Nothing Special   »   [go: up one dir, main page]

skip to main content
Skip header Section
Data Mining: Practical Machine Learning Tools and TechniquesJanuary 2011
Publisher:
  • Morgan Kaufmann Publishers Inc.
  • 340 Pine Street, Sixth Floor
  • San Francisco
  • CA
  • United States
ISBN:978-0-12-374856-0
Published:20 January 2011
Pages:
664
Skip Bibliometrics Section
Reflects downloads up to 18 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

Data Mining: Practical Machine Learning Tools and Techniques offers a thorough grounding in machine learning concepts as well as practical advice on applying machine learning tools and techniques in real-world data mining situations. This highly anticipated third edition of the most acclaimed work on data mining and machine learning will teach you everything you need to know about preparing inputs, interpreting outputs, evaluating results, and the algorithmic methods at the heart of successful data mining. Thorough updates reflect the technical changes and modernizations that have taken place in the field since the last edition, including new material on Data Transformations, Ensemble Learning, Massive Data Sets, Multi-instance Learning, plus a new version of the popular Weka machine learning software developed by the authors. Witten, Frank, and Hall include both tried-and-true techniques of today as well as methods at the leading edge of contemporary research. *Provides a thorough grounding in machine learning concepts as well as practical advice on applying the tools and techniques to your data mining projects *Offers concrete tips and techniques for performance improvement that work by transforming the input or output in machine learning methods *Includes downloadable Weka software toolkit, a collection of machine learning algorithms for data mining tasks-in an updated, interactive interface. Algorithms in toolkit cover: data pre-processing, classification, regression, clustering, association rules, visualization

References

  1. Abe, N., Zadrozny, B., & Langford, J. (2006). Outlier detection by active learning. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 767-772). New York: ACM Press. Google ScholarGoogle Scholar
  2. Adriaans, P., & Zantige, D. (1996). Data mining. Harlow, England: Addison-Wesley. Google ScholarGoogle Scholar
  3. Agrawal, R., & Srikant, R. (1994). Fast algorithms for mining association rules in large databases. In J. Bocca, M. Jarke, & C. Zaniolo (Eds.), Proceedings of the International Conference on Very Large Data Bases (pp. 478-499). Santiago, Chile. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  4. Agrawal, R., Imielinski, T., & Swami, A. (1993a). Database mining: A performance perspective. IEEE Transactions on Knowledge and Data Engineering, 5(6), 914-925. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Agrawal, R., Imielinski, T., & Swami, A. (1993b). Mining association rules between sets of items in large databases. In P. Buneman, & S. Jajodia (Eds.), Proceedings of the ACM SIGMOD International Conference on Management of Data (pp. 207-216). Washington, DC. New York: ACM Press. Google ScholarGoogle Scholar
  6. Aha, D. (1992). Tolerating noisy, irrelevant, and novel attributes in instance-based learning algorithms. International Journal of Man-Machine Studies, 36(2), 267-287. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Almuallin, H., & Dietterich, T. G. (1991). Learning with many irrelevant features. In Proceedings of the Ninth National Conference on Artificial Intelligence (pp. 547-552). Anaheim, CA. Menlo Park, CA: AAAI Press. Google ScholarGoogle Scholar
  8. Almuallin, H., & Dietterich, T. G. (1992). Efficient algorithms for identifying relevant features. In Proceedings of the Ninth Canadian Conference on Artificial Intelligence (pp. 38-45). Vancouver, BC. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  9. Andrews, S., Tsochantaridis, I., & Hofmann, T. (2003). Support vector machines for multiple-instance learning. In Proceedings of the Conference on Neural Information Processing Systems (pp. 561-568). Vancouver, BC. Cambridge, MA: MIT Press.Google ScholarGoogle Scholar
  10. Ankerst, M., Breunig, M. M., Kriegel, H.-P., & Sander, J. (1999). OPTICS: Ordering points to identify the clustering structure. In Proceedings of the ACM SIGMOD International Conference on Management of Data (pp. 49-60). New York: ACM Press. Google ScholarGoogle Scholar
  11. Appelt, D. (1999). An introduction to information extraction. Artificial Intelligence Communications, 12(3), 161-172. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Arthur, D., & Vassilvitskii, S. (2007). K-means++: The advantages of careful seeding. In Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms (pp. 1027-1035). New Orleans. Philadelphia: Society for Industrial and Applied Mathematics. Google ScholarGoogle Scholar
  13. Asuncion, A., & Newman, D. J. (2007). UCI Machine Learning Repository [http://www.ics.uci.edu/~mlearn/MLRepository.html]. Irvine: University of California, School of Information and Computer Science.Google ScholarGoogle Scholar
  14. Asmis, E. (1984). Epicurus' scientific method. Ithaca, NY: Cornell University Press.Google ScholarGoogle Scholar
  15. Atkeson, C. G., Schaal, S. A., & Moore, A. W. (1997). Locally weighted learning. AI Review, 11, 11-71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Auer, P., & Ortner, R. (2004). A boosting approach to multiple instance learning. In Proceedings of the European Conference on Machine Learning (pp. 63-74). Pisa, Italy. Berlin: Springer-Verlag.Google ScholarGoogle Scholar
  17. Barnett, V., & Lewis, T. (1994). Outliers in Statistical Data. West Sussex, England: John Wiley, & Sons.Google ScholarGoogle Scholar
  18. Bay, S. D. (1999). Nearest neighbor classification from multiple feature subsets. Intelligent Data Analysis, 3(3), 191-209. Google ScholarGoogle ScholarCross RefCross Ref
  19. Bay, S. D., & Schwabacher, M. (2003). Near linear time detection of distance-based outliers and applications to security. In Proceedings of the Workshop on Data Mining for Counter Terrorism and Security. San Francisco. Philadelphia: Society for Industrial and Applied Mathematics.Google ScholarGoogle Scholar
  20. Bayes, T. (1763). An essay towards solving a problem in the doctrine of chances. Philosophical Transactions of the Royal Society of London, 53, 370-418.Google ScholarGoogle Scholar
  21. Beck, J. R., & Schultz, E. K. (1986). The use of ROC curves in test performance evaluation. Archives of Pathology and Laboratory Medicine, 110, 13-20.Google ScholarGoogle Scholar
  22. Bergadano, F., & Gunetti, D. (1996). Inductive logic programming: From machine learning to software engineering. Cambridge, MA: MIT Press. Google ScholarGoogle Scholar
  23. Berry, M. J. A., & Linoff, G. (1997). Data mining techniques for marketing, sales, and customer support. New York: John Wiley. Google ScholarGoogle Scholar
  24. Beygelzimer, A., Kakade, S., & Langford, J. (2006). Cover trees for nearest neighbor. In Proceedings of the 23rd International Conference on Machine Learning (pp. 97-104). New York: ACM Press. Google ScholarGoogle Scholar
  25. Bifet, A., Holmes, G., Kirkby, R., & Pfahringer, B. (2010). MOA: Massive online analysis. Journal of Machine Learning Research, 9, 1601-1604. Google ScholarGoogle Scholar
  26. Bigus, J. P. (1996). Data mining with neural networks. New York: McGraw-Hill. Google ScholarGoogle Scholar
  27. Bishop, C. M. (1995). Neural networks for pattern recognition. New York: Oxford University Press. Google ScholarGoogle Scholar
  28. Bishop, C. M. (2006). Pattern recognition and machine learning. Springer-Verlag. Google ScholarGoogle Scholar
  29. BLI (Bureau of Labour Information) (1988). Collective Bargaining Review (November). Ottawa: Labour Canada, Bureau of Labour Information.Google ScholarGoogle Scholar
  30. Blockeel, H., Page, D., & Srinivasan, A. (2005). Multi-instance tree learning. In Proceedings of the 22nd International Conference on Machine Learning (pp. 57-64). Bonn. New York: ACM Press. Google ScholarGoogle Scholar
  31. Blum, A., & Mitchell, T. (1998). Combining labeled and unlabeled data with co-training. In Proceedings of the Eleventh Annual Conference on Computational Learning Theory (pp. 92-100). Madison, WI. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  32. Bouckaert, R. R. (1995). Bayesian belief networks: From construction to inference. Ph.D. Dissertation, Computer Science Department, University of Utrecht, The Netherlands.Google ScholarGoogle Scholar
  33. Bouckaert, R. R. (2004). Bayesian network classifiers in Weka. Working Paper 14/2004, Department of Computer Science, University of Waikato, New Zealand.Google ScholarGoogle Scholar
  34. Bouckaert, R. R. (2010). DensiTree: Making sense of sets of phylogenetic trees. Bioinformatics, 26(10), 1372-1373. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Brachman, R. J., & Levesque, H. J. (Eds.) (1985). Readings in knowledge representation. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  36. Brefeld, U., & Scheffer, T. (2004). Co-EM support vector learning. In R. Greiner, & D. Schuurmans (Eds.), Proceedings of the Twenty-First International Conference on Machine Learning (pp. 121-128). Banff, AB. New York: ACM Press. Google ScholarGoogle Scholar
  37. Breiman, L. (1996a). Stacked regression. Machine Learning, 24(1), 49-64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Breiman, L. (1996b). Bagging predictors. Machine Learning, 24(2), 123-140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Breiman, L. (1996c). [Bias, variance, and] arcing classifiers. Technical Report 460. Department of Statistics, University of California, Berkeley.Google ScholarGoogle Scholar
  40. Breiman, L. (1999). Pasting small votes for classification in large databases and online. Machine Learning, 36(1-2), 85-103. Google ScholarGoogle ScholarCross RefCross Ref
  41. Breiman, L. (2001). Random forests. Machine Learning, 45(1), 5-32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Breiman, L., Friedman, J. H., Olshen, R. A., & Stone, C. J. (1984). Classification and regression trees. Monterey, CA: Wadsworth.Google ScholarGoogle Scholar
  43. Brin, S., Motwani, R., Ullman, J. D., & Tsur, S. (1997). Dynamic itemset counting and implication rules for market basket data. ACM SIGMOD Record, 26(2), 255-264. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertext search engine. Computer Networks and ISDN Systems, 33, 107-117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Brodley, C. E., & Friedl, M. A. (1996). Identifying and eliminating mislabeled training instances. In Proceedings of the Thirteenth National Conference on Artificial Intelligence (pp. 799-805). Portland, OR. Menlo Park, CA: AAAI Press. Google ScholarGoogle Scholar
  46. Brownstown, L., Farrell, R., Kant, E., & Martin, N. (1985). Programming expert systems in OPS5. Reading, MA: Addison-Wesley. Google ScholarGoogle Scholar
  47. Buntine, W. (1992). Learning classification trees. Statistics and Computing, 2(2), 63-73.Google ScholarGoogle ScholarCross RefCross Ref
  48. Burges, C. J. C. (1998). A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2(2), 121-167. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Cabena, P., Hadjinian, P., Stadler, R., Verhees, J., & Zanasi, A. (1998). Discovering data mining: From concept to implementation. Upper Saddle River, NJ: Prentice-Hall. Google ScholarGoogle Scholar
  50. Cardie, C. (1993). Using decision trees to improve case-based learning. In P. Utgoff (Ed.), Proceedings of the Tenth International Conference on Machine Learning (pp. 25-32). Amherst, MA. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  51. Califf, M. E., & Mooney, R. J. (1999). Relational learning of pattern-match rules for information extraction. In Proceedings of the Sixteenth National Conference on Artificial Intelligence (pp. 328-334). Orlando. Menlo Park, CA: AAAI Press. Google ScholarGoogle Scholar
  52. Cavnar, W. B., & Trenkle, J. M. (1994). N-Gram-based text categorization. In Proceedings of the Third Symposium on Document Analysis and Information Retrieval (pp. 161-175). Las Vegas: UNLV Publications/Reprographics.Google ScholarGoogle Scholar
  53. Ceglar, A., & Roddick, J. F. (2006). Association mining. ACM Computing Surveys, 38(2). New York: ACM Press. Google ScholarGoogle Scholar
  54. Cendrowska, J. (1987). PRISM: An algorithm for inducing modular rules. International Journal of Man-Machine Studies, 27(4), 349-370.Google ScholarGoogle Scholar
  55. Chakrabarti, S. (2003). Mining the web: discovering knowledge from hypertext data. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  56. Chang, C.-C., & Lin, C.-J. (2001). LIBSVM: A library for support vector machines. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm. Google ScholarGoogle Scholar
  57. Chawla, N. V., Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). SMOTE: Synthetic minority over-sampling technique. Journal of Artificial Intelligence, 16, 321-357. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Cheeseman, P., & Stutz, J. (1995). Bayesian classification (AutoClass): Theory and results. In U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, & R. Uthurusamy (Eds.), Advances in Knowledge Discovery and Data Mining (pp. 153-180). Menlo Park, CA: AAAI Press. Google ScholarGoogle Scholar
  59. Chen, M. S., Jan, J., & Yu, P. S. (1996). Data mining: An overview from a database perspective. IEEE Transactions on Knowledge and Data Engineering, 8(6), 866-883. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Chen, Y., Bi, J., & Wang, J. Z. (2006). MILES: Multiple-instance learning via embedded instance selection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(12), 1931-1947. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Cherkauer, K. J., & Shavlik, J. W. (1996). Growing simpler decision trees to facilitate knowledge discovery. In E. Simoudis, J. W. Han, & U. Fayyad (Eds.), Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (pp. 315-318). Portland, OR. Menlo Park, CA: AAAI Press.Google ScholarGoogle Scholar
  62. Chevaleyre, Y., & Zucker, J.-D. (2001). Solving multiple-instance and multiple-part learning problems with decision trees and rule sets: Application to the mutagenesis problem. In Proceedings of the Biennial Conference of the Canadian Society for Computational Studies of Intelligence (pp. 204-214). Ottawa. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  63. Cleary, J. G., & Trigg, L. E. (1995). K*: An instance-based learner using an entropic distance measure. In A. Prieditis, & S. Russell (Eds.), Proceedings of the Twelfth International Conference on Machine Learning (pp. 108-114). Tahoe City, CA. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  64. Cohen, J. (1960). A coefficient of agreement for nominal scales. Educational and Psychological Measurement, 20, 37-46.Google ScholarGoogle Scholar
  65. Cohen, W. W. (1995). Fast effective rule induction. In A. Prieditis, & S. Russell (Eds.), Proceedings of the Twelfth International Conference on Machine Learning (pp. 115-123). Tahoe City, CA. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  66. Cooper, G. F., & Herskovits, E. (1992). A Bayesian method for the induction of probabilistic networks from data. Machine Learning, 9(4), 309-347. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Cortes, C., & Vapnik, V. (1995). Support vector networks. Machine Learning, 20(3), 273-297. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Cover, T. M., & Hart, P. E. (1967). Nearest neighbor pattern classification. IEEE Transactions on Information Theory, IT-13, 21-27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Cristianini, N., & Shawe-Taylor, J. (2000). An introduction to support vector machines and other kernel-based learning methods. Cambridge, UK: Cambridge University Press. Google ScholarGoogle Scholar
  70. Cypher, A. (Ed.), (1993). Watch what I do: Programming by demonstration. Cambridge, MA: MIT Press. Google ScholarGoogle Scholar
  71. Dasgupta, S. (2002). Performance guarantees for hierarchical clustering. In J. Kivinen, & R. H. Sloan (Eds.), Proceedings of the Fifteenth Annual Conference on Computational Learning Theory (pp. 351-363). Sydney. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  72. Dasu, T., Koutsofios, E., & Wright, J. (2006). Zen and the art of data mining. In Proceedings of the KDD Workshop on Data Mining for Business Applications (pp. 37-43). Philadelphia. Proceedings at: http://labs.accenture.com/kdd2006_workshop/dmba_proceedings.pdfGoogle ScholarGoogle Scholar
  73. Datta, S., Kargupta, H., & Sivakumar, K. (2003). Homeland defense, privacy-sensitive data mining, and random value distortion. In Proceedings of the Workshop on Data Mining for Counter Terrorism and Security. San Francisco. Philadelphia: Society for International and Applied Mathematics.Google ScholarGoogle Scholar
  74. Day, W. H. E., & Edelsbrünner, H. (1984). Efficient algorithms for agglomerative hierarchical clustering methods. Journal of Classification, 1(1), 7-24.Google ScholarGoogle Scholar
  75. Demiroz, G., & Guvenir, A. (1997). Classification by voting feature intervals. In M. van Someren, & G. Widmer (Eds.), Proceedings of the Ninth European Conference on Machine Learning (pp. 85-92). Prague. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  76. de Raedt, L. (2008). Logical and relational learning. New York: Springer-Verlag. Google ScholarGoogle Scholar
  77. Devroye, L., Györfi, L., & Lugosi, G. (1996). A probabilistic theory of pattern recognition. New York: Springer-Verlag.Google ScholarGoogle Scholar
  78. Dhar, V., & Stein, R. (1997). Seven methods for transforming corporate data into business intelligence. Upper Saddle River, NJ: Prentice-Hall. Google ScholarGoogle Scholar
  79. Diederich, J., Kindermann, J., Leopold, E., & Paass, G. (2003). Authorship attribution with support vector machines. Applied Intelligence, 19(1), 109-123. Google ScholarGoogle ScholarCross RefCross Ref
  80. Dietterich, T. G. (2000). An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization. Machine Learning, 40(2), 139-158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Dietterich, T. G., & Bakiri, G. (1995). Solving multiclass learning problems via errorcorrecting output codes. Journal of Artificial Intelligence Research, 2, 263-286. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Dietterich, T. G., & Kong, E. B. (1995). Error-correcting output coding corrects bias and variance. In Proceedings of the Twelfth International Conference on Machine Learning (pp. 313-321). Tahoe City, CA. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  83. Dietterich, T. G., Lathrop, R. H., & Lozano-Perez, T. (1997). Solving the multiple-instance problem with axis-parallel rectangles. Artificial Intelligence Journal, 89(1-2), 31-71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Domingos, P. (1997). Knowledge acquisition from examples via multiple models. In D. H. Fisher (Ed.), Proceedings of the Fourteenth International Conference on Machine Learning (pp. 98-106). Nashville. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  85. Domingos, P. (1999). MetaCost: A general method for making classifiers cost-sensitive. In U. M. Fayyad, S. Chaudhuri, & D. Madigan (Eds.), Proceedings of the Fifth International Conference on Knowledge Discovery and Data Mining (pp. 155-164). San Diego. New York: ACM Press. Google ScholarGoogle Scholar
  86. Domingos, P., & Hulten, G. (2000). Mining high-speed data streams. In International Conference on Knowledge Discovery and Data Mining (pp. 71-80). Boston. New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Dong, L., Frank, E., & Kramer, S. (2005). Ensembles of balanced nested dichotomies for multi-class problems. In Proceedings of the Ninth European Conference on Principles and Practice of Knowledge Discovery in Databases (pp. 84-95). Porto, Portugal. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  88. Dougherty, J., Kohavi, R., & Sahami, M. (1995). Supervised and unsupervised discretization of continuous features. In A. Prieditis, & S. Russell (Eds.), Proceedings of the Twelfth International Conference on Machine Learning (pp. 194-202). Tahoe City, CA. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  89. Drucker, H. (1997). Improving regressors using boosting techniques. In D. H. Fisher (Ed.), Proceedings of the Fourteenth International Conference on Machine Learning (pp. 107- 115). Nashville. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  90. Drummond, C., & Holte, R. C. (2000). Explicitly representing expected cost: An alternative to ROC representation. In R. Ramakrishnan, S. Stolfo, R. Bayardo, & I. Parsa (Eds.), Proceedings of the Sixth International Conference on Knowledge Discovery and Data Mining (pp. 198-207). Boston. New York: ACM Press. Google ScholarGoogle Scholar
  91. Duda, R. O., & Hart, P. E. (1973). Pattern classification and scene analysis. New York: John Wiley.Google ScholarGoogle Scholar
  92. Duda, R. O., Hart, P. E., & Stork, D. G. (2001). Pattern Classification (2nd ed.). New York: John Wiley. Google ScholarGoogle Scholar
  93. Dumais, S. T., Platt, J., Heckerman, D., & Sahami, M. (1998). Inductive learning algorithms and representations for text categorization. In Proceedings of the ACM Seventh International Conference on Information and Knowledge Management (pp. 148-155). Bethesda, MD. New York: ACM Press. Google ScholarGoogle Scholar
  94. Efron, B., & Tibshirani, R. (1993). An introduction to the bootstrap. London: Chapman and Hall.Google ScholarGoogle Scholar
  95. Egan, J. P. (1975). Signal detection theory and ROC analysis. Series in Cognition and Perception. New York: Academic Press.Google ScholarGoogle Scholar
  96. Ester, M., Kriegel, H.-P., Sander, J., & Xu, X. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96) (pp. 226-231). Menlo Park, CA: AAAI Press.Google ScholarGoogle Scholar
  97. Fan, R.-E., Chang, K.-W., Hsieh, C.-J., Wang, X.-R., & Lin, C.-J. (2008). LIBLINEAR: A library for large linear classification. Journal of Machine Learning Research, 9, 1871-1874. Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Fayyad, U. M., & Irani, K. B. (1993). Multi-interval discretization of continuous-valued attributes for classification learning. In Proceedings of the Thirteenth International Joint Conference on Artificial Intelligence (pp. 1022-1027). Chambery, France. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  99. Fayyad, U. M., & Smyth, P. (1995). From massive datasets to science catalogs: Applications and challenges. In Proceedings of the Workshop on Massive Datasets (pp. 129-141). Washington, DC: NRC, Committee on Applied and Theoretical Statistics.Google ScholarGoogle Scholar
  100. Fayyad, U. M., Piatetsky-Shapiro, G., Smyth, P., & Uthurusamy, R. (Eds.), (1996). Advances in knowledge discovery and data mining. Menlo Park, CA: AAAI Press/MIT Press. Google ScholarGoogle Scholar
  101. Fisher, D. (1987). Knowledge acquisition via incremental conceptual clustering. Machine Learning, 2(2), 139-172. Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. Fisher, R. A. (1936). The use of multiple measurements in taxonomic problems. Annual Eugenics, 7 (part II), 179-188. Reprinted in Contributions to Mathematical Statistics, 1950. New York: John Wiley.Google ScholarGoogle Scholar
  103. Fix, E., & Hodges, J. L. Jr. (1951). Discriminatory analysis; non-parametric discrimination: Consistency properties. Technical Report 21-49-004(4), USAF School of Aviation Medicine, Randolph Field, TX.Google ScholarGoogle Scholar
  104. Flach, P. A., & Lachiche, N. (1999). Confirmation-guided discovery of first-order rules with Tertius. Machine Learning, 42, 61-95. Google ScholarGoogle ScholarCross RefCross Ref
  105. Fletcher, R. (1987). Practical methods of optimization (2nd ed.). New York: John Wiley. Google ScholarGoogle Scholar
  106. Foulds, J., & Frank, E. (2008). Revisiting multiple-instance learning via embedded instance selection. In Proceedings of the Australasian Joint Conference on Artificial Intelligence (pp. 300-310). Auckland. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  107. Foulds, J., & Frank, E. (2010). A review of multi-instance learning assumptions. Knowledge Engineering Review, 25(1), 1-25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Fradkin, D., & Madigan, D. (2003). Experiments with random projections for machine learning. In L. Getoor, T. E. Senator, P. Domingos, & C. Faloutsos (Eds.), Proceedings of the Ninth International Conference on Knowledge Discovery and Data Mining (pp. 517-522). Washington, DC. New York: ACM Press. Google ScholarGoogle Scholar
  109. Frank E. (2000). Pruning decision trees and lists. Ph.D. Dissertation, Department of Computer Science, University of Waikato, New Zealand.Google ScholarGoogle Scholar
  110. Frank, E., & Hall, M. (2001). A simple approach to ordinal classification. In L. de Raedt, & P. A. Flach (Eds.), Proceedings of the Twelfth European Conference on Machine Learning (pp. 145-156). Freiburg, Germany. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  111. Frank, E., Hall, M., & Pfahringer, B. (2003). Locally weighted Naïve Bayes. In U. Kjærulff, & C. Meek (Eds.), Proceedings of the Nineteenth Conference on Uncertainty in Artificial Intelligence (pp. 249-256). Acapulco. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  112. Frank, E., Holmes, G., Kirkby, R., & Hall, M. (2002). Racing Committees for Large Datasets. In S. Lange, K. Satoh, & C. H. Smith (Eds.), Proceedings of the Fifth International Conference on Discovery Science (pp. 153-164). Lübeck, Germany. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  113. Frank, E., & Kramer, S. (2004). Ensembles of nested dichotomies for multi-class problems. In Proceedings of the Twenty-First International Conference on Machine Learning (pp. 305-312). Banff, AB. New York: ACM Press. Google ScholarGoogle Scholar
  114. Frank, E., Paynter, G. W., Witten, I. H., Gutwin, C., & Nevill-Manning, C. G. (1999). Domainspecific key phrase extraction. In Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence (pp. 668-673). Stockholm. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  115. Frank, E., Wang, Y., Inglis, S., Holmes, G., & Witten, I. H. (1998). Using model trees for classification. Machine Learning, 32(1), 63-76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. Frank, E., & Witten, I. H. (1998). Generating accurate rule sets without global optimization. In J. Shavlik (Ed.), Proceedings of the Fifteenth International Conference on Machine Learning (pp. 144-151). Madison, WI. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  117. Frank, E., & Witten, I. H. (1999). Making better use of global discretization. In I. Bratko, & S. Dzeroski (Eds.), Proceedings of the Sixteenth International Conference on Machine Learning (pp. 115- 123). Bled, Slovenia. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  118. Frank, E., & Xu, X. (2003). Applying propositional learning algorithms to multi-instance data. Technical Report 06/03, Department of Computer Science, University of Waikato, New Zealand.Google ScholarGoogle Scholar
  119. Freitag, D. (2002). Machine learning for information extraction in informal domains. Machine Learning, 39(2/3), 169-202. Google ScholarGoogle ScholarCross RefCross Ref
  120. Freund, Y., & Mason, L. (1999). The alternating decision tree learning algorithm. In I. Bratko, & S. Dzeroski (Eds.), Proceedings of the Sixteenth International Conference on Machine Learning (pp. 124-133). Bled, Slovenia. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  121. Freund, Y., & Schapire, R. E. (1996). Experiments with a new boosting algorithm. In L. Saitta (Ed.), Proceedings of the Thirteenth International Conference on Machine Learning (pp. 148-156). Bari, Italy. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  122. Freund, Y., & Schapire, R. E. (1999). Large margin classification using the perceptron algorithm. Machine Learning, 37(3), 277-296. Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. Friedman, J. H. (1996). Another approach to polychotomous classification. Technical report, Department of Statistics, Stanford University, Stanford, CA.Google ScholarGoogle Scholar
  124. Friedman, J. H. (2001). Greedy function approximation: A gradient boosting machine. Annals of Statistics, 29(5), 1189-1232.Google ScholarGoogle ScholarDigital LibraryDigital Library
  125. Friedman, J. H., Bentley, J. L., & Finkel, R. A. (1977). An algorithm for finding best matches in logarithmic expected time. ACM Transactions on Mathematical Software, 3(3), 209-266. Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. Friedman, J. H., Hastie, T., & Tibshirani, R. (2000). Additive logistic regression: A statistical view of boosting. Annals of Statistics, 28(2), 337-374.Google ScholarGoogle Scholar
  127. Friedman, N., Geiger, D., & Goldszmidt, M. (1997). Bayesian Network Classifiers. Machine Learning, 29(2), 131-163. Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. Fulton, T., Kasif, S., & Salzberg, S. (1995). Efficient algorithms for finding multiway splits for decision trees. In A. Prieditis, & S. Russell (Eds.), Proceedings of the Twelfth International Conference on Machine Learning (pp. 244-251). Tahoe City, CA. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  129. Fürnkranz, J. (2002). Round robin classification. Journal of Machine Learning Research, 2, 721-747. Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. Fürnkranz, J. (2003). Round robin ensembles. Intelligent Data Analysis, 7(5), 385-403. Google ScholarGoogle ScholarDigital LibraryDigital Library
  131. Fürnkranz, J., & Flach, P. A. (2005). ROC 'n' rule learning: Towards a better understanding of covering algorithms. Machine Learning, 58(1), 39-77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. Fürnkranz, J., & Widmer, G. (1994). Incremental reduced-error pruning. In H. Hirsh, & W. Cohen (Eds.), Proceedings of the Eleventh International Conference on Machine Learning (pp. 70-77). New Brunswick, NJ. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  133. Gaines, B. R., & Compton, P. (1995). Induction of ripple-down rules applied to modeling large data bases. Journal of Intelligent Information Systems, 5(3), 211-228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  134. Gama, J. (2004). Functional trees. Machine Learning, 55(3), 219-250. Google ScholarGoogle ScholarDigital LibraryDigital Library
  135. Gärtner, T., Flach, P. A., Kowalczyk, A., & Smola, A. J. (2002). Multi-instance kernels. In Proceedings of the International Conference on Machine Learning (pp. 179-186). Sydney. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  136. Genkin, A., Lewis, D. D., & Madigan, D. (2007). Large-scale Bayesian logistic regression for text categorization. Technometrics, 49(3), 291-304.Google ScholarGoogle Scholar
  137. Gennari, J. H., Langley, P., & Fisher, D. (1990). Models of incremental concept formation. Artificial Intelligence, 40, 11-61. Google ScholarGoogle ScholarDigital LibraryDigital Library
  138. Ghani, R. (2002). Combining labeled and unlabeled data for multiclass text categorization. In C. Sammut, & A. Hoffmann (Eds.), Proceedings of the Nineteenth International Conference on Machine Learning (pp. 187-194). Sydney. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  139. Gilad-Bachrach, R., Navot, A., & Tishby, N. (2004). Margin based feature selection: Theory and algorithms. In R. Greiner, & D. Schuurmans (Eds.), Proceedings of the Twenty-First International Conference on Machine Learning (pp. 337-344). Banff, AB. New York: ACM Press. Google ScholarGoogle Scholar
  140. Giraud-Carrier, C. (1996). FLARE: Induction with prior knowledge. In J. Nealon, & J. Hunt (Eds.), Research and Development in Expert Systems XIII (pp. 11-24). Cambridge, England: SGES Publications.Google ScholarGoogle Scholar
  141. Gluck, M., & Corter, J. (1985). Information, uncertainty and the utility of categories. In Proceedings of the Annual Conference of the Cognitive Science Society (pp. 283-287). Irvine, CA. Hillsdale, NJ: Lawrence Erlbaum.Google ScholarGoogle Scholar
  142. Goldberg, D. E. (1989). Genetic algorithms in search, optimization and machine learning. Reading, MA: Addison-Wesley. Google ScholarGoogle Scholar
  143. Good P. (1994). Permutation tests: A practical guide to resampling methods for testing hypotheses. New York: Springer-Verlag.Google ScholarGoogle Scholar
  144. Grossman, D., & Domingos, P. (2004). Learning Bayesian network classifiers by maximizing conditional likelihood. In R. Greiner, & D. Schuurmans (Eds.), Proceedings of the Twenty-First International Conference on Machine Learning (pp. 361-368). Banff, AB. New York: ACM Press. Google ScholarGoogle Scholar
  145. Groth, R. (1998). Data mining: A hands-on approach for business professionals. Upper Saddle River, NJ: Prentice-Hall. Google ScholarGoogle Scholar
  146. Guo, Y., & Greiner, R. (2004). Discriminative model selection for belief net structures. Canada: Department of Computing Science, TR04-22, University of Alberta.Google ScholarGoogle Scholar
  147. Gütlein, M., Frank, E., Hall, M., & Karwath, A. (2009). Large-scale attribute selection using wrappers. In Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining (pp. 332-339). Nashville. Washington, DC: IEEE Computer Society.Google ScholarGoogle Scholar
  148. Guyon, I., Weston, J., Barnhill, S., & Vapnik, V. (2002). Gene selection for cancer classification using support vector machines. Machine Learning, 46(1-3), 389-422. Google ScholarGoogle ScholarDigital LibraryDigital Library
  149. Hall, M. (2000). Correlation-based feature selection for discrete and numeric class machine learning. In P. Langley (Ed.), Proceedings of the Seventeenth International Conference on Machine Learning (pp. 359-366). Stanford, CA. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  150. Hall, M., Holmes, G., & Frank, E. (1999). Generating rule sets from model trees. In N. Y. Foo (Ed.), Proceedings of the Twelfth Australian Joint Conference on Artificial Intelligence (pp. 1-12). Sydney. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  151. Hall, M., & Frank, E. (2008). Combining Naïve Bayes and decision tables. In Proceedings of the 21st Florida Artificial Intelligence Research Society Conference (pp. 318-319). Miami. Menlo Park, CA: AAAI Press.Google ScholarGoogle Scholar
  152. Han, J., Pei, J., & Yin, Y. (2000). Mining frequent patterns without candidate generation. In Proceedings of the ACM-SIGMOD International Conference on Management of Data (pp. 1-12). Dallas. New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  153. Han, J., Pei, J., Yin, Y., & Mao, R. (2004). Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data Mining and Knowledge Discovery, 8(1), 53-87. Google ScholarGoogle ScholarDigital LibraryDigital Library
  154. Han, J., & Kamber, M. (2006). Data mining: Concepts and techniques (2nd ed.). San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  155. Hand, D. J. (2006). Classifier Technology and the Illusion of Progress. Statistical Science, 21(1), 1-14.Google ScholarGoogle ScholarCross RefCross Ref
  156. Hand, D. J., Manilla, H., & Smyth, P. (2001). Principles of Data Mining. Cambridge, MA: MIT Press. Google ScholarGoogle Scholar
  157. Hartigan, J. A. (1975). Clustering algorithms. New York: John Wiley. Google ScholarGoogle Scholar
  158. Hastie, T., & Tibshirani, R. (1998). Classification by pairwise coupling. Annals of Statistics, 26(2), 451-471.Google ScholarGoogle ScholarDigital LibraryDigital Library
  159. Hastie, T., Tibshirani, R., & Friedman, J. (2009). The elements of statistical learning (2nd ed.). New York: Springer-Verlag.Google ScholarGoogle Scholar
  160. Heckerman, D., Geiger, D., & Chickering, D. M. (1995). Learning Bayesian networks: The combination of knowledge and statistical data. Machine Learning, 20(3), 197-243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  161. Hempstalk, K., Frank, E., & Witten, I. H. (2008). One-class classification by combining density and class probability estimation. In Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (pp. 505-519). Antwerp. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  162. Hempstalk, K., & Frank, E. (2008). Discriminating against new classes: One-class versus multi-class classification. In Proceedings of the Twenty-first Australasian Joint Conference on Artificial Intelligence. Auckland (pp. 225-236). New York: Springer-Verlag. Google ScholarGoogle Scholar
  163. Ho, T. K. (1998). The random subspace method for constructing decision forests. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(8), 832-844. Google ScholarGoogle ScholarDigital LibraryDigital Library
  164. Hochbaum, D. S., & Shmoys, D. B. (1985). A best possible heuristic for the k-center problem. Mathematics of Operations Research, 10(2), 180-184.Google ScholarGoogle ScholarDigital LibraryDigital Library
  165. Hoerl, A. E., & Kennard, R. W. (1970). Ridge regression: applications to nonorthogonal problems. Technometrics, 12(1), 69-82.Google ScholarGoogle ScholarDigital LibraryDigital Library
  166. Holmes, G., & Nevill-Manning, C. G. (1995). Feature selection via the discovery of simple classification rules. In G. E. Lasker, & X. Liu (Eds.), Proceedings of the International Symposium on Intelligent Data Analysis (pp. 75-79). Baden-Baden, Germany: International Institute for Advanced Studies in Systems Research and Cybernetics. Baden-Baden. Windsor, Ont: International Institute for Advanced Studies in Systems Research and Cybernetics.Google ScholarGoogle Scholar
  167. Holmes, G., Pfahringer, B., Kirkby, R., Frank, E., & Hall, M. (2002). Multiclass alternating decision trees. In T. Elomaa, H. Mannila, & H. Toivonen (Eds.), Proceedings of the Thirteenth European Conference on Machine Learning (pp. 161-172). Helsinki. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  168. Holte, R. C. (1993). Very simple classification rules perform well on most commonly used datasets. Machine Learning, 11, 63-91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  169. Huffman, S. B. (1996). Learning information extraction patterns from examples. In S. Wertmer, E. Riloff, & G. Scheler (Eds.), Connectionist, statistical, and symbolic approaches to learning for natural language processing (pp. 246-260). Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  170. Jabbour, K., Riveros, J. F. V., Landsbergen, D., & Meyer, W. (1988). ALFA: Automated load forecasting assistant. IEEE Transactions on Power Systems, 3(3), 908-914.Google ScholarGoogle ScholarCross RefCross Ref
  171. Jiang, L., & Zhang, H. (2006). Weightily averaged one-dependence estimators. In Proceedings of the 9th Biennial Pacific Rim International Conference on Artificial Intelligence (pp. 970-974). Guilin, China. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  172. John, G. H. (1995). Robust decision trees: Removing outliers from databases. In U. M. Fayyad, & R. Uthurusamy (Eds.), Proceedings of the First International Conference on Knowledge Discovery and Data Mining (pp. 174-179). Montreal. Menlo Park, CA: AAAI Press.Google ScholarGoogle Scholar
  173. John, G. H. (1997). Enhancements to the data mining process. Ph.D. Dissertation, Computer Science Department, Stanford University, Stanford, CA. Google ScholarGoogle Scholar
  174. John, G. H., Kohavi, R., & Pfleger, P. (1994). Irrelevant features and the subset selection problem. In H. Hirsh, & W. Cohen (Eds.), Proceedings of the Eleventh International Conference on Machine Learning (pp. 121-129). New Brunswick, NJ. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  175. John, G. H., & Langley, P. (1995). Estimating continuous distributions in Bayesian classifiers. In P. Besnard, & S. Hanks (Eds.), Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence (pp. 338-345). Montreal. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  176. Johns, M. V. (1961). An empirical Bayes approach to nonparametric two-way classification. In H. Solomon (Ed.), Studies in item analysis and prediction. Palo Alto, CA: Stanford University Press.Google ScholarGoogle Scholar
  177. Kass, R., & Wasserman, L. (1995). A reference Bayesian test for nested hypotheses and its relationship to the Schwarz criterion. Journal of the American Statistical Association, 90, 928-934.Google ScholarGoogle ScholarCross RefCross Ref
  178. Keerthi, S. S., Shevade, S. K., Bhattacharyya, C., & Murthy, K. R. K. (2001). Improvements to Platt's SMO algorithm for SVM classifier design. Neural Computation, 13(3), 637-649. Google ScholarGoogle ScholarDigital LibraryDigital Library
  179. Kerber, R. (1992). Chimerge: Discretization of numeric attributes. In W. Swartout (Ed.), Proceedings of the Tenth National Conference on Artificial Intelligence (pp. 123-128). San Jose, CA. Menlo Park, CA: AAAI Press. Google ScholarGoogle Scholar
  180. Kibler, D., & Aha, D. W. (1987). Learning representative exemplars of concepts: An initial case study. In P. Langley (Ed.), Proceedings of the Fourth Machine Learning Workshop (pp. 24-30). Irvine, CA. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  181. Kimball, R., & Ross, M. (2002). The data warehouse toolkit (2nd ed.). New York: John Wiley. Google ScholarGoogle Scholar
  182. Kira, K., & Rendell, L. (1992). A practical approach to feature selection. In D. Sleeman, & P. Edwards (Eds.), Proceedings of the Ninth International Workshop on Machine Learning (pp. 249-258). Aberdeen, Scotland. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  183. Kirkby, R. (2007). Improving Hoeffding trees. Ph.D. Dissertation, Department of Computer Science, University of Waikato, New Zealand.Google ScholarGoogle Scholar
  184. Kittler, J. (1978). Feature set search algorithms. In C. H. Chen (Ed.), Pattern recognition and signal processing (pp. 41-60). Amsterdam: Sijthoff an Noordhoff.Google ScholarGoogle Scholar
  185. Kivinen, J., Smola, A. J., & Williamson, R. C. (2002). Online learning with kernels. IEEE Transactions on Signal Processing, 52, 2165-2176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  186. Kleinberg, J. (1998). Authoritative sources in a hyperlinked environment. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (pp. 604-632). Extended version published in Journal of the ACM 46 (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  187. Koestler, A. (1964). The act of creation. London: Hutchinson.Google ScholarGoogle Scholar
  188. Kohavi, R. (1995a). A study of cross-validation and bootstrap for accuracy estimation and model selection. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence (pp. 1137-1143). Montreal. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  189. Kohavi, R. (1995b). The power of decision tables. In N. Lavrac, & S. Wrobel (Eds.), Proceedings of the Eighth European Conference on Machine Learning (pp. 174-189). Iráklion, Crete. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  190. Kohavi, R. (1996). Scaling up the accuracy of Naïve Bayes classifiers: A decision-tree hybrid. In E. Simoudis, J. W. Han, & U. Fayyad (Eds.), Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (pp. 202-207). Portland, OR. Menlo Park, CA: AAAI Press.Google ScholarGoogle Scholar
  191. Kohavi, R., & John, G. H. (1997). Wrappers for feature subset selection. Artificial Intelligence, 97(1-2), 273-324. Google ScholarGoogle ScholarDigital LibraryDigital Library
  192. Kohavi, R., & Kunz, C. (1997). Option decision trees with majority votes. In D. Fisher (Ed.), Proceedings of the Fourteenth International Conference on Machine Learning (pp. 161-191). Nashville. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  193. Kohavi, R., & Provost, F. (Eds.), (1998). Machine learning: Special issue on applications of machine learning and the knowledge discovery process. Machine Learning, 30(2/3), 127-274.Google ScholarGoogle ScholarCross RefCross Ref
  194. Kohavi, R., & Sahami, M. (1996). Error-based and entropy-based discretization of continuous features. In E. Simoudis, J. W. Han, & U. Fayyad (Eds.), Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (pp. 114-119). Portland, OR. Menlo Park, CA: AAAI Press.Google ScholarGoogle Scholar
  195. Komarek, P., & Moore, A. (2000). A dynamic adaptation of AD-trees for efficient machine learning on large data sets. In P. Langley (Ed.), Proceedings of the Seventeenth International Conference on Machine Learning (pp. 495-502). Stanford, CA. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  196. Kononenko, I. (1995). On biases in estimating multi-valued attributes. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence (pp. 1034-1040). Montreal. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  197. Koppel, M., & Schler, J. (2004). Authorship verification as a one-class classification problem. In R. Greiner, & D. Schuurmans (Eds.), Proceedings of the Twenty-First International Conference on Machine Learning (pp. 489-495). Banff, AB. New York: ACM Press. Google ScholarGoogle Scholar
  198. Krogel, M.-A., & Wrobel, S. (2002). Feature selection for propositionalization. In Proceedings of the International Conference on Discovery Science (pp. 430-434). Lübeck, Germany. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  199. Kubat, M., Holte, R. C., & Matwin, S. (1998). Machine learning for the detection of oil spills in satellite radar images. Machine Learning, 30, 195-215. Google ScholarGoogle ScholarDigital LibraryDigital Library
  200. Kuncheva, L. I., & Rodriguez, J. J. (2007). An experimental study on rotation forest ensembles. In Proceedings of the Seventh International Workshop on Multiple Classifier Systems (pp. 459-468). Prague. Berlin/Heidelberg: Springer-Verlag. Google ScholarGoogle Scholar
  201. Kushmerick, N., Weld, D. S., & Doorenbos, R. (1997). Wrapper induction for information extraction. In Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence (pp. 729-735). Nagoya, Japan. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  202. Laguna, M., & Marti, R. (2003). Scatter search: Methodology and implementations in C. Dordrecht, The Netherlands: Kluwer Academic Press. Google ScholarGoogle Scholar
  203. Landwehr, N., Hall, M., & Frank, E. (2005). Logistic model trees. Machine Learning, 59(1-2), 161-205. Google ScholarGoogle ScholarDigital LibraryDigital Library
  204. Langley, P. (1996). Elements of machine learning. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  205. Langley, P., Iba, W., & Thompson, K. (1992). An analysis of Bayesian classifiers. In W. Swartout (Ed.), Proceedings of the Tenth National Conference on Artificial Intelligence (pp. 223-228). San Jose, CA. Menlo Park, CA: AAAI Press. Google ScholarGoogle Scholar
  206. Langley, P., & Sage, S. (1994). Induction of selective Bayesian classifiers. In R. L. de Mantaras, & D. Poole (Eds.), Proceedings of the Tenth Conference on Uncertainty in Artificial Intelligence (pp. 399-406). Seattle. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  207. Langley, P., & Simon, H. A. (1995). Applications of machine learning and rule induction. Communications of the ACM, 38(11), 55-64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  208. Lavrac, N., Motoda, H., Fawcett, T., Holte, R., Langley, P., & Adriaans, P. (Eds.), (2004). Special issue on lessons learned from data mining applications and collaborative problem solving. Machine Learning, 57(1/2). Google ScholarGoogle Scholar
  209. Lawson, C. L., & Hanson, R. J. (1995). Solving least squares problems. Philadelphia: SIAM Publications.Google ScholarGoogle Scholar
  210. le Cessie, S., & van Houwelingen, J. C. (1992). Ridge estimators in logistic regression. Applied Statistics, 41(1), 191-201.Google ScholarGoogle Scholar
  211. Li, M., & Vitanyi, P. M. B. (1992). Inductive reasoning and Kolmogorov complexity. Journal of Computer and System Sciences, 44, 343-384. Google ScholarGoogle ScholarDigital LibraryDigital Library
  212. Lieberman, H. (Ed.), (2001). Your wish is my command: Programming by example. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  213. Littlestone, N. (1988). Learning quickly when irrelevant attributes abound: A new linear-threshold algorithm. Machine Learning, 2(4), 285-318. Google ScholarGoogle ScholarDigital LibraryDigital Library
  214. Littlestone, N. (1989). Mistake bounds and logarithmic linear-threshold learning algorithms. Ph, D. Dissertation, University of California, Santa Cruz. Google ScholarGoogle Scholar
  215. Liu, B. (2009) Web data mining: Exploring hyperlinks, contents, and usage data. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  216. Liu, B., Hsu, W., & Ma, Y. M. (1998). Integrating classification and association rule mining. In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98) (pp. 80-86). New York. Menlo Park, CA: AAAI Press.Google ScholarGoogle Scholar
  217. Liu, H., & Setiono, R. (1996). A probabilistic approach to feature selection: A filter solution. In L. Saitta (Ed.), Proceedings of the Thirteenth International Conference on Machine Learning (pp. 319-327), Bari, Italy. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  218. Liu, H., & Steiono, R. (1997). Feature selection via discretization. IEEE Transactions on Knowledge and Data Engineering, 9(4), 642-645. Google ScholarGoogle ScholarDigital LibraryDigital Library
  219. Luan, J. (2002). Data mining and its applications in higher education. New directions for institutional research, 2002(113), 17-36.Google ScholarGoogle Scholar
  220. Mann, T. (1993). Library research models: A guide to classification, cataloging, and computers. New York: Oxford University Press.Google ScholarGoogle Scholar
  221. Marill, T., & Green, D. M. (1963). On the effectiveness of receptors in recognition systems. IEEE Transactions on Information Theory, 9(11), 11-17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  222. Maron, O. (1998). Learning from ambiguity. Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA. Google ScholarGoogle Scholar
  223. Maron, O., & Lozano-Peréz, T. (1997). A framework for multiple-instance learning. In Proceedings of the Conference on Neural Information Processing Systems (pp. 570-576). Denver. Cambridge, MA: MIT Press. Google ScholarGoogle Scholar
  224. Martin, B. (1995). Instance-based learning: Nearest neighbour with generalisation. M.Sc. Thesis, Department of Computer Science, University of Waikato, New Zealand.Google ScholarGoogle Scholar
  225. McCallum A., & Nigam, K. (1998). A comparison of event models for Naïve Bayes text classification. In Proceedings of the AAAI-98 Workshop on Learning for Text Categorization (pp. 41-48). Madison, WI. Menlo Park, CA: AAAI Press.Google ScholarGoogle Scholar
  226. Medelyan, O., & Witten, I. H. (2008). Domain independent automatic keyphrase indexing with small training sets. Journal of the American Society for Information Science and Technology, 59, 1026-1040. Google ScholarGoogle ScholarDigital LibraryDigital Library
  227. Mehta, M., Agrawal, R., & Rissanen, J. (1996). SLIQ: A fast scalable classifier for data mining. In P. Apers, M. Bouzeghoub, & G. Gardarin (Eds.), Proceedings of the Fifth International Conference on Extending Database Technology (pp. 18-32). Avignon, France. New York: Springer-Verlag. Google ScholarGoogle Scholar
  228. Melville, P., & Mooney, R. J. (2005). Creating diversity in ensembles using artificial data. Information Fusion, 6(1), 99-111.Google ScholarGoogle Scholar
  229. Michalski, R. S., & Chilausky, R. L. (1980). Learning by being told and learning from examples: An experimental comparison of the two methods of knowledge acquisition in the context of developing an expert system for soybean disease diagnosis. International Journal of Policy Analysis and Information Systems, 4(2).Google ScholarGoogle Scholar
  230. Michie, D. (1989). Problems of computer-aided concept formation. In J. R. Quinlan (Ed.), Applications of expert systems (Vol. 2) (pp. 310-333). Wokingham, UK: Addison-Wesley.Google ScholarGoogle Scholar
  231. Minsky, M., & Papert, S. (1969). Perceptrons. Cambridge, MA: MIT Press.Google ScholarGoogle Scholar
  232. Mitchell, T. M. (1997). Machine Learning. New York: McGraw-Hill. Google ScholarGoogle Scholar
  233. Mitchell T. M., Caruana, R., Freitag, D., McDermott, J., & Zabowski, D. (1994). Experience with a learning personal assistant. Communications of the ACM, 37 (7), 81-91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  234. Moore, A. W. (1991). Efficient memory-based learning for robot control. Ph.D. Dissertation, Computer Laboratory, University of Cambridge, UK.Google ScholarGoogle Scholar
  235. Moore, A. W. (2000). The anchors hierarchy: Using the triangle inequality to survive high-dimensional data. In C. Boutilier, & M. Goldszmidt (Eds.), Proceedings of the Sixteenth Conference on Uncertainty in Artificial Intelligence (pp. 397-405). Stanford, CA. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  236. Moore, A. W., & Lee, M. S. (1994). Efficient algorithms for minimizing cross validation error. In W. W. Cohen, & H. Hirsh (Eds.), Proceedings of the Eleventh International Conference on Machine Learning (pp. 190-198). New Brunswick, NJ. San Francisco: Morgan Kaufmann.Google ScholarGoogle Scholar
  237. Moore, A. W. & Lee, M. S. (1998). Cached sufficient statistics for efficient machine learning with large datasets. Journal Artificial Intelligence Research, 8, 67-91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  238. Moore, A. W., & Pelleg, D. (2000). X-means: Extending k-means with efficient estimation of the number of clusters. In P. Langley (Ed.), Proceedings of the Seventeenth International Conference on Machine Learning (pp. 727-734). Stanford, CA. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  239. Mutter, S., Hall, M., & Frank, E. (2004). Using classification to evaluate the output of confidence-based association rule mining. In Proceedings of the Seventeenth Australian Joint Conference on Artificial Intelligence (pp. 538-549). Cairns, Australia. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  240. Nadeau, C., & Bengio, Y. (2003). Inference for the generalization error. Machine Learning, 52(3), 239-281. Google ScholarGoogle ScholarDigital LibraryDigital Library
  241. Nahm, U. Y., & Mooney, R. J. (2000). Using information extraction to aid the discovery of prediction rules from texts. In Proceedings of the Workshop on Text Mining at the Sixth International Conference on Knowledge Discovery and Data Mining (pp. 51-58). Boston. Workshop proceedings at: http://www.cs.cmu.edu/~dunja/WshKDD2000.htmlGoogle ScholarGoogle Scholar
  242. Niculescu-Mizil, A., & Caruana, R. (2005). Predicting good probabilities with supervised learning. In Proceedings of the 22nd International Conference on Machine Learning (pp. 625-632). Bonn. New York: ACM Press. Google ScholarGoogle Scholar
  243. Nie, N. H., Hull, C., Jenkins, H., Steinbrenner, J. G. K., & Bent, D. H. (1970). Statistical package for the social sciences. New York: McGraw-Hill.Google ScholarGoogle Scholar
  244. Nigam, K., & Ghani, R. (2000). Analyzing the effectiveness and applicability of co-training. In Proceedings of the Ninth International Conference on Information and Knowledge Management (pp. 86-93). McLean, VA. New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  245. Nigam, K., McCallum, A. K., Thrun, S., & Mitchell, T. M. (2000). Text classification from labeled and unlabeled documents using EM. Machine Learning, 39(2/3), 103-134. Google ScholarGoogle ScholarCross RefCross Ref
  246. Nilsson, N. J. (1965). Learning machines. New York: McGraw-Hill.Google ScholarGoogle Scholar
  247. Nisbet, R., Elder, J., & Miner, G. (2009). Handbook of statistical analysis and data mining applications. New York: Academic Press. Google ScholarGoogle Scholar
  248. Oates, T., & Jensen, D. (1997). The effects of training set size on decision tree complexity. In Proceedings of the Fourteenth International Conference on Machine Learning (pp. 254-262). Nashville. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  249. Ohm, P. (2009). Broken promises of privacy: Responding to the surprising failure of anonymization. University of Colorado Law Legal Studies Research Paper No. 09-12, August.Google ScholarGoogle Scholar
  250. Omohundro, S. M. (1987). Efficient algorithms with neural network behavior. Journal of Complex Systems, 1(2), 273-347.Google ScholarGoogle Scholar
  251. Paynter G. W. (2000). Automating iterative tasks with programming by demonstration. Ph.D. Dissertation, Department of Computer Science, University of Waikato, New Zealand.Google ScholarGoogle Scholar
  252. Pearson, R. (2005). Mining imperfect data. Society for Industrial and Applied Mechanics, Philadelphia.Google ScholarGoogle Scholar
  253. Pei, J., Han, J., Mortazavi-Asi, B., Wang, J., Pinto, H., Chen, Q., et al. (2004). Mining sequential patterns by pattern-growth: The PrefixSpan approach. IEEE Transactions on Knowledge and Data Engineering, 16(11), 1424-1440. Google ScholarGoogle ScholarDigital LibraryDigital Library
  254. Piatetsky-Shapiro, G., & Frawley, W. J. (Eds.) (1991). Knowledge discovery in databases. Menlo Park, CA: AAAI Press/MIT Press. Google ScholarGoogle Scholar
  255. Platt, J. (1998). Fast training of support vector machines using sequential minimal optimization. In B. Schölkopf, C. Burges, & A. Smola (Eds.), Advances in kernel methods: Support vector learning (pp. 185-209). Cambridge, MA: MIT Press. Google ScholarGoogle Scholar
  256. Power, D. J. (2002). What is the true story about data mining, beer and diapers? DSS News, 3(23); see http://www.dssresources.com/newsletters/66.php.Google ScholarGoogle Scholar
  257. Provost, F., & Fawcett, T. (1997). Analysis and visualization of classifier performance: Comparison under imprecise class and cost distributions. In D. Heckerman, H. Mannila, D. Pregibon, & R. Uthurusamy (Eds.), Proceedings of the Third International Conference on Knowledge Discovery and Data Mining (pp. 43-48). Huntington Beach, CA. Menlo Park, CA: AAAI Press.Google ScholarGoogle Scholar
  258. Pyle, D. (1999). Data preparation for data mining. San Francisco, CA: Morgan Kaufmann. Google ScholarGoogle Scholar
  259. Quinlan, J. R. (1986). Induction of decision trees. Machine Learning, 1(1), 81-106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  260. 8Quinlan, J. R. (1992). Learning with continuous classes. In N. Adams, & L. Sterling (Eds.), Proceedings of the Fifth Australian Joint Conference on Artificial Intelligence (pp. 343-348). Hobart, Tasmania. Singapore: World Scientific.Google ScholarGoogle Scholar
  261. Quinlan, J. R. (1993). C4.5: Programs for machine learning. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  262. Quinlan, J. R. (1996). Improved use of continuous attributes in C4.5. Journal of Artificial Intelligence Research, 4, 77-90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  263. Ramon, J., & de Raedt, L. (2000). Multi instance neural networks. In Proceedings of the ICML Workshop on Attribute-Value and Relational Learning (pp. 53-60). Stanford, CA.Google ScholarGoogle Scholar
  264. Ray, S., & Craven, M. (2005). Supervised learning versus multiple instance learning: An empirical comparison. In Proceedings of the International Conference on Machine Learning (pp. 697-704). Bonn. New York: ACM Press. Google ScholarGoogle Scholar
  265. Read, J., Pfahringer, B., Holmes, G., & Frank, E. (2009). Classifier chains for multilabel classification. In Proceedings of the 13th European Conference on Principles and Practice of Knowledge Discovery in Databases and 20th European Conference on Machine Learning (pp. 254-269). Bled, Slovenia. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  266. Rennie, J. D. M., Shih, L., Teevan, J., & Karger, D. R. (2003). Tackling the poor assumptions of Naïve Bayes text classifiers. In T. Fawcett, & N. Mishra (Eds.), Proceedings of the Twentieth International Conference on Machine Learning (pp. 616-623). Washington, DC. Menlo Park, CA: AAAI Press.Google ScholarGoogle Scholar
  267. Ricci, F., & Aha, D. W. (1998). Error-correcting output codes for local learners. In C. Nedellec, & C. Rouveird (Eds.), Proceedings of the European Conference on Machine Learning (pp. 280-291). Chemnitz, Germany. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  268. Richards, D., & Compton, P. (1998). Taking up the situated cognition challenge with ripple-down rules. International Journal of Human-Computer Studies, 49(6), 895-926. Google ScholarGoogle ScholarDigital LibraryDigital Library
  269. Rifkin, R., & Klautau, A. (2004). In defense of one-vs.-all classification. Journal of Machine Learning Research, 5, 101-141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  270. Ripley, B. D. (1996). Pattern recognition and neural networks. Cambridge, UK: Cambridge University Press. Google ScholarGoogle Scholar
  271. Rissanen, J. (1985). The minimum description length principle. In S. Kotz, & N. L. Johnson (Eds.), Encylopedia of Statistical Sciences (Vol. 5) (pp. 523-527). New York: John Wiley.Google ScholarGoogle Scholar
  272. Rodriguez, J. J., Kuncheva, L. I., & Alonso, C. J. (2006). Rotation forest: A new classifier ensemble method. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(10), 1619-1630. Google ScholarGoogle ScholarDigital LibraryDigital Library
  273. Rousseeuw, P. J., & Leroy, A. M. (1987). Robust regression and outlier detection. New York: John Wiley. Google ScholarGoogle Scholar
  274. Russell, S., & Norvig, P. (2009). Artificial intelligence: A modern approach (3rd ed.). Upper Saddle River, NJ: Prentice-Hall. Google ScholarGoogle Scholar
  275. Sahami, M., Dumais, S., Heckerman, D., & Horvitz, E. (1998). A Bayesian approach to filtering junk e-mail. In Proceedings of the AAAI-98 Workshop on Learning for Text Categorization (pp. 55-62). Madison, WI. Menlo Park, CA: AAAI Press.Google ScholarGoogle Scholar
  276. Saitta, L., & Neri, F. (1998). Learning in the "real world." Machine Learning, 30(2/3), 133-163. Google ScholarGoogle ScholarCross RefCross Ref
  277. Salzberg, S. (1991). A nearest hyperrectangle learning method. Machine Learning, 6(3), 251-276. Google ScholarGoogle ScholarDigital LibraryDigital Library
  278. Schapire, R. E., Freund, Y., Bartlett, P., & Lee, W. S. (1997). Boosting the margin: A new explanation for the effectiveness of voting methods. In D. H. Fisher (Ed.), Proceedings of the Fourteenth International Conference on Machine Learning (pp. 322-330). Nashville. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  279. Scheffer, T. (2001). Finding association rules that trade support optimally against confidence. In L. de Raedt, & A. Siebes (Eds.), Proceedings of the Fifth European Conference on Principles of Data Mining and Knowledge Discovery (pp. 424-435). Freiburg, Germany. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  280. Schölkopf, B., Bartlett, P., Smola, A. J., & Williamson, R. (1999). Shrinking the tube: A new support vector regression algorithm. Advances in Neural Information Processing Systems, 11, 330-336. Cambridge, MA: MIT Press. Google ScholarGoogle Scholar
  281. Schölkopf, B., Williamson, R., Smola, A., Shawe-Taylor, J., & Platt, J. (2000). Support vector method for novelty detection. Advances in Neural Information Processing Systems, 12, 582-588. Cambridge, MA: MIT Press.Google ScholarGoogle Scholar
  282. Schölkopf, B., & Smola, A. J. (2002). Learning with kernels: Support vector machines, regularization, optimization, and beyond. Cambridge, MA: MIT Press. Google ScholarGoogle Scholar
  283. Sebastiani, F. (2002). Machine learning in automated text categorization. ACM Computing Surveys, 34(1), 1-47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  284. Seewald A. K. (2002). How to make stacking better and faster while also taking care of an unknown weakness. In Proceedings of the Nineteenth International Conference on Machine Learning (pp. 54-561). Sydney. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  285. Seewald, A. K., & Fürnkranz, J. (2001). An evaluation of grading classifiers. In F. Hoffmann, D. J. Hand, N. M. Adams, D. H. Fisher, & G. Guimarães (Eds.), Proceedings of the Fourth International Conference on Advances in Intelligent Data Analysis (pp. 115-124). Cascais, Portugal. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  286. Shafer, R., Agrawal, R., & Metha, M. (1996). SPRINT: A scalable parallel classifier for data mining. In T. M. Vijayaraman, A. P. Buchmann, C. Mohan, & N. L. Sarda (Eds.), Proceedings of the Second International Conference on Very Large Databases (pp. 544-555). Mumbai (Bombay). San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  287. Shalev-Shwartz, S., Singer, Y., & Srebro, N. (2007). Pegasos: Primal estimated sub-gradient solver for SVM. In Proceedings of the 24th international conference on Machine Learning (pp. 807-814). New York: ACM Press. Google ScholarGoogle Scholar
  288. Shawe-Taylor, J., & Cristianini, N. (2004). Kernel methods for pattern analysis. Cambridge, UK: Cambridge University Press. Google ScholarGoogle Scholar
  289. Slonim, N., Friedman, N., & Tishby, N. (2002). Unsupervised document classification using sequential information maximization. In Proceedings of the 25th International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 120-136). New York: ACM Press. Google ScholarGoogle Scholar
  290. Smola, A. J., & B. Schölkopf. (2004). A tutorial on support vector regression. Statistics and Computing, 14(3), 199-222. Google ScholarGoogle ScholarDigital LibraryDigital Library
  291. Soderland, S., Fisher, D., Aseltine, J., & Lehnert, W. (1995). Crystal: Inducing a conceptual dictionary. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence (pp. 1314-1319). Montreal. Menlo Park, CA: AAAI Press. Google ScholarGoogle Scholar
  292. Srikant, R., & Agrawal, R. (1996). Mining sequential patterns: Generalizations and performance improvements. In P. M. Apers, M. Bouzeghoub, & G. Gardarin (Eds.), Proceedings of the Fifth International Conference on Extending Database Technology. Avignon, France. Lecture Notes in Computer Science. Vol. 1057 (pp. 3-17). London: Springer-Verlag. Google ScholarGoogle Scholar
  293. Stevens, S. S. (1946). On the theory of scales of measurement. Science, 103, 677-680.Google ScholarGoogle Scholar
  294. Stone, P., & Veloso, M. (2000). Multiagent systems: A survey from a machine learning perspective. Autonomous Robots, 8(3), 345-383. Google ScholarGoogle ScholarDigital LibraryDigital Library
  295. Stout, Q. F. (2008). Unimodal regression via prefix isotonic regression. Computational Statistics and Data Analysis, 53, 289-297. Google ScholarGoogle ScholarDigital LibraryDigital Library
  296. Su, J., Zhang, H., Ling, C. X., & Matwin, S. (2008). Discriminative parameter learning for Bayesian networks. In Proceedings of the 25th International Conference on Machine Learning (pp. 1016-1023). Helsinki. New York: ACM Press. Google ScholarGoogle Scholar
  297. Swets, J. (1988). Measuring the accuracy of diagnostic systems. Science, 240, 1285-1293.Google ScholarGoogle Scholar
  298. Ting, K. M. (2002). An instance-weighting method to induce cost-sensitive trees. IEEE Transactions on Knowledge and Data Engineering, 14(3), 659-665. Google ScholarGoogle ScholarDigital LibraryDigital Library
  299. Ting, K. M., & Witten, I. H. (1997a). Stacked generalization: When does it work? In Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence (pp. 866-871). Nagoya, Japan. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  300. Ting, K. M., & Witten, I. H. (1997b). Stacking bagged and dagged models. In D. H. Fisher (Ed.), Proceedings of the Fourteenth International Conference on Machine Learning (pp. 367-375). Nashville. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  301. Turney, P. D. (1999). Learning to extract key phrases from text. Technical Report ERB-1057, Institute for Information Technology, National Research Council of Canada, Ottawa.Google ScholarGoogle Scholar
  302. U.S. House of Representatives Subcommittee on Aviation (2002). Hearing on aviation security with a focus on passenger profiling, February 27, 2002; see http://www.house.gov/transportation/aviation/02-27-02/02-27-02memo.html.Google ScholarGoogle Scholar
  303. Utgoff, P. E. (1989). Incremental induction of decision trees. Machine Learning, 4(2), 161-186. Google ScholarGoogle ScholarDigital LibraryDigital Library
  304. Utgoff, P. E., Berkman, N. C., & Clouse, J. A. (1997). Decision tree induction based on efficient tree restructuring. Machine Learning, 29(1), 5-44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  305. Vafaie, H., & DeJong, K. (1992). Genetic algorithms as a tool for feature selection in machine learning. In Proceedings of the International Conference on Tools with Artificial Intelligence (pp. 200-203). Arlington, VA: IEEE Computer Society Press.Google ScholarGoogle Scholar
  306. van Rijsbergen, C. A. (1979). Information retrieval. London: Butterworths. Google ScholarGoogle Scholar
  307. Vapnik, V. (1999). The nature of statistical learning theory (2nd ed.). New York: Springer-Verlag. Google ScholarGoogle Scholar
  308. Vitter, J. S. (1985). Random sampling with a reservoir. ACM Transactions on Mathematical Software, 1(11), 37-57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  309. Wang, J., & Zucker, J.-D. (2000). Solving the multiple-instance problem: A lazy learning approach. In Proceedings of the International Conference on Machine Learning (pp. 1119-1125). Stanford, CA. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  310. Wang, J., Han, J., & Pei, J. (2003). CLOSET+: Searching for the best strategies for mining frequent closed itemsets. In Proceedings of the International Conference on Knowledge Discovery and Data Mining (pp. 236-245). Washington, DC. New York: ACM Press. Google ScholarGoogle Scholar
  311. Wang, Y., & Witten, I. H. (1997). Induction of model trees for predicting continuous classes. In M. van Someren, & G. Widmer (Eds.), Proceedings of the of the Poster Papers of the European Conference on Machine Learning (pp. 128-137). University of Economics, Faculty of Informatics and Statistics, Prague. Berlin: Springer.Google ScholarGoogle Scholar
  312. Wang, Y., & Witten, I. H. (2002). Modeling for optimal probability prediction. In C. Sammut, & A. Hoffmann (Eds.), Proceedings of the Nineteenth International Conference on Machine Learning (pp. 650-657). Sydney. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  313. Webb, G. I. (1999). Decision tree grafting from the all-tests-but-one partition. In Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence (pp. 702-707). San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  314. Webb, G. I. (2000). MultiBoosting: A technique for combining boosting and wagging. Machine Learning, 40(2), 159-196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  315. Webb, G. I., Boughton, J., & Wang, Z. (2005). Not so naïve Bayes: Aggregating one-dependence estimators. Machine Learning, 58(1), 5-24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  316. Weidmann, N., Frank, E., & Pfahringer, B. (2003). A two-level learning method for generalized multi-instance problems. In Proceedings of the European Conference on Machine Learning (pp. 468-479). Cavtat, Croatia. Berlin: Springer-Verlag.Google ScholarGoogle Scholar
  317. Weiser, M., & Brown, J. S. (1997). The coming age of calm technology. In P. J. Denning, & R. M. Metcalfe (Eds.), Beyond calculation: The next fifty years (pp. 75-86). New York: Copernicus. Google ScholarGoogle Scholar
  318. Weiss, S. M., & Indurkhya, N. (1998). Predictive data mining: A practical guide. San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  319. Wettschereck, D., & Dietterich, T. G. (1995). An experimental comparison of the nearest-neighbor and nearest-hyperrectangle algorithms. Machine Learning, 19(1), 5-28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  320. Wild, C. J., & Seber, G. A. F. (1995). Introduction to probability and statistics. Department of Statistics, University of Auckland, New Zealand.Google ScholarGoogle Scholar
  321. Winston, P. H. (1992). Artificial intelligence. Reading, MA: Addison-Wesley. Google ScholarGoogle Scholar
  322. Witten, I. H. (2004). Text mining. In M. P. Singh (Ed.), Practical handbook of Internet computing (pp. 14-1-14-22). Boca Raton, FL: CRC Press.Google ScholarGoogle Scholar
  323. Witten, I. H., Bray, Z., Mahoui, M., & Teahan, W. (1999a). Text mining: A new frontier for lossless compression. In J. A. Storer, & M. Cohn (Eds.), Proceedings of the Data Compression Conference (pp. 198-207). Snowbird, UT. Los Alamitos, CA: IEEE Press. Google ScholarGoogle Scholar
  324. Witten, I. H., Moffat, A., & Bell, T. C. (1999b). Managing gigabytes: Compressing and indexing documents and images (2nd ed.). San Francisco: Morgan Kaufmann. Google ScholarGoogle Scholar
  325. Wolpert, D. H. (1992). Stacked generalization. Neural Networks, 5, 241-259. Google ScholarGoogle ScholarDigital LibraryDigital Library
  326. Wu, X. V., Kumar, J. R., Quinlan, J., Ghosh, Q., Yang, H., Motoda, G. J., et al. (2008). Top 10 algorithms in data mining. Knowledge and Information Systems, 14(1), 1-37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  327. Wu, X., & Kumar, V. (Eds.), (2009). The top ten algorithms in data mining. New York: Chapman and Hall. Google ScholarGoogle Scholar
  328. Xu, X., & Frank, E. (2004). Logistic regression and boosting for labeled bags of instances. In Proceedings of the 8th Pacific-Asia Conference on Knowledge Discovery and Data Mining (pp. 272-281). Sydney. Berlin: Springer-Verlag.Google ScholarGoogle Scholar
  329. Yan, X., & Han, J. (2002). gSpan: Graph-based substructure pattern mining. In Proceedings of the IEEE International Conference on Data Mining (pp. 721-724). Maebashi City, Japan. Washington, DC: IEEE Computer Society. Google ScholarGoogle Scholar
  330. Yan, X., & Han, J. (2003). CloseGraph: Mining closed frequent graph patterns. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 286-295). Washington, DC. New York: ACM Press. Google ScholarGoogle Scholar
  331. Yan, X., Han, J., & Afshar, R. (2003). CloSpan: Mining closed sequential patterns in large datasets. In Proceedings of the SIAM International Conference on Data Mining (pp. 166-177). San Francisco. Philadelphia: Society for Industrial and Applied Mathematics.Google ScholarGoogle Scholar
  332. Yang, Y., & Webb, G. I. (2001). Proportional k-interval discretization for Naïve Bayes classifiers. In L. de Raedt, & P. Flach (Eds.), Proceedings of the Twelfth European Conference on Machine Learning (pp. 564-575). Freiburg, Germany. Berlin: Springer-Verlag. Google ScholarGoogle Scholar
  333. Yang, Y., Guan, X., & You, J. (2002). CLOPE: A fast and effective clustering algorithm for transactional data. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 682-687). Edmonton, AB. New York: ACM Press. Google ScholarGoogle Scholar
  334. Yurcik, W., Barlow, J., Zhou, Y., Raje, H., Li, Y., Yin, X., et al. (2003). Scalable data management alternatives to support data mining heterogeneous logs for computer network security. In Proceedings of the Workshop on Data Mining for Counter Terrorism and Security. San Francisco. Philadelphia: Society for International and Applied Mathematics.Google ScholarGoogle Scholar
  335. Zadrozny, B., & Elkan, C. (2002). Transforming classifier scores into accurate multiclass probability estimates. In Proceedings of the Eighth ACM International Conference on Knowledge Discovery and Data Mining (pp. 694-699). Edmonton, AB. New York: ACM Press. Google ScholarGoogle Scholar
  336. Zaki, M. J., Parthasarathy, S., Ogihara, M., & Li, W. (1997). New algorithms for fast discovery of association rules. In Proceedings Knowledge Discovery in Databases (pp. 283-286). Newport Beach, CA. Menlo Park, CA: AAAI Press.Google ScholarGoogle Scholar
  337. Zhang, H., Jiang, L., & Su, J. (2005). Hidden Naïve Bayes. In Proceedings of the 20th National Conference on Artificial Intelligence (pp. 919-924). Pittsburgh. Menlo Park, CA: AAAI Press. Google ScholarGoogle Scholar
  338. Zhang, T., Ramakrishnan, R., & Livny, M. (1996). BIRCH: An efficient data clustering method for very large databases. In Proceedings of the ACM SIGMOD International Conference on Management of Data (pp. 103-114). Montreal. New York: ACM Press. Google ScholarGoogle Scholar
  339. Zhang, T. (2004). Solving large scale linear prediction problems using stochastic gradient descent algorithms. In Proceedings of the 21st International Conference on Machine Learning (pp. 919-926). Banff, AB. Madison, WI: Omnipress. Google ScholarGoogle Scholar
  340. Zheng, F., & Webb, G. (2006). Efficient lazy elimination for averaged one-dependence estimators. In Proceedings of the 23rd International Conference on Machine Learning (pp. 1113-1120). New York: ACM Press. Google ScholarGoogle Scholar
  341. Zheng, Z., & Webb, G. (2000). Lazy learning of Bayesian rules. Machine Learning, 41(1), 53-84. Google ScholarGoogle ScholarCross RefCross Ref
  342. Zhou, Z.-H., & Zhang, M.-L. (2007). Solving multi-instance problems with classifier ensemble based on constructive clustering. Knowledge and Information Systems, 11(2), 155-170. Google ScholarGoogle ScholarDigital LibraryDigital Library

Cited By

  1. Sha Y, Du J, Yang Z and Jiang F Cluster Center Initialization for Fuzzy K-Modes Clustering Using Outlier Detection Technique Pattern Recognition and Computer Vision, (3-18)
  2. İfraz M, Ersöz S, Aktepe A and Çetinyokuş T (2024). Sequential predictive maintenance and spare parts management with data mining methods: a case study in bus fleet, The Journal of Supercomputing, 80:15, (22099-22123), Online publication date: 1-Oct-2024.
  3. ACM
    Ayoughi N, Nejati S, Sabetzadeh M and Saavedra P Enhancing Automata Learning with Statistical Machine Learning: A Network Security Case Study Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, (172-182)
  4. Świtoński A and Josiński H Human Sex Recognition Based on Dimensionality and Uncertainty of Gait Motion Capture Data Computational Science – ICCS 2024, (18-30)
  5. ACM
    Angelopoulos G and Estivill-Castro V Human-Robot Dialogue that Elicits The Alignment of Moral Principles For Driverless Vehicles Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction, (196-200)
  6. Amini M, Naseri S and Nejati S (2024). Evaluating the impact of flaky simulators on testing autonomous driving systems, Empirical Software Engineering, 29:2, Online publication date: 1-Mar-2024.
  7. Singh T and Uppaluri R (2024). Feed-forward ANN and traditional machine learning-based prediction of biogas generation rate from meteorological and organic waste parameters, The Journal of Supercomputing, 80:2, (2538-2571), Online publication date: 1-Jan-2024.
  8. Pinto V, Gamage C, Stephenson M and Renz J The Difficulty of Novelty Detection and Adaptation in Physical Environments AI 2023: Advances in Artificial Intelligence, (28-40)
  9. de Leoni M, Vinci F, Leemans S and Mannhardt F Investigating the Influence of Data-Aware Process States on Activity Probabilities in Simulation Models: Does Accuracy Improve? Business Process Management, (129-145)
  10. ACM
    Lee J, Shin S, Briand L and Nejati S (2023). Probabilistic Safe WCET Estimation for Weakly Hard Real-Time Systems at Design Stages, ACM Transactions on Software Engineering and Methodology, 0:0
  11. Ji Q, Jiang L and Zhang W Instance Weighting-Based Noise Correction for Crowdsourcing Advanced Intelligent Computing Technology and Applications, (285-297)
  12. Chennareddy V, Tirunagari S, Mohan S, Windridge D and Balla Y Interpretable Chronic Kidney Disease Risk Prediction from Clinical Data Using Machine Learning Multi-disciplinary Trends in Artificial Intelligence, (683-691)
  13. ACM
    Yates D and Islam M (2022). Data Mining on Smartphones: An Introduction and Survey, ACM Computing Surveys, 55:5, (1-38), Online publication date: 30-Jun-2023.
  14. Mannhardt F, Leemans S, Schwanen C and de Leoni M Modelling Data-Aware Stochastic Processes - Discovery and Conformance Checking Application and Theory of Petri Nets and Concurrency, (77-98)
  15. Costa F, Nassar S and Dantas M (2023). A Sensor Ranking Approach for Edge–Fog–Cloud Environments, SN Computer Science, 4:4, Online publication date: 24-May-2023.
  16. Mortensen K, Zardbani F, Haque M, Agustsson S, Mottin D, Hofmann P and Karras P (2023). Marigold: Efficient k-Means Clustering in High Dimensions, Proceedings of the VLDB Endowment, 16:7, (1740-1748), Online publication date: 1-Mar-2023.
  17. Jhajharia K and Mathur P (2022). Machine Learning Approaches to Predict Crop Yield Using Integrated Satellite and Climate Data, International Journal of Ambient Computing and Intelligence, 13:1, (1-17), Online publication date: 23-Nov-2022.
  18. ACM
    Cong K, Das D, Park J and Pereira H SortingHat Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (563-577)
  19. Yang W, Li C and Jiang L (2022). Learning from crowds with decision trees, Knowledge and Information Systems, 64:8, (2123-2140), Online publication date: 1-Aug-2022.
  20. Cesarelli G, Donisi L, Coccia A, Amitrano F, Biancardi A, Lanzillo B and D'Addio G Ataxia and Parkinson's disease patients classification using tree-based machine learning algorithms fed by spatiotemporal features: a pilot study 2022 IEEE International Symposium on Medical Measurements and Applications (MeMeA), (1-6)
  21. Mortazavi R, Mortazavi S and Troncoso A (2022). Wrapper-based feature selection using regression trees to predict intrinsic viscosity of polymer, Engineering with Computers, 38:3, (2553-2565), Online publication date: 1-Jun-2022.
  22. Varde A, Pandey A and Du X (2022). Prediction Tool on Fine Particle Pollutants and Air Quality for Environmental Engineering, SN Computer Science, 3:3, Online publication date: 1-May-2022.
  23. Gavel S, Raghuvanshi A and Tiwari S (2022). Maximum correlation based mutual information scheme for intrusion detection in the data networks, Expert Systems with Applications: An International Journal, 189:C, Online publication date: 1-Mar-2022.
  24. Bai L, Cui L, Jiao Y, Rossi L and Hancock E (2022). Learning Backtrackless Aligned-Spatial Graph Convolutional Networks for Graph Classification, IEEE Transactions on Pattern Analysis and Machine Intelligence, 44:2, (783-798), Online publication date: 1-Feb-2022.
  25. Le H, Shar L, Bianculli D, Briand L and Nguyen C (2022). Automated reverse engineering of role-based access control policies of web applications, Journal of Systems and Software, 184:C, Online publication date: 1-Feb-2022.
  26. ACM
    Falessi D, Ahluwalia A and Penta M (2021). The Impact of Dormant Defects on Defect Prediction: A Study of 19 Apache Projects, ACM Transactions on Software Engineering and Methodology, 31:1, (1-26), Online publication date: 31-Jan-2022.
  27. Jhaveri R, Revathi A, Ramana K, Raut R, Dhanaraj R and Hakak S (2022). A Review on Machine Learning Strategies for Real-World Engineering Applications, Mobile Information Systems, 2022, Online publication date: 1-Jan-2022.
  28. Aguilar D, Loyola-González O, Medina-Pérez M, Cañete-Sifuentes L and Choo K (2021). PBC4occ, Future Generation Computer Systems, 125:C, (71-90), Online publication date: 1-Dec-2021.
  29. Gan H, Zhang J, Towsey M, Truskinger A, Stark D, van Rensburg B, Li Y and Roe P (2021). A novel frog chorusing recognition method with acoustic indices and machine learning, Future Generation Computer Systems, 125:C, (485-495), Online publication date: 1-Dec-2021.
  30. Zhang C, Oh S and Fu Z (2022). Hierarchical polynomial-based fuzzy neural networks driven with the aid of hybrid network architecture and ranking-based neuron selection strategies, Applied Soft Computing, 113:PA, Online publication date: 1-Dec-2021.
  31. Zhang H, Jiang L and Li C (2021). Collaboratively weighted naive Bayes, Knowledge and Information Systems, 63:12, (3159-3182), Online publication date: 1-Dec-2021.
  32. Cleofas-Sanchez L, Pineda-Briseño A and Sanchez J Identifying Optimal Clusters in Purchase Transaction Data Advances in Computational Intelligence, (3-22)
  33. Sicilia R, Merone M, Valenti R and Soda P (2021). Rule-based space characterization for rumour detection in health, Engineering Applications of Artificial Intelligence, 105:C, Online publication date: 1-Oct-2021.
  34. Maitre J, Rendu C, Bouchard K, Bouchard B and Gaboury S (2021). Object recognition in performed basic daily activities with a handcrafted data glove prototype, Pattern Recognition Letters, 147:C, (181-188), Online publication date: 1-Jul-2021.
  35. Rossi A, Soares C, Souza B and Ponce de Leon Ferreira de Carvalho A (2021). Micro-MetaStream, Information Sciences: an International Journal, 565:C, (262-277), Online publication date: 1-Jul-2021.
  36. Garcia-Ceja E, Thambawita V, Hicks S, Jha D, Jakobsen P, Hammer H, Halvorsen P and Riegler M HTAD: A Home-Tasks Activities Dataset with Wrist-Accelerometer and Audio Features MultiMedia Modeling, (196-205)
  37. Ezzini S, Abualhaija S, Arora C, Sabetzadeh M and Briand L Using Domain-specific Corpora for Improved Handling of Ambiguity in Requirements Proceedings of the 43rd International Conference on Software Engineering, (1485-1497)
  38. Nivaashini M and Thangaraj P (2021). Computational intelligence techniques for automatic detection of Wi-Fi attacks in wireless IoT networks, Wireless Networks, 27:4, (2761-2784), Online publication date: 1-May-2021.
  39. ACM
    Vandehei B, Costa D and Falessi D (2021). Leveraging the Defects Life Cycle to Label Affected Versions and Defective Classes, ACM Transactions on Software Engineering and Methodology, 30:2, (1-35), Online publication date: 30-Apr-2021.
  40. ACM
    Ma W, Papadakis M, Tsakmalis A, Cordy M and Traon Y (2021). Test Selection for Deep Learning Systems, ACM Transactions on Software Engineering and Methodology, 30:2, (1-22), Online publication date: 30-Apr-2021.
  41. Carvalho T and Moniz N The Compromise of Data Privacy in Predictive Performance Advances in Intelligent Data Analysis XIX, (426-438)
  42. Yang X, Yu Z, Wang J and Menzies T (2021). Understanding static code warnings, Expert Systems with Applications: An International Journal, 167:C, Online publication date: 1-Apr-2021.
  43. Guo W, Vanhoucke M, Coelho J and Luo J (2021). Automatic detection of the best performing priority rule for the resource-constrained project scheduling problem, Expert Systems with Applications: An International Journal, 167:C, Online publication date: 1-Apr-2021.
  44. Jiang F, Yu X, Zhao H, Gong D and Du J (2021). Ensemble learning based on random super-reduct and resampling, Artificial Intelligence Review, 54:4, (3115-3140), Online publication date: 1-Apr-2021.
  45. Sultana K, Anu V and Chong T (2020). Using software metrics for predicting vulnerable classes and methods in Java projects, Journal of Software: Evolution and Process, 33:3, Online publication date: 3-Mar-2021.
  46. Al-Zoubi A, Alqatawna J, Faris H and Hassonah M (2021). Spam profiles detection on social networks using computational intelligence methods, Journal of Information Science, 47:1, (58-81), Online publication date: 1-Feb-2021.
  47. Kratsch S, Masařík T, Muzi I, Pilipczuk M and Sorge M Optimal discretization is fixed-parameter tractable Proceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, (1702-1719)
  48. Li Y, Sun Z, Liu X, Chen W, Horng D, Lai K and Zhang N (2021). Feature Selection Based on a Large-Scale Many-Objective Evolutionary Algorithm, Computational Intelligence and Neuroscience, 2021, Online publication date: 1-Jan-2021.
  49. Yaman M, Rattay F and Subasi A (2022). Comparison of Bagging and Boosting Ensemble Machine Learning Methods for Face Recognition, Procedia Computer Science, 194:C, (202-209), Online publication date: 1-Jan-2021.
  50. ACM
    Zeng X, Fang B, Shen H and Zhang M Distream Proceedings of the 18th Conference on Embedded Networked Sensor Systems, (409-421)
  51. Costa D, Pereira C, Peixoto H and Machado J Anticipating Maintenance in Telecom Installation Processes Intelligent Data Engineering and Automated Learning – IDEAL 2020, (322-334)
  52. Demissie B, Ceccato M and Shar L (2020). Security analysis of permission re-delegation vulnerabilities in Android apps, Empirical Software Engineering, 25:6, (5084-5136), Online publication date: 1-Nov-2020.
  53. ACM
    Silva D, Soares D and Gonçalves S Measuring Unique Changes Proceedings of the 14th Brazilian Symposium on Software Components, Architectures, and Reuse, (121-130)
  54. Zhang J, Liu X and Li X (2020). Predictive Analytics with Strategically Missing Data, INFORMS Journal on Computing, 32:4, (1143-1156), Online publication date: 1-Oct-2020.
  55. Mohammed K, Ayesh A and Boiten E Utility Promises of Self-Organising Maps in Privacy Preserving Data Mining Data Privacy Management, Cryptocurrencies and Blockchain Technology, (55-72)
  56. Manocha A, Kumar G, Bhatia M and Sharma A (2020). Video-assisted smart health monitoring for affliction determination based on fog analytics, Journal of Biomedical Informatics, 109:C, Online publication date: 1-Sep-2020.
  57. ACM
    Feng Y, Shi Q, Gao X, Wan J, Fang C and Chen Z DeepGini: prioritizing massive tests to enhance the robustness of deep neural networks Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, (177-188)
  58. ACM
    Lin J, Liu Y and Cleland-Huang J Supporting Program Comprehension through Fast Query response in Large-Scale Systems Proceedings of the 28th International Conference on Program Comprehension, (285-295)
  59. ACM
    Tsay J, Braz A, Hirzel M, Shinnar A and Mummert T AIMMX Proceedings of the 17th International Conference on Mining Software Repositories, (81-92)
  60. ACM
    Xia H, Zhang Y, Zhou Y, Chen X, Wang Y, Zhang X, Cui S, Hong G, Zhang X, Yang M and Yang Z How Android developers handle evolution-induced API compatibility issues Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, (886-898)
  61. Martins I, Bahiense L, Infante C and Arruda E (2020). Dimensionality reduction for multi-criteria problems, Expert Systems with Applications: An International Journal, 148:C, Online publication date: 15-Jun-2020.
  62. Adamović S, Miškovic V, Maček N, Milosavljević M, Šarac M, Saračević M and Gnjatović M (2020). An efficient novel approach for iris recognition based on stylometric features and machine learning techniques, Future Generation Computer Systems, 107:C, (144-157), Online publication date: 1-Jun-2020.
  63. Li X, Cheng S, Lv Z, Song H, Jia T and Lu N (2020). Data analytics of urban fabric metrics for smart cities, Future Generation Computer Systems, 107:C, (871-882), Online publication date: 1-Jun-2020.
  64. Chang J, Chen M, Chen L and Chien W (2019). Recognizing important factors of influencing trust in O2O models: an example of OpenTable, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:11, (7907-7923), Online publication date: 1-Jun-2020.
  65. Ong H, Mustapha N, Hamdan H, Rosli R and Mustapha A (2020). Informative top-k class associative rule for cancer biomarker discovery on microarray data, Expert Systems with Applications: An International Journal, 146:C, Online publication date: 15-May-2020.
  66. Pandey S, Mishra R and Tripathi A (2020). BPDET, Expert Systems with Applications: An International Journal, 144:C, Online publication date: 15-Apr-2020.
  67. Ayala D, Borrego A, Hernández I and Ruiz D (2020). A neural network for semantic labelling of structured information, Expert Systems with Applications: An International Journal, 143:C, Online publication date: 1-Apr-2020.
  68. Fan Z, Chiong R, Hu Z and Lin Y (2020). A fuzzy weighted relative error support vector machine for reverse prediction of concrete components, Computers and Structures, 230:C, Online publication date: 1-Apr-2020.
  69. ACM
    de Leoni M and Dündar S Event-log abstraction using batch session identification and clustering Proceedings of the 35th Annual ACM Symposium on Applied Computing, (36-44)
  70. ACM
    Van Goidsenhoven S, Bogdanova D, Deeva G, Broucke S, De Weerdt J and Snoeck M Predicting student success in a blended learning environment Proceedings of the Tenth International Conference on Learning Analytics & Knowledge, (17-25)
  71. Barbez A, Khomh F and Guéhéneuc Y (2020). A machine-learning based ensemble method for anti-patterns detection, Journal of Systems and Software, 161:C, Online publication date: 1-Mar-2020.
  72. Mariani L, Pezzè M, Riganelli O and Xin R (2020). Predicting failures in multi-tier distributed systems, Journal of Systems and Software, 161:C, Online publication date: 1-Mar-2020.
  73. Roitero K, Brunello A, Serra G and Mizzaro S (2020). Effectiveness evaluation without human relevance judgments, Information Processing and Management: an International Journal, 57:2, Online publication date: 1-Mar-2020.
  74. Park H and Jung J (2022). SAX-ARM, Expert Systems with Applications: An International Journal, 141:C, Online publication date: 1-Mar-2020.
  75. Liang J, Xue Y and Wang J (2020). Genetic programming based feature construction methods for foreground object segmentation, Engineering Applications of Artificial Intelligence, 89:C, Online publication date: 1-Mar-2020.
  76. Loreto M, Lisboa T and Moreira V (2020). Early prediction of ICU readmissions using classification algorithms, Computers in Biology and Medicine, 118:C, Online publication date: 1-Mar-2020.
  77. Xie R, Khalil I, Badsha S and Atiquzzaman M (2020). An intelligent healthcare system with data priority based on multi vital biosignals, Computer Methods and Programs in Biomedicine, 185:C, Online publication date: 1-Mar-2020.
  78. Hao Z, Yang C, Liu L, Kustudic M and Niu B (2019). Exploiting skew-adaptive delimitation mechanism for learning expressive classification rules, Applied Intelligence, 50:3, (746-758), Online publication date: 1-Mar-2020.
  79. ACM
    Yu T, Petoumenos P, Janjic V, Leather H and Thomson J COLAB: a collaborative multi-factor scheduler for asymmetric multicore processors Proceedings of the 18th ACM/IEEE International Symposium on Code Generation and Optimization, (268-279)
  80. Sağbaş E, Korukoglu S and Balli S (2020). Stress Detection via Keyboard Typing Behaviors by Using Smartphone Sensors and Machine Learning Techniques, Journal of Medical Systems, 44:4, Online publication date: 19-Feb-2020.
  81. Silber-Varod V, Malayev S and Lerner A (2020). Positioning oneself in different roles, Speech Communication, 117:C, (1-12), Online publication date: 1-Feb-2020.
  82. Martin N, Depaire B, Caris A and Schepers D (2020). Retrieving the resource availability calendars of a process from an event log, Information Systems, 88:C, Online publication date: 1-Feb-2020.
  83. Riaboff L, Poggi S, Madouasse A, Couvreur S, Aubin S, Bédère N, Goumand E, Chauvin A and Plantier G (2020). Development of a methodological framework for a robust prediction of the main behaviours of dairy cows using a combination of machine learning algorithms on accelerometer data, Computers and Electronics in Agriculture, 169:C, Online publication date: 1-Feb-2020.
  84. Alauthman M, Aslam N, Al-kasassbeh M, Khan S, Al-Qerem A and Raymond Choo K (2020). An efficient reinforcement learning-based Botnet detection approach, Journal of Network and Computer Applications, 150:C, Online publication date: 15-Jan-2020.
  85. ACM
    Umar M, Zhanfang C and Liu Y Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering, (5-13)
  86. Yue X, Xiao X, Chen Y and Qian J (2020). Robust Neighborhood Covering Reduction with Determinantal Point Process sampling, Knowledge-Based Systems, 188:C, Online publication date: 5-Jan-2020.
  87. El Hindi K, Abu Shawar B, Aljulaidan R, Alsalamn H and MacLennan B (2020). Improved Distance Functions for Instance-Based Text Classification, Computational Intelligence and Neuroscience, 2020, Online publication date: 1-Jan-2020.
  88. Maldonado S, Peters G and Weber R (2020). Credit scoring using three-way decisions with probabilistic rough sets, Information Sciences: an International Journal, 507:C, (700-714), Online publication date: 1-Jan-2020.
  89. Yue X, Chen Y, Miao D and Fujita H (2020). Fuzzy neighborhood covering for three-way classification, Information Sciences: an International Journal, 507:C, (795-808), Online publication date: 1-Jan-2020.
  90. Casado-Vara R, Martin-del Rey A, Affes S, Prieto J and Corchado J (2022). IoT network slicing on virtual layers of homogeneous data for improved algorithm operation in smart buildings, Future Generation Computer Systems, 102:C, (965-977), Online publication date: 1-Jan-2020.
  91. Gelmini S, Formentin S, Strada S, Tanelli M and Savaresi S (2022). fierClass, Engineering Applications of Artificial Intelligence, 87:C, Online publication date: 1-Jan-2020.
  92. Alqahtani F and Alsulaiman F (2022). Is image-based CAPTCHA secure against attacks based on machine learning? An experimental study, Computers and Security, 88:C, Online publication date: 1-Jan-2020.
  93. Bilal M and Oyedele L (2021). Guidelines for applied machine learning in construction industry—A case of profit margins estimation, Advanced Engineering Informatics, 43:C, Online publication date: 1-Jan-2020.
  94. Kumar G (2019). An improved ensemble approach for effective intrusion detection, The Journal of Supercomputing, 76:1, (275-291), Online publication date: 1-Jan-2020.
  95. Cunha C (2019). Building Autonomic Elements from Video-Streaming Servers, Journal of Network and Systems Management, 28:1, (160-192), Online publication date: 1-Jan-2020.
  96. Qayyum H, Majid M, Haq E and Anwar S (2019). Generation of personalized video summaries by detecting viewer’s emotion using electroencephalography, Journal of Visual Communication and Image Representation, 65:C, Online publication date: 1-Dec-2019.
  97. Liu C, Zhao Q, Yan B, Elsayed S and Sarker R (2019). Transfer learning-assisted multi-objective evolutionary clustering framework with decomposition for high-dimensional data, Information Sciences: an International Journal, 505:C, (440-456), Online publication date: 1-Dec-2019.
  98. Bolón-Canedo V and Alonso-Betanzos A (2019). Ensembles for feature selection, Information Fusion, 52:C, (1-12), Online publication date: 1-Dec-2019.
  99. Tarkhaneh O and Moser I (2019). An improved differential evolution algorithm using Archimedean spiral and neighborhood search based mutation approach for cluster analysis, Future Generation Computer Systems, 101:C, (921-939), Online publication date: 1-Dec-2019.
  100. Yang Q, Scholz M, Shao J, Wang G and Liu X (2019). A generic framework to analyse the spatiotemporal variations of water quality data on a catchment scale, Environmental Modelling & Software, 122:C, Online publication date: 1-Dec-2019.
  101. Lin X, Li C, Ren W, Luo X and Qi Y (2020). A new feature selection method based on symmetrical uncertainty and interaction gain, Computational Biology and Chemistry, 83:C, Online publication date: 1-Dec-2019.
  102. Khosravi K, Daggupati P, Alami M, Awadh S, Ghareb M, Panahi M, Pham B, Rezaie F, Qi C and Yaseen Z (2019). Meteorological data mining and hybrid data-intelligence models for reference evaporation simulation, Computers and Electronics in Agriculture, 167:C, Online publication date: 1-Dec-2019.
  103. Trindade Á and Campelo F (2019). Tuning metaheuristics by sequential optimisation of regression models, Applied Soft Computing, 85:C, Online publication date: 1-Dec-2019.
  104. ACM
    Jabal A, Davari M, Bertino E, Makaya C, Calo S, Verma D, Russo A and Williams C (2019). Methods and Tools for Policy Analysis, ACM Computing Surveys, 51:6, (1-35), Online publication date: 30-Nov-2019.
  105. ACM
    Der Weth C, Abdul A, Kashyap A and Kankanhalli M (2019). CloseUp—A Community-Driven Live Online Search Engine, ACM Transactions on Internet Technology, 19:3, (1-21), Online publication date: 22-Nov-2019.
  106. Matos L, Cortez P, Mendes R and Moreau A Using Deep Learning for Ordinal Classification of Mobile Marketing User Conversion Intelligent Data Engineering and Automated Learning – IDEAL 2019, (60-67)
  107. ACM
    Mungloo-Dilmohamud Z, Jaufeerally-Fakim Y and Peña-Reyes C Exploring the Stability of Feature Selection Methods across a Palette of Gene Expression Datasets Proceedings of the 2019 6th International Conference on Biomedical and Bioinformatics Engineering, (7-12)
  108. Yang R, Zhang C, Gao R, Zhang L and Song Q (2019). Predicting FAD Interacting Residues with Feature Selection and Comprehensive Sequence Descriptors, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16:6, (2046-2056), Online publication date: 1-Nov-2019.
  109. Chen Y and Chang C (2019). Early prediction of the future popularity of uploaded videos, Expert Systems with Applications: An International Journal, 133:C, (59-74), Online publication date: 1-Nov-2019.
  110. Chamikara M, Bertok P, Liu D, Camtepe S and Khalil I (2022). An efficient and scalable privacy preserving algorithm for big data and data streams, Computers and Security, 87:C, Online publication date: 1-Nov-2019.
  111. D’Angelo G, Pilla R, Tascini C and Rampone S (2019). A proposal for distinguishing between bacterial and viral meningitis using genetic programming and decision trees, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:22, (11775-11791), Online publication date: 1-Nov-2019.
  112. ACM
    Ziwei B and Chua H An Application for Classifying Depression in Tweets Proceedings of the 2nd International Conference on Computing and Big Data, (37-41)
  113. ACM
    Cambronero J and Rinard M (2019). AL: autogenerating supervised learning programs, Proceedings of the ACM on Programming Languages, 3:OOPSLA, (1-28), Online publication date: 10-Oct-2019.
  114. Ykhlef H, Bouchaffra D and Ykhlef F Selection of Optimal Sub-ensembles of Classifiers through Evolutionary Game Theory 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), (2267-2272)
  115. Gu X and Blackmore K (2019). Developing a scholar classification scheme from publication patterns in academic science, Journal of the Association for Information Science and Technology, 70:11, (1262-1276), Online publication date: 6-Oct-2019.
  116. Hu X, Pedrycz W and Wang X (2019). Random ensemble of fuzzy rule-based models, Knowledge-Based Systems, 181:C, Online publication date: 1-Oct-2019.
  117. Hussain S (2019). A novel robust kernel for classifying high-dimensional data using Support Vector Machines, Expert Systems with Applications: An International Journal, 131:C, (116-131), Online publication date: 1-Oct-2019.
  118. Martínez F, Frías M, Pérez M and Rivera A (2019). A methodology for applying k-nearest neighbor to time series forecasting, Artificial Intelligence Review, 52:3, (2019-2037), Online publication date: 1-Oct-2019.
  119. Yu L, Jiang L, Wang D and Zhang L (2019). Toward naive Bayes with attribute value weighting, Neural Computing and Applications, 31:10, (5699-5713), Online publication date: 1-Oct-2019.
  120. ACM
    Roccetti M, Delnevo G, Casini L, Zagni N and Cappiello G A Paradox in ML Design Proceedings of the 5th EAI International Conference on Smart Objects and Technologies for Social Good, (201-206)
  121. Bai L, Jiao Y, Cui L and Hancock E Learning Aligned-Spatial Graph Convolutional Networks for Graph Classification Machine Learning and Knowledge Discovery in Databases, (464-482)
  122. Matinnejad R, Nejati S, Briand L and Bruckmann T (2019). Test Generation and Test Prioritization for Simulink Models with Dynamic Behavior, IEEE Transactions on Software Engineering, 45:9, (919-944), Online publication date: 1-Sep-2019.
  123. Bruns R, Dunkel J and Offel N (2022). Learning of complex event processing rules with genetic programming, Expert Systems with Applications: An International Journal, 129:C, (186-199), Online publication date: 1-Sep-2019.
  124. Chen C, Liu Y, Kumar M, Qin J and Ren Y (2019). Energy consumption modelling using deep learning embedded semi-supervised learning, Computers and Industrial Engineering, 135:C, (757-765), Online publication date: 1-Sep-2019.
  125. Maitre J, Bouchard K and Bédard L (2022). Mineral grains recognition using computer vision and machine learning, Computers & Geosciences, 130:C, (84-93), Online publication date: 1-Sep-2019.
  126. Honarvar A and Sami A (2019). Towards Sustainable Smart City by Particulate Matter Prediction Using Urban Big Data, Excluding Expensive Air Pollution Infrastructures, Big Data Research, 17:C, (56-65), Online publication date: 1-Sep-2019.
  127. Quintero-Domínguez L, Morell C and Ventura S (2022). WordificationMI: multi-relational data mining through multiple-instance propositionalization, Progress in Artificial Intelligence, 8:3, (375-387), Online publication date: 1-Sep-2019.
  128. Alghofaily B and Ding C (2019). Data mining service recommendation based on dataset features, Service Oriented Computing and Applications, 13:3, (261-277), Online publication date: 1-Sep-2019.
  129. Ji H, Huang S, Wu Y, Hui Z and Zheng C (2019). A new weighted naive Bayes method based on information diffusion for software defect prediction, Software Quality Journal, 27:3, (923-968), Online publication date: 1-Sep-2019.
  130. ACM
    Xylogiannopoulos K, Karampelas P and Alhajj R Multivariate motif detection in local weather big data Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (749-756)
  131. ACM
    Gandhi S and Harrison B Guided open story generation using probabilistic graphical models Proceedings of the 14th International Conference on the Foundations of Digital Games, (1-7)
  132. Malhotra R and Khanna M (2019). Dynamic selection of fitness function for software change prediction using Particle Swarm Optimization, Information and Software Technology, 112:C, (51-67), Online publication date: 1-Aug-2019.
  133. Rauf I, Troubitsyna E and Porres I (2019). A systematic mapping study of API usability evaluation methods, Computer Science Review, 33:C, (49-68), Online publication date: 1-Aug-2019.
  134. Pliakos K, Joo S, Park J, Cornillie F, Vens C and Van den Noortgate W (2019). Integrating machine learning into item response theory for addressing the cold start problem in adaptive learning systems, Computers & Education, 137:C, (91-103), Online publication date: 1-Aug-2019.
  135. Gangavarapu T and Patil N (2019). A novel filter–wrapper hybrid greedy ensemble approach optimized using the genetic algorithm to reduce the dimensionality of high-dimensional biomedical datasets, Applied Soft Computing, 81:C, Online publication date: 1-Aug-2019.
  136. Hafiz F, Swain A, Naik C and Patel N (2019). Efficient feature selection of power quality events using two dimensional (2D) particle swarms, Applied Soft Computing, 81:C, Online publication date: 1-Aug-2019.
  137. García V, Sánchez J, Rodríguez-Picón L, Méndez-González L and Ochoa-Domínguez H (2019). Using regression models for predicting the product quality in a tubing extrusion process, Journal of Intelligent Manufacturing, 30:6, (2535-2544), Online publication date: 1-Aug-2019.
  138. Jiang L and Li C (2019). Two improved attribute weighting schemes for value difference metric, Knowledge and Information Systems, 60:2, (949-970), Online publication date: 1-Aug-2019.
  139. Saeed S and Ong H (2019). A bi-objective hybrid algorithm for the classification of imbalanced noisy and borderline data sets, Pattern Analysis & Applications, 22:3, (979-998), Online publication date: 1-Aug-2019.
  140. ACM
    Du Y, Issarny V and Sailhan F (2019). When the Power of the Crowd Meets the Intelligence of the Middleware, ACM SIGOPS Operating Systems Review, 53:1, (85-90), Online publication date: 25-Jul-2019.
  141. Bravo F, Barrio A and Ayala J A study on the parallelization of moeas to predict the patient's response to the onabotulinumtoxina treatment Proceedings of the 2019 Summer Simulation Conference, (1-12)
  142. Hosseini S and Azizi M (2019). The hybrid technique for DDoS detection with supervised learning algorithms, Computer Networks: The International Journal of Computer and Telecommunications Networking, 158:C, (35-45), Online publication date: 20-Jul-2019.
  143. Camara C, Warwick K, Bruña R, Aziz T and Pereda E (2019). Closed-loop deep brain stimulation based on a stream-clustering system, Expert Systems with Applications: An International Journal, 126:C, (187-199), Online publication date: 15-Jul-2019.
  144. ACM
    Pacheco J, Benitez V and Félix L Anomaly Behavior Analysis for IoT Network Nodes Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, (1-6)
  145. Canizo B, Escudero L, Pellerano R and Wuilloud R (2022). Data mining approach based on chemical composition of grape skin for quality evaluation and traceability prediction of grapes, Computers and Electronics in Agriculture, 162:C, (514-522), Online publication date: 1-Jul-2019.
  146. Ndenga M, Ganchev I, Mehat J, Wabwoba F and Akdag H (2019). Performance and cost-effectiveness of change burst metrics in predicting software faults, Knowledge and Information Systems, 60:1, (275-302), Online publication date: 1-Jul-2019.
  147. Hancer E (2019). Differential evolution for feature selection, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:13, (5233-5248), Online publication date: 1-Jul-2019.
  148. ACM
    Perona I, Yera A, Arbelaitz O, Muguerza J, Pérez J and Valencia X Towards automatic problem detection in web navigation based on client-side interaction data Proceedings of the XX International Conference on Human Computer Interaction, (1-4)
  149. ACM
    Zhu H, Wang H and Carroll J Creating Persona Skeletons from Imbalanced Datasets - A Case Study using U.S. Older Adults' Health Data Proceedings of the 2019 on Designing Interactive Systems Conference, (61-70)
  150. Zhang X, Shi H, Zhu X and Li P (2019). Active semi-supervised learning based on self-expressive correlation with generative adversarial networks, Neurocomputing, 345:C, (103-113), Online publication date: 14-Jun-2019.
  151. Koźlak J, Sniezynski B, Wilk-Kołodziejczyk D, Leśniak A and Jaśkowiec K Multi-agent Environment for Decision-Support in Production Systems Using Machine Learning Methods Computational Science – ICCS 2019, (517-529)
  152. Liu Y, Lee T, Law T and Lee K (2019). Acoustical Assessment of Voice Disorder With Continuous Speech Using ASR Posterior Features, IEEE/ACM Transactions on Audio, Speech and Language Processing, 27:6, (1047-1059), Online publication date: 1-Jun-2019.
  153. Yuan M, Boston-Fisher N, Luo Y, Verma A and Buckeridge D (2019). A systematic review of aberration detection algorithms used in public health surveillance, Journal of Biomedical Informatics, 94:C, Online publication date: 1-Jun-2019.
  154. Mardini M and Raś Z (2019). Extraction of actionable knowledge to reduce hospital readmissions through patients personalization, Information Sciences: an International Journal, 485:C, (1-17), Online publication date: 1-Jun-2019.
  155. Wang J, Li M, Wang S, Menzies T and Wang Q (2019). Images don’t lie, Information and Software Technology, 110:C, (139-155), Online publication date: 1-Jun-2019.
  156. Gupta S, Buriro A and Crispo B (2019). DriverAuth, Computers and Security, 83:C, (122-139), Online publication date: 1-Jun-2019.
  157. Verde L and De Pietro G (2022). A neural network approach to classify carotid disorders from Heart Rate Variability analysis, Computers in Biology and Medicine, 109:C, (226-234), Online publication date: 1-Jun-2019.
  158. dos Santos U, Pessin G, da Costa C and da Rosa Righi R (2019). AgriPrediction, Computers and Electronics in Agriculture, 161:C, (202-213), Online publication date: 1-Jun-2019.
  159. Rupnik R, Kukar M, Vračar P, Košir D, Pevec D and Bosnić Z (2019). AgroDSS, Computers and Electronics in Agriculture, 161:C, (260-271), Online publication date: 1-Jun-2019.
  160. Nordbeck P, Soter L, Viklund J, Beckmann E, Kallen R, Chemero A and Richardson M (2019). Effects of task constraint on action dynamics, Cognitive Systems Research, 55:C, (192-204), Online publication date: 1-Jun-2019.
  161. ACM
    Du M, Vidal J and Markovsky B Wikitheoria Proceedings of the 7th ACIS International Conference on Applied Computing and Information Technology, (1-5)
  162. Johanssen J, Bernius J and Bruegge B Toward usability problem identification based on user emotions derived from facial expressions Proceedings of the 4th International Workshop on Emotion Awareness in Software Engineering, (1-7)
  163. Malhotra R and Kamal S (2019). An empirical study to investigate oversampling methods for improving software defect prediction using imbalanced data, Neurocomputing, 343:C, (120-140), Online publication date: 28-May-2019.
  164. ACM
    Feitoza M, da Silva W and Calumby R Exploring Deep Features and Transfer Learning for Plant Species Recognition Proceedings of the XV Brazilian Symposium on Information Systems, (1-8)
  165. ACM
    Sciancalepore S, Ibrahim O, Oligeri G and Di Pietro R Detecting Drones Status via Encrypted Traffic Analysis Proceedings of the ACM Workshop on Wireless Security and Machine Learning, (67-72)
  166. ACM
    Roselli D, Matthews J and Talagala N Managing Bias in AI Companion Proceedings of The 2019 World Wide Web Conference, (539-544)
  167. ACM
    Xu W, Liang H, Zhao Y, Yu D and Monteiro D DMove Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, (1-14)
  168. ACM
    Berkovsky S, Taib R, Koprinska I, Wang E, Zeng Y, Li J and Kleitman S Detecting Personality Traits Using Eye-Tracking Data Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, (1-12)
  169. Ponzanelli L, Bavota G, Mocci A, Oliveto R, Penta M, Haiduc S, Russo B and Lanza M (2019). Automatic Identification and Classification of Software Development Video Tutorial Fragments, IEEE Transactions on Software Engineering, 45:5, (464-488), Online publication date: 1-May-2019.
  170. Wang H and Hong M (2019). Online ad effectiveness evaluation with a two-stage method using a Gaussian filter and decision tree approach, Electronic Commerce Research and Applications, 35:C, Online publication date: 1-May-2019.
  171. Phang D, Wang K, Wang Q, Kauffman R and Naldi M (2019). How to derive causal insights for digital commerce in China? A research commentary on computational social science methods, Electronic Commerce Research and Applications, 35:C, Online publication date: 1-May-2019.
  172. Stange R, Cereda P and Neto J (2019). An Adaptive Algorithm for Rule Learning, Electronic Notes in Theoretical Computer Science (ENTCS), 342:C, (39-55), Online publication date: 28-Apr-2019.
  173. ACM
    Asrafi N Comparing Performances of Graph Mining Algorithms to Detect Malware Proceedings of the 2019 ACM Southeast Conference, (268-269)
  174. ACM
    Abidin D Effects of Image Filters on Various Image Datasets Proceedings of the 2019 5th International Conference on Computer and Technology Applications, (1-5)
  175. Nóbrega J and Oliveira A (2019). A sequential learning method with Kalman filter and extreme learning machine for regression and time series forecasting, Neurocomputing, 337:C, (235-250), Online publication date: 14-Apr-2019.
  176. ACM
    Gan Y, Zhang Y, Cheng D, Shetty A, Rathi P, Katarki N, Bruno A, Hu J, Ritchken B, Jackson B, Hu K, Pancholi M, He Y, Clancy B, Colen C, Wen F, Leung C, Wang S, Zaruvinsky L, Espinosa M, Lin R, Liu Z, Padilla J and Delimitrou C An Open-Source Benchmark Suite for Microservices and Their Hardware-Software Implications for Cloud & Edge Systems Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, (3-18)
  177. ACM
    Gan Y, Zhang Y, Hu K, Cheng D, He Y, Pancholi M and Delimitrou C Seer Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, (19-33)
  178. Costaguta R, Santana-Mansilla P, Lescano G and Missio D (2021). Mining Associations Between Collaborative Skills and Group Roles in Collaborative E-Learning Environments, Journal of Information Technology Research, 12:2, (159-174), Online publication date: 1-Apr-2019.
  179. Aldowah H, Al-Samarraie H and Fauzy W (2022). Educational data mining and learning analytics for 21st century higher education, Telematics and Informatics, 37:C, (13-49), Online publication date: 1-Apr-2019.
  180. Cai L, Qi Y, Wei W, Wu J and Li J (2019). mrMoulder, Future Generation Computer Systems, 93:C, (570-582), Online publication date: 1-Apr-2019.
  181. Mcintosh A, Hassan S and Hindle A (2019). What can Android mobile app developers do about the energy consumption of machine learning?, Empirical Software Engineering, 24:2, (562-601), Online publication date: 1-Apr-2019.
  182. Zhang L, Jiang L and Li C (2019). A discriminative model selection approach and its application to text classification, Neural Computing and Applications, 31:4, (1173-1187), Online publication date: 1-Apr-2019.
  183. ACM
    Azad S, Al Fanah M and Lei C Physical Role Limitation - It's Classification and Prediction using Machine Learning Proceedings of the 2019 International Conference on Big Data and Education, (70-76)
  184. ACM
    Adnane M, El M, El Fkihi S and Thami R Prediction Demand for Classified Ads Using Machine Learning Proceedings of the 2nd International Conference on Networking, Information Systems & Security, (1-6)
  185. ACM
    Gil Y, Honaker J, Gupta S, Ma Y, D'Orazio V, Garijo D, Gadewar S, Yang Q and Jahanshad N Towards human-guided machine learning Proceedings of the 24th International Conference on Intelligent User Interfaces, (614-624)
  186. Itani S, Lecron F and Fortemps P (2019). Specifics of medical data mining for diagnosis aid, Expert Systems with Applications: An International Journal, 118:C, (300-314), Online publication date: 15-Mar-2019.
  187. ACM
    Matyukhina A, Stakhanova N, Dalla Preda M and Perley C Adversarial Authorship Attribution in Open-Source Projects Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, (291-302)
  188. Berger P and Kompan M (2019). User Modeling for Churn Prediction in E-Commerce, IEEE Intelligent Systems, 34:2, (44-52), Online publication date: 1-Mar-2019.
  189. Sanin C, Haoxi Z, Shafiq I, Waris M, Silva de Oliveira C and Szczerbicki E (2022). Experience based knowledge representation for Internet of Things and Cyber Physical Systems with case studies, Future Generation Computer Systems, 92:C, (604-616), Online publication date: 1-Mar-2019.
  190. Papouskova M and Hajek P (2019). Two-stage consumer credit risk modelling using heterogeneous ensemble learning, Decision Support Systems, 118:C, (33-45), Online publication date: 1-Mar-2019.
  191. Lee K, Han C, Jun J, Lee J and Lee S (2019). Batch-Free Event Sequence Pattern Mining for Communication Stream Data with Instant and Persistent Events, Wireless Personal Communications: An International Journal, 105:2, (673-689), Online publication date: 1-Mar-2019.
  192. Huang J, Xue Y, Hu X, Jin H, Lu X and Liu Z (2019). Sentiment analysis of Chinese online reviews using ensemble learning framework, Cluster Computing, 22:2, (3043-3058), Online publication date: 1-Mar-2019.
  193. Serrano E, Suárez-Figueroa M, González-Pachón J and Gómez-Pérez A (2019). Toward proactive social inclusion powered by machine learning, Knowledge and Information Systems, 58:3, (651-667), Online publication date: 1-Mar-2019.
  194. Basiri J, Taghiyareh F and Faili H (2019). RACER, Neural Computing and Applications, 31:3, (895-908), Online publication date: 1-Mar-2019.
  195. ACM
    Nguyen T Model-Based Book Recommender Systems using Naïve Bayes enhanced with Optimal Feature Selection Proceedings of the 2019 8th International Conference on Software and Computer Applications, (217-222)
  196. ACM
    Sarsam S Reinforcing the Decision-making Process in Chemometrics Proceedings of the 2019 8th International Conference on Software and Computer Applications, (11-16)
  197. Jiang L, Zhang L, Li C and Wu J (2019). A Correlation-Based Feature Weighting Filter for Naive Bayes, IEEE Transactions on Knowledge and Data Engineering, 31:2, (201-213), Online publication date: 1-Feb-2019.
  198. Cui C, Liu B and Li G A Novel Feature Selection Method for Software Fault Prediction Model 2019 Annual Reliability and Maintainability Symposium (RAMS), (1-6)
  199. Ooi B, Abdul Rahim N, Zakaria A, Masnan M, Abdul Shukor S, Batyrshin I, Cross V, Kreinovich V and Rifqi M (2019). Random subspace oracle (RSO) ensemble to solve small sample-sized classification problems, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 36:4, (3225-3234), Online publication date: 1-Jan-2019.
  200. Zhao Y, Bo B, Feng Y, Xu C, Yu B and Chen J (2019). A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
  201. Rashid M, Rizzo G, Torchiano M, Mihindukulasooriya N, Corcho O and García-Castro R (2022). Completeness and consistency analysis for evolving knowledge bases, Web Semantics: Science, Services and Agents on the World Wide Web, 54:C, (48-71), Online publication date: 1-Jan-2019.
  202. Fazayeli H, Syed-Mohamad S and Md Akhir N (2019). Towards Auto-labelling Issue Reports for Pull-Based Software Development using Text Mining Approach, Procedia Computer Science, 161:C, (585-592), Online publication date: 1-Jan-2019.
  203. Ragab A, Yacout S, Ouali M and Osman H (2019). Prognostics of multiple failure modes in rotating machinery using a pattern-based classifier and cumulative incidence functions, Journal of Intelligent Manufacturing, 30:1, (255-274), Online publication date: 1-Jan-2019.
  204. ACM
    Kim A, Choi W, Park J, Kim K and Lee U (2018). Interrupting Drivers for Interactions, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2:4, (1-28), Online publication date: 27-Dec-2018.
  205. ACM
    Zhao Y, Baldini I, Sattigeri P, Padhi I, Lee Y and Smith E Data Driven Techniques for Organizing Scientific Articles Relevant to Biomimicry Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, (347-353)
  206. ACM
    korba A Energy Fraud Detection in Advanced Metering Infrastructure AMI Proceedings of the 7th International Conference on Software Engineering and New Technologies, (1-6)
  207. ACM
    Pooput P and Muenchaisri P Finding Impact Factors for Rejection of Pull Requests on GitHub Proceedings of the 2018 VII International Conference on Network, Communication and Computing, (70-76)
  208. Zhang Q and Dai J Feature Selection Based on Fuzzy Conditional Distinction Degree Neural Information Processing, (72-83)
  209. ACM
    Luo G (2018). Progress Indication for Machine Learning Model Building, ACM SIGKDD Explorations Newsletter, 20:2, (1-12), Online publication date: 11-Dec-2018.
  210. Dalstam A, Engberg M, Nåfors D, Johansson B and Sundblom A A stepwise implementation of the virtual factory in manufacturing industry Proceedings of the 2018 Winter Simulation Conference, (3229-3240)
  211. Parlar T, Özel S and Song F (2018). QER, Human-centric Computing and Information Sciences, 8:1, (1-19), Online publication date: 1-Dec-2018.
  212. Habayeb M, Murtaza S, Miranskyy A and Bener A (2018). On the Use of Hidden Markov Model to Predict the Time to Fix Bugs, IEEE Transactions on Software Engineering, 44:12, (1224-1244), Online publication date: 1-Dec-2018.
  213. ACM
    Budhiraja S and Mago V Extracting Learning Outcomes Using Machine Learning and White Space Analysis Proceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good, (7-12)
  214. ACM
    Lagus J, Longi K, Klami A and Hellas A (2018). Transfer-Learning Methods in Programming Course Outcome Prediction, ACM Transactions on Computing Education, 18:4, (1-18), Online publication date: 13-Nov-2018.
  215. Koitz-Hristov R and Wotawa F (2018). Applying algorithm selection to abductive diagnostic reasoning, Applied Intelligence, 48:11, (3976-3994), Online publication date: 1-Nov-2018.
  216. ACM
    Romero F and Delimitrou C Mage Proceedings of the 27th International Conference on Parallel Architectures and Compilation Techniques, (1-13)
  217. ACM
    Hussain M, Hussain S, Zhang W, Zhu W, Theodorou P and Abidi S Mining Moodle Data to Detect the Inactive and Low-performance Students during the Moodle Course Proceedings of the 2nd International Conference on Big Data Research, (133-140)
  218. ACM
    Noei E, Da Costa D and Zou Y Winning the app production rally Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (283-294)
  219. ACM
    Keller B, Lonczynski J, D'Angelo T and Delabrida S Evaluation of Wearable Devices for Belt Conveyor Inspection Using Augmented Reality Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, (1-9)
  220. ACM
    Cascaes R, Lameira K, Sarmanho R, Pinheiro K, Mota M, Pereira A and Neto N Adaptation and Automation of a Cancellation Test for Evaluation of Exploratory Visual Behavior Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, (1-9)
  221. ACM
    Wang W, Guo H, Li Z, Shen Y and Barenji A Towards Open and Automated Customer Service Proceedings of the 2nd International Conference on Computer Science and Application Engineering, (1-6)
  222. ACM
    Kuutila M, Mäntylä M, Claes M, Elovainio M and Adams B Using experience sampling to link software repositories with emotions and work well-being Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, (1-10)
  223. Primeau N, Falcon R, Abielmona R and Petriu E (2018). A Review of Computational Intelligence Techniques in Wireless Sensor and Actuator Networks, IEEE Communications Surveys & Tutorials, 20:4, (2822-2854), Online publication date: 1-Oct-2018.
  224. Angiulli F and Narvaez E (2018). Pruning strategies for nearest neighbor competence preservation learners, Neurocomputing, 308:C, (8-20), Online publication date: 25-Sep-2018.
  225. ACM
    Dang C, Seiderer A and André E Theodor Proceedings of the 5th international Workshop on Sensor-based Activity Recognition and Interaction, (1-7)
  226. ACM
    Murauer M, Haslgrübler M and Ferscha A Natural Pursuits for Eye Tracker Calibration Proceedings of the 5th international Workshop on Sensor-based Activity Recognition and Interaction, (1-10)
  227. Sarmah U, Bhattacharyya D and Kalita J (2018). A survey of detection methods for XSS attacks, Journal of Network and Computer Applications, 118:C, (113-143), Online publication date: 15-Sep-2018.
  228. Krachunov M, Nisheva M and Vassilev D Machine Learning-Driven Noise Separation in High Variation Genomics Sequencing Datasets Artificial Intelligence: Methodology, Systems, and Applications, (173-185)
  229. ACM
    Qu Y, Liu T, Chi J, Jin Y, Cui D, He A and Zheng Q node2defect: using network embedding to improve software defect prediction Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, (844-849)
  230. ACM
    Ma L, Juefei-Xu F, Zhang F, Sun J, Xue M, Li B, Chen C, Su T, Li L, Liu Y, Zhao J and Wang Y DeepGauge: multi-granularity testing criteria for deep learning systems Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, (120-131)
  231. ACM
    Zhang M, Zhang Y, Zhang L, Liu C and Khurshid S DeepRoad: GAN-based metamorphic testing and input validation framework for autonomous driving systems Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, (132-142)
  232. Ben Slima I and Borgi A Features’ Associations in Fuzzy Ensemble Classifiers Database and Expert Systems Applications, (369-377)
  233. Urbanowicz R, Olson R, Schmitt P, Meeker M and Moore J (2018). Benchmarking relief-based feature selection methods for bioinformatics data mining, Journal of Biomedical Informatics, 85:C, (168-188), Online publication date: 1-Sep-2018.
  234. Boselli R, Cesarini M, Mercorio F and Mezzanzanica M (2018). Classifying online Job Advertisements through Machine Learning, Future Generation Computer Systems, 86:C, (319-328), Online publication date: 1-Sep-2018.
  235. Wosiak A, Glinka K and Zakrzewska D (2018). Multi-label classification methods for improving comorbidities identification, Computers in Biology and Medicine, 100:C, (279-288), Online publication date: 1-Sep-2018.
  236. Qiu C, Jiang L and Cai Z Using Differential Evolution to Estimate Labeler Quality for Crowdsourcing PRICAI 2018: Trends in Artificial Intelligence, (165-173)
  237. ACM
    Syed T and Nair S Personalized Recommendation System for Advanced Learning Management Systems Proceedings of the 8th International Conference on Information Communication and Management, (90-95)
  238. Cui L, Bai L, Rossi L, Zhang Z, Jiao Y and Hancock E A Preliminary Survey of Analyzing Dynamic Time-Varying Financial Networks Using Graph Kernels Structural, Syntactic, and Statistical Pattern Recognition, (237-247)
  239. ACM
    Oviatt S, Hang K, Zhou J, Yu K and Chen F (2018). Dynamic Handwriting Signal Features Predict Domain Expertise, ACM Transactions on Interactive Intelligent Systems, 8:3, (1-21), Online publication date: 8-Aug-2018.
  240. Ip R, Ang L, Seng K, Broster J and Pratley J (2018). Big data and machine learning for crop protection, Computers and Electronics in Agriculture, 151:C, (376-383), Online publication date: 1-Aug-2018.
  241. Benmessahel I, Xie K and Chellal M (2018). A new evolutionary neural networks based on intrusion detection systems using multiverse optimization, Applied Intelligence, 48:8, (2315-2327), Online publication date: 1-Aug-2018.
  242. Wu M and Lu J Automated Machine Learning Algorithm Mining for Classification Problem Machine Learning and Data Mining in Pattern Recognition, (380-392)
  243. ACM
    Theodorou T, Mporas I, Potamitis I and Fakotakis N Data-Driven Audio Feature Selection for Audio Quality Recognition in Broadcast News Proceedings of the 10th Hellenic Conference on Artificial Intelligence, (1-6)
  244. ACM
    Tomlinson A, Bryans J and Shaikh S Using a one-class compound classifier to detect in-vehicle network attacks Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1926-1929)
  245. Abu Shanab A and Khoshgoftaar T Filter-Based Subset Selection for Easy, Moderate, and Hard Bioinformatics Data 2018 IEEE International Conference on Information Reuse and Integration (IRI), (372-377)
  246. Abu Shanab A and Khoshgoftaar T Is Gene Selection Enough for Imbalanced Bioinformatics Data? 2018 IEEE International Conference on Information Reuse and Integration (IRI), (346-355)
  247. Ribeiro S and Pappa G (2018). Strategies for combining Twitter users geo-location methods, Geoinformatica, 22:3, (563-587), Online publication date: 1-Jul-2018.
  248. Sahu S and Shrivas A (2018). Comparative Study of Classification Models with Genetic Search Based Feature Selection Technique, International Journal of Applied Evolutionary Computation, 9:3, (1-11), Online publication date: 1-Jul-2018.
  249. Hu Z, Bodyanskiy Y, Tyshchenko O and Boiko O (2018). A neuro-fuzzy Kohonen network for data stream possibilistic clustering and its online self-learning procedure, Applied Soft Computing, 68:C, (710-718), Online publication date: 1-Jul-2018.
  250. Camara C, Peris-Lopez P, Gonzalez-Manzano L and Tapiador J (2018). Real-time electrocardiogram streams for continuous authentication, Applied Soft Computing, 68:C, (784-794), Online publication date: 1-Jul-2018.
  251. Duque R, Arbelaez A and Díaz J (2018). Online over time processing of combinatorial problems, Constraints, 23:3, (310-334), Online publication date: 1-Jul-2018.
  252. ACM
    Fiacco J and Rosé C Towards domain general detection of transactive knowledge building behavior Proceedings of the Fifth Annual ACM Conference on Learning at Scale, (1-11)
  253. ACM
    Vrbančič G, Fister I and Podgorelec V Swarm Intelligence Approaches for Parameter Setting of Deep Learning Neural Network Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics, (1-8)
  254. ACM
    Asiri M, Nemati H and Sadri F Feature Reduction Improves Classification Accuracy in Healthcare Proceedings of the 22nd International Database Engineering & Applications Symposium, (193-198)
  255. ACM
    Behroozi M and Parnin C Can we predict stressful technical interview settings through eye-tracking? Proceedings of the Workshop on Eye Movements in Programming, (1-5)
  256. ACM
    Sivaprasad S, Joshi T, Agrawal R and Pedanekar N Multimodal Continuous Prediction of Emotions in Movies using Long Short-Term Memory Networks Proceedings of the 2018 ACM on International Conference on Multimedia Retrieval, (413-419)
  257. ACM
    Giacomelli D and Faria E Study and Characterization of the Main Tools for Human Activity Recognition using Accelerometer Sensors Proceedings of the XIV Brazilian Symposium on Information Systems, (1-8)
  258. Yamak Z, Saunier J and Vercouter L (2018). SocksCatch, Knowledge-Based Systems, 149:C, (124-142), Online publication date: 1-Jun-2018.
  259. de Sá A, Pereira A and Pappa G (2018). A customized classification algorithm for credit card fraud detection, Engineering Applications of Artificial Intelligence, 72:C, (21-29), Online publication date: 1-Jun-2018.
  260. Gil D, Girela J, Azorín J, De Juan A and De Juan J (2018). Identifying central and peripheral nerve fibres with an artificial intelligence approach, Applied Soft Computing, 67:C, (276-285), Online publication date: 1-Jun-2018.
  261. Rathore S, Loia V and Park J (2018). SpamSpotter, Applied Soft Computing, 67:C, (920-932), Online publication date: 1-Jun-2018.
  262. ACM
    Tian Y, Pei K, Jana S and Ray B DeepTest Proceedings of the 40th International Conference on Software Engineering, (303-314)
  263. ACM
    Rath M, Rendall J, Guo J, Cleland-Huang J and Mäder P Traceability in the wild Proceedings of the 40th International Conference on Software Engineering, (834-845)
  264. ACM
    Abdessalem R, Nejati S, Briand L and Stifter T Testing vision-based control systems using learnable evolutionary algorithms Proceedings of the 40th International Conference on Software Engineering, (1016-1026)
  265. González M, Bergmeir C, Triguero I, Rodríguez Y and Benítez J (2018). Self-labeling techniques for semi-supervised time series classification, Knowledge and Information Systems, 55:2, (493-528), Online publication date: 1-May-2018.
  266. Puri M, Du X, Varde A and de Melo G Mapping Ordinances and Tweets using Smart City Characteristics to Aid Opinion Mining Companion Proceedings of the The Web Conference 2018, (1721-1728)
  267. ACM
    Zhang C, Xue Q, Waghmare A, Meng R, Jain S, Han Y, Li X, Cunefare K, Ploetz T, Starner T, Inan O and Abowd G FingerPing Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, (1-10)
  268. ACM
    Kosch T, Hassib M, Woźniak P, Buschek D and Alt F Your Eyes Tell Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, (1-13)
  269. ACM
    Zhao J, Bhatt C, Cooper M and Shamma D Flexible Learning with Semantic Visual Exploration and Sequence-Based Recommendation of MOOC Videos Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, (1-13)
  270. ACM
    Huang T, Chang J and Bigham J Evorus Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, (1-13)
  271. Ruan Y, Durresi A and Alfantoukh L (2018). Using Twitter trust network for stock market analysis, Knowledge-Based Systems, 145:C, (207-218), Online publication date: 1-Apr-2018.
  272. McAllister P, Zheng H, Bond R and Moorhead A (2018). Combining deep residual neural network features with supervised machine learning algorithms to classify diverse food image datasets, Computers in Biology and Medicine, 95:C, (217-233), Online publication date: 1-Apr-2018.
  273. Gupta M, Govil M and Singh G (2018). Text-mining and pattern-matching based prediction models for detecting vulnerable files in web applications, Journal of Web Engineering, 17:1-2, (28-44), Online publication date: 1-Mar-2018.
  274. Diab D and El Hindi K (2018). Using differential evolution for improving distance measures of nominal values, Applied Soft Computing, 64:C, (14-34), Online publication date: 1-Mar-2018.
  275. Ferreira R, Pimentel M and Cristo M (2018). A wikification prediction model based on the combination of latent, dyadic, and monadic features, Journal of the Association for Information Science and Technology, 69:3, (380-394), Online publication date: 1-Mar-2018.
  276. ACM
    Fong S, Biuk-Aghai R and Millham R Swarm Search Methods in Weka for Data Mining Proceedings of the 2018 10th International Conference on Machine Learning and Computing, (122-127)
  277. ACM
    Fuhr N (2018). Some Common Mistakes In IR Evaluation, And How They Can Be Avoided, ACM SIGIR Forum, 51:3, (32-41), Online publication date: 22-Feb-2018.
  278. Mezei J and Nikou S (2018). Fuzzy optimization to improve mobile health and wellness recommendation systems, Knowledge-Based Systems, 142:C, (108-116), Online publication date: 15-Feb-2018.
  279. ACM
    Ebrahimi S, Vahabi H, Prockup M and Nieto O Predicting Audio Advertisement Quality Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, (153-161)
  280. Gupta A, Banerjee I and Rubin D (2018). Automatic information extraction from unstructured mammography reports using distributed semantics, Journal of Biomedical Informatics, 78:C, (78-86), Online publication date: 1-Feb-2018.
  281. Oliveira R, Papa J, Pereira A and Tavares J (2018). Computational methods for pigmented skin lesion classification in images, Neural Computing and Applications, 29:3, (613-636), Online publication date: 1-Feb-2018.
  282. ACM
    Estivill-Castro V, Lombardi M and Marani A Improving binary classification of web pages using an ensemble of feature selection algorithms Proceedings of the Australasian Computer Science Week Multiconference, (1-10)
  283. Urraca R, Sodupe-Ortega E, Antonanzas J, Antonanzas-Torres F and Martinez-de-Pison F (2018). Evaluation of a novel GA-based methodology for model structure selection, Neurocomputing, 271:C, (9-17), Online publication date: 3-Jan-2018.
  284. De Luise D, Saad B, Pescio P and Saliwonczyk C (2018). Autistic Language Processing by Patterns Detection, International Journal of Artificial Life Research, 8:1, (36-61), Online publication date: 1-Jan-2018.
  285. Tang D, Zhang M, Xu J, Zhang X, Yang F, Li H, Feng L, Wang K, Zheng Y and Vlamos P (2018). Application of Data Mining Technology on Surveillance Report Data of HIV/AIDS High-Risk Group in Urumqi from 2009 to 2015, Complexity, 2018, Online publication date: 1-Jan-2018.
  286. Jiménez-Bravo D, De Paz J, Villarrubia G and Bajo J (2018). Dealing with Demand in Electric Grids with an Adaptive Consumption Management Platform, Complexity, 2018, (13), Online publication date: 1-Jan-2018.
  287. Wosiak A, Zakrzewska D and Czarnowski I (2018). Integrating Correlation-Based Feature Selection and Clustering for Improved Cardiovascular Disease Diagnosis, Complexity, 2018, Online publication date: 1-Jan-2018.
  288. Hernndez N, Alonso J and Ocaa M (2017). Fuzzy classifier ensembles for hierarchical WiFi-based semantic indoor localization, Expert Systems with Applications: An International Journal, 90:C, (394-404), Online publication date: 30-Dec-2017.
  289. Nikravesh A, Ajila S and Lung C (2017). An autonomic prediction suite for cloud resource provisioning, Journal of Cloud Computing: Advances, Systems and Applications, 6:1, (1-20), Online publication date: 1-Dec-2017.
  290. Feng C and Liao S (2017). Scalable Gaussian Kernel Support Vector Machines with Sublinear Training Time Complexity, Information Sciences: an International Journal, 418:C, (480-494), Online publication date: 1-Dec-2017.
  291. Lughofer E, Richter R, Neissl U, Heidl W, Eitzinger C and Radauer T (2017). Explaining classifier decisions linguistically for stimulating and improving operators labeling behavior, Information Sciences: an International Journal, 420:C, (16-36), Online publication date: 1-Dec-2017.
  292. Wen L, Min F and Wang S (2017). A two-stage discretization algorithm based on information entropy, Applied Intelligence, 47:4, (1169-1185), Online publication date: 1-Dec-2017.
  293. Altaher A (2017). An improved Android malware detection scheme based on an evolving hybrid neuro-fuzzy classifier (EHNFC) and permission-based features, Neural Computing and Applications, 28:12, (4147-4157), Online publication date: 1-Dec-2017.
  294. ACM
    El Fouki M, Aknin N and El. Kadiri K Intelligent Adapted e-Learning System based on Deep Reinforcement Learning Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems, (1-6)
  295. ACM
    Liu X, Liu K, Li M, Lu F, Liao M and Yang R SHE Proceedings of the 1st ACM SIGSPATIAL Workshop on Prediction of Human Mobility, (1-10)
  296. ACM
    Zhou B and Buyya R A Group-based Fault Tolerant Mechanism for Heterogeneous Mobile Clouds Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, (373-382)
  297. ACM
    Cristo M, Hanada R, Carvalho A, Lores F and Pimentel M Fast Word Recognition for Noise channel-based Models in Scenarios with Noise Specific Domain Knowledge Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, (607-616)
  298. Jondya A and Iswanto B (2017). Indonesians Traditional Music Clustering Based on Audio Features, Procedia Computer Science, 116:C, (174-181), Online publication date: 1-Nov-2017.
  299. Hadi W, Issa G and Ishtaiwi A (2017). ACPRISM, Information Sciences: an International Journal, 417:C, (287-300), Online publication date: 1-Nov-2017.
  300. Khvostikov A, Krylov A, Kamalov J and Megroyan A (2017). Ultrasound despeckling by anisotropic diffusion and total variation methods for liver fibrosis diagnostics, Image Communication, 59:C, (3-11), Online publication date: 1-Nov-2017.
  301. Kavakiotis I, Samaras P, Triantafyllidis A and Vlahavas I (2017). FIFS, Computers in Biology and Medicine, 90:C, (146-154), Online publication date: 1-Nov-2017.
  302. Sun Y, Chen C, Wang Q and Boehm B Improving missing issue-commit link recovery using positive and unlabeled data Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, (147-152)
  303. ACM
    Kraemer F, Ammar D, Braten A, Tamkittikhun N and Palma D Solar energy prediction for constrained IoT nodes based on public weather forecasts Proceedings of the Seventh International Conference on the Internet of Things, (1-8)
  304. ACM
    Dilli R, Filho H, Pernas A and Yamin A EXEHDA-RR Proceedings of the 23rd Brazillian Symposium on Multimedia and the Web, (293-300)
  305. ACM
    Mcheick H, Saleh L, Ajami H and Mili H HCES Proceedings of the 1st International Conference on Internet of Things and Machine Learning, (1-10)
  306. Pendharkar P (2017). Bayesian posterior misclassification error risk distributions for ensemble classifiers, Engineering Applications of Artificial Intelligence, 65:C, (484-492), Online publication date: 1-Oct-2017.
  307. Oliveira R, Pereira A and Tavares J (2017). Skin lesion computational diagnosis of dermoscopic images, Computer Methods and Programs in Biomedicine, 149:C, (43-53), Online publication date: 1-Oct-2017.
  308. Arar m and Ayan K (2017). A feature dependent Naive Bayes approach and its application to the software defect prediction problem, Applied Soft Computing, 59:C, (197-209), Online publication date: 1-Oct-2017.
  309. Chang W, Tay K and Lim C (2017). A New Evolving Tree-Based Model with Local Re-learning for Document Clustering and Visualization, Neural Processing Letters, 46:2, (379-409), Online publication date: 1-Oct-2017.
  310. ACM
    Lenhard J, Hassan M, Blom M and Herold S Are code smell detection tools suitable for detecting architecture degradation? Proceedings of the 11th European Conference on Software Architecture: Companion Proceedings, (138-144)
  311. Hou C, Jiao Y, Nie F, Luo T and Zhou Z (2017). 2D Feature Selection by Sparse Matrix Regression, IEEE Transactions on Image Processing, 26:9, (4255-4268), Online publication date: 1-Sep-2017.
  312. Watanabe Y and Kun L (2017). Long-term influence of user identification based on touch operation on smart phone, Procedia Computer Science, 112:C, (2529-2536), Online publication date: 1-Sep-2017.
  313. Liu Y, Bi J and Fan Z (2017). Multi-class sentiment classification, Expert Systems with Applications: An International Journal, 80:C, (323-339), Online publication date: 1-Sep-2017.
  314. Ucar E and Ozhan E (2017). The Analysis of Firewall Policy Through Machine Learning and Data Mining, Wireless Personal Communications: An International Journal, 96:2, (2891-2909), Online publication date: 1-Sep-2017.
  315. Yan K and Ryoo H (2017). Strong valid inequalities for Boolean logical pattern generation, Journal of Global Optimization, 69:1, (183-230), Online publication date: 1-Sep-2017.
  316. ACM
    Castellini J, Poggioni V and Sorbi G Fake Twitter followers detection by denoising autoencoder Proceedings of the International Conference on Web Intelligence, (195-202)
  317. ACM
    Matinnejad R, Nejati S and Briand L Automated testing of hybrid Simulink/Stateflow controllers: industrial case studies Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, (938-943)
  318. Vizer L and Sears A (2017). Efficacy of personalized models in discriminating high cognitive demand conditions using text-based interactions, International Journal of Human-Computer Studies, 104:C, (80-96), Online publication date: 1-Aug-2017.
  319. Costa E, Fonseca B, Santana M, de Arajo F and Rego J (2017). Evaluating the effectiveness of educational data mining techniques for early prediction of students' academic failure in introductory programming courses, Computers in Human Behavior, 73:C, (247-256), Online publication date: 1-Aug-2017.
  320. Ali M and Mohamed Y (2017). A method for clustering unlabeled BIM objects using entropy and TF-IDF with RDF encoding, Advanced Engineering Informatics, 33:C, (154-163), Online publication date: 1-Aug-2017.
  321. Doycheva K, Horn G, Koch C, Schumann A and Knig M (2017). Assessment and weighting of meteorological ensemble forecast members based on supervised machine learning with application to runoff simulations and flood warning, Advanced Engineering Informatics, 33:C, (427-439), Online publication date: 1-Aug-2017.
  322. ACM
    Mills C, Bavota G, Haiduc S, Oliveto R, Marcus A and Lucia A (2017). Predicting Query Quality for Applications of Text Retrieval to Software Engineering Tasks, ACM Transactions on Software Engineering and Methodology, 26:1, (1-45), Online publication date: 20-Jul-2017.
  323. ACM
    de Sá A, Pappa G and Freitas A Towards a method for automatically selecting and configuring multi-label classification algorithms Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1125-1132)
  324. Taleb R, Seddiki L, Guelton K and Akdag H Merging fuzzy observer-based state estimation and database classification for fault detection and diagnosis of an actuated seat 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-6)
  325. Jarraya A, Arour K, Bouzeghoub A and Borgi A Feature selection based on Choquet integral for human activity recognition 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-6)
  326. Zahera H and El-Sisi A (2017). Accelerating Training Process in Logistic Regression Model using OpenCL Framework, International Journal of Grid and High Performance Computing, 9:3, (34-45), Online publication date: 1-Jul-2017.
  327. Taylor P, Griffiths N, Bhalerao A, Xu Z, Gelencser A and Popham T (2017). Investigating the Feasibility of Vehicle Telemetry Data as a Means of Predicting Driver Workload, International Journal of Mobile Human Computer Interaction, 9:3, (54-72), Online publication date: 1-Jul-2017.
  328. Vargas-Vera M, Salles C, Parot J and Letelier S (2017). A E-Business Case of Study, International Journal of Knowledge Society Research, 8:3, (1-20), Online publication date: 1-Jul-2017.
  329. ACM
    Krömer P, Heckenbergerová J and Musilek P Accurate mixed weibull distribution fitting by differential evolution Proceedings of the Genetic and Evolutionary Computation Conference, (1161-1168)
  330. ACM
    Safdar S, Lu H, Yue T and Ali S Mining cross product line rules with multi-objective search and machine learning Proceedings of the Genetic and Evolutionary Computation Conference, (1319-1326)
  331. Chen Y, Yue X, Fujita H and Fu S (2017). Three-way decision support for diagnosis on focal liver lesions, Knowledge-Based Systems, 127:C, (85-99), Online publication date: 1-Jul-2017.
  332. Fatima M, Hasan K, Anwar S and Nawab R (2017). Multilingual author profiling on Facebook, Information Processing and Management: an International Journal, 53:4, (886-904), Online publication date: 1-Jul-2017.
  333. Hung C (2017). Word of mouth quality classification based on contextual sentiment lexicons, Information Processing and Management: an International Journal, 53:4, (751-763), Online publication date: 1-Jul-2017.
  334. Oliva J and Garcia Rosa J (2017). How an epileptic EEG segment, used as reference, can influence a cross-correlation classifier?, Applied Intelligence, 47:1, (178-196), Online publication date: 1-Jul-2017.
  335. Kocher M and Savoy J Author clustering using Spatium Proceedings of the 17th ACM/IEEE Joint Conference on Digital Libraries, (265-268)
  336. ACM
    Barcelos M, Bernardini F, Barcelos A and Vaz Silva G City Ranking Based on Financial Flux Indicator Clustering Proceedings of the 18th Annual International Conference on Digital Government Research, (452-460)
  337. Npoles G, Falcon R, Papageorgiou E, Bello R and Vanhoof K (2017). Rough cognitive ensembles, International Journal of Approximate Reasoning, 85:C, (79-96), Online publication date: 1-Jun-2017.
  338. Tzirakis P and Tjortjis C (2017). T3C, Advances in Data Analysis and Classification, 11:2, (353-370), Online publication date: 1-Jun-2017.
  339. El-Alfy E and Qureshi M (2017). Robust content authentication of gray and color images using lbp-dct markov-based features, Multimedia Tools and Applications, 76:12, (14535-14556), Online publication date: 1-Jun-2017.
  340. Cashman M, Catlett J, Cohen M, Buan N, Sakkaff Z, Pierobon M and Kelley C BioSIMP Proceedings of the 12th International Workshop on Software Engineering for Science, (2-8)
  341. Taylor P, Griffiths N, Barakat L and Miles S Bootstrapping Trust with Partial and Subjective Observability Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, (1745-1747)
  342. Das A, Pathak P, Chuah C and Mohapatra P (2017). Privacy-aware contextual localization using network traffic analysis, Computer Networks: The International Journal of Computer and Telecommunications Networking, 118:C, (24-36), Online publication date: 8-May-2017.
  343. Pes B, Dess N and Angioni M (2017). Exploiting the ensemble paradigm for stable feature selection, Information Fusion, 35:C, (132-147), Online publication date: 1-May-2017.
  344. Lombardi I and Vernero F (2017). What and who with, International Journal of Human-Computer Studies, 101:C, (62-75), Online publication date: 1-May-2017.
  345. (2017). Emotion recognition using mobile phones, Computers and Electrical Engineering, 60:C, (1-13), Online publication date: 1-May-2017.
  346. Oliveira T, Satoh K, Novais P, Neves J and Hosobe H (2017). A dynamic default revision mechanism for speculative computation, Autonomous Agents and Multi-Agent Systems, 31:3, (656-695), Online publication date: 1-May-2017.
  347. Neto R, Jorge Adeodato P and Carolina Salgado A (2017). A framework for data transformation in Credit Behavioral Scoring applications based on Model Driven Development, Expert Systems with Applications: An International Journal, 72:C, (293-305), Online publication date: 15-Apr-2017.
  348. ACM
    Bazhenova E and Weske M Optimal acquisition of input data for decision taking in business processes Proceedings of the Symposium on Applied Computing, (703-710)
  349. Hamami D, Baghdad A and Shankland C (2017). Decision Support based on Bio-PEPA Modeling and Decision Tree Induction, International Journal of Information Systems in the Service Sector, 9:2, (71-101), Online publication date: 1-Apr-2017.
  350. Ragab A, De Carné De Carnavalet X, Yacout S and Ouali M (2017). Face recognition using multi-class Logical Analysis of Data, Pattern Recognition and Image Analysis, 27:2, (276-288), Online publication date: 1-Apr-2017.
  351. Antonucci A and Corani G (2017). The multilabel naive credal classifier, International Journal of Approximate Reasoning, 83:C, (320-336), Online publication date: 1-Apr-2017.
  352. Ngo-Ye T, Sinha A and Sen A (2017). Predicting the helpfulness of online reviews using a scripts-enriched text regression model, Expert Systems with Applications: An International Journal, 71:C, (98-110), Online publication date: 1-Apr-2017.
  353. (2017). Prototype selection to improve monotonic nearest neighbor, Engineering Applications of Artificial Intelligence, 60:C, (128-135), Online publication date: 1-Apr-2017.
  354. Qiu C, Jiang L and Li C (2017). Randomly selected decision tree for test-cost sensitive learning, Applied Soft Computing, 53:C, (27-33), Online publication date: 1-Apr-2017.
  355. ACM
    Elsayed H and Syed L An automatic early risk classification of hard coronary heart diseases using framingham scoring model Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, (1-8)
  356. Bandaru S, Ng A and Deb K (2017). Data mining methods for knowledge discovery in multi-objective optimization, Expert Systems with Applications: An International Journal, 70:C, (139-159), Online publication date: 15-Mar-2017.
  357. Su Y, Luarn P, Lee Y and Yen S (2017). Creating an invalid defect classification model using text mining on server development, Journal of Systems and Software, 125:C, (197-206), Online publication date: 1-Mar-2017.
  358. tajduhar I, Mamula M, Mileti D and nal G (2017). Semi-automated detection of anterior cruciate ligament injury from MRI, Computer Methods and Programs in Biomedicine, 140:C, (151-164), Online publication date: 1-Mar-2017.
  359. Erikson V. De S. Rosa R and Ferreira De Lucena V (2017). Contextualizing and capturing individual user interactions in shared iTV environments, Multimedia Tools and Applications, 76:6, (8573-8595), Online publication date: 1-Mar-2017.
  360. Li C, Jiang L, Li H, Wu J and Zhang P (2017). Toward value difference metric with attribute weighting, Knowledge and Information Systems, 50:3, (795-825), Online publication date: 1-Mar-2017.
  361. Bunkhumpornpat C and Sinapiromsaran K (2017). DBMUTE, Knowledge and Information Systems, 50:3, (827-850), Online publication date: 1-Mar-2017.
  362. Iliou T, Anagnostopoulos C, Stephanakis I and Anastassopoulos G (2017). A novel data preprocessing method for boosting neural network performance, Information Sciences: an International Journal, 380:C, (92-100), Online publication date: 20-Feb-2017.
  363. Wang B and Klabjan D Regularization for unsupervised deep neural nets Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, (2681-2681)
  364. Zhang X, Li Y, Kotagiri R, Wu L, Tari Z and Cheriet M (2017). KRNN, Pattern Recognition, 62:C, (33-44), Online publication date: 1-Feb-2017.
  365. Yazdanbakhsh O, Zhou Y and Dick S (2017). An intelligent system for livestock disease surveillance, Information Sciences: an International Journal, 378:C, (26-47), Online publication date: 1-Feb-2017.
  366. Quintana-Amate S, Bermell-Garcia P, Tiwari A and Turner C (2017). A new knowledge sourcing framework for knowledge-based engineering, Computers and Industrial Engineering, 104:C, (35-50), Online publication date: 1-Feb-2017.
  367. Calatroni L, Gennip Y, Schönlieb C, Rowland H and Flenner A (2017). Graph Clustering, Variational Image Segmentation Methods and Hough Transform Scale Detection for Object Measurement in Images, Journal of Mathematical Imaging and Vision, 57:2, (269-291), Online publication date: 1-Feb-2017.
  368. ACM
    Du J and He J Proportioning documents over categories based on word embeddings Proceedings of the Australasian Computer Science Week Multiconference, (1-5)
  369. Benavoli A, Corani G, Demšar J and Zaffalon M (2017). Time for a change, The Journal of Machine Learning Research, 18:1, (2653-2688), Online publication date: 1-Jan-2017.
  370. Alhajri R, Alhunaiyyan A and AlMousa E (2017). Understanding the Impact of Individual Differences on Learner Performance Using Hypermedia Systems, International Journal of Web-Based Learning and Teaching Technologies, 12:1, (1-18), Online publication date: 1-Jan-2017.
  371. Alhajri R, Alhunaiyyan A and AlMousa E (2017). Understanding the Impact of Individual Differences on Learner Performance Using Hypermedia Systems, International Journal of Web-Based Learning and Teaching Technologies, 12:1, (1-18), Online publication date: 1-Jan-2017.
  372. Alhajri R, Alhunaiyyan A and AlMousa E (2017). Understanding the Impact of Individual Differences on Learner Performance Using Hypermedia Systems, International Journal of Web-Based Learning and Teaching Technologies, 12:1, (1-18), Online publication date: 1-Jan-2017.
  373. Pabreja K (2017). Comparison of Different Classification Techniques for Educational Data, International Journal of Information Systems in the Service Sector, 9:1, (54-67), Online publication date: 1-Jan-2017.
  374. Czyzewski A, Kostek B, Kurowski A, Szczuko P, Lech M, Odya P and Kwiatkowska A (2017). Multimodal approach for polysensory stimulation and diagnosis of subjects with severe communication disorders, Procedia Computer Science, 121:C, (238-243), Online publication date: 1-Jan-2017.
  375. Kocher M and Savoy J (2017). A simple and efficient algorithm for authorship verification, Journal of the Association for Information Science and Technology, 68:1, (259-269), Online publication date: 1-Jan-2017.
  376. ACM
    Cho H, Park H, Kim C and Kim K (2016). Investigation of the Effect of “Fog of War” in the Prediction of StarCraft Strategy Using Machine Learning, Computers in Entertainment, 14:1, (1-16), Online publication date: 29-Dec-2016.
  377. Brynjolfsson E, Geva T and Reichman S (2016). Crowd-squared, MIS Quarterly, 40:4, (941-961), Online publication date: 1-Dec-2016.
  378. Farid D, Al-Mamun M, Manderick B and Nowe A (2016). An adaptive rule-based classifier for mining big biological data, Expert Systems with Applications: An International Journal, 64:C, (305-316), Online publication date: 1-Dec-2016.
  379. Erdal H and Karahanolu l (2016). Bagging ensemble models for bank profitability, Applied Soft Computing, 49:C, (861-867), Online publication date: 1-Dec-2016.
  380. Dolado J, Rodriguez D, Harman M, Langdon W and Sarro F (2016). Evaluation of estimation models using the Minimum Interval of Equivalence, Applied Soft Computing, 49:C, (956-967), Online publication date: 1-Dec-2016.
  381. Zhao L, Jiang L and Dong X (2016). Supervised feature selection method via potential value estimation, Cluster Computing, 19:4, (2039-2049), Online publication date: 1-Dec-2016.
  382. Oliva J, Lee H, Spolaôr N, Coy C and Wu F (2016). Prototype system for feature extraction, classification and study of medical images, Expert Systems with Applications: An International Journal, 63:C, (267-283), Online publication date: 30-Nov-2016.
  383. Bai J and Wang J (2016). Improving malware detection using multi-view ensemble learning, Security and Communication Networks, 9:17, (4227-4241), Online publication date: 25-Nov-2016.
  384. (2016). A multiobjective weighted voting ensemble classifier based on differential evolution algorithm for text sentiment classification, Expert Systems with Applications: An International Journal, 62:C, (1-16), Online publication date: 15-Nov-2016.
  385. Leme L, Renso C, Nunes B, Lopes G, Casanova M and Vidal V Searching for Data Sources for the Semantic Enrichment of Trajectories Proceedings of the 17th International Conference on Web Information Systems Engineering - Volume 10042, (238-246)
  386. Shin K and Miyazaki S (2016). A Fast and Accurate Feature Selection Algorithm Based on Binary Consistency Measure, Computational Intelligence, 32:4, (646-667), Online publication date: 1-Nov-2016.
  387. K. N, Islam M, Hamou-Lhadj A and Hamdaqa M An effective method for detecting duplicate crash reports using crash traces and hidden Markov models Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, (75-84)
  388. ACM
    Thakur G, Sparks K, Li R, Stewart R and Urban M Demonstrating PlanetSense Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (1-4)
  389. ACM
    Hanada R, Pimentel M, Cristo M and Lores F Effective Spelling Correction for Eye-based Typing using domain-specific Information about Error Distribution Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, (1723-1732)
  390. (2016). Autonomously evolving classifier TEDAClass, Information Sciences: an International Journal, 366:C, (1-11), Online publication date: 20-Oct-2016.
  391. Tzalavra A, Dalakleidi K, Zacharaki E, Tsiaparas N, Constantinidis F, Paragios N and Nikita K Comparison of Multi-resolution Analysis Patterns for Texture Classification of Breast Tumors Based on DCE-MRI Machine Learning in Medical Imaging, (296-304)
  392. Pardede R, Tóth L, Jeney G, Kovács F and Hosszú G (2016). Four-Layer Grapheme Model for Computational Paleography, Journal of Information Technology Research, 9:4, (64-82), Online publication date: 1-Oct-2016.
  393. Suzuki N and Tsuda K (2016). Radio Quality Clustering to Induce the Behavior Toward Optimal Wireless Connection, Procedia Computer Science, 96:C, (939-945), Online publication date: 1-Oct-2016.
  394. Baron G (2016). On Influence of Representations of Discretized Data on Performance of a Decision System, Procedia Computer Science, 96:C, (1418-1427), Online publication date: 1-Oct-2016.
  395. Ojeme B and Mbogho A (2016). Selecting Learning Algorithms for Simultaneous Identification of Depression and Comorbid Disorders, Procedia Computer Science, 96:C, (1294-1303), Online publication date: 1-Oct-2016.
  396. García-Rudolph A and Gibert K (2016). Understanding effects of cognitive rehabilitation under a knowledge discovery approach, Engineering Applications of Artificial Intelligence, 55:C, (165-185), Online publication date: 1-Oct-2016.
  397. ACM
    Calix R, Cabrera A and Iqbal I Analysis of Parallel Architectures for Network Intrusion Detection Proceedings of the 5th Annual Conference on Research in Information Technology, (7-12)
  398. Truong D and Cheng G (2016). Detecting domain-flux botnet based on DNS traffic features in managed network, Security and Communication Networks, 9:14, (2338-2347), Online publication date: 25-Sep-2016.
  399. Onan A, Korukoğlu S and Bulut H (2016). Ensemble of keyword extraction methods and classifiers in text classification, Expert Systems with Applications: An International Journal, 57:C, (232-247), Online publication date: 15-Sep-2016.
  400. Bertini Junior J, Nicoletti M and Zhao L (2016). An embedded imputation method via Attribute-based Decision Graphs, Expert Systems with Applications: An International Journal, 57:C, (159-177), Online publication date: 15-Sep-2016.
  401. Kong G, Jiang L and Li C (2016). Beyond accuracy, Pattern Recognition Letters, 80:C, (165-171), Online publication date: 1-Sep-2016.
  402. Li C, Sheng V, Jiang L and Li H (2016). Noise filtering to improve data and model quality for crowdsourcing, Knowledge-Based Systems, 107:C, (96-103), Online publication date: 1-Sep-2016.
  403. Simha R and Shatkay H Improved multi-label classification using inter-dependence structure via a generative mixture model Proceedings of the Twenty-second European Conference on Artificial Intelligence, (1336-1343)
  404. Valero-Mas J, Calvo-Zaragoza J and Rico-Juan J (2016). On the suitability of Prototype Selection methods for kNN classification with distributed data, Neurocomputing, 203:C, (150-160), Online publication date: 26-Aug-2016.
  405. ACM
    Moonen L, Di Alesio S, Binkley D and Rolfsnes T Practical guidelines for change recommendation using association rule mining Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, (732-743)
  406. ACM
    Ben Abdessalem R, Nejati S, Briand L and Stifter T Testing advanced driver assistance systems using multi-objective search and neural networks Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, (63-74)
  407. Dittakan K and Coenen F Early detection of osteoarthritis using local binary patterns Proceedings of the 14th Pacific Rim International Conference on Trends in Artificial Intelligence, (93-105)
  408. ACM
    Khaleel M, Hmeidi I and Najadat H An Automatic Text Classification System Based on Genetic Algorithm Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016, (1-7)
  409. Arnaiz-González Á, Díez-Pastor J, Rodríguez J and García-Osorio C (2016). Instance selection for regression, Neurocomputing, 201:C, (66-81), Online publication date: 12-Aug-2016.
  410. Giustarini L, Parisot O, Ghoniem M, Hostache R, Trebs I and Otjacques B (2016). A user-driven case-based reasoning tool for infilling missing values in daily mean river flow records, Environmental Modelling & Software, 82:C, (308-320), Online publication date: 1-Aug-2016.
  411. Jones D, Ghandehari H and Facelli J (2016). A review of the applications of data mining and machine learning for the prediction of biomedical properties of nanoparticles, Computer Methods and Programs in Biomedicine, 132:C, (93-103), Online publication date: 1-Aug-2016.
  412. Wang J (2016). Extracting significant pattern histories from timestamped texts using MapReduce, The Journal of Supercomputing, 72:8, (3236-3260), Online publication date: 1-Aug-2016.
  413. Jensen U, Kugler P, Ring M and Eskofier B (2016). Approaching the accuracy---cost conflict in embedded classification system design, Pattern Analysis & Applications, 19:3, (839-855), Online publication date: 1-Aug-2016.
  414. Yao G, Zeng H, Chao F, Su C, Lin C and Zhou C (2016). Integration of classifier diversity measures for feature selection-based classifier ensemble reduction, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 20:8, (2995-3005), Online publication date: 1-Aug-2016.
  415. ACM
    Medeiros I, Neves N and Correia M DEKANT: a static analysis tool that learns to detect web application vulnerabilities Proceedings of the 25th International Symposium on Software Testing and Analysis, (1-11)
  416. Gerlein E, McGinnity M, Belatreche A and Coleman S (2016). Evaluating machine learning classification for financial trading, Expert Systems with Applications: An International Journal, 54:C, (193-207), Online publication date: 15-Jul-2016.
  417. Silva L, Santos A, Bravo R, Silva A, Muchaluat-Saade D and Conci A (2016). Hybrid analysis for indicating patients with breast cancer using temperature time series, Computer Methods and Programs in Biomedicine, 130:C, (142-153), Online publication date: 1-Jul-2016.
  418. Teich E, Degaetano-Ortlieb S, Fankhauser P, Kermes H and Lapshinova-Koltunski E (2016). The linguistic construal of disciplinarity, Journal of the Association for Information Science and Technology, 67:7, (1668-1678), Online publication date: 1-Jul-2016.
  419. Perovšek M, Kranjc J, Erjavec T, Cestnik B and Lavrač N (2016). TextFlows, Science of Computer Programming, 121:C, (128-152), Online publication date: 1-Jun-2016.
  420. Bai L, Escolano F and Hancock E (2016). Depth-based hypergraph complexity traces from directed line graphs, Pattern Recognition, 54:C, (229-240), Online publication date: 1-Jun-2016.
  421. Sorato D, Goularte F, Nassar S and Fileto R Analysis of Methods and Tools for Relevant Words Recognition in Microblogs Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (345-352)
  422. Machado R, Pinheiro R, Machado K and Borges E Contacts Deduplication in Mobile Devices Using Textual Similarity and Machine Learning Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (160-167)
  423. ACM
    Matinnejad R, Nejati S, Briand L and Bruckmann T Automated test suite generation for time-continuous simulink models Proceedings of the 38th International Conference on Software Engineering, (595-606)
  424. ACM
    Middleton S and Krivcovs V (2016). Geoparsing and Geosemantics for Social Media, ACM Transactions on Information Systems, 34:3, (1-26), Online publication date: 5-May-2016.
  425. Otebolaku A and Andrade M (2016). User context recognition using smartphone sensors and classification models, Journal of Network and Computer Applications, 66:C, (33-51), Online publication date: 1-May-2016.
  426. ACM
    Kovanović V, Joksimović S, Waters Z, Gašević D, Kitto K, Hatala M and Siemens G Towards automated content analysis of discussion transcripts Proceedings of the Sixth International Conference on Learning Analytics & Knowledge, (15-24)
  427. Mohammad R, Thabtah F and Mccluskey L An Improved Self-Structuring Neural Network Revised Selected Papers of the PAKDD 2016 Workshops on Trends and Applications in Knowledge Discovery and Data Mining - Volume 9794, (35-47)
  428. Shi B, Ifrim G and Hurley N Learning-to-Rank for Real-Time High-Precision Hashtag Recommendation for Streaming News Proceedings of the 25th International Conference on World Wide Web, (1191-1202)
  429. Chen H, Wang G, Ma C, Cai Z, Liu W and Wang S (2016). An efficient hybrid kernel extreme learning machine approach for early diagnosis of Parkinson's disease, Neurocomputing, 184:C, (131-144), Online publication date: 5-Apr-2016.
  430. Arslan O, Guralnik D and Koditschek D (2016). Coordinated Robot Navigation via Hierarchical Clustering, IEEE Transactions on Robotics, 32:2, (352-371), Online publication date: 1-Apr-2016.
  431. Buczak A and Guven E (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection, IEEE Communications Surveys & Tutorials, 18:2, (1153-1176), Online publication date: 1-Apr-2016.
  432. Buza K (2016). Classification of gene expression data, Computer Methods and Programs in Biomedicine, 127:C, (105-113), Online publication date: 1-Apr-2016.
  433. ACM
    Tomuro N, Lytinen S and Hornsburg K Automatic Summarization of Privacy Policies using Ensemble Learning Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, (133-135)
  434. ACM
    Mahmud J, Fei G, Xu A, Pal A and Zhou M Predicting Attitude and Actions of Twitter Users Proceedings of the 21st International Conference on Intelligent User Interfaces, (2-6)
  435. ACM
    Seeliger A, Schmidt B, Schweizer I and Mühlhäuser M What Belongs Together Comes Together Proceedings of the 21st International Conference on Intelligent User Interfaces, (60-70)
  436. Kim Y, Ha J, Yoon Y, Kim N, Im H, Sim S and Choi R (2016). Improved Correction of Atmospheric Pressure Data Obtained by Smartphones through Machine Learning, Computational Intelligence and Neuroscience, 2016, (4), Online publication date: 1-Mar-2016.
  437. ACM
    Netten N, van den Braak S, Choenni S and van Someren M A Big Data Approach to Support Information Distribution in Crisis Response Proceedings of the 9th International Conference on Theory and Practice of Electronic Governance, (266-275)
  438. ACM
    Wang Y, Burke M and Kraut R Modeling Self-Disclosure in Social Networking Sites Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, (74-85)
  439. ACM
    Tsubaki K, Terada T and Tsukamoto M An Activity Recognition Method by Measuring Circumference of Body Parts Proceedings of the 7th Augmented Human International Conference 2016, (1-7)
  440. ACM
    Holland-Minkley A and Lombardi T Improving Engagement in Introductory Courses with Homework Resubmission Proceedings of the 47th ACM Technical Symposium on Computing Science Education, (534-539)
  441. Márquez-Vera C, Cano A, Romero C, Noaman A, Mousa Fardoun H and Ventura S (2016). Early dropout prediction using data mining, Expert Systems: The Journal of Knowledge Engineering, 33:1, (107-124), Online publication date: 1-Feb-2016.
  442. Cerpa N, Bardeen M, Astudillo C and Verner J (2016). Evaluating different families of prediction methods for estimating software project outcomes, Journal of Systems and Software, 112:C, (48-64), Online publication date: 1-Feb-2016.
  443. Alberdi A, Aztiria A and Basarab A (2016). Towards an automatic early stress recognition system for office environments based on multimodal measurements, Journal of Biomedical Informatics, 59:C, (49-75), Online publication date: 1-Feb-2016.
  444. Pimentel B and de Souza R (2016). Multivariate Fuzzy C-Means algorithms with weighting, Neurocomputing, 174:PB, (946-965), Online publication date: 22-Jan-2016.
  445. Pohl D, Bouchachia A and Hellwagner H (2016). Online indexing and clustering of social media data for emergency management, Neurocomputing, 172:C, (168-179), Online publication date: 8-Jan-2016.
  446. Catania C, Zanni-Merk C, Bertrand de Beuvron F and Collet P (2016). Ontologies to Lead Knowledge Intensive Evolutionary Algorithms, International Journal of Knowledge and Systems Science, 7:1, (78-100), Online publication date: 1-Jan-2016.
  447. Chen N, Chen A and Ribeiro B (2016). Towards tangible benefits of corporate failure prediction with business sector, Intelligent Decision Technologies, 10:4, (431-442), Online publication date: 1-Jan-2016.
  448. Eiland E and Liebrock L (2016). Efficacious discriminant analysis (classifier) measures for end users, Advances in Artificial Intelligence, 2016, (1-1), Online publication date: 1-Jan-2016.
  449. Park H and Kim K (2016). Active player modeling in the iterated prisoner's dilemma, Computational Intelligence and Neuroscience, 2016, (38-38), Online publication date: 1-Jan-2016.
  450. Diaz-Honrubia A, Martinez J, Cuenca P, Gamez J and Puerta J (2016). Adaptive Fast Quadtree Level Decision Algorithm for H.264 to HEVC Video Transcoding, IEEE Transactions on Circuits and Systems for Video Technology, 26:1, (154-168), Online publication date: 1-Jan-2016.
  451. (2016). Decision forest, Information Fusion, 27:C, (111-125), Online publication date: 1-Jan-2016.
  452. Nagpal A and Gaur D A New Proposed Feature Subset Selection Algorithm Based on Maximization of Gain Ratio Proceedings of the 4th International Conference on Big Data Analytics - Volume 9498, (181-197)
  453. Cresci S, Di Pietro R, Petrocchi M, Spognardi A and Tesconi M (2015). Fame for sale, Decision Support Systems, 80:C, (56-71), Online publication date: 1-Dec-2015.
  454. He W, Hogg P, Juette A, Denton E and Zwiggelaar R (2015). Breast image pre-processing for mammographic tissue segmentation, Computers in Biology and Medicine, 67:C, (61-73), Online publication date: 1-Dec-2015.
  455. Gjoreski H, Kaluža B, Gams M, Milić R and Luštrek M (2015). Context-based ensemble method for human energy expenditure estimation, Applied Soft Computing, 37:C, (960-970), Online publication date: 1-Dec-2015.
  456. Monge D, Holec M, Železný F and Garino C (2015). Ensemble learning of runtime prediction models for gene-expression analysis workflows, Cluster Computing, 18:4, (1317-1329), Online publication date: 1-Dec-2015.
  457. Bhattacharya S and Selvakumar S (2015). LAWRA, Security and Communication Networks, 8:18, (3459-3468), Online publication date: 1-Dec-2015.
  458. Kim H and Choi J (2015). Hierarchical multi-class LAD based on OvA-binary tree using genetic algorithm, Expert Systems with Applications: An International Journal, 42:21, (8134-8145), Online publication date: 30-Nov-2015.
  459. Inuiguchi M, Hamakawa T and Ubukata S Imprecise Rules for Data Privacy Rough Sets and Knowledge Technology, (129-139)
  460. Martínez-Usó A, Hernández-Orallo J, Ramírez-Quintana M and Plumed F Pentaho + R Proceedings of the 16th Conference of the Spanish Association for Artificial Intelligence on Advances in Artificial Intelligence - Volume 9422, (234-244)
  461. Koopaei N and Hamou-Lhadj A CrashAutomata Proceedings of the 25th Annual International Conference on Computer Science and Software Engineering, (201-210)
  462. Vranjković V, Struharik R and Novak L (2015). Hardware acceleration of homogeneous and heterogeneous ensemble classifiers, Microprocessors & Microsystems, 39:8, (782-795), Online publication date: 1-Nov-2015.
  463. Cheng H and Kumar A (2015). Process mining on noisy logs - Can log sanitization help to improve performance?, Decision Support Systems, 79:C, (138-149), Online publication date: 1-Nov-2015.
  464. Goel N and Sehgal P (2015). Fuzzy classification of pre-harvest tomatoes for ripeness estimation - An approach based on automatic rule learning using decision tree, Applied Soft Computing, 36:C, (45-56), Online publication date: 1-Nov-2015.
  465. Lima A, de Castro L and Corchado J (2015). A polarity analysis framework for Twitter messages, Applied Mathematics and Computation, 270:C, (756-767), Online publication date: 1-Nov-2015.
  466. ACM
    Gollapalli S, Caragea C, Mitra P and Giles C (2015). Improving Researcher Homepage Classification with Unlabeled Data, ACM Transactions on the Web, 9:4, (1-32), Online publication date: 26-Oct-2015.
  467. ACM
    Malinka F Prediction of protein stability changes upon one-point mutations using machine learning Proceedings of the 2015 Conference on research in adaptive and convergent systems, (102-107)
  468. Peters G (2015). Assessing Rough Classifiers, Fundamenta Informaticae, 137:4, (493-515), Online publication date: 1-Oct-2015.
  469. ACM
    Koumpouri A, Mporas I and Megalooikonomou V Feature selection for improving opinion identification from web authors' posts Proceedings of the 19th Panhellenic Conference on Informatics, (117-122)
  470. Perovšek M, Vavpetič A, Kranjc J, Cestnik B and Lavrač N (2015). Wordification, Expert Systems with Applications: An International Journal, 42:17, (6442-6456), Online publication date: 1-Oct-2015.
  471. Lughofer E, Weigl E, Heidl W, Eitzinger C and Radauer T (2015). Integrating new classes on the fly in evolving fuzzy classifier designs and their application in visual inspection, Applied Soft Computing, 35:C, (558-582), Online publication date: 1-Oct-2015.
  472. ACM
    Iliou T, Anagnostopoulos C, Nerantzaki M and Anastassopoulos G A Novel Machine Learning Data Preprocessing Method for Enhancing Classification Algorithms Performance Proceedings of the 16th International Conference on Engineering Applications of Neural Networks (INNS), (1-5)
  473. ACM
    Kleiminger W, Beckel C and Santini S Household occupancy monitoring using electricity meters Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (975-986)
  474. Andrienko G and Andrienko N Visualization support to interactive cluster analysis Proceedings of the 2015th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part III, (337-340)
  475. ACM
    Taylor P, Griffiths N, Bhalerao A, Xu Z, Gelencser A and Popham T Warwick-JLR driver monitoring dataset (DMD) Proceedings of the 7th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, (89-92)
  476. Wong T (2015). Performance evaluation of classification algorithms by k-fold and leave-one-out cross validation, Pattern Recognition, 48:9, (2839-2846), Online publication date: 1-Sep-2015.
  477. Mao C, Chen J, Towey D, Chen J and Xie X (2015). Search-based QoS ranking prediction for web services in cloud environments, Future Generation Computer Systems, 50:C, (111-126), Online publication date: 1-Sep-2015.
  478. ACM
    Daka E, Campos J, Fraser G, Dorn J and Weimer W Modeling readability to improve unit tests Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, (107-118)
  479. ACM
    McGookin D, Gkatzia D and Hastie H Exploratory Navigation for Runners Through Geographic Area Classification with Crowd-Sourced Data Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, (357-361)
  480. Cohen A and Vitanyi P (2015). Normalized Compression Distance of Multisets with Applications, IEEE Transactions on Pattern Analysis and Machine Intelligence, 37:8, (1602-1614), Online publication date: 1-Aug-2015.
  481. Quintana-Amate S, Bermell-Garcia P and Tiwari A (2015). Transforming expertise into Knowledge-Based Engineering tools, Knowledge-Based Systems, 84:C, (89-97), Online publication date: 1-Aug-2015.
  482. Qiu C, Jiang L and Li C (2015). Not always simple classification, Expert Systems with Applications: An International Journal, 42:13, (5433-5440), Online publication date: 1-Aug-2015.
  483. Aktepe A, Ersöz S and Toklu B (2015). Customer satisfaction and loyalty analysis with classification algorithms and Structural Equation Modeling, Computers and Industrial Engineering, 86:C, (95-106), Online publication date: 1-Aug-2015.
  484. Savoy J (2015). Text clustering, Journal of the Association for Information Science and Technology, 66:8, (1645-1654), Online publication date: 1-Aug-2015.
  485. Shahzad R, Fatima M, Lavesson N and Boldt M Consensus Decision Making in Random Forests Revised Selected Papers of the First International Workshop on Machine Learning, Optimization, and Big Data - Volume 9432, (347-358)
  486. Dasari S, Lavesson N, Andersson P and Persson M Tree-Based Response Surface Analysis Revised Selected Papers of the First International Workshop on Machine Learning, Optimization, and Big Data - Volume 9432, (118-129)
  487. Koprinska I, Rana M and Agelidis V (2015). Correlation and instance based feature selection for electricity load forecasting, Knowledge-Based Systems, 82:C, (29-40), Online publication date: 1-Jul-2015.
  488. Wang G, Zhang Z, Sun J, Yang S and Larson C (2015). POS-RS, Information Processing and Management: an International Journal, 51:4, (458-479), Online publication date: 1-Jul-2015.
  489. Dessì N and Pes B (2015). Similarity of feature selection methods, Expert Systems with Applications: An International Journal, 42:10, (4632-4642), Online publication date: 15-Jun-2015.
  490. King M, Abrahams A and Ragsdale C (2015). Ensemble learning methods for pay-per-click campaign management, Expert Systems with Applications: An International Journal, 42:10, (4818-4829), Online publication date: 15-Jun-2015.
  491. Asghari M and Alizadeh S A New Similarity Measure by Combining Formal Concept Analysis and Clustering for Case-Based Reasoning Proceedings of the 28th International Conference on Current Approaches in Applied Artificial Intelligence - Volume 9101, (503-513)
  492. Dessì N and Pes B Stability in Biomarker Discovery Proceedings of the 28th International Conference on Current Approaches in Applied Artificial Intelligence - Volume 9101, (191-200)
  493. Joia P, Petronetto F and Nonato L (2015). Uncovering Representative Groups in Multidimensional Projections, Computer Graphics Forum, 34:3, (281-290), Online publication date: 1-Jun-2015.
  494. da Silva P, Gonçalves E, Rios E, Muhammad A, Moss A, Pritchard T, Glassborow B, Plastino A and Azeredo R (2015). Automatic classification of carbonate rocks permeability from 1H NMR relaxation data, Expert Systems with Applications: An International Journal, 42:9, (4299-4309), Online publication date: 1-Jun-2015.
  495. Silva F, Grassi Sella M, Francoy T and Costa A (2015). Evaluating classification and feature selection techniques for honeybee subspecies identification using wing images, Computers and Electronics in Agriculture, 114:C, (68-77), Online publication date: 1-Jun-2015.
  496. Huelss J and Paulheim H What SPARQL Query Logs Tell and Do Not Tell About Semantic Relatedness in LOD The Semantic Web: ESWC 2015 Satellite Events, (297-308)
  497. do Prado C, Peres S and Fantinato M Decision Making in Public Administration Supported by Knowledge Discovery Proceedings of the annual conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective - Volume 1, (399-406)
  498. ACM
    Zhang L, Pathak P, Wu M, Zhao Y and Mohapatra P AccelWord Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, (301-315)
  499. ACM
    Moussouri T and Roussos G (2015). Conducting Visitor Studies Using Smartphone-Based Location Sensing, Journal on Computing and Cultural Heritage , 8:3, (1-16), Online publication date: 7-May-2015.
  500. Dee Miller L, Soh L and Scott S (2015). Genetic Algorithm Classifier System for Semi-Supervised Learning, Computational Intelligence, 31:2, (201-232), Online publication date: 1-May-2015.
  501. Zanoni M, Arcelli Fontana F and Stella F (2015). On applying machine learning techniques for design pattern detection, Journal of Systems and Software, 103:C, (102-117), Online publication date: 1-May-2015.
  502. Assunção M, Calheiros R, Bianchi S, Netto M and Buyya R (2015). Big Data computing and clouds, Journal of Parallel and Distributed Computing, 79:C, (3-15), Online publication date: 1-May-2015.
  503. Pérez A, Gojenola K, Casillas A, Oronoz M and Díaz de Ilarraza A (2015). Computer aided classification of diagnostic terms in spanish, Expert Systems with Applications: An International Journal, 42:6, (2949-2958), Online publication date: 15-Apr-2015.
  504. ACM
    Ferreira R, Pimentel M and Cristo M Exploring graph topology via matrix factorization to improve wikification Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1099-1104)
  505. ACM
    Soares D, de Lima Júnior M, Murta L and Plastino A Acceptance factors of pull requests in open-source projects Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1541-1546)
  506. ACM
    do Nascimento M, Batista L and Cavalcanti N A new approach to biometric recognition based on hand geometry Proceedings of the 30th Annual ACM Symposium on Applied Computing, (59-65)
  507. ACM
    Li H, Zhang Q and Lu K Integrating mobile sensing and social network for personalized health-care application Proceedings of the 30th Annual ACM Symposium on Applied Computing, (527-534)
  508. ACM
    Gimenes G, Gualdron H, Rodrigues J and Gazziro M Multimodal graph-based analysis over the DBLP repository Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1129-1135)
  509. ACM
    Sidney C, Mendes D, Ribeiro L and Härder T Performance prediction for set similarity joins Proceedings of the 30th Annual ACM Symposium on Applied Computing, (967-972)
  510. Hansen D (2015). Introducing machine learning via baseball's hall of fame, Journal of Computing Sciences in Colleges, 30:4, (7-14), Online publication date: 1-Apr-2015.
  511. Farkash M, Hickerson B and Samynathan B Data mining diagnostics and bug MRIs for HW bug localization Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, (79-84)
  512. Zhi Wang , Lifeng Sun , Chuan Wu and Shiqiang Yang (2015). Enhancing Internet-Scale Video Service Deployment Using Microblog-Based Prediction, IEEE Transactions on Parallel and Distributed Systems, 26:3, (775-785), Online publication date: 1-Mar-2015.
  513. Antonelli M, Ducange P, Marcelloni F and Segatori A (2015). A novel associative classification model based on a fuzzy frequent pattern mining algorithm, Expert Systems with Applications: An International Journal, 42:4, (2086-2097), Online publication date: 1-Mar-2015.
  514. Barak S and Modarres M (2015). Developing an approach to evaluate stocks by forecasting effective features with data mining methods, Expert Systems with Applications: An International Journal, 42:3, (1325-1339), Online publication date: 15-Feb-2015.
  515. ACM
    Xu C, Pathak P and Mohapatra P Finger-writing with Smartwatch Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, (9-14)
  516. Auddy A and Mukhopadhyay S Data Mining on ICT Usage in an Academic Campus Proceedings of the 11th International Conference on Distributed Computing and Internet Technology - Volume 8956, (443-447)
  517. Moeyersoms J, Junqué de Fortuny E, Dejaeger K, Baesens B and Martens D (2015). Comprehensible software fault and effort prediction, Journal of Systems and Software, 100:C, (80-90), Online publication date: 1-Feb-2015.
  518. Dutta R, Smith D, Rawnsley R, Bishop-Hurley G, Hills J, Timms G and Henry D (2015). Dynamic cattle behavioural classification using supervised ensemble classifiers, Computers and Electronics in Agriculture, 111:C, (18-28), Online publication date: 1-Feb-2015.
  519. Wang J, Lin Y and Hou S (2015). A data mining approach for training evaluation in simulation-based training, Computers and Industrial Engineering, 80:C, (171-180), Online publication date: 1-Feb-2015.
  520. ACM
    FarahinAzahar T, Mahinderjit-Singh M and Hassan R RFID-enabled supply chain detection using clustering algorithms Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, (1-8)
  521. Cai C, Xu Y, Ke D and Su K (2015). Deep neural networks with multistate activation functions, Computational Intelligence and Neuroscience, 2015, (90-90), Online publication date: 1-Jan-2015.
  522. Ilarri S, Hermoso R, Trillo-Lado R and Rodríguez-Hernández M (2016). A review of the role of sensors in mobile context-aware recommendation systems, International Journal of Distributed Sensor Networks, 2015, (226-226), Online publication date: 1-Jan-2015.
  523. Moonen L (2015). Towards evidence-based recommendations to guide the evolution of component-based product families, Science of Computer Programming, 97:P1, (105-112), Online publication date: 1-Jan-2015.
  524. Wang X, Liu X, Pedrycz W and Zhang L (2015). Fuzzy rule based decision trees, Pattern Recognition, 48:1, (50-59), Online publication date: 1-Jan-2015.
  525. Vidulin V, Bohanec M and Gams M (2014). Combining human analysis and machine data mining to obtain credible data relations, Information Sciences: an International Journal, 288:C, (254-278), Online publication date: 20-Dec-2014.
  526. Coimbra R, Rodriguez-Galiano V, Olóriz F and Chica-Olmo M (2014). Regression trees for modeling geochemical data-An application to Late Jurassic carbonates (Ammonitico Rosso), Computers & Geosciences, 73:C, (198-207), Online publication date: 1-Dec-2014.
  527. ACM
    Mass J, Srirama S, Flores H and Chang C Proximal and social-aware device-to-device communication via audio detection on cloud Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, (143-150)
  528. Zúñiga-Cañón C and Burguillo J Applying Data Mining in Urban Environments Using the Roles Model Approach Advances in Artificial Intelligence -- IBERAMIA 2014, (698-709)
  529. ACM
    Ferreira J, Rodrigues J, Cristo M and de Oliveira D Multi-Entity Polarity Analysis in Financial Documents Proceedings of the 20th Brazilian Symposium on Multimedia and the Web, (115-122)
  530. ACM
    Sá A, Pappa G and Pereira A Generating Personalized Algorithms to Learn Bayesian Network Classifiers for Fraud Detection in Web Transactions Proceedings of the 20th Brazilian Symposium on Multimedia and the Web, (179-186)
  531. ACM
    Zhou J, Hang K, Oviatt S, Yu K and Chen F Combining empirical and machine learning techniques to predict math expertise using pen signal features Proceedings of the 2014 ACM workshop on Multimodal Learning Analytics Workshop and Grand Challenge, (29-36)
  532. ACM
    Brehmer M, Sedlmair M, Ingram S and Munzner T Visualizing dimensionally-reduced data Proceedings of the Fifth Workshop on Beyond Time and Errors: Novel Evaluation Methods for Visualization, (1-8)
  533. Kintab G, Roy C and McCalla G Recommending software experts using code similarity and social heuristics Proceedings of 24th Annual International Conference on Computer Science and Software Engineering, (4-18)
  534. Li C, Jiang L and Li H (2014). Local value difference metric, Pattern Recognition Letters, 49:C, (62-68), Online publication date: 1-Nov-2014.
  535. Ridge E (2014). Guerrilla Analytics, 10.5555/2695494, Online publication date: 7-Oct-2014.
  536. Hill M, Connolly P, Reutemann P and Fletcher D (2014). The use of data mining to assist crop protection decisions on kiwifruit in New Zealand, Computers and Electronics in Agriculture, 108:C, (250-257), Online publication date: 1-Oct-2014.
  537. Bi Y Evidential Fusion for Sentiment Polarity Classification Proceedings of the Third International Conference on Belief Functions: Theory and Applications - Volume 8764, (365-373)
  538. ACM
    Wang S, Zhang W and Wang Q FixerCache Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, (1-10)
  539. Fetter M and Gross T LiLoLe--A Framework for Lifelong Learning from Sensor Data Streams for Predictive User Modelling Proceedings of the 5th IFIP WG 13.2 International Conference on Human-Centered Software Engineering - Volume 8742, (126-143)
  540. ACM
    Biskri I and Bensaber B A Flexible Approach for Text Processing Engineering Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, (152-158)
  541. ACM
    Matinnejad R, Nejati S, Briand L and Brcukmann T MiL testing of highly configurable continuous controllers Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, (163-174)
  542. ACM
    Nakamata A, Wei W, Kawahara Y and Asami T Feature optimization for recognizing food using power leakage from microwave oven Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, (537-546)
  543. ACM
    Goodwin M, Haghighi M, Tang Q, Akcakaya M, Erdogmus D and Intille S Moving towards a real-time system for automatically recognizing stereotypical motor movements in individuals on the autism spectrum using wireless accelerometry Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (861-872)
  544. Pereira D, da Silva E and Esmin A Disambiguating publication venue titles using association rules Proceedings of the 14th ACM/IEEE-CS Joint Conference on Digital Libraries, (77-85)
  545. El Gebaly K, Agrawal P, Golab L, Korn F and Srivastava D (2014). Interpretable and informative explanations of outcomes, Proceedings of the VLDB Endowment, 8:1, (61-72), Online publication date: 1-Sep-2014.
  546. ACM
    Gwizdka J Characterizing relevance with eye-tracking measures Proceedings of the 5th Information Interaction in Context Symposium, (58-67)
  547. Kärkkäinen T On Cross-Validation for MLP Model Evaluation Proceedings of the Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition - Volume 8621, (291-300)
  548. ACM
    Hasanain M, Malhas R and Elsayed T Query performance prediction for microblog search Proceedings of the first international workshop on Social media retrieval and analysis, (1-6)
  549. ACM
    Meireles A, Figueiredo L, Lopes L and Almeida A Portable decision support system for heart failure detection and medical diagnosis Proceedings of the 18th International Database Engineering & Applications Symposium, (257-260)
  550. ACM
    Bydžovská H and Popelínský L The influence of social data on student success prediction Proceedings of the 18th International Database Engineering & Applications Symposium, (374-375)
  551. Bagnall A and Janacek G (2014). A Run Length Transformation for Discriminating Between Auto Regressive Time Series, Journal of Classification, 31:2, (154-178), Online publication date: 1-Jul-2014.
  552. ACM
    Shafiq M, Erman J, Ji L, Liu A, Pang J and Wang J (2014). Understanding the impact of network dynamics on mobile video user engagement, ACM SIGMETRICS Performance Evaluation Review, 42:1, (367-379), Online publication date: 20-Jun-2014.
  553. ACM
    Harrison T Building government's capacity for big data analysis Proceedings of the 15th Annual International Conference on Digital Government Research, (306-308)
  554. ACM
    Shafiq M, Erman J, Ji L, Liu A, Pang J and Wang J Understanding the impact of network dynamics on mobile video user engagement The 2014 ACM international conference on Measurement and modeling of computer systems, (367-379)
  555. Sarikaya A, Albers D, Mitchell J and Gleicher M Visualizing validation of protein surface classifiers Proceedings of the 16th Eurographics Conference on Visualization, (171-180)
  556. Paiva R, Bittencourt Santa Pinto I, Silva A, Isotani S and Jaques P A Systematic Approach for Providing Personalized Pedagogical Recommendations Based on Educational Data Mining 12th International Conference on Intelligent Tutoring Systems - Volume 8474, (362-367)
  557. Gomes M, Oliveira T, Silva F, Carneiro D and Novais P Establishing the Relationship between Personality Traits and Stress in an Intelligent Environment Proceedings, Part II, of the 27th International Conference on Modern Advances in Applied Intelligence - Volume 8482, (378-387)
  558. ACM
    Mporas I, Tsirka V, Zacharaki E, Koutroumanidis M and Megalooikonomou V Evaluation of time and frequency domain features for seizure detection from combined EEG and ECG signals Proceedings of the 7th International Conference on PErvasive Technologies Related to Assistive Environments, (1-4)
  559. ACM
    Rodriguez D, Herraiz I, Harrison R, Dolado J and Riquelme J Preliminary comparison of techniques for dealing with imbalance in software defect prediction Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, (1-10)
  560. Raphael J, Schneider E, Parsons S and Sklar E Behaviour mining for collision avoidance in multi-robot systems Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (1445-1446)
  561. ACM
    Piccardi T, Convertino G, Zancanaro M, Wang J and Archambeau C Towards crowd-based customer service Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (2725-2734)
  562. ACM
    Medeiros I, Neves N and Correia M Automatic detection and correction of web application vulnerabilities using data mining to predict false positives Proceedings of the 23rd international conference on World wide web, (63-74)
  563. Knauss E and Ott D Semi- automatic Categorization of Natural Language Requirements Proceedings of the 20th International Working Conference on Requirements Engineering: Foundation for Software Quality - Volume 8396, (39-54)
  564. Thesprasith O and Jaruskulchai C Query Expansion Using Medical Subject Headings Terms in the Biomedical Documents Proceedings, Part I, of the 6th Asian Conference on Intelligent Information and Database Systems - Volume 8397, (93-102)
  565. ACM
    Delimitrou C and Kozyrakis C (2014). Quasar, ACM SIGARCH Computer Architecture News, 42:1, (127-144), Online publication date: 5-Apr-2014.
  566. ACM
    Delimitrou C and Kozyrakis C (2014). Quasar, ACM SIGPLAN Notices, 49:4, (127-144), Online publication date: 5-Apr-2014.
  567. Wang G, Ma J and Yang S (2014). An improved boosting based on feature selection for corporate bankruptcy prediction, Expert Systems with Applications: An International Journal, 41:5, (2353-2361), Online publication date: 1-Apr-2014.
  568. Alpar P and Winkelsträter S (2014). Assessment of data quality in accounting data with association rules, Expert Systems with Applications: An International Journal, 41:5, (2259-2268), Online publication date: 1-Apr-2014.
  569. ACM
    Baker Y, Agrawal R, Foster J, Beck D and Dozier G Detecting bacterial vaginosis using machine learning Proceedings of the 2014 ACM Southeast Conference, (1-4)
  570. ACM
    Bogarín A, Romero C, Cerezo R and Sánchez-Santillán M Clustering for improving educational process mining Proceedings of the Fourth International Conference on Learning Analytics And Knowledge, (11-15)
  571. ACM
    Freitas A (2014). Comprehensible classification models, ACM SIGKDD Explorations Newsletter, 15:1, (1-10), Online publication date: 17-Mar-2014.
  572. Nettleton D (2014). Commercial Data Mining, 10.5555/2600138, Online publication date: 5-Mar-2014.
  573. Kotsiantis S (2014). Integrating global and local application of random subspace ensemble, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 26:2, (731-739), Online publication date: 1-Mar-2014.
  574. Peña-Ayala A (2014). Review, Expert Systems with Applications: An International Journal, 41:4, (1432-1462), Online publication date: 1-Mar-2014.
  575. ACM
    Muñoz E, Hogan A and Mileo A Using linked data to mine RDF from wikipedia's tables Proceedings of the 7th ACM international conference on Web search and data mining, (533-542)
  576. ACM
    Delimitrou C and Kozyrakis C Quasar Proceedings of the 19th international conference on Architectural support for programming languages and operating systems, (127-144)
  577. ACM
    Rathore S and Gupta A A comparative study of feature-ranking and feature-subset selection techniques for improved fault prediction Proceedings of the 7th India Software Engineering Conference, (1-10)
  578. ACM
    Chen J, Hsieh G, Mahmud J and Nichols J Understanding individuals' personal values from social media word use Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, (405-414)
  579. Kotsiantis S (2014). A hybrid decision tree classifier, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 26:1, (327-336), Online publication date: 1-Jan-2014.
  580. Ravizza S, Chen J, Atkin J, Stewart P and Burke E (2014). Aircraft taxi time prediction, Applied Soft Computing, 14, (397-406), Online publication date: 1-Jan-2014.
  581. Jelinek H, Kelarev A, Robinson D, Stranieri A and Cornforth D (2014). Using meta-regression data mining to improve predictions of performance based on heart rate dynamics for Australian football, Applied Soft Computing, 14, (81-87), Online publication date: 1-Jan-2014.
  582. A.Silva M, Trevisan D, Prata D, Marques E, Lisboa M and Prata M Exploring an Ichthyoplankton Database from a Freshwater Reservoir in Legal Amazon Part II of the Proceedings of the 9th International Conference on Advanced Data Mining and Applications - Volume 8347, (384-395)
  583. Cinque M, Cotroneo D, Frattini F and Russo S Cost-Benefit Analysis of Virtualizing Batch Systems Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, (264-268)
  584. ACM
    Neumann A, Schnier C, Hermann T and Pitsch K Interaction analysis and joint attention tracking in augmented reality Proceedings of the 15th ACM on International conference on multimodal interaction, (165-172)
  585. ACM
    Delimitrou C and Kozyrakis C (2013). QoS-Aware scheduling in heterogeneous datacenters with paragon, ACM Transactions on Computer Systems, 31:4, (1-34), Online publication date: 1-Dec-2013.
  586. ACM
    O'shea J, Bandar Z and Crockett K (2014). A new benchmark dataset with production methodology for short text semantic similarity algorithms, ACM Transactions on Speech and Language Processing , 10:4, (1-63), Online publication date: 1-Dec-2013.
  587. Ruz G, Varas S and Villena M (2013). Policy making for broadband adoption and usage in Chile through machine learning, Expert Systems with Applications: An International Journal, 40:17, (6728-6734), Online publication date: 1-Dec-2013.
  588. Abawajy J, Kelarev A and Chowdhury M (2013). Multistage approach for clustering and classification of ECG data, Computer Methods and Programs in Biomedicine, 112:3, (720-730), Online publication date: 1-Dec-2013.
  589. Braga I, Carmo L, Benatti C and Monard M A Note on Parameter Selection for Support Vector Machines Proceedings of the 12th Mexican International Conference on Advances in Soft Computing and Its Applications - Volume 8266, (233-244)
  590. Campos Y, Estrada R, Morell C and Ferri F A Feature Set Decomposition Method for the Construction of Multi-classifier Systems Trained with High-Dimensional Data Proceedings, Part I, of the 18th Iberoamerican Congress on Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications - Volume 8258, (278-285)
  591. Berger P, Hennig P and Meinel C Identifying Domain Experts in the Blogosphere -- Ranking Blogs Based on Topic Consistency Proceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 01, (252-259)
  592. El-Alfy E Enhanced Hand Shape Identification Using Random Forests Proceedings, Part II, of the 20th International Conference on Neural Information Processing - Volume 8227, (441-447)
  593. MiguéIs V, Camanho A and FalcãO E Cunha J (2013). Customer attrition in retailing, Expert Systems with Applications: An International Journal, 40:16, (6225-6232), Online publication date: 1-Nov-2013.
  594. Mohamad S, Tasir Z, Harun J and A. Shukor N (2013). Pattern of reflection in learning Authoring System through blogging, Computers & Education, 69, (356-368), Online publication date: 1-Nov-2013.
  595. Gwon R, Kim K, Park J, Kim H and Kim Y A Kidnapping Detection Scheme Using Frame-Based Classification for Intelligent Video Surveillance Proceedings of the 14th International Conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume 8170, (345-354)
  596. Zhao J and Forouraghi B An Interactive and Personalized Cloud-Based Virtual Learning System to Teach Computer Science Proceedings of the 12th International Conference on Advances in Web-Based Learning --- ICWL 2013 - Volume 8167, (101-110)
  597. Alhajri R, Counsell S and Liu X (2013). Investigating attributes affecting the performance of WBI users, Computers & Education, 68:C, (117-128), Online publication date: 1-Oct-2013.
  598. Abawajy J, Kelarev A, Chowdhury M, Stranieri A and Jelinek H (2013). Predicting cardiac autonomic neuropathy category for diabetic data with missing values, Computers in Biology and Medicine, 43:10, (1328-1333), Online publication date: 1-Oct-2013.
  599. AbuOmar O, Nouranian S, King R, Bouvard J, Toghiani H, Lacy T and Pittman C (2013). Data mining and knowledge discovery in materials science and engineering, Advanced Engineering Informatics, 27:4, (615-624), Online publication date: 1-Oct-2013.
  600. ACM
    Radovanović M, von Trzebiatowski G, Kurbalija V, Ivanović M, Burkhard H, Schmidt D and Hinrichs C Quality checking and mining nephrology biopsy data Proceedings of the 6th Balkan Conference in Informatics, (110-113)
  601. Jerome Q, Marchal S, State R and Engel T Advanced Detection Tool for PDF Threats Revised Selected Papers of the 8th International Workshop on Data Privacy Management and Autonomous Spontaneous Security - Volume 8247, (300-315)
  602. Lasota T, Łuczak T, Niemczyk M, Olszewski M and Trawiński B Investigation of Property Valuation Models Based on Decision Tree Ensembles Built over Noised Data Proceedings of the 5th International Conference on Computational Collective Intelligence. Technologies and Applications - Volume 8083, (417-426)
  603. ACM
    Weiss G, Nathan A, Kropp J and Lockhart J WagTag Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, (405-414)
  604. ACM
    Baumann P, Kleiminger W and Santini S The influence of temporal and spatial features on the performance of next-place prediction algorithms Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, (449-458)
  605. ACM
    Teufl P, Leitold H and Posch R Semantic Pattern Transformation Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, (1-8)
  606. ACM
    Karamshuk D, Noulas A, Scellato S, Nicosia V and Mascolo C Geo-spotting Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (793-801)
  607. Sokolova M, GonzáLez-Martí I, Contreras JordáN O and FernáNdez Bustos J (2013). A case study of muscle dysmorphia disorder diagnostics, Expert Systems with Applications: An International Journal, 40:10, (4226-4231), Online publication date: 1-Aug-2013.
  608. Eichelberger R and Sheng V An empirical study of reducing multiclass classification methodologies Proceedings of the 9th international conference on Machine Learning and Data Mining in Pattern Recognition, (505-519)
  609. Ribeiro D, Sanfins A and Belo O Wastewater treatment plant performance prediction with support vector machines Proceedings of the 13th international conference on Advances in Data Mining: applications and theoretical aspects, (99-111)
  610. Wang Y, Di G, Yu J, Lei J and Coenen F Feature representation for customer attrition risk prediction in retail banking Proceedings of the 13th international conference on Advances in Data Mining: applications and theoretical aspects, (229-238)
  611. Leme L, Lopes G, Nunes B, Casanova M and Dietze S Identifying candidate datasets for data interlinking Proceedings of the 13th international conference on Web Engineering, (354-366)
  612. ACM
    de Sá A and Pappa G Towards a method for automatically evolving bayesian network classifiers Proceedings of the 15th annual conference companion on Genetic and evolutionary computation, (1505-1512)
  613. ACM
    AL-Madi N and Ludwig S Segment-based genetic programming Proceedings of the 15th annual conference companion on Genetic and evolutionary computation, (133-134)
  614. ACM
    Salama K and Freitas A Evaluating the use of different measure functions in the predictive quality of ABC-miner Proceedings of the 15th annual conference companion on Genetic and evolutionary computation, (15-16)
  615. ACM
    Kowaliw T, Banzhaf W and Doursat R Networks of transform-based evolvable features for object recognition Proceedings of the 15th annual conference on Genetic and evolutionary computation, (1077-1084)
  616. Song M, Yang H, Siadat S and Pechenizkiy M (2013). A comparative study of dimensionality reduction techniques to enhance trace clustering performances, Expert Systems with Applications: An International Journal, 40:9, (3722-3737), Online publication date: 1-Jul-2013.
  617. Stegmayer G, Milone D, Garran S and Burdyn L (2013). Automatic recognition of quarantine citrus diseases, Expert Systems with Applications: An International Journal, 40:9, (3512-3517), Online publication date: 1-Jul-2013.
  618. ACM
    Coria S, Ramírez-Vásquez S, Luna-Trejo J, Mondragón-Becerra R, Pérez-Meza M and Ávila-Barrón O Delta score Proceedings of the 14th Annual International Conference on Digital Government Research, (102-110)
  619. ACM
    Agarwal D, Chen B, Elango P and Ramakrishnan R (2013). Content recommendation on web portals, Communications of the ACM, 56:6, (92-101), Online publication date: 1-Jun-2013.
  620. Zhang H, Gong L and Versteeg S Predicting bug-fixing time: an empirical study of commercial software projects Proceedings of the 2013 International Conference on Software Engineering, (1042-1051)
  621. Femmer H, Ganesan D, Lindvall M and McComas D Detecting inconsistencies in wrappers: a case study Proceedings of the 2013 International Conference on Software Engineering, (1022-1031)
  622. Cotroneo D, Pietrantuono R and Russo S A learning-based method for combining testing techniques Proceedings of the 2013 International Conference on Software Engineering, (142-151)
  623. ACM
    Vizer L Different strokes for different folks CHI '13 Extended Abstracts on Human Factors in Computing Systems, (2773-2778)
  624. ACM
    Delimitrou C and Kozyrakis C (2013). Paragon, ACM SIGPLAN Notices, 48:4, (77-88), Online publication date: 23-Apr-2013.
  625. ACM
    Mian R, Martin P, Zulkernine F and Vazquez-Poletti J Towards building performance models for data-intensive workloads in public clouds Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering, (259-270)
  626. Ott D Automatic requirement categorization of large natural language specifications at mercedes-benz for review improvements Proceedings of the 19th international conference on Requirements Engineering: Foundation for Software Quality, (50-64)
  627. ACM
    Delimitrou C and Kozyrakis C (2013). Paragon, ACM SIGARCH Computer Architecture News, 41:1, (77-88), Online publication date: 29-Mar-2013.
  628. Zhang S, McClean S, Nugent C, O'Neill S, Donnelly M, Galway L, Scotney B and Cleland I Prediction of assistive technology adoption for people with dementia Proceedings of the second international conference on Health Information Science, (160-171)
  629. Ermakov S and Ermakova L Sentiment classification based on phonetic characteristics Proceedings of the 35th European conference on Advances in Information Retrieval, (706-709)
  630. Jeong Y and Myaeng S Using wordnet hypernyms and dependency features for phrasal-level event recognition and type classification Proceedings of the 35th European conference on Advances in Information Retrieval, (267-278)
  631. ACM
    Delimitrou C and Kozyrakis C Paragon Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems, (77-88)
  632. ACM
    Brooks M, Kuksenok K, Torkildson M, Perry D, Robinson J, Scott T, Anicello O, Zukowski A, Harris P and Aragon C Statistical affect detection in collaborative chat Proceedings of the 2013 conference on Computer supported cooperative work, (317-328)
  633. ACM
    Englert F, Schmitt T, Kößler S, Reinhardt A and Steinmetz R How to auto-configure your smart home? Proceedings of the fourth international conference on Future energy systems, (215-224)
  634. ACM
    Beckel C, Sadamori L and Santini S Automatic socio-economic classification of households using electricity consumption data Proceedings of the fourth international conference on Future energy systems, (75-86)
  635. ACM
    Chang P and Yeh W Simplified swarm optimization with differential evolution mutation strategy for parameter search Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, (1-5)
  636. Berns A, Gonzalez-Pardo A and Camacho D (2013). Game-like language learning in 3-D virtual environments, Computers & Education, 60:1, (210-220), Online publication date: 1-Jan-2013.
  637. Chen H, Chiang R and Storey V (2012). Business intelligence and analytics, MIS Quarterly, 36:4, (1165-1188), Online publication date: 1-Dec-2012.
  638. ACM
    Carberry S, Elzer Schwartz S, Mccoy K, Demir S, Wu P, Greenbacker C, Chester D, Schwartz E, Oliver D and Moraes P (2013). Access to multimodal articles for individuals with sight impairments, ACM Transactions on Interactive Intelligent Systems, 2:4, (1-49), Online publication date: 1-Dec-2012.
  639. ACM
    Park H, Cho H, Lee K and Kim K Prediction of early stage opponents strategy for StarCraft AI using scouting and machine learning Proceedings of the Workshop at SIGGRAPH Asia, (7-12)
  640. BinMakhashen G and El-Alfy E Fusion of multiple texture representations for palmprint recognition using neural networks Proceedings of the 19th international conference on Neural Information Processing - Volume Part V, (410-417)
  641. El-Alfy E, Abdel-Aal R and Baig Z Abductive neural network modeling for hand recognition using geometric features Proceedings of the 19th international conference on Neural Information Processing - Volume Part IV, (593-602)
  642. d’Amato C, Bryl V and Serafini L Semantic Knowledge Discovery and Data-Driven Logical Reasoning from Heterogeneous Data Sources Uncertainty Reasoning for the Semantic Web III, (163-183)
  643. Maraschin M, Somensi-Zeggio A, Oliveira S, Kuhnen S, Tomazzoli M, Zeri A, Carreira R and Rocha M A machine learning and chemometrics assisted interpretation of spectroscopic data --- a NMR-Based metabolomics platform for the assessment of brazilian propolis Proceedings of the 7th IAPR international conference on Pattern Recognition in Bioinformatics, (129-140)
  644. Ariyaratne H, Zhang D and Lu G A class centric feature and classifier ensemble selection approach for music genre classification Proceedings of the 2012 Joint IAPR international conference on Structural, Syntactic, and Statistical Pattern Recognition, (666-674)
  645. Masiero A, Ferreira L and Aquino P Algoritmos de clusterização e python científico apoiando modelagem de usuário Companion Proceedings of the 11th Brazilian Symposium on Human Factors in Computing Systems, (47-50)
  646. ACM
    Mendes-Moreira J, Soares C, Jorge A and Sousa J (2012). Ensemble approaches for regression, ACM Computing Surveys, 45:1, (1-40), Online publication date: 1-Nov-2012.
  647. ACM
    Lindner A Semantic awareness for automatic image interpretation Proceedings of the 20th ACM international conference on Multimedia, (1425-1428)
  648. Santiago E, Romero-Salcedo M, Velasco-Hernández J, Velasquillo L and Hernández J An integrated strategy for analyzing flow conductivity of fractures in a naturally fractured reservoir using a complex network metric Proceedings of the 11th Mexican international conference on Advances in Computational Intelligence - Volume Part II, (350-361)
  649. Nápoles G, Grau I, León M and Grau R Modelling, aggregation and simulation of a dynamic biological system through fuzzy cognitive maps Proceedings of the 11th Mexican international conference on Advances in Computational Intelligence - Volume Part II, (188-199)
  650. ACM
    Ferreira R, Okada K, Cristo M, Berlt K, de Moura E and Fernandes D Scripts as source of information to contextual video advertising Proceedings of the 18th Brazilian symposium on Multimedia and the web, (39-46)
  651. d'Amato C, Bryl V and Serafini L Semantic knowledge discovery from heterogeneous data sources Proceedings of the 18th international conference on Knowledge Engineering and Knowledge Management, (26-31)
  652. ACM
    Domingos P (2012). A few useful things to know about machine learning, Communications of the ACM, 55:10, (78-87), Online publication date: 1-Oct-2012.
  653. Garcia-Piquer A, Fornells A, Orriols-Puig A, Corral G and Golobardes E (2012). Data classification through an evolutionary approach based on multiple criteria, Knowledge and Information Systems, 33:1, (35-56), Online publication date: 1-Oct-2012.
  654. ACM
    Trandafili E, Allkoçi A, Kajo E and Xhuvani A Discovery and evaluation of student's profiles with machine learning Proceedings of the Fifth Balkan Conference in Informatics, (174-179)
  655. Dobnik S, Cooper R and Larsson S Modelling Language, Action, and Perception in Type Theory with Records Revised Selected Papers of the 7th International Workshop on Constraint Solving and Language Processing - Volume 8114, (70-91)
  656. de Souza Jacomini R, do Nascimento M, Dantas R and Ramos R Comparison of PCA and ANOVA for information selection of CC and MLO views in classification of mammograms Proceedings of the 13th international conference on Intelligent Data Engineering and Automated Learning, (117-126)
  657. Saravanan M, Prasad G, Jagadeesan M, Raman R and Rekha S Group Recommender Model for Boosting and Optimizing Customer Purchases Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (1266-1271)
  658. ACM
    Jacob S and Ramani R Mining of classification patterns in clinical data through data mining algorithms Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (997-1003)
  659. Nagy G and Buza K SOHAC Proceedings of the 12th Industrial conference on Advances in Data Mining: applications and theoretical aspects, (38-51)
  660. Nagesh A, Ramakrishnan G, Chiticariu L, Krishnamurthy R, Dharkar A and Bhattacharyya P Towards efficient named-entity rule induction for customizability Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, (128-138)
  661. Kuo T, Hung S, Lin W, Peng N, Lin S and Lin W Exploiting latent information to predict diffusions of novel topics on social networks Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers - Volume 2, (344-348)
  662. Tortajada M, Oliver A, Martí R, Vilagran M, Ganau S, Tortajada L, Sentís M and Freixenet J Adapting breast density classification from digitized to full-field digital mammograms Proceedings of the 11th international conference on Breast Imaging, (561-568)
  663. ACM
    Medland M and Otero F A study of different quality evaluation functions in the cAnt-Miner(PB) classification algorithm Proceedings of the 14th annual conference on Genetic and evolutionary computation, (49-56)
  664. Rodriguez D, Herraiz I and Harrison R On software engineering repositories and their open problems Proceedings of the First International Workshop on Realizing AI Synergies in Software Engineering, (52-56)
  665. Xuan J, Jiang H, Ren Z and Zou W Developer prioritization in bug repositories Proceedings of the 34th International Conference on Software Engineering, (25-35)
  666. Xu B, Huang J, Williams G, Li M and Ye Y Hybrid random forests Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, (147-158)
  667. Deligianni D and Kotsiantis S Forecasting corporate bankruptcy with an ensemble of classifiers Proceedings of the 7th Hellenic conference on Artificial Intelligence: theories and applications, (65-72)
  668. Zouboulidis E and Kotsiantis S Forecasting fraudulent financial statements with committee of cost-sensitive decision tree classifiers Proceedings of the 7th Hellenic conference on Artificial Intelligence: theories and applications, (57-64)
  669. Kamos E, Matthaiou F and Kotsiantis S Credit rating using a hybrid voting ensemble Proceedings of the 7th Hellenic conference on Artificial Intelligence: theories and applications, (165-173)
  670. Bobicev V, Sokolova M, Jafer Y and Schramm D Learning sentiments from tweets with personal health information Proceedings of the 25th Canadian conference on Advances in Artificial Intelligence, (37-48)
  671. Japkowicz N Mining the hidden structure of inductive learning data sets Proceedings of the 25th Canadian conference on Advances in Artificial Intelligence, (318-324)
  672. Song Y, Gong J, Gao S, Wang D, Cui T, Li Y and Wei B (2012). Susceptibility assessment of earthquake-induced landslides using Bayesian network, Computers & Geosciences, 42:C, (189-199), Online publication date: 1-May-2012.
  673. Lin S (2012). Data mining for student retention management, Journal of Computing Sciences in Colleges, 27:4, (92-99), Online publication date: 1-Apr-2012.
  674. Lee S and Lee K (2012). Context-prediction performance by a dynamic Bayesian network, Expert Systems with Applications: An International Journal, 39:5, (4908-4914), Online publication date: 1-Apr-2012.
  675. ACM
    Griffith J, O'Riordan C and Sorensen H Investigations into user rating information and predictive accuracy in a collaborative filtering domain Proceedings of the 27th Annual ACM Symposium on Applied Computing, (937-942)
  676. Rand G (2012). Book Reviews, Interfaces, 42:2, (217-225), Online publication date: 1-Mar-2012.
  677. Alazab M, Venkatraman S, Watters P and Alazab M Zero-day malware detection based on supervised learning algorithms of API call signatures Proceedings of the Ninth Australasian Data Mining Conference - Volume 121, (171-182)
  678. Li F, Lei J, Tian Y, Punyapatthanakul S and Wang Y Model selection strategy for customer attrition risk prediction in retail banking Proceedings of the Ninth Australasian Data Mining Conference - Volume 121, (119-124)
  679. ACM
    Yu Y, Bandara A, Tun T and Nuseibeh B Towards learning to detect meaningful changes in software Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering, (51-54)
  680. Wu Q, Liang G, Wang Q, Xie T and Mei H Iterative mining of resource-releasing specifications Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering, (233-242)
  681. ACM
    Assam R and Seidl T Preserving privacy of moving objects via temporal clustering of spatio-temporal data streams Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, (9-16)
  682. Moonsamy V, Tian R and Batten L Feature reduction to speed up malware classification Proceedings of the 16th Nordic conference on Information Security Technology for Applications, (176-188)
  683. Stolpe M and Morik K Learning from label proportions by optimizing cluster model selection Proceedings of the 2011 European conference on Machine learning and knowledge discovery in databases - Volume Part III, (349-364)
  684. Stolpe M and Morik K Learning from label proportions by optimizing cluster model selection Proceedings of the 2011th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part III, (349-364)
  685. ACM
    Khonji M, Jones A and Iraqi Y A study of feature subset evaluators and feature subset searching methods for phishing classification Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, (135-144)
  686. SuáRez SáNchez A, GarcíA Nieto P, Riesgo FernáNdez P, Del Coz DíAz J and Iglesias-RodríGuez F (2011). Application of an SVM-based regression model to the air quality study at local scale in the Avilés urban area (Spain), Mathematical and Computer Modelling: An International Journal, 54:5-6, (1453-1466), Online publication date: 1-Sep-2011.
  687. Göndör M and Bresfelean V Fiscal policy, the main tool to influence the capital markets' strength Proceedings of the 11th WSEAS international conference on Applied informatics and communications, and Proceedings of the 4th WSEAS International conference on Biomedical electronics and biomedical informatics, and Proceedings of the international conference on Computational engineering in systems applications, (458-463)
  688. Bresfelean V Data mining and model trees study on GDP and its influence factors Proceedings of the 11th WSEAS international conference on Applied informatics and communications, and Proceedings of the 4th WSEAS International conference on Biomedical electronics and biomedical informatics, and Proceedings of the international conference on Computational engineering in systems applications, (401-406)
  689. Stanca L, Lacurezeanu R, Bresfelean V and Pop I Student profile ergonomically adapted to e-learning. a data clustering and statistical analysis based survey Proceedings of the 11th WSEAS international conference on Applied informatics and communications, and Proceedings of the 4th WSEAS International conference on Biomedical electronics and biomedical informatics, and Proceedings of the international conference on Computational engineering in systems applications, (332-337)
  690. ACM
    Moura D, el-Nasr M and Shaw C Visualizing and understanding players' behavior in video games Proceedings of the 2011 ACM SIGGRAPH Symposium on Video Games, (11-15)
  691. ACM
    Moura D, el-Nasr M and Shaw C Visualizing and understanding players' behavior in video games ACM SIGGRAPH 2011 Game Papers, (1-6)
  692. Manzato G, Arentze T, Timmermans H and Ettema D (2011). Matching office firms types and location characteristics, Expert Systems with Applications: An International Journal, 38:8, (9665-9673), Online publication date: 1-Aug-2011.
  693. Du H Data mining project Proceedings of the 28th British national conference on Advances in databases, (221-235)
  694. ACM
    de Almeida N and Pedrosa I Open source data mining tools for audit purposes Proceedings of the 2011 Workshop on Open Source and Design of Communication, (33-35)
  695. Jovic A and Bogunovic N HRVFrame Proceedings of the 13th conference on Artificial intelligence in medicine, (96-100)
  696. ACM
    Murtaza S, Madhavji N, Gittens M and Li Z Diagnosing new faults using mutants and prior faults (NIER track) Proceedings of the 33rd International Conference on Software Engineering, (960-963)
  697. Aburrous M, Hossain M, Dahal K and Thabtah F (2010). Intelligent phishing detection system for e-banking using fuzzy data mining, Expert Systems with Applications: An International Journal, 37:12, (7913-7921), Online publication date: 1-Dec-2010.
  698. Wang G, Hao J, Ma J and Huang L (2010). A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering, Expert Systems with Applications: An International Journal, 37:9, (6225-6232), Online publication date: 1-Sep-2010.
  699. Akay M and Abasıkeleş I (2010). Predicting the performance measures of an optical distributed shared memory multiprocessor by using support vector regression, Expert Systems with Applications: An International Journal, 37:9, (6293-6301), Online publication date: 1-Sep-2010.
  700. Śnieżyński B, Łukasik T and Mierzwa M B2R Proceedings of the 21st international conference on Database and expert systems applications: Part II, (177-184)
  701. Guo Y, Korhonen A, Liakata M, Karolinska I, Sun L and Stenius U Identifying the information structure of scientific abstracts Proceedings of the 2010 Workshop on Biomedical Natural Language Processing, (99-107)
  702. ACM
    Li X (2009). A Bayesian Approach for Estimating and Replacing Missing Categorical Data, Journal of Data and Information Quality, 1:1, (1-11), Online publication date: 1-Jun-2009.
  703. ACM
    Zhou D, Truran M, Brailsford T and Ashman H (2008). A Hybrid Technique for English-Chinese Cross Language Information Retrieval, ACM Transactions on Asian Language Information Processing, 7:2, (1-35), Online publication date: 1-Jun-2008.
  704. Kozareva Z, Vazquez S and Montoyo A UA-ZSA Proceedings of the 4th International Workshop on Semantic Evaluations, (338-341)
  705. D’Mello S and Graesser A Affect detection from human-computer dialogue with an intelligent tutoring system Proceedings of the 6th international conference on Intelligent Virtual Agents, (54-67)
  706. Olasupo T, Otero C, Olasupo K and Qureshi A Automatic detection of radio signal obstruction in wireless sensor networks' on-demand deployment 2016 IEEE Sensors Applications Symposium (SAS), (1-6)
  707. Moreira-Matias L and Cerqueira V CJAMmer - traffic JAM Cause Prediction using Boosted Trees 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), (743-748)
  708. Popkov Y, Dubnov Y and Popkov A Randomized machine learning: Statement, solution, applications 2016 IEEE 8th International Conference on Intelligent Systems (IS), (27-39)
  709. Bauder R and Khoshgoftaar T A Novel Method for Fraudulent Medicare Claims Detection from Expected Payment Deviations (Application Paper) 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI), (11-19)
  710. Baik E, Pande A, Zheng Z and Mohapatra P VSync: Cloud based video streaming service for mobile devices IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, (1-9)
  711. Rezk E, Babi S, Islam F and Jaoua A Uncertain training data set conceptual reduction: A machine learning perspective 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1842-1849)
  712. Li Z, Shang C and Shen Q Fuzzy-clustering embedded regression for predicting student academic performance 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (344-351)
  713. Yang H, Li Y, Wu M and Cheng F A hybrid tool life prediction scheme in cloud architecture 2016 IEEE International Conference on Automation Science and Engineering (CASE), (1160-1165)
  714. Tran C, Zhang M and Andreae P Directly evolving classifiers for missing data using genetic programming 2016 IEEE Congress on Evolutionary Computation (CEC), (5278-5285)
  715. Ferreira C, de Medeiros D and Santana F FCFilter: Feature selection based on clustering and genetic algorithms 2016 IEEE Congress on Evolutionary Computation (CEC), (2106-2113)
  716. Piantadosi G, Fusco R, Petrillo A, Sansone M and Sansone C LBP-TOP for Volume Lesion Classification in Breast DCE-MRI Image Analysis and Processing — ICIAP 2015, (647-657)
  717. Yuan X, Sa N, Begany G and Yang H What Users Prefer and Why: A User Study on Effective Presentation Styles of Opinion Summarization Human-Computer Interaction – INTERACT 2015, (249-264)
Contributors
  • The University of Waikato
  • The University of Waikato
  • The University of Waikato

Reviews

Radu State

When the authors of the Waikato Environment for Knowledge Analysis (Weka), a well-known and widely used data mining toolkit, teamed up to write a book on data mining techniques, the expectations were high. This third edition meets these expectations by combining hands-on and application-driven content with thorough coverage of the technical background of data mining and machine learning. The book is logically divided into three major sections. Part 1 (the first five chapters) is a solid introduction to basic data mining algorithms and real-life data processing. With regard to content, this part addresses the basic association mining algorithms, automated clustering techniques, and regression-based classification. From an operational point of view, the authors address the important and frequent issue of dealing with missing and/or inaccurate data items. Part 2 (the next four chapters) leverages the techniques from the first part. The authors refine them, cover more advanced data mining approaches, and consider the fine-tuning of previously described data clustering techniques. In this second part, the authors: show how the numbers of clusters in a clustering algorithm can be set; address the co-training learning mechanism; and delve into the more recent techniques of bagging and boosting. A dedicated chapter addresses the transformation and relevance-driven selection of attributes. It also discusses popular data transformation techniques such as principal component analysis (PCA). The final part of the book (chapters 10 to 17) provides an in-depth introduction to the Weka toolkit. The authors not only focus on the simple usage of Weka, but also give a comprehensive overview on extending the Weka toolkit with custom libraries and integrating Weka into an embedded data mining application. Chapter 15"?my favorite"?thoroughly covers how to build a standalone data mining application on top of the Weka libraries. This book is a must-read for every aspiring data mining analyst. Its many examples and the technical background it imparts would be a unique and welcome addition to the bookshelf of any graduate or advanced undergraduate student. The book is written for both academic and application-oriented readers, and I strongly recommend it to any reader working in the area of machine learning and data mining. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations