Nothing Special   »   [go: up one dir, main page]

skip to main content
Skip header Section
Data MiningJanuary 2005
Publisher:
  • Elsevier Science Inc.
  • 655 Avenue of the Americas New York, NY
  • United States
ISBN:978-81-312-0050-6
Published:01 January 2005
Skip Bibliometrics Section
Reflects downloads up to 26 Sep 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Sultana K, Anu V and Chong T (2020). Using software metrics for predicting vulnerable classes and methods in Java projects, Journal of Software: Evolution and Process, 33:3, Online publication date: 3-Mar-2021.
  2. Al-Zoubi A, Alqatawna J, Faris H and Hassonah M (2021). Spam profiles detection on social networks using computational intelligence methods, Journal of Information Science, 47:1, (58-81), Online publication date: 1-Feb-2021.
  3. ACM
    Chao X, Zhongqing Y, Jinhua L and Xixin Y Modeling and Optimization of HVAC System Based on GA-ANFIS Algorithm Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, (44-53)
  4. Yang R, Zhang C, Gao R, Zhang L and Song Q (2019). Predicting FAD Interacting Residues with Feature Selection and Comprehensive Sequence Descriptors, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16:6, (2046-2056), Online publication date: 1-Nov-2019.
  5. Gu X and Blackmore K (2019). Developing a scholar classification scheme from publication patterns in academic science, Journal of the Association for Information Science and Technology, 70:11, (1262-1276), Online publication date: 6-Oct-2019.
  6. Iloga S, Romain O and Tchuenté M (2019). An accurate HMM-based similarity measure between finite sets of histograms, Pattern Analysis & Applications, 22:3, (1079-1104), Online publication date: 1-Aug-2019.
  7. ACM
    Abidin D Effects of Image Filters on Various Image Datasets Proceedings of the 2019 5th International Conference on Computer and Technology Applications, (1-5)
  8. ACM
    Sim J, Kim H, Kim G and Choi M Supervised Classification of Geriatric Anxiety Proceedings of the 2019 4th International Conference on Intelligent Information Technology, (73-77)
  9. ACM
    Marik R Feature Space Decomposition using Information Theory Proceedings of the 2018 International Conference on Algorithms, Computing and Artificial Intelligence, (1-10)
  10. Habayeb M, Murtaza S, Miranskyy A and Bener A (2018). On the Use of Hidden Markov Model to Predict the Time to Fix Bugs, IEEE Transactions on Software Engineering, 44:12, (1224-1244), Online publication date: 1-Dec-2018.
  11. ACM
    García-Díaz J, Apolinario-Arzube Ó, Medina-Moreira J, Luna-Aveiga H, Lagos-Ortiz K and Valencia-García R Sentiment Analysis on Tweets related to infectious diseases in South America Proceedings of the Euro American Conference on Telematics and Information Systems, (1-5)
  12. Bongini M, Freno A, Laveglia V and Trentin E (2018). Dynamic Hybrid Random Fields for the Probabilistic Graphical Modeling of Sequential Data, Neural Processing Letters, 48:2, (733-768), Online publication date: 1-Oct-2018.
  13. ACM
    Zimbra D, Abbasi A, Zeng D and Chen H (2018). The State-of-the-Art in Twitter Sentiment Analysis, ACM Transactions on Management Information Systems, 9:2, (1-29), Online publication date: 5-Sep-2018.
  14. Buă?Ar J, ?Nidaršiă? M and Povh J (2018). Annotated news corpora and a lexicon for sentiment analysis in Slovene, Language Resources and Evaluation, 52:3, (895-919), Online publication date: 1-Sep-2018.
  15. Banaee H, Schaffernicht E and Loutfi A (2019). Data-driven conceptual spaces, Journal of Artificial Intelligence Research, 63:1, (691-742), Online publication date: 1-Sep-2018.
  16. ACM
    Hiranrat C and Harncharnchai A Using Text Mining to Discover Skills Demanded in Software Development Jobs in Thailand Proceedings of the 2nd International Conference on Education and Multimedia Technology, (112-116)
  17. Alam F, Danieli M and Riccardi G (2018). Annotating and modeling empathy in spoken conversations, Computer Speech and Language, 50:C, (40-61), Online publication date: 1-Jul-2018.
  18. Levati J, Kocev D, Ceci M and Deroski S (2018). Semi-supervised trees for multi-target regression, Information Sciences: an International Journal, 450:C, (109-127), Online publication date: 1-Jun-2018.
  19. ACM
    Jahangir R, Teh Y, Ishtiaq U, Mujtaba G and Nweke H Automatic Speaker Identification through Robust Time Domain Features and Hierarchical Classification Approach Proceedings of the International Conference on Data Processing and Applications, (34-38)
  20. Akbarinasaji S, Caglayan B and Bener A (2018). Predicting bug-fixing time, Journal of Systems and Software, 136:C, (173-186), Online publication date: 1-Feb-2018.
  21. Aceto G, Ciuonzo D, Montieri A and Pescap A (2018). Multi-classification approaches for classifying mobile app traffic, Journal of Network and Computer Applications, 103:C, (131-145), Online publication date: 1-Feb-2018.
  22. Feitosa Neto A and Canuto A (2018). An exploratory study of mono and multi-objective metaheuristics to ensemble of classifiers, Applied Intelligence, 48:2, (416-431), Online publication date: 1-Feb-2018.
  23. Ammae O, Korpela J and Maekawa T (2018). Unobtrusive detection of body movements during sleep using Wi-Fi received signal strength with model adaptation technique, Future Generation Computer Systems, 78:P2, (616-625), Online publication date: 1-Jan-2018.
  24. Itani S, Lecron F and Fortemps P (2018). A multi-level classification framework for multi-site medical data, Expert Systems with Applications: An International Journal, 91:C, (36-45), Online publication date: 1-Jan-2018.
  25. ACM
    Ampornphan P and Tongngam S Patent Knowledge Discovery Using Data Analytics Proceedings of the 2017 International Conference on Information Technology, (42-46)
  26. ACM
    Nguyen Q, Frisiello A and Rossi C Co-design of a crowdsourcing solution for disaster risk reduction Proceedings of the First CoNEXT Workshop on ICT Tools for Emergency Networks and DisastEr Relief, (7-12)
  27. Zhu T, Lin Y and Liu Y (2017). Synthetic minority oversampling technique for multiclass imbalance problems, Pattern Recognition, 72:C, (327-340), Online publication date: 1-Dec-2017.
  28. Thompson J, Leung B, Blair M and Taboada M (2017). Sentiment analysis of player chat messaging in the video game StarCraft 2, Knowledge-Based Systems, 137:C, (149-162), Online publication date: 1-Dec-2017.
  29. Kebede M, Zegeye D and Zeleke B (2017). Predicting CD4 count changes among patients on antiretroviral treatment, Computer Methods and Programs in Biomedicine, 152:C, (149-157), Online publication date: 1-Dec-2017.
  30. Lee P, Loh W and Chin J (2017). Feature selection in multimedia, Image and Vision Computing, 67:C, (29-42), Online publication date: 1-Nov-2017.
  31. Rowe E, Asbell-Clarke J, Baker R, Eagle M, Hicks A, Barnes T, Brown R and Edwards T (2017). Assessing implicit science learning in digital games, Computers in Human Behavior, 76:C, (617-630), Online publication date: 1-Nov-2017.
  32. Baccar N, Jridi M and Bouallegue R (2017). Adaptive Neuro-Fuzzy Location Indicator in Wireless Sensor Networks, Wireless Personal Communications: An International Journal, 97:2, (3165-3181), Online publication date: 1-Nov-2017.
  33. Rathore S and Kumar S (2017). Towards an ensemble based system for predicting the number of software faults, Expert Systems with Applications: An International Journal, 82:C, (357-382), Online publication date: 1-Oct-2017.
  34. Watanabe Y and Kun L (2017). Long-term influence of user identification based on touch operation on smart phone, Procedia Computer Science, 112:C, (2529-2536), Online publication date: 1-Sep-2017.
  35. Ezghari S, Zahi A and Zenkouar K (2017). A new nearest neighbor classification method based on fuzzy set theory and aggregation operators, Expert Systems with Applications: An International Journal, 80:C, (58-74), Online publication date: 1-Sep-2017.
  36. ACM
    Wlodarczak P, Ally M and Soar J Data mining in IoT Proceedings of the International Conference on Web Intelligence, (1100-1103)
  37. ACM
    Qin X, Kakar T, Wunnava S, Rundensteiner E and Cao L MARAS Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1615-1623)
  38. Kriegel H, Schubert E and Zimek A (2017). The (black) art of runtime evaluation, Knowledge and Information Systems, 52:2, (341-378), Online publication date: 1-Aug-2017.
  39. Zhou L, Si Y and Fujita H (2017). Predicting the listing statuses of Chinese-listed companies using decision trees combined with an improved filter feature selection method, Knowledge-Based Systems, 128:C, (93-101), Online publication date: 15-Jul-2017.
  40. Zhang M, Ali S, Yue T and Norgre R (2017). Uncertainty-wise evolution of test ready models, Information and Software Technology, 87:C, (140-159), Online publication date: 1-Jul-2017.
  41. Martnez-Ballesteros M, Garca-Heredia J, Nepomuceno-Chamorro I and Riquelme-Santos J (2017). Machine learning techniques to discover genes with potential prognosis role in Alzheimers disease using different biological sources, Information Fusion, 36:C, (114-129), Online publication date: 1-Jul-2017.
  42. Varlamis I, Apostolakis I, Sifaki-Pistolla D, Dey N, Georgoulias V and Lionis C (2017). Application of data mining techniques and data analysis methods to measure cancer morbidity and mortality data in a regional cancer registry, Computer Methods and Programs in Biomedicine, 145:C, (73-83), Online publication date: 1-Jul-2017.
  43. Chou C, Hsieh S and Qiu C (2017). Hybrid genetic algorithm and fuzzy clustering for bankruptcy prediction, Applied Soft Computing, 56:C, (298-316), Online publication date: 1-Jul-2017.
  44. ACM
    Iliev A and Stanchev P Smart Multifunctional Digital Content Ecosystem Using Emotion Analysis of Voice Proceedings of the 18th International Conference on Computer Systems and Technologies, (58-64)
  45. ACM
    Arvanitou E, Ampatzoglou A, Chatzigeorgiou A and Avgeriou P A Method for Assessing Class Change Proneness Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering, (186-195)
  46. ACM
    Paluch M, Rotari G, Steding D, Weß M, Moritz M and Büchler M Analysis of Part-Of-Speech Tagging of Historical German Texts Proceedings of the 2nd International Conference on Digital Access to Textual Cultural Heritage, (41-46)
  47. Holanda O, Isotani S, Bittencourt I, Dermeval D and Alcantara W (2017). An object triple mapping system supporting detached objects, Engineering Applications of Artificial Intelligence, 62:C, (234-251), Online publication date: 1-Jun-2017.
  48. Khan S and Baig A (2017). Ant colony optimization based hierarchical multi-label classification algorithm, Applied Soft Computing, 55:C, (462-479), Online publication date: 1-Jun-2017.
  49. Thakker D, Karanasios S, Blanchard E, Lau L and Dimitrova V (2017). Ontology for cultural variations in interpersonal communication, Journal of the Association for Information Science and Technology, 68:6, (1411-1428), Online publication date: 1-Jun-2017.
  50. Ghotra B, Mcintosh S and Hassan A A large-scale study of the impact of feature selection techniques on defect classification models Proceedings of the 14th International Conference on Mining Software Repositories, (146-157)
  51. Sarker I, Kabir M, Colman A and Han J An approach to modeling call response behavior on mobile phones based on multi-dimensional contexts Proceedings of the 4th International Conference on Mobile Software Engineering and Systems, (91-95)
  52. Wang J, Cui Q, Wang S and Wang Q Domain adaptation for test report classification in crowdsourced testing Proceedings of the 39th International Conference on Software Engineering: Software Engineering in Practice Track, (83-92)
  53. Li B, Poshyvanyk D and Grechanik M Automatically detecting integrity violations in database-centric applications Proceedings of the 25th International Conference on Program Comprehension, (251-262)
  54. Das A, Das S and Ghosh A (2017). Ensemble feature selection using bi-objective genetic algorithm, Knowledge-Based Systems, 123:C, (116-127), Online publication date: 1-May-2017.
  55. Gan H, Zhang Y and Song Q (2017). Bayesian belief network for positive unlabeled learning with uncertainty, Pattern Recognition Letters, 90:C, (28-35), Online publication date: 15-Apr-2017.
  56. Alvi F and Pears R (2017). A composite spatio-temporal modeling approach for age invariant face recognition, Expert Systems with Applications: An International Journal, 72:C, (383-394), Online publication date: 15-Apr-2017.
  57. Ali R, Lee S and Chung T (2017). Accurate multi-criteria decision making methodology for recommending machine learning algorithm, Expert Systems with Applications: An International Journal, 71:C, (257-278), Online publication date: 1-Apr-2017.
  58. Arabasadi Z, Alizadehsani R, Roshanzamir M, Moosaei H and Yarifard A (2017). Computer aided decision making for heart disease detection using hybrid neural network-Genetic algorithm, Computer Methods and Programs in Biomedicine, 141:C, (19-26), Online publication date: 1-Apr-2017.
  59. Maity M, Mungle T, Dhane D, Maiti A and Chakraborty C (2017). An Ensemble Rule Learning Approach for Automated Morphological Classification of Erythrocytes, Journal of Medical Systems, 41:4, (1-14), Online publication date: 1-Apr-2017.
  60. ACM
    Mekouar S, Zrira N and Bouyakhf E Popularity Prediction of Videos in YouTube as Case Study Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, (1-6)
  61. Appice A, Guccione P and Malerba D (2017). A novel spectral-spatial co-training algorithm for the transductive classification of hyperspectral imagery data, Pattern Recognition, 63:C, (229-245), Online publication date: 1-Mar-2017.
  62. Rathore S and Kumar S (2017). Linear and non-linear heterogeneous ensemble methods to predict the number of faults in software systems, Knowledge-Based Systems, 119:C, (232-256), Online publication date: 1-Mar-2017.
  63. Carbonero-Ruz M, Martnez-Estudillo F, Fernndez-Navarro F, Becerra-Alonso D and Martnez-Estudillo A (2017). A two dimensional accuracy-based measure for classification performance, Information Sciences: an International Journal, 382:C, (60-80), Online publication date: 1-Mar-2017.
  64. Tesfaye B, Atique S, Elias N, Dibaba L, Shabbir S and Kebede M (2017). Determinants and development of a web-based child mortality prediction model in resource-limited settings, Computer Methods and Programs in Biomedicine, 140:C, (45-51), Online publication date: 1-Mar-2017.
  65. Gu D, Liang C and Zhao H (2017). A case-based reasoning system based on weighted heterogeneous value distance metric for breast cancer diagnosis, Artificial Intelligence in Medicine, 77:C, (31-47), Online publication date: 1-Mar-2017.
  66. Forkan A, Khalil I and Atiquzzaman M (2017). ViSiBiD, Computer Networks: The International Journal of Computer and Telecommunications Networking, 113:C, (244-257), Online publication date: 11-Feb-2017.
  67. (2017). Using acoustic paralinguistic information to assess the interaction quality in speech-based systems for elderly users, International Journal of Human-Computer Studies, 98:C, (1-13), Online publication date: 1-Feb-2017.
  68. Dominiak K and Kristensen A (2017). Prioritizing alarms from sensor-based detection models in livestock production - A review on model performance and alarm reducing methods, Computers and Electronics in Agriculture, 133:C, (46-67), Online publication date: 1-Feb-2017.
  69. Malazgirt G and Yurdakul A (2017). Prenaut, Journal of Systems Architecture: the EUROMICRO Journal, 72:C, (3-18), Online publication date: 1-Jan-2017.
  70. Abdar M, Zomorodi-Moghadam M, Das R and Ting I (2017). Performance analysis of classification algorithms on early detection of liver disease, Expert Systems with Applications: An International Journal, 67:C, (239-251), Online publication date: 1-Jan-2017.
  71. (2017). A sentiment classification model based on multiple classifiers, Applied Soft Computing, 50:C, (135-141), Online publication date: 1-Jan-2017.
  72. ACM
    Li Z, Zou D, Xu S, Jin H, Qi H and Hu J VulPecker Proceedings of the 32nd Annual Conference on Computer Security Applications, (201-213)
  73. Khelladi D, Hebig R, Bendraou R, Robin J and Gervais M (2016). Detecting complex changes and refactorings during (Meta)model evolution, Information Systems, 62:C, (220-241), Online publication date: 1-Dec-2016.
  74. Muhammad T and Halim Z (2016). Employing artificial neural networks for constructing metadata-based model to automatically select an appropriate data visualization technique, Applied Soft Computing, 49:C, (365-384), Online publication date: 1-Dec-2016.
  75. Esmaelian M, Shahmoradi H and Vali M (2016). A novel classification method, Applied Soft Computing, 49:C, (56-70), Online publication date: 1-Dec-2016.
  76. Ammar M, Bouaziz S, Alimi A and Abraham A (2016). Multi-agent architecture for Multiźobjective optimization of Flexible Neural Tree, Neurocomputing, 214:C, (307-316), Online publication date: 19-Nov-2016.
  77. Kim Y, Baik B and Cho S (2016). Detecting financial misstatements with fraud intention using multi-class cost-sensitive learning, Expert Systems with Applications: An International Journal, 62:C, (32-43), Online publication date: 15-Nov-2016.
  78. Shin K and Miyazaki S (2016). A Fast and Accurate Feature Selection Algorithm Based on Binary Consistency Measure, Computational Intelligence, 32:4, (646-667), Online publication date: 1-Nov-2016.
  79. Seara Vieira A, Borrajo L and Iglesias E (2016). Improving the text classification using clustering and a novel HMM to reduce the dimensionality, Computer Methods and Programs in Biomedicine, 136:C, (119-130), Online publication date: 1-Nov-2016.
  80. Assem H, Xu L, Buda T and O'sullivan D (2016). Machine learning as a service for enabling Internet of Things and People, Personal and Ubiquitous Computing, 20:6, (899-914), Online publication date: 1-Nov-2016.
  81. ACM
    Zhang Y, Weninger F, Batliner A, Hönig F and Schuller B Language proficiency assessment of English L2 speakers based on joint analysis of prosody and native language Proceedings of the 18th ACM International Conference on Multimodal Interaction, (274-278)
  82. ACM
    de Brito Moraes G and da Silva T Systematic Literature Mapping on Eye Tracking and Data Mining Proceedings of the 15th Brazilian Symposium on Human Factors in Computing Systems, (1-4)
  83. ACM
    Wen E, Seah W, Ng B, Liu X and Cao J UbiTouch Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (286-297)
  84. ACM
    Petrić J, Bowes D, Hall T, Christianson B and Baddoo N Building an Ensemble for Software Defect Prediction Based on Diversity Selection Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, (1-10)
  85. Chiu M and Chiou J (2016). Technical service platform planning based on a company's competitive advantage and future market trends, Computers and Industrial Engineering, 99:C, (503-517), Online publication date: 1-Sep-2016.
  86. ACM
    Wang J, Wang S, Cui Q and Wang Q Local-based active classification of test report to assist crowdsourced testing Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, (190-201)
  87. ACM
    Gao Y and Parameswaran A Squish Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1575-1584)
  88. Monsalve-Torra A, Ruiz-Fernandez D, Marin-Alonso O, Soriano-Payá A, Camacho-Mackenzie J and Carreño-Jaimes M (2016). Using machine learning methods for predicting inhospital mortality in patients undergoing open repair of abdominal aortic aneurysm, Journal of Biomedical Informatics, 62:C, (195-201), Online publication date: 1-Aug-2016.
  89. Zafari F and Nassiri-Mofakham F (2016). POPPONENT, Artificial Intelligence, 237:C, (59-91), Online publication date: 1-Aug-2016.
  90. Zhang C, Chen D, Yin J and Chen L (2016). Data-driven train operation models based on data mining and driving experience for the diesel-electric locomotive, Advanced Engineering Informatics, 30:3, (553-563), Online publication date: 1-Aug-2016.
  91. Bilal M, Oyedele L, Qadir J, Munir K, Ajayi S, Akinade O, Owolabi H, Alaka H and Pasha M (2016). Big Data in the construction industry, Advanced Engineering Informatics, 30:3, (500-521), Online publication date: 1-Aug-2016.
  92. ACM
    Bowes D, Hall T, Harman M, Jia Y, Sarro F and Wu F Mutation-aware fault prediction Proceedings of the 25th International Symposium on Software Testing and Analysis, (330-341)
  93. Murtaza S, Khreich W, Hamou-Lhadj A and Bener A (2016). Mining trends and patterns of software vulnerabilities, Journal of Systems and Software, 117:C, (218-228), Online publication date: 1-Jul-2016.
  94. Chen Y (2016). A comprehensive identification-evidence based alternative for HIV/AIDS treatment with HAART in the healthcare industries, Computer Methods and Programs in Biomedicine, 131:C, (111-126), Online publication date: 1-Jul-2016.
  95. Schikuta E and Fritz F (2016). An Execution Framework for Grid-clustering Methods, Procedia Computer Science, 80:C, (2322-2326), Online publication date: 1-Jun-2016.
  96. Corani G and Scanagatta M (2016). Air pollution prediction via multi-label classification, Environmental Modelling & Software, 80:C, (259-264), Online publication date: 1-Jun-2016.
  97. Jiang L, Li C, Wang S and Zhang L (2016). Deep feature weighting for naive Bayes and its application to text classification, Engineering Applications of Artificial Intelligence, 52:C, (26-39), Online publication date: 1-Jun-2016.
  98. Andrade E, Sampaio I, Viterbo J, Silva J and Boscarioli C Profiling Household Consumption with Clustering Algorithms Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (45-51)
  99. ACM
    Luo Q, Poshyvanyk D, Nair A and Grechanik M FOREPOST Proceedings of the 38th International Conference on Software Engineering Companion, (593-596)
  100. ACM
    Ray B, Hellendoorn V, Godhane S, Tu Z, Bacchelli A and Devanbu P On the "naturalness" of buggy code Proceedings of the 38th International Conference on Software Engineering, (428-439)
  101. ACM
    Wang S, Liu T and Tan L Automatically learning semantic features for defect prediction Proceedings of the 38th International Conference on Software Engineering, (297-308)
  102. Yu Y, Hou P, Da Q and Qian Y Boosting Nonparametric Policies Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (477-484)
  103. Zeng Y, Pathak P and Mohapatra P WiWho Proceedings of the 15th International Conference on Information Processing in Sensor Networks, (1-12)
  104. ACM
    Marcon de Moraes F, de Santana V and Braga J Supporting the selection of web content modality based on user interactions logs Proceedings of the 13th International Web for All Conference, (1-4)
  105. Pobiruchin M, Bochum S, Martens U, Kieser M and Schramm W (2016). A method for using real world data in breast cancer modeling, Journal of Biomedical Informatics, 60:C, (385-394), Online publication date: 1-Apr-2016.
  106. Ruiz-Fernández D, Monsalve Torra A, Soriano-Payá A, Marín-Alonso O and Triana Palencia E (2016). Aid decision algorithms to estimate the risk in congenital heart surgery, Computer Methods and Programs in Biomedicine, 126:C, (118-127), Online publication date: 1-Apr-2016.
  107. ACM
    Jhajharia S, Verma S and Kumar R Predictive Analytics for Breast Cancer Survivability Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-5)
  108. Jiang S and Wang L (2016). Efficient feature selection based on correlation measure between continuous and discrete features, Information Processing Letters, 116:2, (203-215), Online publication date: 1-Feb-2016.
  109. Li Q, Han Q and Sun L (2016). Collaborative Recognition of Queuing Behavior on Mobile Phones, IEEE Transactions on Mobile Computing, 15:1, (60-73), Online publication date: 1-Jan-2016.
  110. Abdi L and Hashemi S (2016). To Combat Multi-Class Imbalanced Problems by Means of Over-Sampling Techniques, IEEE Transactions on Knowledge and Data Engineering, 28:1, (238-251), Online publication date: 1-Jan-2016.
  111. Zuo X, Blackburn J, Kourtellis N, Skvoretz J and Iamnitchi A (2016). The power of indirect ties, Computer Communications, 73:PB, (188-199), Online publication date: 1-Jan-2016.
  112. Liang Z, Sun J, Lin Q, Du Z, Chen J and Ming Z (2016). A novel multiple rule sets data classification algorithm based on ant colony algorithm, Applied Soft Computing, 38:C, (1000-1011), Online publication date: 1-Jan-2016.
  113. Apolloni J, Leguizamón G and Alba E (2016). Two hybrid wrapper-filter feature selection algorithms applied to high-dimensional microarray experiments, Applied Soft Computing, 38:C, (922-932), Online publication date: 1-Jan-2016.
  114. Huang K and Li I (2016). A multi-attribute decision-making model for the robust classification of multiple inputs and outputs datasets with uncertainty, Applied Soft Computing, 38:C, (176-189), Online publication date: 1-Jan-2016.
  115. Zhioua S (2015). The web browser factor in traffic analysis attacks, Security and Communication Networks, 8:18, (4227-4241), Online publication date: 1-Dec-2015.
  116. Kim H and Choi J (2015). Hierarchical multi-class LAD based on OvA-binary tree using genetic algorithm, Expert Systems with Applications: An International Journal, 42:21, (8134-8145), Online publication date: 30-Nov-2015.
  117. ACM
    Nikkhah M, Dovrolis C and Guérin R Why didn't my (great!) protocol get adopted? Proceedings of the 14th ACM Workshop on Hot Topics in Networks, (1-7)
  118. ACM
    Danieli M, Riccardi G and Alam F Emotion Unfolding and Affective Scenes Proceedings of the International Workshop on Emotion Representations and Modelling for Companion Technologies, (5-11)
  119. Di Sorbo A, Panichella S, Visaggio C, Di Penta M, Canfora G and Gall H Development emails content analyzer Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, (12-23)
  120. ACM
    Filios G, Nikoletseas S and Pavlopoulou C Efficient Parameterized Methods for Physical Activity Detection using only Smartphone Sensors Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access, (97-104)
  121. Schmitt A and Ultes S (2015). Interaction Quality, Speech Communication, 74:C, (12-36), Online publication date: 1-Nov-2015.
  122. Beg A, Awwad F, Ibrahim W and Ahmed F (2015). On the reliability estimation of nano-circuits using neural networks, Microprocessors & Microsystems, 39:8, (674-685), Online publication date: 1-Nov-2015.
  123. Rashkovska A, Kocev D and Trobec R (2015). Non-invasive real-time prediction of inner knee temperatures during therapeutic cooling, Computer Methods and Programs in Biomedicine, 122:2, (136-148), Online publication date: 1-Nov-2015.
  124. ACM
    Bowes D, Hall T and Petrić J Different Classifiers Find Different Defects Although With Different Level of Consistency Proceedings of the 11th International Conference on Predictive Models and Data Analytics in Software Engineering, (1-10)
  125. ACM
    Zarouchas T, Perikos I, Paraskevas M and Pegiazis T A hybrid training framework oriented to computer engineering educators Proceedings of the 19th Panhellenic Conference on Informatics, (33-37)
  126. (2015). Dealing with inter-expert variability in retinopathy of prematurity, Computer Methods and Programs in Biomedicine, 122:1, (1-15), Online publication date: 1-Oct-2015.
  127. ACM
    Benvenuti L, Kloss C and Pirker S Characterization of DEM particles by means of artificial neural networks and macroscopic experiments Proceedings of the 16th International Conference on Engineering Applications of Neural Networks (INNS), (1-8)
  128. ACM
    Wei T and Zhang X mTrack Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, (117-129)
  129. ACM
    Suarez I, Jahn A, Anderson C and David K Improved activity recognition by using enriched acceleration data Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (1011-1015)
  130. ACM
    Delimitrou C, Sanchez D and Kozyrakis C Tarcil Proceedings of the Sixth ACM Symposium on Cloud Computing, (97-110)
  131. Zeng Z, Zhang H, Zhang R and Yin C (2015). A novel feature selection method considering feature interaction, Pattern Recognition, 48:8, (2656-2666), Online publication date: 1-Aug-2015.
  132. (2015). Learning to detect representative data for large scale instance selection, Journal of Systems and Software, 106:C, (1-8), Online publication date: 1-Aug-2015.
  133. ACM
    de las Cuevas Delgado P, Merelo J and García Sánchez P Soft Computing Techniques Applied to Corporate and Personal Security Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1193-1196)
  134. ACM
    Al-Sahaf H, Zhang M and Johnston M Evolutionary Image Descriptor Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (975-982)
  135. Vizine Pereira A and Hruschka E (2015). Simultaneous co-clustering and learning to address the cold start problem in recommender systems, Knowledge-Based Systems, 82:C, (11-19), Online publication date: 1-Jul-2015.
  136. ACM
    Zhu G, Wang Y and Agrawal G SciCSM Proceedings of the 27th International Conference on Scientific and Statistical Database Management, (1-6)
  137. Yousfi A, Dey A, Saidi R and Hong J (2015). Introducing decision-aware business processes, Computers in Industry, 70:C, (13-22), Online publication date: 1-Jun-2015.
  138. Greiler M, Herzig K and Czerwonka J Code ownership and software quality Proceedings of the 12th Working Conference on Mining Software Repositories, (2-12)
  139. Murtaza S, Hamou-Lhadj A, Madhavji N and Gittens M Towards an emerging theory for the diagnosis of faulty functions in function-call traces Proceedings of the Fourth SEMAT Workshop on General Theory of Software Engineering, (59-68)
  140. Ghotra B, McIntosh S and Hassan A Revisiting the impact of classification techniques on the performance of defect prediction models Proceedings of the 37th International Conference on Software Engineering - Volume 1, (789-800)
  141. Atanassov K (2015). Intuitionistic fuzzy logics as tools for evaluation of Data Mining processes, Knowledge-Based Systems, 80:C, (122-130), Online publication date: 1-May-2015.
  142. De Cnudde S and Martens D (2015). Loyal to your city? A data mining analysis of a public service loyalty program, Decision Support Systems, 73:C, (74-84), Online publication date: 1-May-2015.
  143. Makond B, Wang K and Wang K (2015). Probabilistic modeling of short survivability in patients with brain metastasis from lung cancer, Computer Methods and Programs in Biomedicine, 119:3, (142-162), Online publication date: 1-May-2015.
  144. ACM
    Züger M and Fritz T Interruptibility of Software Developers and its Prediction Using Psycho-Physiological Sensors Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, (2981-2990)
  145. ACM
    Blomberg L, Barros R and Ruiz D Evolving regression trees robust to missing data Proceedings of the 30th Annual ACM Symposium on Applied Computing, (102-109)
  146. Gerevini A, Saetti A and Vallati M (2015). Exploiting macro-actions and predicting plan length in planning as satisfiability, AI Communications, 28:2, (323-344), Online publication date: 1-Apr-2015.
  147. Wang K, Adrian A, Chen K and Wang K (2015). An improved electromagnetism-like mechanism algorithm and its application to the prediction of diabetes mellitus, Journal of Biomedical Informatics, 54:C, (220-229), Online publication date: 1-Apr-2015.
  148. ACM
    Schuller B Modelling User Affect and Sentiment in Intelligent User Interfaces Proceedings of the 20th International Conference on Intelligent User Interfaces, (443-446)
  149. Shaker A and Hüllermeier E (2015). Recovery analysis for adaptive learning from non-stationary data streams, Neurocomputing, 150:PA, (250-264), Online publication date: 20-Feb-2015.
  150. Abdallah Z, Gaber M, Srinivasan B and Krishnaswamy S (2015). Adaptive mobile activity recognition system with evolving data streams, Neurocomputing, 150:PA, (304-317), Online publication date: 20-Feb-2015.
  151. Triguero I, Peralta D, Bacardit J, García S and Herrera F (2015). MRPR, Neurocomputing, 150:PA, (331-345), Online publication date: 20-Feb-2015.
  152. Moro S, Cortez P and Rita P (2015). Business intelligence in banking, Expert Systems with Applications: An International Journal, 42:3, (1314-1324), Online publication date: 15-Feb-2015.
  153. ACM
    Kokkodis M, Papadimitriou P and Ipeirotis P Hiring Behavior Models for Online Labor Markets Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, (223-232)
  154. Kamkar I, Gupta S, Phung D and Venkatesh S (2015). Stable feature selection for clinical prediction, Journal of Biomedical Informatics, 53:C, (277-290), Online publication date: 1-Feb-2015.
  155. Martinez D, Ananda-Rajah M, Suominen H, Slavin M, Thursky K and Cavedon L (2015). Automatic detection of patients with invasive fungal disease from free-text computed tomography (CT) scans, Journal of Biomedical Informatics, 53:C, (251-260), Online publication date: 1-Feb-2015.
  156. Kim H and Choi J (2015). Pattern generation for multi-class LAD using iterative genetic algorithm with flexible chromosomes and multiple populations, Expert Systems with Applications: An International Journal, 42:2, (833-843), Online publication date: 1-Feb-2015.
  157. Ulutagay G, Ecer F and Nasibov E (2015). Performance evaluation of industrial enterprises via fuzzy inference system approach, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 19:2, (449-458), Online publication date: 1-Feb-2015.
  158. ACM
    Paiva J, Ruivo P, Romano P and Rodrigues L (2014). AutoPlacer, ACM Transactions on Autonomous and Adaptive Systems, 9:4, (1-30), Online publication date: 14-Jan-2015.
  159. Sun X, Zhang T, Chai Y and Liu Y (2015). Localized ambient solidity separation algorithm based computer user segmentation, Computational Intelligence and Neuroscience, 2015, (69-69), Online publication date: 1-Jan-2015.
  160. Wang R, He Y, Chow C, Ou F and Zhang J (2015). Learning ELM-Tree from big data based on uncertainty reduction, Fuzzy Sets and Systems, 258:C, (79-100), Online publication date: 1-Jan-2015.
  161. Chen T, Bahsoon R and Yao X Online QoS Modeling in the Cloud Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, (327-336)
  162. ACM
    Pham T, Nguyen Q and Nguyen X Generating artificial attack data for intrusion detection using machine learning Proceedings of the Fifth Symposium on Information and Communication Technology, (286-291)
  163. ACM
    Jiang H, Ma H, Ren Z, Zhang J and Li X What makes a good app description? Proceedings of the 6th Asia-Pacific Symposium on Internetware, (45-53)
  164. ACM
    Zheng D, Hu T, You Q, Kautz H and Luo J Inferring Home Location from User's Photo Collections based on Visual Content and Mobility Patterns Proceedings of the 3rd ACM Multimedia Workshop on Geotagging and Its Applications in Multimedia, (21-26)
  165. ACM
    Jilani M, Corcoran P and Bertolotto M Automated highway tag assessment of OpenStreetMap road networks Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (449-452)
  166. ACM
    Conte G, De Marchi M, Nacci A, Rana V and Sciuto D BlueSentinel Proceedings of the 1st ACM Conference on Embedded Systems for Energy-Efficient Buildings, (11-19)
  167. ACM
    Choi W, Oh J, Park T, Kang S, Moon M, Lee U, Hwang I and Song J MobyDick Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, (76-90)
  168. ACM
    Tripp O, Guarnieri S, Pistoia M and Aravkin A ALETHEIA Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, (762-774)
  169. Erdemir U and Buzluca F (2014). A learning-based module extraction method for object-oriented systems, Journal of Systems and Software, 97:C, (156-177), Online publication date: 1-Nov-2014.
  170. Chen K, Wang K, Wang K and Angelia M (2014). Applying particle swarm optimization-based decision tree classifier for cancer classification on gene expression data, Applied Soft Computing, 24:C, (773-780), Online publication date: 1-Nov-2014.
  171. Wang X, Liu X and Zhang L (2014). A rapid fuzzy rule clustering method based on granular computing, Applied Soft Computing, 24:C, (534-542), Online publication date: 1-Nov-2014.
  172. Papadakis G, Papastefanatos G and Koutrika G (2014). Supervised meta-blocking, Proceedings of the VLDB Endowment, 7:14, (1929-1940), Online publication date: 1-Oct-2014.
  173. ACM
    Avvenuti M, Cresci S, Marchetti A, Meletti C and Tesconi M EARS (earthquake alert and report system) Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, (1749-1758)
  174. ACM
    Penniston A and Harley E Classification and Generation of Grammatical Errors Proceedings of the 2014 International C* Conference on Computer Science & Software Engineering, (1-10)
  175. ACM
    Son G, Hazlewood V and Peterson G On Automating XSEDE User Ticket Classification Proceedings of the 2014 Annual Conference on Extreme Science and Engineering Discovery Environment, (1-7)
  176. Barros R, Jaskowiak P, Cerri R and de Carvalho A (2014). A framework for bottom-up induction of oblique decision trees, Neurocomputing, 135:C, (3-12), Online publication date: 5-Jul-2014.
  177. ACM
    Merten T, Mager B, Bürsner S and Paech B Classifying unstructured data into natural language text and technical information Proceedings of the 11th Working Conference on Mining Software Repositories, (300-303)
  178. Da Q, Yu Y and Zhou Z Napping for functional representation of policy Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (189-196)
  179. El Hindi K (2014). Fine tuning the Naïve Bayesian learning algorithm, AI Communications, 27:2, (133-141), Online publication date: 1-Apr-2014.
  180. ACM
    Brooks C and Greer J Explaining predictive models to learning specialists using personas Proceedings of the Fourth International Conference on Learning Analytics And Knowledge, (26-30)
  181. Abellán J, Baker R, Coolen F, Crossman R and Masegosa A (2014). Classification with decision trees from a nonparametric predictive inference perspective, Computational Statistics & Data Analysis, 71:C, (789-802), Online publication date: 1-Mar-2014.
  182. ACM
    Masli M and Terveen L Leveraging the contributory potential of user feedback Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, (956-966)
  183. ACM
    Mohanty S and Cole M Autotuning Wavefront Applications for Multicore Multi-GPU Hybrid Architectures Proceedings of Programming Models and Applications on Multicores and Manycores, (1-9)
  184. ACM
    Mohanty S and Cole M Autotuning Wavefront Applications for Multicore Multi-GPU Hybrid Architectures Proceedings of Programming Models and Applications on Multicores and Manycores, (1-9)
  185. Deng H, Baydogan M and Runger G (2014). SMT, Statistical Analysis and Data Mining, 7:1, (53-69), Online publication date: 1-Feb-2014.
  186. Czyżewska M, Szkoła J and Pancerz K (2014). Towards Assessment of Innovativeness Economy Determinant Correlation, Fundamenta Informaticae, 129:1-2, (37-48), Online publication date: 1-Jan-2014.
  187. ACM
    Dînşoreanu M and Potolea R A scalable approach for Contradiction Detection driven by Opinion mining Proceedings of International Conference on Information Integration and Web-based Applications & Services, (7-15)
  188. ACM
    O'shea J, Bandar Z and Crockett K (2014). A new benchmark dataset with production methodology for short text semantic similarity algorithms, ACM Transactions on Speech and Language Processing , 10:4, (1-63), Online publication date: 1-Dec-2013.
  189. Hong-Yuan W, Xiu-Jie D, Qi-Cai C and Fu-Hua C An Improved ISOMAP for Visualization and Classification of Multiple Manifolds Proceedings, Part II, of the 20th International Conference on Neural Information Processing - Volume 8227, (1-12)
  190. Lin C, Yeh Y, Hung Y and Chang R (2013). Data mining for providing a personalized learning path in creativity, Computers & Education, 68:C, (199-210), Online publication date: 1-Oct-2013.
  191. Romero C, López M, Luna J and Ventura S (2013). Predicting students' final performance from participation in on-line discussion forums, Computers & Education, 68:C, (458-472), Online publication date: 1-Oct-2013.
  192. ACM
    Narang P, Reddy J and Hota C Feature selection for detection of peer-to-peer botnet traffic Proceedings of the 6th ACM India Computing Convention, (1-9)
  193. Soua B, Borgi A and Tagina M (2013). An ensemble method for fuzzy rule-based classification systems, Knowledge and Information Systems, 36:2, (385-410), Online publication date: 1-Aug-2013.
  194. Vallati M (2013). Efficient planning through automatic configuration and machine learning, AI Communications, 26:3, (319-321), Online publication date: 1-Jul-2013.
  195. El Hindi K (2013). Specific-class distance measures for nominal attributes, AI Communications, 26:3, (261-279), Online publication date: 1-Jul-2013.
  196. Shar L, Tan H and Briand L Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis Proceedings of the 2013 International Conference on Software Engineering, (642-651)
  197. ACM
    Vizer L Different strokes for different folks CHI '13 Extended Abstracts on Human Factors in Computing Systems, (2773-2778)
  198. ACM
    Costa H, Benevenuto F and Merschmann L Detecting tip spam in location-based social networks Proceedings of the 28th Annual ACM Symposium on Applied Computing, (724-729)
  199. Pancerz K, Lewicki A, Tadeusiewicz R and Warchoł J (2013). Ant-Based Clustering in Delta Episode Information Systems Based on Temporal Rough Set Flow Graphs, Fundamenta Informaticae, 128:1-2, (143-158), Online publication date: 1-Jan-2013.
  200. Kouno A, Takayama D and Suzuki E Predicting the State of a Person by an Office-Use Autonomous Mobile Robot Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02, (80-84)
  201. ACM
    Dhifli W, Saidi R and Nguifo E A novel approach for mining representative spatial motifs of proteins Proceedings of the ACM Conference on Bioinformatics, Computational Biology and Biomedicine, (506-508)
  202. ACM
    Fülöp L, Beszédes Á, Tóth G, Demeter H, Vidács L and Farkas L Predictive complex event processing Proceedings of the Fifth Balkan Conference in Informatics, (26-31)
  203. Ishaya T and Folarin M (2012). A service oriented approach to Business Intelligence in Telecoms industry, Telematics and Informatics, 29:3, (273-285), Online publication date: 1-Aug-2012.
  204. ACM
    Schuchhardt M, Scholbrock B, Pamuksuz U, Memik G, Dinda P and Dick R Understanding the impact of laptop power saving options on user satisfaction using physiological sensors Proceedings of the 2012 ACM/IEEE international symposium on Low power electronics and design, (291-296)
  205. ACM
    Aisopos F, Papadakis G, Tserpes K and Varvarigou T Content vs. context for sentiment analysis Proceedings of the 23rd ACM conference on Hypertext and social media, (187-196)
  206. ACM
    Giannakopoulos G, Mavridi P, Paliouras G, Papadakis G and Tserpes K Representation models for text classification Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics, (1-12)
  207. Shar L and Tan H Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities Proceedings of the 34th International Conference on Software Engineering, (1293-1296)
  208. Peters F and Menzies T Privacy and utility for defect prediction: experiments with MORPH Proceedings of the 34th International Conference on Software Engineering, (189-199)
  209. Grechanik M, Fu C and Xie Q Automatically finding performance problems with feedback-directed learning software testing Proceedings of the 34th International Conference on Software Engineering, (156-166)
  210. Hsieh N, Hung L, Shih C, Keh H and Chan C (2012). Intelligent Postoperative Morbidity Prediction of Heart Disease Using Artificial Intelligence Techniques, Journal of Medical Systems, 36:3, (1809-1820), Online publication date: 1-Jun-2012.
  211. Du X, Dua S, Acharya R and Chua C (2012). Classification of Epilepsy Using High-Order Spectra Features and Principle Component Analysis, Journal of Medical Systems, 36:3, (1731-1743), Online publication date: 1-Jun-2012.
  212. Mihăilă C and Batista-Navarro R What's in a name? Proceedings of the Student Research Workshop at the 13th Conference of the European Chapter of the Association for Computational Linguistics, (38-45)
  213. Powers D The problem with kappa Proceedings of the 13th Conference of the European Chapter of the Association for Computational Linguistics, (345-355)
  214. Jagannathan G, Pillaipakkamnatt K and Wright R (2012). A Practical Differentially Private Random Decision Tree Classifier, Transactions on Data Privacy, 5:1, (273-295), Online publication date: 1-Apr-2012.
  215. Pathical S and Serpen G (2012). Hybrid random subsample classifier ensemble for high dimensional data sets, International Journal of Hybrid Intelligent Systems, 9:2, (91-103), Online publication date: 1-Apr-2012.
  216. Adomavicius G, Curley S, Gupta A and Sanyal P (2012). Effect of Information Feedback on Bidder Behavior in Continuous Combinatorial Auctions, Management Science, 58:4, (811-830), Online publication date: 1-Apr-2012.
  217. Samorani M and Laguna M (2012). Data-Mining-Driven Neighborhood Search, INFORMS Journal on Computing, 24:2, (210-227), Online publication date: 1-Apr-2012.
  218. ACM
    Durand J and Atkison T Applying random projection to the classification of malicious applications using data mining algorithms Proceedings of the 50th Annual Southeast Regional Conference, (286-291)
  219. Agrawal A, Misra S, Narayanan R, Polepeddi L and Choudhary A (2012). Lung cancer survival prediction using ensemble data mining on SEER data, Scientific Programming, 20:1, (29-42), Online publication date: 1-Jan-2012.
  220. Kandula S, Zeng-Treitler Q, Chen L, Salomon W and Bray B (2011). A bootstrapping algorithm to improve cohort identification using structured data, Journal of Biomedical Informatics, 44:S1, (S63-S68), Online publication date: 1-Dec-2011.
  221. Li X and Sarkar S (2011). Protecting Privacy Against Record Linkage Disclosure, Information Systems Research, 22:4, (774-789), Online publication date: 1-Dec-2011.
  222. ACM
    Huang X, Zhao T, Cao Y, Mu X and Tirilly P Towards the improvement of textual anatomy image classification using image local features Proceedings of the 2011 international ACM workshop on Medical multimedia analysis and retrieval, (25-30)
  223. ACM
    Martinez D and Li Y Information extraction from pathology reports in a hospital setting Proceedings of the 20th ACM international conference on Information and knowledge management, (1877-1882)
  224. Montaòés E, Quevedo J and Prieto M (2011). A greedy algorithm for dimensionality reduction in polynomial regression to forecast the performance of a power plant condenser, Intelligent Data Analysis, 15:5, (733-748), Online publication date: 1-Sep-2011.
  225. Hülsmann M, Borscheid D, Friedrich C and Reith D General sales forecast models for automobile markets based on time series analysis and data mining techniques Proceedings of the 11th international conference on Advances in data mining: applications and theoretical aspects, (255-269)
  226. Kouno A, Montanier J, Takano S, Bredeche N, Schoenauer M, Sebag M and Suzuki E On-Board Evolutionary Algorithm and Off-Line Rule Discovery for Column Formation in Swarm Robotics Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02, (220-227)
  227. Desmarais M Performance comparison of item-to-item skills models with the IRT single latent trait model Proceedings of the 19th international conference on User modeling, adaption, and personalization, (75-86)
  228. Xiong W and Litman D Understanding differences in perceived peer-review helpfulness using natural language processing Proceedings of the 6th Workshop on Innovative Use of NLP for Building Educational Applications, (10-19)
  229. Akkaya C, Wiebe J, Conrad A and Mihalcea R Improving the impact of subjectivity word sense disambiguation on contextual opinion analysis Proceedings of the Fifteenth Conference on Computational Natural Language Learning, (87-96)
  230. ACM
    Wang P, Wang H and Wang W Finding semantics in time series Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (385-396)
  231. Ouyang J, Patel N and Sethi I (2011). From centralized to distributed decision tree induction using CHAID and fisher's linear discriminant function algorithms, Intelligent Decision Technologies, 5:2, (133-149), Online publication date: 1-Jun-2011.
  232. Belacel N and Al-Obeidat F A learning method for developing PROAFTN classifiers and a comparative study with decision trees Proceedings of the 24th Canadian conference on Advances in artificial intelligence, (56-61)
  233. ACM
    Murtaza S, Madhavji N, Gittens M and Li Z Diagnosing new faults using mutants and prior faults (NIER track) Proceedings of the 33rd International Conference on Software Engineering, (960-963)
  234. ACM
    Epp C, Lippold M and Mandryk R Identifying emotional states using keystroke dynamics Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (715-724)
  235. ACM
    Hirshfield L, Gulotta R, Hirshfield S, Hincks S, Russell M, Ward R, Williams T and Jacob R This is your brain on interfaces Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (373-382)
  236. Taylor M, Suay H and Chernova S Integrating reinforcement learning with human demonstrations of varying ability The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (617-624)
  237. Sug H Using quick decision tree algorithm to find better RBF networks Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I, (207-217)
  238. Jiang Y, Li M and Zhou Z (2011). Software defect detection with rocus, Journal of Computer Science and Technology, 26:2, (328-342), Online publication date: 1-Mar-2011.
  239. ACM
    Fanizzi N, d'Amato C and Esposito F (2011). Composite ontology matching with uncertain mappings recovery, ACM SIGAPP Applied Computing Review, 11:2, (17-29), Online publication date: 1-Mar-2011.
  240. Ye J and Dobson S (2010). Exploring semantics in activity recognition using context lattices, Journal of Ambient Intelligence and Smart Environments, 2:4, (389-407), Online publication date: 1-Dec-2010.
  241. Krzywicki A and Wobcke W Exploiting concept clumping for efficient incremental e-mail categorization Proceedings of the 6th international conference on Advanced data mining and applications - Volume Part II, (244-258)
  242. Luna J, Revoredo K and Cozman F Semantic query extension through probabilistic description logics Proceedings of the 6th International Conference on Uncertainty Reasoning for the Semantic Web - Volume 654, (49-60)
  243. Murtaza S, Gittens M, Li Z and Madhavji N F007 Proceedings of the 2010 Conference of the Center for Advanced Studies on Collaborative Research, (57-71)
  244. ACM
    Martinez D and Baldwin T Word sense disambiguation for event trigger word detection Proceedings of the ACM fourth international workshop on Data and text mining in biomedical informatics, (41-48)
  245. ACM
    Santos R, Macdonald C and Ounis I Selectively diversifying web search results Proceedings of the 19th ACM international conference on Information and knowledge management, (1179-1188)
  246. ACM
    Shang L, Yang L, Wang F, Chan K and Hua X Real-time large scale near-duplicate web video retrieval Proceedings of the 18th ACM international conference on Multimedia, (531-540)
  247. Kim S, Cavedon L and Baldwin T Classifying dialogue acts in one-on-one live chats Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing, (862-871)
  248. Liotta A, Menkovski V, Exarchakos G and Sánchez A (2010). Quality of Experience Models for Multimedia Streaming, International Journal of Mobile Computing and Multimedia Communications, 2:4, (1-20), Online publication date: 1-Oct-2010.
  249. ACM
    Kleisouris K, Firner B, Howard R, Zhang Y and Martin R Detecting intra-room mobility with signal strength descriptors Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, (71-80)
  250. ACM
    Zhang H, Nelson A and Menzies T On the value of learning from defect dense components for software defect prediction Proceedings of the 6th International Conference on Predictive Models in Software Engineering, (1-9)
  251. ACM
    Gay G A baseline method for search-based software engineering Proceedings of the 6th International Conference on Predictive Models in Software Engineering, (1-11)
  252. Martin B, Filipovic M, Rennie L and Shaw D Using machine learning to prescribe warfarin Proceedings of the 14th international conference on Artificial intelligence: methodology, systems, and applications, (151-160)
  253. ACM
    Frommholz I, Larsen B, Piwowarski B, Lalmas M, Ingwersen P and van Rijsbergen K Supporting polyrepresentation in a quantum-inspired geometrical retrieval framework Proceedings of the third symposium on Information interaction in context, (115-124)
  254. ACM
    Lu Z, Wu X, Zhu X and Bongard J Ensemble pruning via individual contribution ordering Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (871-880)
  255. Pulina L and Tacchella A An abstraction-refinement approach to verification of artificial neural networks Proceedings of the 22nd international conference on Computer Aided Verification, (243-257)
  256. ACM
    Tóth G, Fülöp L, Vidács L, Beszédes Á, Demeter H and Farkas L Complex event processing synergies with predictive analytics Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, (95-96)
  257. Zurada J and Kunene N Performance assessment of data mining methods for loan granting decisions Proceedings of the 10th international conference on Artificial intelligence and soft computing: Part I, (495-502)
  258. Chang S, Plimmer B and Blagojevic R Rata.SSR Proceedings of the Seventh Sketch-Based Interfaces and Modeling Symposium, (95-102)
  259. ACM
    Barbosa L and Freire J Using latent-structure to detect objects on the web Procceedings of the 13th International Workshop on the Web and Databases, (1-6)
  260. Pant G and Srinivasan P (2010). Predicting Web Page Status, Information Systems Research, 21:2, (345-364), Online publication date: 1-Jun-2010.
  261. Wzorek M, Kvarnström J and Doherty P Choosing path replanning strategies for unmanned aircraft systems Proceedings of the Twentieth International Conference on International Conference on Automated Planning and Scheduling, (193-200)
  262. Burnett C, Norman T and Sycara K Bootstrapping trust evaluations through stereotypes Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (241-248)
  263. ACM
    Lim S, Quercia D and Finkelstein A StakeNet Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1, (295-304)
  264. ACM
    Barros R, Basgalupp M, Ruiz D, de Carvalho A and Freitas A Evolutionary model tree induction Proceedings of the 2010 ACM Symposium on Applied Computing, (1131-1137)
  265. ACM
    Sramka M, Safavi-Naini R, Denzinger J and Askari M A practice-oriented framework for measuring privacy and utility in data sanitization systems Proceedings of the 2010 EDBT/ICDT Workshops, (1-10)
  266. ACM
    Zorrilla M, García D and Álvarez E A decision support system to improve e-learning environments Proceedings of the 2010 EDBT/ICDT Workshops, (1-8)
  267. ACM
    Brdiczka O From documents to tasks Proceedings of the 15th international conference on Intelligent user interfaces, (285-288)
  268. ACM
    Brdiczka O, Su N and Begole J Temporal task footprinting Proceedings of the 15th international conference on Intelligent user interfaces, (281-284)
  269. ACM
    Hurst A, Hudson S and Mankoff J Automatically identifying targets users interact with during real world tasks Proceedings of the 15th international conference on Intelligent user interfaces, (11-20)
  270. ACM
    Chen L and Harper M Multimodal floor control shift detection Proceedings of the 2009 international conference on Multimodal interfaces, (15-22)
  271. Pawley N, Myers K, Galbraith J and Brumby S Capturing dynamics on multiple time scales Proceedings of the 43rd Asilomar conference on Signals, systems and computers, (1687-1691)
  272. Bessa Maia J and Holanda Filho R One-Against-All Methodology for Features Selection and Classification of Internet Applications Proceedings of the 9th IEEE International Workshop on IP Operations and Management, (27-38)
  273. Ye J and Dobson S Human-behaviour study with situation lattices Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics, (343-348)
  274. ACM
    Benevenuto F, Pereira A, Rodrigues T, Almeida V, Almeida J and Gonçalves M Evaluation of users access and navigation profiles on web video sharing environments Proceedings of the XV Brazilian Symposium on Multimedia and the Web, (1-8)
  275. Liesaputra V, Witten I and Bainbridge D Searching in a book Proceedings of the 13th European conference on Research and advanced technology for digital libraries, (442-446)
  276. Orăsan C, Dornescu L and Ponomareva N QALL-ME needs AIR Proceedings of the Workshop on Adaptation of Language Resources and Technology to New Domains, (50-57)
  277. Pulina L and Tacchella A Learning to integrate deduction and search in reasoning about quantified boolean formulas Proceedings of the 7th international conference on Frontiers of combining systems, (350-365)
  278. Ravitz G, Shyu M and Powell M Integration of hurricane wind analysis and multimedia semantic content analysis for public outreach Proceedings of the 10th IEEE international conference on Information Reuse & Integration, (342-347)
  279. Akkaya C, Wiebe J and Mihalcea R Subjectivity word sense disambiguation Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1, (190-199)
  280. Kim S and Kan M Re-examining automatic keyphrase extraction approaches in scientific articles Proceedings of the Workshop on Multiword Expressions: Identification, Interpretation, Disambiguation and Applications, (9-16)
  281. Merlo P and Van Der Plas L Abstraction and generalisation in semantic role labels Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP: Volume 1 - Volume 1, (288-296)
  282. Szewcyzk S, Dwan K, Minor B, Swedlove B and Cook D (2009). Annotating smart environment sensor data for activity learning, Technology and Health Care, 17:3, (161-169), Online publication date: 1-Aug-2009.
  283. ACM
    Chen Z, Kalashnikov D and Mehrotra S Exploiting context analysis for combining multiple entity resolution systems Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, (207-218)
  284. Tsunoo E, Tzanetakis G, Ono N and Sagayama S Audio genre classification using percussive pattern clustering combined with timbral features Proceedings of the 2009 IEEE international conference on Multimedia and Expo, (382-385)
  285. ACM
    Dudas C and Boström H Using uncertain chemical and thermal data to predict product quality in a casting process Proceedings of the 1st ACM SIGKDD Workshop on Knowledge Discovery from Uncertain Data, (57-61)
  286. ACM
    Bouayad-Agha N, Casamayor G, Ferraro G, Mille S, Vidal V and Wanner L Improving the comprehension of legal documentation Proceedings of the 12th International Conference on Artificial Intelligence and Law, (78-87)
  287. Móra G, Farkas R, Szarvas G and Molnár Z Exploring ways beyond the simple supervised learning approach for biological event extraction Proceedings of the Workshop on Current Trends in Biomedical Natural Language Processing: Shared Task, (137-140)
  288. ACM
    Rath A, Devaurs D and Lindstaedt S UICO Proceedings of the 1st Workshop on Context, Information and Ontologies, (1-10)
  289. ACM
    Li X (2009). A Bayesian Approach for Estimating and Replacing Missing Categorical Data, Journal of Data and Information Quality, 1:1, (1-11), Online publication date: 1-Jun-2009.
  290. Fanizzi N, D'Amato C and Esposito F ReduCE Proceedings of the 6th European Semantic Web Conference on The Semantic Web: Research and Applications, (323-337)
  291. Zhang J, Wu Z, Wang Z, Guo J and Huang Z Unconstrained gene expression programming Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (2043-2048)
  292. Sugimura K, Jeong S, Obayashi S and Kimura T Kriging-model-based multi-objective robust optimization and trade-off-rule mining using association rule with aspiration vector Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (522-529)
  293. ACM
    Jiang Y and Cukic B Misclassification cost-sensitive fault prediction models Proceedings of the 5th International Conference on Predictor Models in Software Engineering, (1-10)
  294. ACM
    Gay G, Menzies T, Cukic B and Turhan B How to build repeatable experiments Proceedings of the 5th International Conference on Predictor Models in Software Engineering, (1-9)
  295. ACM
    Menzies T, El-Rawas O, Hihn J and Boehm B Can we build software faster and better and cheaper? Proceedings of the 5th International Conference on Predictor Models in Software Engineering, (1-9)
  296. Sollenberger D and Singh M Koko Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (1423-1424)
  297. Perols J, Chari K and Agrawal M (2009). Information Market-Based Decision Fusion, Management Science, 55:5, (827-842), Online publication date: 1-May-2009.
  298. ACM
    Dai N, Davison B and Qi X Looking into the past to better classify web spam Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web, (1-8)
  299. Iliofotou M, Kim H, Faloutsos M, Mitzenmacher M, Pappu P and Varghese G Graph-based P2P traffic classification at the internet backbone Proceedings of the 28th IEEE international conference on Computer Communications Workshops, (37-42)
  300. ACM
    Hirshfield L, Solovey E, Girouard A, Kebinger J, Jacob R, Sassaroli A and Fantini S Brain measurement for usability testing and adaptive interfaces Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (2185-2194)
  301. ACM
    Bauer K, McCoy D, Greenstein B, Grunwald D and Sicker D Performing traffic analysis on a wireless identifier-free link layer The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations, (18-23)
  302. Goldstein-Stewart J, Winder R and Sabin R Person identification from text and speech genre samples Proceedings of the 12th Conference of the European Chapter of the Association for Computational Linguistics, (336-344)
  303. ACM
    Timotheou S and Loukas G Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios Proceedings of the 2009 ACM symposium on Applied Computing, (1171-1175)
  304. Pulina L and Tacchella A (2009). A self-adaptive multi-engine solver for quantified Boolean formulas, Constraints, 14:1, (80-116), Online publication date: 1-Mar-2009.
  305. Jagnjić e, Bogunović N, Pieta I and Jović F (2009). Time series classification based on qualitative space fragmentation, Advanced Engineering Informatics, 23:1, (116-129), Online publication date: 1-Jan-2009.
  306. Koul N, Caragea C, Honavar V, Bahirwani V and Caragea D Learning Classifiers from Large Databases Using Statistical Queries Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01, (923-926)
  307. Faraone M, Gorgoglione M, Lombardi S, Palmisano C, Panniello U and Tuzhilin A The Effect of Context on the Predictive Performance of Segmentation Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (63-66)
  308. Mandhani B and Soderland S Exploiting Hyponymy in Extracting Relations and Enhancing Ontologies Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (325-329)
  309. Banerjee S and Scholz M Leveraging Web 2.0 Sources for Web Content Classification Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01, (300-306)
  310. D'Amato C, Fanizzi N and Esposito F Analogical Reasoning in Description Logics Uncertainty Reasoning for the Semantic Web I, (330-347)
  311. ACM
    Forman G and Kirshenbaum E Extremely fast text feature extraction for classification and indexing Proceedings of the 17th ACM conference on Information and knowledge management, (1221-1230)
  312. ACM
    Webb S, Caverlee J and Pu C Predicting web spam with HTTP session information Proceedings of the 17th ACM conference on Information and knowledge management, (339-348)
  313. ACM
    Coons K, Robatmili B, Taylor M, Maher B, Burger D and McKinley K Feature selection and policy optimization for distributed instruction placement using reinforcement learning Proceedings of the 17th international conference on Parallel architectures and compilation techniques, (32-42)
  314. Kiritchenko S and Jiline M Keyword optimization in sponsored search via feature selection Proceedings of the 2008 International Conference on New Challenges for Feature Selection in Data Mining and Knowledge Discovery - Volume 4, (122-134)
  315. Yada K, Washio T, Ukai Y and Nagaoka H A Bank Run Model in Financial Crises Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II, (703-710)
  316. Ishii N, Yamada T and Bao Y Improved Accuracy by Relearning and Combining Distance Functions Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II, (926-933)
  317. Rehm M, Bee N and André E Wave like an Egyptian Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1, (13-22)
  318. ACM
    Blockeel H, Calders T, Fromont E, Goethals B, Prado A and Robardet C An inductive database prototype based on virtual mining views Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, (1061-1064)
  319. ACM
    Jiang Y, Cukic B and Menzies T Can data transformation help in the detection of fault-prone modules? Proceedings of the 2008 workshop on Defects in large software systems, (16-20)
  320. ACM
    Elgersma E and de Rijke M Personal vs non-personal blogs Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval, (723-724)
  321. ACM
    Bendersky M and Croft W Discovering key concepts in verbose queries Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval, (491-498)
  322. ACM
    Garcia B, Aler R, Ledezma A and Sanchis A Protein-protein functional association prediction using genetic programming Proceedings of the 10th annual conference on Genetic and evolutionary computation, (347-348)
  323. Şensoy M and Yolum P Active Concept Learning For Ontology Evolution Proceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence, (773-774)
  324. Partalas I, Tsoumakas G and Vlahavas I Focused Ensemble Selection Proceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence, (117-121)
  325. Hendrickx I, Daelemans W, Luyckx K, Morante R and Van Asch V CNTS Proceedings of the Fifth International Natural Language Generation Conference, (194-195)
  326. Blagojevic R, Plimmer B, Grundy J and Wang Y A data collection tool for sketched diagrams Proceedings of the Fifth Eurographics conference on Sketch-Based Interfaces and Modeling, (73-80)
  327. ACM
    Zhou D, Truran M, Brailsford T and Ashman H (2008). A Hybrid Technique for English-Chinese Cross Language Information Retrieval, ACM Transactions on Asian Language Information Processing, 7:2, (1-35), Online publication date: 1-Jun-2008.
  328. Sokolova M and Lapalme G Verbs speak loud Proceedings of the Canadian Society for computational studies of intelligence, 21st conference on Advances in artificial intelligence, (320-331)
  329. Taylor M, Kuhlmann G and Stone P Autonomous transfer for reinforcement learning Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 1, (283-290)
  330. ACM
    Menzies T, Turhan B, Bener A, Gay G, Cukic B and Jiang Y Implications of ceiling effects in defect predictors Proceedings of the 4th international workshop on Predictor models in software engineering, (47-54)
  331. ACM
    Jiang Y, Cuki B, Menzies T and Bartlow N Comparing design and code metrics for software quality prediction Proceedings of the 4th international workshop on Predictor models in software engineering, (11-18)
  332. ACM
    Ratzinger J, Sigmund T and Gall H On the relation of refactorings and software defect prediction Proceedings of the 2008 international working conference on Mining software repositories, (35-38)
  333. ACM
    Benevenuto F, Rodrigues T, Almeida V, Almeida J, Zhang C and Ross K Identifying video spammers in online social networks Proceedings of the 4th international workshop on Adversarial information retrieval on the web, (45-52)
  334. ACM
    Pandey S and Olston C Crawl ordering by search impact Proceedings of the 2008 International Conference on Web Search and Data Mining, (3-14)
  335. Jiang E Integrating background knowledge into RBF networks for text classification Proceedings of the 4th Asia information retrieval conference on Information retrieval technology, (61-70)
  336. Caulier Y and Bourennane S (2008). An image content description technique for the inspection of specular objects, EURASIP Journal on Advances in Signal Processing, 2008, (1-14), Online publication date: 1-Jan-2008.
  337. Cornforth D and Jelinek H (2008). Automated classification reveals morphological factors associated with dementia, Applied Soft Computing, 8:1, (182-190), Online publication date: 1-Jan-2008.
  338. Jiang E (2007). Detecting spam email by radial basis function networks, International Journal of Knowledge-based and Intelligent Engineering Systems, 11:6, (409-418), Online publication date: 30-Dec-2008.
  339. Bella A, Ferri C, Hernández-Orallo J and Ramírez-Quintana M Joint cutoff probabilistic estimation using simulation Proceedings of the 8th international conference on Intelligent data engineering and automated learning, (609-619)
  340. Celikel E, Kantarcioglu M, Thuraisingham B and Bertino E Managing risks in RBAC employed distributed environments Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II, (1548-1566)
  341. ACM
    Schuth A, Marx M and de Rijke M Extracting the discussion structure in comments on news-articles Proceedings of the 9th annual ACM international workshop on Web information and data management, (97-104)
  342. ACM
    Madhavan J and Whitehead E Predicting buggy changes inside an integrated development environment Proceedings of the 2007 OOPSLA workshop on eclipse technology eXchange, (36-40)
  343. ACM
    Singer J, Brown G, Watson I and Cavazos J Intelligent selection of application-specific garbage collectors Proceedings of the 6th international symposium on Memory management, (91-102)
  344. Pulina L and Tacchella A A multi-engine solver for quantified boolean formulas Proceedings of the 13th international conference on Principles and practice of constraint programming, (574-589)
  345. Freno A Selecting features by learning Markov blankets Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part I, (69-76)
  346. ACM
    Grechanik M, McKinley K and Perry D Recovering and using use-case-diagram-to-source-code traceability links Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, (95-104)
  347. ACM
    Jiang H, Moore A, Ge Z, Jin S and Wang J Lightweight application classification for network management Proceedings of the 2007 SIGCOMM workshop on Internet network management, (299-304)
  348. Lokaiczyk R, Faatz A, Beckhaus A and Goertz M Enhancing just-in-time e-learning through machine learning on desktop context sensors Proceedings of the 6th international and interdisciplinary conference on Modeling and using context, (330-341)
  349. ACM
    Bhagat S, Rozenbaum I and Cormode G Applying link-based classification to label blogs Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, (92-101)
  350. Loukeris N Comparative evaluation of multi layer perceptrons, to hybrid multi layer perceptrons, with multicriteria hierarchical discrimination and logistic regression in corporate financial analysis Proceedings of the 11th WSEAS International Conference on Computers, (681-688)
  351. ACM
    AbouGhazaleh N, Ferreira A, Rusu C, Xu R, Liberato F, Childers B, Mosse D and Melhem R (2007). Integrated CPU and l2 cache voltage scaling using machine learning, ACM SIGPLAN Notices, 42:7, (41-50), Online publication date: 13-Jul-2007.
  352. ACM
    Lane N, Lu H and Campbell A Ambient beacon localization Proceedings of the 4th workshop on Embedded networked sensors, (38-42)
  353. Hepple M, Setzer A and Gaizauskas R USFD Proceedings of the 4th International Workshop on Semantic Evaluations, (438-441)
  354. Kozareva Z, Vazquez S and Montoyo A UA-ZSA Proceedings of the 4th International Workshop on Semantic Evaluations, (338-341)
  355. ACM
    AbouGhazaleh N, Ferreira A, Rusu C, Xu R, Liberato F, Childers B, Mosse D and Melhem R Integrated CPU and l2 cache voltage scaling using machine learning Proceedings of the 2007 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems, (41-50)
  356. ACM
    Tindale A A hybrid method for extended percussive gesture Proceedings of the 7th international conference on New interfaces for musical expression, (392-393)
  357. Barakat N and Bradley A (2007). Rule Extraction from Support Vector Machines, IEEE Transactions on Knowledge and Data Engineering, 19:6, (729-741), Online publication date: 1-Jun-2007.
  358. Peters J Near sets Proceedings of the 2nd international conference on Rough sets and knowledge technology, (22-33)
  359. ACM
    Taylor M, Whiteson S and Stone P Transfer via inter-task mappings in policy search reinforcement learning Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, (1-8)
  360. ACM
    Gan Q and Suel T Improving web spam classifiers using link structure Proceedings of the 3rd international workshop on Adversarial information retrieval on the web, (17-20)
  361. Esmeir S and Markovitch S (2007). Anytime Learning of Decision Trees, The Journal of Machine Learning Research, 8, (891-933), Online publication date: 1-May-2007.
  362. Siermala M, Juhola M, Laurikkala J, Iltanen K, Kentala E and Pyykkö I (2007). Evaluation and classification of otoneurological data with new data analysis methods based on machine learning, Information Sciences: an International Journal, 177:9, (1963-1976), Online publication date: 1-May-2007.
  363. ACM
    Yingbo L, Jianmin W and Jiaguang S A machine learning approach to semi-automating workflow staff assignment Proceedings of the 2007 ACM symposium on Applied computing, (340-345)
  364. Fisseler J, Kern-Isberner G, Beierle C, Koch A and Müller C Algebraic knowledge discovery using haskell Proceedings of the 9th international conference on Practical Aspects of Declarative Languages, (80-93)
  365. Peters J (2007). Near Sets. Special Theory about Nearness of Objects, Fundamenta Informaticae, 75:1-4, (407-433), Online publication date: 1-Jan-2007.
  366. Menzies T, Greenwald J and Frank A (2007). Data Mining Static Code Attributes to Learn Defect Predictors, IEEE Transactions on Software Engineering, 33:1, (2-13), Online publication date: 1-Jan-2007.
  367. Baxter R Finding robust models using a stratified design Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence, (1064-1068)
  368. Sokolova M, Japkowicz N and Szpakowicz S Beyond accuracy, f-score and ROC Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence, (1015-1021)
  369. ACM
    Zhang Z and Varadarajan B Utility scoring of product reviews Proceedings of the 15th ACM international conference on Information and knowledge management, (51-57)
  370. Park S and Kim M Extracting moving / static objects of interest in video Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing, (722-729)
  371. Shah M, Sokolova M and Szpakowicz S (2006). Process-Specific Information for Learning Electronic Negotiation Outcomes, Fundamenta Informaticae, 74:2,3, (351-373), Online publication date: 1-Nov-2006.
  372. Menzies T, Chen Z, Hihn J and Lum K (2006). Selecting Best Practices for Effort Estimation, IEEE Transactions on Software Engineering, 32:11, (883-895), Online publication date: 1-Nov-2006.
  373. ACM
    Kazemzadeh A, Lee S and Narayanan S Using model trees for evaluating dialog error conditions based on acoustic information Proceedings of the 1st ACM international workshop on Human-centered multimedia, (109-114)
  374. Liu C Learning students' learning patterns with support vector machines Proceedings of the 16th international conference on Foundations of Intelligent Systems, (601-611)
  375. ACM
    Le F, Lee S, Wong T, Kim H and Newcomb D Minerals Proceedings of the 2006 SIGCOMM workshop on Mining network data, (293-298)
  376. ACM
    Jaroszewicz S Polynomial association rules with applications to logistic regression Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (586-591)
  377. ACM
    Chakrabarti D, Kumar R and Tomkins A Evolutionary clustering Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (554-560)
  378. Shah M, Sokolova M and Szpakowicz S (2006). Process-Specific Information for Learning Electronic Negotiation Outcomes, Fundamenta Informaticae, 74:2,3, (351-373), Online publication date: 1-Aug-2006.
  379. ACM
    Miles N, Freitas A and Serjeant S Estimating photometric redshifts with genetic algorithms Proceedings of the 8th annual conference on Genetic and evolutionary computation, (1593-1594)
  380. ACM
    desJardins M, Eaton E and Wagstaff K Learning user preferences for sets of objects Proceedings of the 23rd international conference on Machine learning, (273-280)
  381. Angryk R On interpretation of non-atomic values and induction of decision rules in fuzzy relational databases Proceedings of the 8th international conference on Artificial Intelligence and Soft Computing, (170-181)
  382. ACM
    Mohomed I, Cai J, Chavoshi S and de Lara E Context-aware interactive content adaptation Proceedings of the 4th international conference on Mobile systems, applications and services, (42-55)
  383. Sokolova M and Szpakowicz S Language patterns in the learning of strategies from negotiation texts Proceedings of the 19th international conference on Advances in Artificial Intelligence: Canadian Society for Computational Studies of Intelligence, (288-299)
  384. ACM
    Martin E and Xie T Understanding software application interfaces via string analysis Proceedings of the 28th international conference on Software engineering, (901-904)
  385. Papadimitriou S and Terzidis K Clustering with kernel-based self-organized maps trained with supervised bias Proceedings of the 5th WSEAS international conference on Signal processing, (127-134)
  386. ACM
    Knab P, Pinzger M and Bernstein A Predicting defect densities in source code files with decision tree learners Proceedings of the 2006 international workshop on Mining software repositories, (119-125)
  387. ACM
    Agogino A and Tumer K Efficient agent-based cluster ensembles Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (1079-1086)
  388. Solomatine D and Siek M (2006). 2006 Special issue, Neural Networks, 19:2, (215-224), Online publication date: 1-Mar-2006.
  389. Jung Y, Yoon A and Kwon H Disambiguation based on wordnet for transliteration of arabic numerals for korean TTS Proceedings of the 7th international conference on Computational Linguistics and Intelligent Text Processing, (366-377)
  390. Zhou X, Geller J, Perl Y and Halper M An application intersection marketing ontology Theoretical Computer Science, (143-163)
  391. Kreimer J (2005). Adaptive Detection of Design Flaws, Electronic Notes in Theoretical Computer Science (ENTCS), 141:4, (117-136), Online publication date: 1-Dec-2005.
  392. Birrer F (2005). Data Mining to Combat Terrorism and the Roots of Privacy Concerns, Ethics and Information Technology, 7:4, (211-220), Online publication date: 1-Dec-2005.
  393. Russell T, Malik A, Chase M and van Beek P Learning basic block scheduling heuristics from optimal data Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, (242-253)
  394. Struyf J and Džeroski S Constraint based induction of multi-objective regression trees Proceedings of the 4th international conference on Knowledge Discovery in Inductive Databases, (222-233)
  395. Lee I Data mining coupled conceptual spaces for intelligent agents in data-rich environments Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV, (42-48)
  396. Dufay G, Felty A and Matwin S Privacy-sensitive information flow with JML Proceedings of the 20th international conference on Automated Deduction, (116-130)
  397. Liang X Mathematical analysis of classifying convex clusters based on support functionals Proceedings of the First international conference on Advanced Data Mining and Applications, (761-768)
  398. Papadimitriou S, Mavroudi S and Likothanassis S Mutual information clustering for efficient mining of fuzzy association rules with application to gene expression data analysis Proceedings of the 9th WSEAS International Conference on Computers, (1-9)
  399. Papadimitriou S and Mavroudi S The fuzzy frequent pattern Tree Proceedings of the 9th WSEAS International Conference on Computers, (1-7)
  400. Boullé M A grouping method for categorical attributes having very large number of values Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition, (228-242)
  401. Geller , Zhou X, Prathipati K, Kanigiluppai S and Chen X (2005). Raising data for improved support in rule mining, Intelligent Data Analysis, 9:4, (397-415), Online publication date: 1-Jul-2005.
  402. Pulman S and Sukkarieh J Automatic short answer marking Proceedings of the second workshop on Building Educational Applications Using NLP, (9-16)
  403. ACM
    Moore A and Zuev D (2005). Internet traffic classification using bayesian analysis techniques, ACM SIGMETRICS Performance Evaluation Review, 33:1, (50-60), Online publication date: 6-Jun-2005.
  404. ACM
    Moore A and Zuev D Internet traffic classification using bayesian analysis techniques Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (50-60)
  405. Papaioannou D and Tassopoulos A (2005). Design and implementation of information systems for environmental managers, Neural, Parallel & Scientific Computations, 13:2, (179-198), Online publication date: 1-Jun-2005.
  406. ACM
    Li S, Wu T and Pottenger W (2005). Distributed higher order association rule mining using information extracted from textual data, ACM SIGKDD Explorations Newsletter, 7:1, (26-35), Online publication date: 1-Jun-2005.
  407. Sokolova M and Szpakowicz S Analysis and classification of strategies in electronic negotiations Proceedings of the 18th Canadian Society conference on Advances in Artificial Intelligence, (145-157)
  408. Hafner V and Kaplan F Learning to interpret pointing gestures Biomimetic Neural Learning for Intelligent Robots, (225-234)
  409. Day J and Deters R Selecting the best web service Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research, (293-307)
  410. Crespo A and Garcia-Molina H Semantic overlay networks for p2p systems Proceedings of the Third international conference on Agents and Peer-to-Peer Computing, (1-13)
  411. Lorenzi F and Ricci F Case-based recommender systems Proceedings of the 2003 international conference on Intelligent Techniques for Web Personalization, (89-113)
  412. Pierre-Yves O (2003). The production and recognition of emotions in speech, International Journal of Human-Computer Studies, 59:1-2, (157-183), Online publication date: 1-Jul-2003.
  413. ACM
    Liu C, Chang C and Ho J Classification and clustering for case-based criminal summary judgments Proceedings of the 9th international conference on Artificial intelligence and law, (252-261)
  414. Chen H (2003). Editorial, Decision Support Systems, 35:1, (1-5), Online publication date: 1-Apr-2003.
  415. Roberge L, Long S, Hassett P and Burnham D (2002). Technology and the changing practice of law, Artificial Intelligence and Law, 10:4, (261-282), Online publication date: 1-Dec-2002.
  416. Roschelle J and Pea R A walk on the WILD side Proceedings of the Conference on Computer Support for Collaborative Learning: Foundations for a CSCL Community, (51-60)
  417. Moreira-Matias L and Cerqueira V CJAMmer - traffic JAM Cause Prediction using Boosted Trees 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), (743-748)
  418. Popkov Y, Dubnov Y and Popkov A Randomized machine learning: Statement, solution, applications 2016 IEEE 8th International Conference on Intelligent Systems (IS), (27-39)
  419. Bauder R and Khoshgoftaar T A Novel Method for Fraudulent Medicare Claims Detection from Expected Payment Deviations (Application Paper) 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI), (11-19)
  420. Baik E, Pande A, Zheng Z and Mohapatra P VSync: Cloud based video streaming service for mobile devices IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, (1-9)
  421. Yang H, Li Y, Wu M and Cheng F A hybrid tool life prediction scheme in cloud architecture 2016 IEEE International Conference on Automation Science and Engineering (CASE), (1160-1165)
  422. Tran C, Zhang M and Andreae P Directly evolving classifiers for missing data using genetic programming 2016 IEEE Congress on Evolutionary Computation (CEC), (5278-5285)
  423. Ferreira C, de Medeiros D and Santana F FCFilter: Feature selection based on clustering and genetic algorithms 2016 IEEE Congress on Evolutionary Computation (CEC), (2106-2113)
Contributors
  • The University of Waikato
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations