistate activation functions, Computational Intelligence and Neuroscience, 2015, (90-90), Online publication date: 1-Jan-2015.
- Ilarri S, Hermoso R, Trillo-Lado R and Rodríguez-Hernández M (2016). A review of the role of sensors in mobile context-aware recommendation systems, International Journal of Distributed Sensor Networks, 2015, (226-226), Online publication date: 1-Jan-2015.
- Moonen L (2015). Towards evidence-based recommendations to guide the evolution of component-based product families, Science of Computer Programming, 97:P1, (105-112), Online publication date: 1-Jan-2015.
- Wang X, Liu X, Pedrycz W and Zhang L (2015). Fuzzy rule based decision trees, Pattern Recognition, 48:1, (50-59), Online publication date: 1-Jan-2015.
- Vidulin V, Bohanec M and Gams M (2014). Combining human analysis and machine data mining to obtain credible data relations, Information Sciences: an International Journal, 288:C, (254-278), Online publication date: 20-Dec-2014.
- Coimbra R, Rodriguez-Galiano V, Olóriz F and Chica-Olmo M (2014). Regression trees for modeling geochemical data-An application to Late Jurassic carbonates (Ammonitico Rosso), Computers & Geosciences, 73:C, (198-207), Online publication date: 1-Dec-2014.
- Mass J, Srirama S, Flores H and Chang C Proximal and social-aware device-to-device communication via audio detection on cloud Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, (143-150)
- Zúñiga-Cañón C and Burguillo J Applying Data Mining in Urban Environments Using the Roles Model Approach Advances in Artificial Intelligence -- IBERAMIA 2014, (698-709)
- Ferreira J, Rodrigues J, Cristo M and de Oliveira D Multi-Entity Polarity Analysis in Financial Documents Proceedings of the 20th Brazilian Symposium on Multimedia and the Web, (115-122)
- Sá A, Pappa G and Pereira A Generating Personalized Algorithms to Learn Bayesian Network Classifiers for Fraud Detection in Web Transactions Proceedings of the 20th Brazilian Symposium on Multimedia and the Web, (179-186)
- Zhou J, Hang K, Oviatt S, Yu K and Chen F Combining empirical and machine learning techniques to predict math expertise using pen signal features Proceedings of the 2014 ACM workshop on Multimodal Learning Analytics Workshop and Grand Challenge, (29-36)
- Brehmer M, Sedlmair M, Ingram S and Munzner T Visualizing dimensionally-reduced data Proceedings of the Fifth Workshop on Beyond Time and Errors: Novel Evaluation Methods for Visualization, (1-8)
- Kintab G, Roy C and McCalla G Recommending software experts using code similarity and social heuristics Proceedings of 24th Annual International Conference on Computer Science and Software Engineering, (4-18)
- Li C, Jiang L and Li H (2014). Local value difference metric, Pattern Recognition Letters, 49:C, (62-68), Online publication date: 1-Nov-2014.
- Ridge E (2014). Guerrilla Analytics, 10.5555/2695494, Online publication date: 7-Oct-2014.
- Hill M, Connolly P, Reutemann P and Fletcher D (2014). The use of data mining to assist crop protection decisions on kiwifruit in New Zealand, Computers and Electronics in Agriculture, 108:C, (250-257), Online publication date: 1-Oct-2014.
- Bi Y Evidential Fusion for Sentiment Polarity Classification Proceedings of the Third International Conference on Belief Functions: Theory and Applications - Volume 8764, (365-373)
- Wang S, Zhang W and Wang Q FixerCache Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, (1-10)
- Fetter M and Gross T LiLoLe--A Framework for Lifelong Learning from Sensor Data Streams for Predictive User Modelling Proceedings of the 5th IFIP WG 13.2 International Conference on Human-Centered Software Engineering - Volume 8742, (126-143)
- Biskri I and Bensaber B A Flexible Approach for Text Processing Engineering Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, (152-158)
- Matinnejad R, Nejati S, Briand L and Brcukmann T MiL testing of highly configurable continuous controllers Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, (163-174)
- Nakamata A, Wei W, Kawahara Y and Asami T Feature optimization for recognizing food using power leakage from microwave oven Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, (537-546)
- Goodwin M, Haghighi M, Tang Q, Akcakaya M, Erdogmus D and Intille S Moving towards a real-time system for automatically recognizing stereotypical motor movements in individuals on the autism spectrum using wireless accelerometry Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (861-872)
- Pereira D, da Silva E and Esmin A Disambiguating publication venue titles using association rules Proceedings of the 14th ACM/IEEE-CS Joint Conference on Digital Libraries, (77-85)
- El Gebaly K, Agrawal P, Golab L, Korn F and Srivastava D (2014). Interpretable and informative explanations of outcomes, Proceedings of the VLDB Endowment, 8:1, (61-72), Online publication date: 1-Sep-2014.
- Gwizdka J Characterizing relevance with eye-tracking measures Proceedings of the 5th Information Interaction in Context Symposium, (58-67)
- Kärkkäinen T On Cross-Validation for MLP Model Evaluation Proceedings of the Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition - Volume 8621, (291-300)
- Hasanain M, Malhas R and Elsayed T Query performance prediction for microblog search Proceedings of the first international workshop on Social media retrieval and analysis, (1-6)
- Meireles A, Figueiredo L, Lopes L and Almeida A Portable decision support system for heart failure detection and medical diagnosis Proceedings of the 18th International Database Engineering & Applications Symposium, (257-260)
- Bydžovská H and Popelínský L The influence of social data on student success prediction Proceedings of the 18th International Database Engineering & Applications Symposium, (374-375)
- Bagnall A and Janacek G (2014). A Run Length Transformation for Discriminating Between Auto Regressive Time Series, Journal of Classification, 31:2, (154-178), Online publication date: 1-Jul-2014.
- Shafiq M, Erman J, Ji L, Liu A, Pang J and Wang J (2014). Understanding the impact of network dynamics on mobile video user engagement, ACM SIGMETRICS Performance Evaluation Review, 42:1, (367-379), Online publication date: 20-Jun-2014.
- Harrison T Building government's capacity for big data analysis Proceedings of the 15th Annual International Conference on Digital Government Research, (306-308)
- Shafiq M, Erman J, Ji L, Liu A, Pang J and Wang J Understanding the impact of network dynamics on mobile video user engagement The 2014 ACM international conference on Measurement and modeling of computer systems, (367-379)
- Sarikaya A, Albers D, Mitchell J and Gleicher M Visualizing validation of protein surface classifiers Proceedings of the 16th Eurographics Conference on Visualization, (171-180)
- Paiva R, Bittencourt Santa Pinto I, Silva A, Isotani S and Jaques P A Systematic Approach for Providing Personalized Pedagogical Recommendations Based on Educational Data Mining 12th International Conference on Intelligent Tutoring Systems - Volume 8474, (362-367)
- Gomes M, Oliveira T, Silva F, Carneiro D and Novais P Establishing the Relationship between Personality Traits and Stress in an Intelligent Environment Proceedings, Part II, of the 27th International Conference on Modern Advances in Applied Intelligence - Volume 8482, (378-387)
- Mporas I, Tsirka V, Zacharaki E, Koutroumanidis M and Megalooikonomou V Evaluation of time and frequency domain features for seizure detection from combined EEG and ECG signals Proceedings of the 7th International Conference on PErvasive Technologies Related to Assistive Environments, (1-4)
- Rodriguez D, Herraiz I, Harrison R, Dolado J and Riquelme J Preliminary comparison of techniques for dealing with imbalance in software defect prediction Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, (1-10)
- Raphael J, Schneider E, Parsons S and Sklar E Behaviour mining for collision avoidance in multi-robot systems Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (1445-1446)
- Piccardi T, Convertino G, Zancanaro M, Wang J and Archambeau C Towards crowd-based customer service Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (2725-2734)
- Medeiros I, Neves N and Correia M Automatic detection and correction of web application vulnerabilities using data mining to predict false positives Proceedings of the 23rd international conference on World wide web, (63-74)
- Knauss E and Ott D Semi- automatic Categorization of Natural Language Requirements Proceedings of the 20th International Working Conference on Requirements Engineering: Foundation for Software Quality - Volume 8396, (39-54)
- Thesprasith O and Jaruskulchai C Query Expansion Using Medical Subject Headings Terms in the Biomedical Documents Proceedings, Part I, of the 6th Asian Conference on Intelligent Information and Database Systems - Volume 8397, (93-102)
- Delimitrou C and Kozyrakis C (2014). Quasar, ACM SIGARCH Computer Architecture News, 42:1, (127-144), Online publication date: 5-Apr-2014.
- Delimitrou C and Kozyrakis C (2014). Quasar, ACM SIGPLAN Notices, 49:4, (127-144), Online publication date: 5-Apr-2014.
- Wang G, Ma J and Yang S (2014). An improved boosting based on feature selection for corporate bankruptcy prediction, Expert Systems with Applications: An International Journal, 41:5, (2353-2361), Online publication date: 1-Apr-2014.
- Alpar P and Winkelsträter S (2014). Assessment of data quality in accounting data with association rules, Expert Systems with Applications: An International Journal, 41:5, (2259-2268), Online publication date: 1-Apr-2014.
- Baker Y, Agrawal R, Foster J, Beck D and Dozier G Detecting bacterial vaginosis using machine learning Proceedings of the 2014 ACM Southeast Conference, (1-4)
- Bogarín A, Romero C, Cerezo R and Sánchez-Santillán M Clustering for improving educational process mining Proceedings of the Fourth International Conference on Learning Analytics And Knowledge, (11-15)
- Freitas A (2014). Comprehensible classification models, ACM SIGKDD Explorations Newsletter, 15:1, (1-10), Online publication date: 17-Mar-2014.
- Nettleton D (2014). Commercial Data Mining, 10.5555/2600138, Online publication date: 5-Mar-2014.
- Kotsiantis S (2014). Integrating global and local application of random subspace ensemble, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 26:2, (731-739), Online publication date: 1-Mar-2014.
- Peña-Ayala A (2014). Review, Expert Systems with Applications: An International Journal, 41:4, (1432-1462), Online publication date: 1-Mar-2014.
- Muñoz E, Hogan A and Mileo A Using linked data to mine RDF from wikipedia's tables Proceedings of the 7th ACM international conference on Web search and data mining, (533-542)
- Delimitrou C and Kozyrakis C Quasar Proceedings of the 19th international conference on Architectural support for programming languages and operating systems, (127-144)
- Rathore S and Gupta A A comparative study of feature-ranking and feature-subset selection techniques for improved fault prediction Proceedings of the 7th India Software Engineering Conference, (1-10)
- Chen J, Hsieh G, Mahmud J and Nichols J Understanding individuals' personal values from social media word use Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, (405-414)
- Kotsiantis S (2014). A hybrid decision tree classifier, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 26:1, (327-336), Online publication date: 1-Jan-2014.
- Ravizza S, Chen J, Atkin J, Stewart P and Burke E (2014). Aircraft taxi time prediction, Applied Soft Computing, 14, (397-406), Online publication date: 1-Jan-2014.
- Jelinek H, Kelarev A, Robinson D, Stranieri A and Cornforth D (2014). Using meta-regression data mining to improve predictions of performance based on heart rate dynamics for Australian football, Applied Soft Computing, 14, (81-87), Online publication date: 1-Jan-2014.
- A.Silva M, Trevisan D, Prata D, Marques E, Lisboa M and Prata M Exploring an Ichthyoplankton Database from a Freshwater Reservoir in Legal Amazon Part II of the Proceedings of the 9th International Conference on Advanced Data Mining and Applications - Volume 8347, (384-395)
- Cinque M, Cotroneo D, Frattini F and Russo S Cost-Benefit Analysis of Virtualizing Batch Systems Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, (264-268)
- Neumann A, Schnier C, Hermann T and Pitsch K Interaction analysis and joint attention tracking in augmented reality Proceedings of the 15th ACM on International conference on multimodal interaction, (165-172)
- Delimitrou C and Kozyrakis C (2013). QoS-Aware scheduling in heterogeneous datacenters with paragon, ACM Transactions on Computer Systems, 31:4, (1-34), Online publication date: 1-Dec-2013.
- O'shea J, Bandar Z and Crockett K (2014). A new benchmark dataset with production methodology for short text semantic similarity algorithms, ACM Transactions on Speech and Language Processing , 10:4, (1-63), Online publication date: 1-Dec-2013.
- Ruz G, Varas S and Villena M (2013). Policy making for broadband adoption and usage in Chile through machine learning, Expert Systems with Applications: An International Journal, 40:17, (6728-6734), Online publication date: 1-Dec-2013.
- Abawajy J, Kelarev A and Chowdhury M (2013). Multistage approach for clustering and classification of ECG data, Computer Methods and Programs in Biomedicine, 112:3, (720-730), Online publication date: 1-Dec-2013.
- Braga I, Carmo L, Benatti C and Monard M A Note on Parameter Selection for Support Vector Machines Proceedings of the 12th Mexican International Conference on Advances in Soft Computing and Its Applications - Volume 8266, (233-244)
- Campos Y, Estrada R, Morell C and Ferri F A Feature Set Decomposition Method for the Construction of Multi-classifier Systems Trained with High-Dimensional Data Proceedings, Part I, of the 18th Iberoamerican Congress on Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications - Volume 8258, (278-285)
- Berger P, Hennig P and Meinel C Identifying Domain Experts in the Blogosphere -- Ranking Blogs Based on Topic Consistency Proceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 01, (252-259)
- El-Alfy E Enhanced Hand Shape Identification Using Random Forests Proceedings, Part II, of the 20th International Conference on Neural Information Processing - Volume 8227, (441-447)
- MiguéIs V, Camanho A and FalcãO E Cunha J (2013). Customer attrition in retailing, Expert Systems with Applications: An International Journal, 40:16, (6225-6232), Online publication date: 1-Nov-2013.
- Mohamad S, Tasir Z, Harun J and A. Shukor N (2013). Pattern of reflection in learning Authoring System through blogging, Computers & Education, 69, (356-368), Online publication date: 1-Nov-2013.
- Gwon R, Kim K, Park J, Kim H and Kim Y A Kidnapping Detection Scheme Using Frame-Based Classification for Intelligent Video Surveillance Proceedings of the 14th International Conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume 8170, (345-354)
- Zhao J and Forouraghi B An Interactive and Personalized Cloud-Based Virtual Learning System to Teach Computer Science Proceedings of the 12th International Conference on Advances in Web-Based Learning --- ICWL 2013 - Volume 8167, (101-110)
- Alhajri R, Counsell S and Liu X (2013). Investigating attributes affecting the performance of WBI users, Computers & Education, 68:C, (117-128), Online publication date: 1-Oct-2013.
- Abawajy J, Kelarev A, Chowdhury M, Stranieri A and Jelinek H (2013). Predicting cardiac autonomic neuropathy category for diabetic data with missing values, Computers in Biology and Medicine, 43:10, (1328-1333), Online publication date: 1-Oct-2013.
- AbuOmar O, Nouranian S, King R, Bouvard J, Toghiani H, Lacy T and Pittman C (2013). Data mining and knowledge discovery in materials science and engineering, Advanced Engineering Informatics, 27:4, (615-624), Online publication date: 1-Oct-2013.
- Radovanović M, von Trzebiatowski G, Kurbalija V, Ivanović M, Burkhard H, Schmidt D and Hinrichs C Quality checking and mining nephrology biopsy data Proceedings of the 6th Balkan Conference in Informatics, (110-113)
- Jerome Q, Marchal S, State R and Engel T Advanced Detection Tool for PDF Threats Revised Selected Papers of the 8th International Workshop on Data Privacy Management and Autonomous Spontaneous Security - Volume 8247, (300-315)
- Lasota T, Łuczak T, Niemczyk M, Olszewski M and Trawiński B Investigation of Property Valuation Models Based on Decision Tree Ensembles Built over Noised Data Proceedings of the 5th International Conference on Computational Collective Intelligence. Technologies and Applications - Volume 8083, (417-426)
- Weiss G, Nathan A, Kropp J and Lockhart J WagTag Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, (405-414)
- Baumann P, Kleiminger W and Santini S The influence of temporal and spatial features on the performance of next-place prediction algorithms Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, (449-458)
- Teufl P, Leitold H and Posch R Semantic Pattern Transformation Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, (1-8)
- Karamshuk D, Noulas A, Scellato S, Nicosia V and Mascolo C Geo-spotting Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (793-801)
- Sokolova M, GonzáLez-Martí I, Contreras JordáN O and FernáNdez Bustos J (2013). A case study of muscle dysmorphia disorder diagnostics, Expert Systems with Applications: An International Journal, 40:10, (4226-4231), Online publication date: 1-Aug-2013.
- Eichelberger R and Sheng V An empirical study of reducing multiclass classification methodologies Proceedings of the 9th international conference on Machine Learning and Data Mining in Pattern Recognition, (505-519)
- Ribeiro D, Sanfins A and Belo O Wastewater treatment plant performance prediction with support vector machines Proceedings of the 13th international conference on Advances in Data Mining: applications and theoretical aspects, (99-111)
- Wang Y, Di G, Yu J, Lei J and Coenen F Feature representation for customer attrition risk prediction in retail banking Proceedings of the 13th international conference on Advances in Data Mining: applications and theoretical aspects, (229-238)
- Leme L, Lopes G, Nunes B, Casanova M and Dietze S Identifying candidate datasets for data interlinking Proceedings of the 13th international conference on Web Engineering, (354-366)
- de Sá A and Pappa G Towards a method for automatically evolving bayesian network classifiers Proceedings of the 15th annual conference companion on Genetic and evolutionary computation, (1505-1512)
- AL-Madi N and Ludwig S Segment-based genetic programming Proceedings of the 15th annual conference companion on Genetic and evolutionary computation, (133-134)
- Salama K and Freitas A Evaluating the use of different measure functions in the predictive quality of ABC-miner Proceedings of the 15th annual conference companion on Genetic and evolutionary computation, (15-16)
- Kowaliw T, Banzhaf W and Doursat R Networks of transform-based evolvable features for object recognition Proceedings of the 15th annual conference on Genetic and evolutionary computation, (1077-1084)
- Song M, Yang H, Siadat S and Pechenizkiy M (2013). A comparative study of dimensionality reduction techniques to enhance trace clustering performances, Expert Systems with Applications: An International Journal, 40:9, (3722-3737), Online publication date: 1-Jul-2013.
- Stegmayer G, Milone D, Garran S and Burdyn L (2013). Automatic recognition of quarantine citrus diseases, Expert Systems with Applications: An International Journal, 40:9, (3512-3517), Online publication date: 1-Jul-2013.
- Coria S, Ramírez-Vásquez S, Luna-Trejo J, Mondragón-Becerra R, Pérez-Meza M and Ávila-Barrón O Delta score Proceedings of the 14th Annual International Conference on Digital Government Research, (102-110)
- Agarwal D, Chen B, Elango P and Ramakrishnan R (2013). Content recommendation on web portals, Communications of the ACM, 56:6, (92-101), Online publication date: 1-Jun-2013.
- Zhang H, Gong L and Versteeg S Predicting bug-fixing time: an empirical study of commercial software projects Proceedings of the 2013 International Conference on Software Engineering, (1042-1051)
- Femmer H, Ganesan D, Lindvall M and McComas D Detecting inconsistencies in wrappers: a case study Proceedings of the 2013 International Conference on Software Engineering, (1022-1031)
- Cotroneo D, Pietrantuono R and Russo S A learning-based method for combining testing techniques Proceedings of the 2013 International Conference on Software Engineering, (142-151)
- Vizer L Different strokes for different folks CHI '13 Extended Abstracts on Human Factors in Computing Systems, (2773-2778)
- Delimitrou C and Kozyrakis C (2013). Paragon, ACM SIGPLAN Notices, 48:4, (77-88), Online publication date: 23-Apr-2013.
- Mian R, Martin P, Zulkernine F and Vazquez-Poletti J Towards building performance models for data-intensive workloads in public clouds Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering, (259-270)
- Ott D Automatic requirement categorization of large natural language specifications at mercedes-benz for review improvements Proceedings of the 19th international conference on Requirements Engineering: Foundation for Software Quality, (50-64)
- Delimitrou C and Kozyrakis C (2013). Paragon, ACM SIGARCH Computer Architecture News, 41:1, (77-88), Online publication date: 29-Mar-2013.
- Zhang S, McClean S, Nugent C, O'Neill S, Donnelly M, Galway L, Scotney B and Cleland I Prediction of assistive technology adoption for people with dementia Proceedings of the second international conference on Health Information Science, (160-171)
- Ermakov S and Ermakova L Sentiment classification based on phonetic characteristics Proceedings of the 35th European conference on Advances in Information Retrieval, (706-709)
- Jeong Y and Myaeng S Using wordnet hypernyms and dependency features for phrasal-level event recognition and type classification Proceedings of the 35th European conference on Advances in Information Retrieval, (267-278)
- Delimitrou C and Kozyrakis C Paragon Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems, (77-88)
- Brooks M, Kuksenok K, Torkildson M, Perry D, Robinson J, Scott T, Anicello O, Zukowski A, Harris P and Aragon C Statistical affect detection in collaborative chat Proceedings of the 2013 conference on Computer supported cooperative work, (317-328)
- Englert F, Schmitt T, Kößler S, Reinhardt A and Steinmetz R How to auto-configure your smart home? Proceedings of the fourth international conference on Future energy systems, (215-224)
- Beckel C, Sadamori L and Santini S Automatic socio-economic classification of households using electricity consumption data Proceedings of the fourth international conference on Future energy systems, (75-86)
- Chang P and Yeh W Simplified swarm optimization with differential evolution mutation strategy for parameter search Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, (1-5)
- Berns A, Gonzalez-Pardo A and Camacho D (2013). Game-like language learning in 3-D virtual environments, Computers & Education, 60:1, (210-220), Online publication date: 1-Jan-2013.
- Chen H, Chiang R and Storey V (2012). Business intelligence and analytics, MIS Quarterly, 36:4, (1165-1188), Online publication date: 1-Dec-2012.
- Carberry S, Elzer Schwartz S, Mccoy K, Demir S, Wu P, Greenbacker C, Chester D, Schwartz E, Oliver D and Moraes P (2013). Access to multimodal articles for individuals with sight impairments, ACM Transactions on Interactive Intelligent Systems, 2:4, (1-49), Online publication date: 1-Dec-2012.
- Park H, Cho H, Lee K and Kim K Prediction of early stage opponents strategy for StarCraft AI using scouting and machine learning Proceedings of the Workshop at SIGGRAPH Asia, (7-12)
- BinMakhashen G and El-Alfy E Fusion of multiple texture representations for palmprint recognition using neural networks Proceedings of the 19th international conference on Neural Information Processing - Volume Part V, (410-417)
- El-Alfy E, Abdel-Aal R and Baig Z Abductive neural network modeling for hand recognition using geometric features Proceedings of the 19th international conference on Neural Information Processing - Volume Part IV, (593-602)
- d’Amato C, Bryl V and Serafini L Semantic Knowledge Discovery and Data-Driven Logical Reasoning from Heterogeneous Data Sources Uncertainty Reasoning for the Semantic Web III, (163-183)
- Maraschin M, Somensi-Zeggio A, Oliveira S, Kuhnen S, Tomazzoli M, Zeri A, Carreira R and Rocha M A machine learning and chemometrics assisted interpretation of spectroscopic data --- a NMR-Based metabolomics platform for the assessment of brazilian propolis Proceedings of the 7th IAPR international conference on Pattern Recognition in Bioinformatics, (129-140)
- Ariyaratne H, Zhang D and Lu G A class centric feature and classifier ensemble selection approach for music genre classification Proceedings of the 2012 Joint IAPR international conference on Structural, Syntactic, and Statistical Pattern Recognition, (666-674)
- Masiero A, Ferreira L and Aquino P Algoritmos de clusterização e python científico apoiando modelagem de usuário Companion Proceedings of the 11th Brazilian Symposium on Human Factors in Computing Systems, (47-50)
- Mendes-Moreira J, Soares C, Jorge A and Sousa J (2012). Ensemble approaches for regression, ACM Computing Surveys, 45:1, (1-40), Online publication date: 1-Nov-2012.
- Lindner A Semantic awareness for automatic image interpretation Proceedings of the 20th ACM international conference on Multimedia, (1425-1428)
- Santiago E, Romero-Salcedo M, Velasco-Hernández J, Velasquillo L and Hernández J An integrated strategy for analyzing flow conductivity of fractures in a naturally fractured reservoir using a complex network metric Proceedings of the 11th Mexican international conference on Advances in Computational Intelligence - Volume Part II, (350-361)
- Nápoles G, Grau I, León M and Grau R Modelling, aggregation and simulation of a dynamic biological system through fuzzy cognitive maps Proceedings of the 11th Mexican international conference on Advances in Computational Intelligence - Volume Part II, (188-199)
- Ferreira R, Okada K, Cristo M, Berlt K, de Moura E and Fernandes D Scripts as source of information to contextual video advertising Proceedings of the 18th Brazilian symposium on Multimedia and the web, (39-46)
- d'Amato C, Bryl V and Serafini L Semantic knowledge discovery from heterogeneous data sources Proceedings of the 18th international conference on Knowledge Engineering and Knowledge Management, (26-31)
- Domingos P (2012). A few useful things to know about machine learning, Communications of the ACM, 55:10, (78-87), Online publication date: 1-Oct-2012.
- Garcia-Piquer A, Fornells A, Orriols-Puig A, Corral G and Golobardes E (2012). Data classification through an evolutionary approach based on multiple criteria, Knowledge and Information Systems, 33:1, (35-56), Online publication date: 1-Oct-2012.
- Trandafili E, Allkoçi A, Kajo E and Xhuvani A Discovery and evaluation of student's profiles with machine learning Proceedings of the Fifth Balkan Conference in Informatics, (174-179)
- Dobnik S, Cooper R and Larsson S Modelling Language, Action, and Perception in Type Theory with Records Revised Selected Papers of the 7th International Workshop on Constraint Solving and Language Processing - Volume 8114, (70-91)
- de Souza Jacomini R, do Nascimento M, Dantas R and Ramos R Comparison of PCA and ANOVA for information selection of CC and MLO views in classification of mammograms Proceedings of the 13th international conference on Intelligent Data Engineering and Automated Learning, (117-126)
- Saravanan M, Prasad G, Jagadeesan M, Raman R and Rekha S Group Recommender Model for Boosting and Optimizing Customer Purchases Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (1266-1271)
- Jacob S and Ramani R Mining of classification patterns in clinical data through data mining algorithms Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (997-1003)
- Nagy G and Buza K SOHAC Proceedings of the 12th Industrial conference on Advances in Data Mining: applications and theoretical aspects, (38-51)
- Nagesh A, Ramakrishnan G, Chiticariu L, Krishnamurthy R, Dharkar A and Bhattacharyya P Towards efficient named-entity rule induction for customizability Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, (128-138)
- Kuo T, Hung S, Lin W, Peng N, Lin S and Lin W Exploiting latent information to predict diffusions of novel topics on social networks Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers - Volume 2, (344-348)
- Tortajada M, Oliver A, Martí R, Vilagran M, Ganau S, Tortajada L, Sentís M and Freixenet J Adapting breast density classification from digitized to full-field digital mammograms Proceedings of the 11th international conference on Breast Imaging, (561-568)
- Medland M and Otero F A study of different quality evaluation functions in the cAnt-Miner(PB) classification algorithm Proceedings of the 14th annual conference on Genetic and evolutionary computation, (49-56)
- Rodriguez D, Herraiz I and Harrison R On software engineering repositories and their open problems Proceedings of the First International Workshop on Realizing AI Synergies in Software Engineering, (52-56)
- Xuan J, Jiang H, Ren Z and Zou W Developer prioritization in bug repositories Proceedings of the 34th International Conference on Software Engineering, (25-35)
- Xu B, Huang J, Williams G, Li M and Ye Y Hybrid random forests Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, (147-158)
- Deligianni D and Kotsiantis S Forecasting corporate bankruptcy with an ensemble of classifiers Proceedings of the 7th Hellenic conference on Artificial Intelligence: theories and applications, (65-72)
- Zouboulidis E and Kotsiantis S Forecasting fraudulent financial statements with committee of cost-sensitive decision tree classifiers Proceedings of the 7th Hellenic conference on Artificial Intelligence: theories and applications, (57-64)
- Kamos E, Matthaiou F and Kotsiantis S Credit rating using a hybrid voting ensemble Proceedings of the 7th Hellenic conference on Artificial Intelligence: theories and applications, (165-173)
- Bobicev V, Sokolova M, Jafer Y and Schramm D Learning sentiments from tweets with personal health information Proceedings of the 25th Canadian conference on Advances in Artificial Intelligence, (37-48)
- Japkowicz N Mining the hidden structure of inductive learning data sets Proceedings of the 25th Canadian conference on Advances in Artificial Intelligence, (318-324)
- Song Y, Gong J, Gao S, Wang D, Cui T, Li Y and Wei B (2012). Susceptibility assessment of earthquake-induced landslides using Bayesian network, Computers & Geosciences, 42:C, (189-199), Online publication date: 1-May-2012.
- Lin S (2012). Data mining for student retention management, Journal of Computing Sciences in Colleges, 27:4, (92-99), Online publication date: 1-Apr-2012.
- Lee S and Lee K (2012). Context-prediction performance by a dynamic Bayesian network, Expert Systems with Applications: An International Journal, 39:5, (4908-4914), Online publication date: 1-Apr-2012.
- Griffith J, O'Riordan C and Sorensen H Investigations into user rating information and predictive accuracy in a collaborative filtering domain Proceedings of the 27th Annual ACM Symposium on Applied Computing, (937-942)
- Rand G (2012). Book Reviews, Interfaces, 42:2, (217-225), Online publication date: 1-Mar-2012.
- Alazab M, Venkatraman S, Watters P and Alazab M Zero-day malware detection based on supervised learning algorithms of API call signatures Proceedings of the Ninth Australasian Data Mining Conference - Volume 121, (171-182)
- Li F, Lei J, Tian Y, Punyapatthanakul S and Wang Y Model selection strategy for customer attrition risk prediction in retail banking Proceedings of the Ninth Australasian Data Mining Conference - Volume 121, (119-124)
- Yu Y, Bandara A, Tun T and Nuseibeh B Towards learning to detect meaningful changes in software Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering, (51-54)
- Wu Q, Liang G, Wang Q, Xie T and Mei H Iterative mining of resource-releasing specifications Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering, (233-242)
- Assam R and Seidl T Preserving privacy of moving objects via temporal clustering of spatio-temporal data streams Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, (9-16)
- Moonsamy V, Tian R and Batten L Feature reduction to speed up malware classification Proceedings of the 16th Nordic conference on Information Security Technology for Applications, (176-188)
- Stolpe M and Morik K Learning from label proportions by optimizing cluster model selection Proceedings of the 2011 European conference on Machine learning and knowledge discovery in databases - Volume Part III, (349-364)
- Stolpe M and Morik K Learning from label proportions by optimizing cluster model selection Proceedings of the 2011th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part III, (349-364)
- Khonji M, Jones A and Iraqi Y A study of feature subset evaluators and feature subset searching methods for phishing classification Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, (135-144)
- SuáRez SáNchez A, GarcíA Nieto P, Riesgo FernáNdez P, Del Coz DíAz J and Iglesias-RodríGuez F (2011). Application of an SVM-based regression model to the air quality study at local scale in the Avilés urban area (Spain), Mathematical and Computer Modelling: An International Journal, 54:5-6, (1453-1466), Online publication date: 1-Sep-2011.
- Göndör M and Bresfelean V Fiscal policy, the main tool to influence the capital markets' strength Proceedings of the 11th WSEAS international conference on Applied informatics and communications, and Proceedings of the 4th WSEAS International conference on Biomedical electronics and biomedical informatics, and Proceedings of the international conference on Computational engineering in systems applications, (458-463)
- Bresfelean V Data mining and model trees study on GDP and its influence factors Proceedings of the 11th WSEAS international conference on Applied informatics and communications, and Proceedings of the 4th WSEAS International conference on Biomedical electronics and biomedical informatics, and Proceedings of the international conference on Computational engineering in systems applications, (401-406)
- Stanca L, Lacurezeanu R, Bresfelean V and Pop I Student profile ergonomically adapted to e-learning. a data clustering and statistical analysis based survey Proceedings of the 11th WSEAS international conference on Applied informatics and communications, and Proceedings of the 4th WSEAS International conference on Biomedical electronics and biomedical informatics, and Proceedings of the international conference on Computational engineering in systems applications, (332-337)
- Moura D, el-Nasr M and Shaw C Visualizing and understanding players' behavior in video games Proceedings of the 2011 ACM SIGGRAPH Symposium on Video Games, (11-15)
- Moura D, el-Nasr M and Shaw C Visualizing and understanding players' behavior in video games ACM SIGGRAPH 2011 Game Papers, (1-6)
- Manzato G, Arentze T, Timmermans H and Ettema D (2011). Matching office firms types and location characteristics, Expert Systems with Applications: An International Journal, 38:8, (9665-9673), Online publication date: 1-Aug-2011.
- Du H Data mining project Proceedings of the 28th British national conference on Advances in databases, (221-235)
- de Almeida N and Pedrosa I Open source data mining tools for audit purposes Proceedings of the 2011 Workshop on Open Source and Design of Communication, (33-35)
- Jovic A and Bogunovic N HRVFrame Proceedings of the 13th conference on Artificial intelligence in medicine, (96-100)
- Murtaza S, Madhavji N, Gittens M and Li Z Diagnosing new faults using mutants and prior faults (NIER track) Proceedings of the 33rd International Conference on Software Engineering, (960-963)
- Aburrous M, Hossain M, Dahal K and Thabtah F (2010). Intelligent phishing detection system for e-banking using fuzzy data mining, Expert Systems with Applications: An International Journal, 37:12, (7913-7921), Online publication date: 1-Dec-2010.
- Wang G, Hao J, Ma J and Huang L (2010). A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering, Expert Systems with Applications: An International Journal, 37:9, (6225-6232), Online publication date: 1-Sep-2010.
- Akay M and Abasıkeleş I (2010). Predicting the performance measures of an optical distributed shared memory multiprocessor by using support vector regression, Expert Systems with Applications: An International Journal, 37:9, (6293-6301), Online publication date: 1-Sep-2010.
- Śnieżyński B, Łukasik T and Mierzwa M B2R Proceedings of the 21st international conference on Database and expert systems applications: Part II, (177-184)
- Guo Y, Korhonen A, Liakata M, Karolinska I, Sun L and Stenius U Identifying the information structure of scientific abstracts Proceedings of the 2010 Workshop on Biomedical Natural Language Processing, (99-107)
- Li X (2009). A Bayesian Approach for Estimating and Replacing Missing Categorical Data, Journal of Data and Information Quality, 1:1, (1-11), Online publication date: 1-Jun-2009.
- Zhou D, Truran M, Brailsford T and Ashman H (2008). A Hybrid Technique for English-Chinese Cross Language Information Retrieval, ACM Transactions on Asian Language Information Processing, 7:2, (1-35), Online publication date: 1-Jun-2008.
- Kozareva Z, Vazquez S and Montoyo A UA-ZSA Proceedings of the 4th International Workshop on Semantic Evaluations, (338-341)
- D’Mello S and Graesser A Affect detection from human-computer dialogue with an intelligent tutoring system Proceedings of the 6th international conference on Intelligent Virtual Agents, (54-67)
- Olasupo T, Otero C, Olasupo K and Qureshi A Automatic detection of radio signal obstruction in wireless sensor networks' on-demand deployment 2016 IEEE Sensors Applications Symposium (SAS), (1-6)
- Moreira-Matias L and Cerqueira V CJAMmer - traffic JAM Cause Prediction using Boosted Trees 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), (743-748)
- Popkov Y, Dubnov Y and Popkov A Randomized machine learning: Statement, solution, applications 2016 IEEE 8th International Conference on Intelligent Systems (IS), (27-39)
- Bauder R and Khoshgoftaar T A Novel Method for Fraudulent Medicare Claims Detection from Expected Payment Deviations (Application Paper) 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI), (11-19)
- Baik E, Pande A, Zheng Z and Mohapatra P VSync: Cloud based video streaming service for mobile devices IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, (1-9)
- Rezk E, Babi S, Islam F and Jaoua A Uncertain training data set conceptual reduction: A machine learning perspective 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1842-1849)
- Li Z, Shang C and Shen Q Fuzzy-clustering embedded regression for predicting student academic performance 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (344-351)
- Yang H, Li Y, Wu M and Cheng F A hybrid tool life prediction scheme in cloud architecture 2016 IEEE International Conference on Automation Science and Engineering (CASE), (1160-1165)
- Tran C, Zhang M and Andreae P Directly evolving classifiers for missing data using genetic programming 2016 IEEE Congress on Evolutionary Computation (CEC), (5278-5285)
- Ferreira C, de Medeiros D and Santana F FCFilter: Feature selection based on clustering and genetic algorithms 2016 IEEE Congress on Evolutionary Computation (CEC), (2106-2113)
- Piantadosi G, Fusco R, Petrillo A, Sansone M and Sansone C LBP-TOP for Volume Lesion Classification in Breast DCE-MRI Image Analysis and Processing — ICIAP 2015, (647-657)
- Yuan X, Sa N, Begany G and Yang H What Users Prefer and Why: A User Study on Effective Presentation Styles of Opinion Summarization Human-Computer Interaction – INTERACT 2015, (249-264)
Index Terms
- Data Mining: Practical Machine Learning Tools and Techniques
Recommendations
Mining uncertain data
As an important data mining and knowledge discovery task, association rule mining searches for implicit, previously unknown, and potentially useful pieces of information—in the form of rules revealing associative relationships—that are embedded in the ...
Mining fuzzy specific rare itemsets for education data
Association rule mining is an important data analysis method for the discovery of associations within data. There have been many studies focused on finding fuzzy association rules from transaction databases. Unfortunately, in the real world, one may ...