![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
772 Result(s)
-
Chapter and Conference Paper
Planning with Domain Rules Based on State-Independent Activation Sets
In AI planning community, planning domains with derived predicates are very challenging to many planning system. Derived predicate is a new application of domain rules and domain knowledge acquisition. In this...
-
Chapter and Conference Paper
Training Classifiers for Unbalanced Distribution and Cost-Sensitive Domains with ROC Analysis
ROC (Receiver Operating Characteristic) has been used as a tool for the analysis and evaluation of two-class classifiers, even the training data embraces unbalanced class distribution and cost-sensitiveness. H...
-
Chapter and Conference Paper
Clustering Massive Text Data Streams by Semantic Smoothing Model
Clustering text data streams is an important issue in data mining community and has a number of applications such as news group filtering, text crawling, document organization and topic detection and tracing e...
-
Chapter and Conference Paper
Pattern Recognition in Stock Data Based on a New Segmentation Algorithm
In trying to find the features and patterns within the stock time series, time series segmentation is often required as one of the fundamental components in stock data mining. In this paper, a new stock time s...
-
Chapter and Conference Paper
PPN 2007 PC Co-chairs’ Message
Welcome to the proceedings of the 1st International Workshop on Peer-to-Peer Networks (PPN 2007). The workshop was held in conjunction with the On The Move Federated Conference and Workshops (OTM2007), Novembe...
-
Chapter and Conference Paper
An Improved AdaBoost Algorithm Based on Adaptive Weight Adjusting
The base classifier, which is trained by AdaBoost ensemble learning algorithm, has a constant weight for all test instances. From the view of iterative process of AdaBoost, every base classifier has good class...
-
Chapter and Conference Paper
Transforming the Adaptive Irregular Out-of-Core Applications for Hiding Communication and Disk I/O
In adaptive irregular out-of-core applications, communications and mass disk I/O operations occupy a large portion of the overall execution. This paper presents a program transformation scheme to enable overla...
-
Chapter and Conference Paper
Unsupervised Outlier Detection in Sensor Networks Using Aggregation Tree
In the applications of sensor networks, outlier detection has attracted more and more attention. The identification of outliers can be used to filter false data, find faulty nodes and discover interesting even...
-
Chapter and Conference Paper
Inferring Gene Regulatory Networks from Multiple Data Sources Via a Dynamic Bayesian Network with Structural EM
Using our dynamic Bayesian network with structural Expectation Maximization (SEM-DBN), we develop a new framework to model gene regulatory network from both gene expression data and transcriptional factor bind...
-
Chapter and Conference Paper
Clustering-Based K-Anonymisation Algorithms
K-anonymisation is an approach to protecting private information contained within a dataset. Many k-anonymisation methods have been proposed recently and one class of such methods are clustering-based. These m...
-
Chapter and Conference Paper
A Novel Text Classification Approach Based on Enhanced Association Rule
The current research on association rule based text classification neglected several key problems. First, weights of elements in profile vectors may have much impact on generating classification rules. Second,...
-
Chapter and Conference Paper
A Subjective and Objective Integrated Method for MAGDM Problems with Multiple Types of Exact Preference Formats
Group decision making with preference information on alternatives has become a very active research field over the last decade. Especially, the investigation on the group decision making problems based on diff...
-
Chapter and Conference Paper
An Efficient Dictionary Mechanism Based on Double-Byte
Dictionary is an efficient management of large sets of distinct strings in memory. It has significant influence on Natural Language Process, Information Retrieval and other areas. In this paper, we propose an ...
-
Chapter and Conference Paper
Distributed Knowledge Management Based on Ontological Engineering and Multi-Agent System Towards Semantic Interoperation
Currently, the available architectures for knowledge management are mainly centralized and focus on basic string processing in essence. They tend to ignore that knowledge is distributed and full of semantics i...
-
Chapter and Conference Paper
CACS: A Novel Classification Algorithm Based on Concept Similarity
This paper proposes a novel algorithm of classification based on the similarities among data attributes. This method assumes data attributes of dataset as basic vectors of m dimensions, and each tuple of datas...
-
Chapter and Conference Paper
Exploring Content and Linkage Structures for Searching Relevant Web Pages
This work addresses the problem of Web searching for pages relevant to a query URL. Based on an approach that uses a deep linkage analysis among vicinity pages, we investigate the Web page content structures a...
-
Chapter and Conference Paper
Finding Unsatisfiable Subformulas with Stochastic Method
Explaining the causes of infeasibility of Boolean formulas has many practical applications in various fields. A small unsatisfiable subformula provides a succinct explanation of infeasibility and is valuable f...
-
Chapter and Conference Paper
Independent Factor Reinforcement Learning for Portfolio Management
In this paper we propose to do portfolio management using reinforcement learning (RL) and independent factor model. Factors in independent factor model are mutually independent and exhibit better predictabilit...
-
Chapter and Conference Paper
Contention-Free Communication Scheduling for Group Communication in Data Parallelism
Group communication significantly influences the performance of data parallel applications. It is required often in two situations: one is array redistribution from phase to phase; the other is array remap**...
-
Chapter and Conference Paper
A Similarity Retrieval Method in Brain Image Sequence Database
Image mining is more than just an extension of data mining to image domain but an interdisciplinary endeavor. Very few people have systematically investigated this field. Similarity Retrieval in medical image ...