Skip to main content

previous disabled Page of 23
and
  1. No Access

    Article

    Mining Customer Value: From Association Rules to Direct Marketing

    Direct marketing is a modern business activity with an aim to maximize the profit generated from marketing to a selected group of customers. A key to direct marketing is to select a subset of customers so as t...

    Ke Wang Wong, Senqiang Zhou, Qiang Yang in Data Mining and Knowledge Discovery (2005)

  2. No Access

    Article

    A Mathematical Morphology Based Scale Space Method for the Mining of Linear Features in Geographic Data

    This paper presents a spatial data mining method MCAMMO and its extension L_MCAMMO designed for discovering linear and near linear features in spatial databases. L_MCAMMO can be divided into two basic steps: f...

    Min Wang, Yee Leung, Chenhu Zhou, Tao Pei in Data Mining and Knowledge Discovery (2006)

  3. No Access

    Book and Conference Proceedings

    Emerging Technologies in Knowledge Discovery and Data Mining

    PAKDD 2007 International Workshops Nan**g, China, May 22-25, 2007 Revised Selected Papers

    Takashi Washio, Zhi-Hua Zhou in Lecture Notes in Computer Science (2007)

  4. No Access

    Book and Conference Proceedings

    Advances in Knowledge Discovery and Data Mining

    11th Pacific-Asia Conference, PAKDD 2007, Nan**g, China, May 22-25, 2007. Proceedings

    Zhi-Hua Zhou, Hang Li, Qiang Yang in Lecture Notes in Computer Science (2007)

  5. No Access

    Chapter and Conference Paper

    CommonKADS Methodology for Develo** Power Grid Switching Orders Systems

    Modeling knowledge and expertise is necessary but difficult in formation of switching operation orders in power systems. Switching operations of electrical components are very frequent in normal changes of ope...

    Ming Zhou, Jianwen Ren, Jianxun Qi in Emerging Technologies in Knowledge Discove… (2007)

  6. No Access

    Chapter and Conference Paper

    A Code-Based Multi-match Packet Classification with TCAM

    Packet classification, especially multi-match packet classification has become a challenging problem in Network Intrusion Detection Systems(NIDSs). Because of the speed limitation of software based packet clas...

    Zhiwen Zhang, Mingtian Zhou in Advances in Web and Network Technologies, … (2007)

  7. No Access

    Chapter and Conference Paper

    Genetic Programming with 3σ Rule for Fault Detection

    In this paper a new method is presented to solve a series of fault detection problems using 3σ rule in Genetic Programming (GP). Fault detection can be seen as a problem of multi-class classification. GP methods ...

    Yongquan Zhou, Dongyong Chen in Advanced Intelligent Computing Theories an… (2007)

  8. No Access

    Chapter and Conference Paper

    A Novel Method for 2DPCA-ICA in Face Recognition

    In this paper, a novel method for independent component analysis (ICA) with 2-D Principle Component Analysis (2DPCA) in face recognition is presented, called 2DPCA-ICA. In this method, 2DPCA is used for dimens...

    Jun-ying Gan, Chun-zhi Li, Dang-pei Zhou in Advanced Intelligent Computing Theories an… (2007)

  9. No Access

    Chapter and Conference Paper

    Application of the Stress Waves to Extract Multi-fault Features of the Low-Speed Machinery Based on Blind Source Separation

    This paper proposed a non-linear signal processing method to separate the stress wave signals from different sources for extracting the multi-fault features without any a priori knowledge. Firstly, stress wave...

    Bo Zhou, Changzheng Chen, Yi Gou, Yu Zhang in Advanced Intelligent Computing Theories an… (2007)

  10. No Access

    Chapter and Conference Paper

    A Novel Support Vector Machine Ensemble Based on Subtractive Clustering Analysis

    This paper put forwards a novel support vector machine ensemble construction method based on subtractive clustering analysis. Firstly, the training samples are clustered into several clusters according to thei...

    Cuiru Wang, He** Yuan, Jun Liu, Tao Zhou in Advances in Knowledge Discovery and Data M… (2007)

  11. No Access

    Chapter and Conference Paper

    Progressive Subspace Skyline Clusters Mining on High Dimensional Data

    Skyline queries have caused much attention for it helps users make intelligent decisions over complex data. Unfortunately, too many or too few skyline objects are not desirable for users to choose. Practically...

    Rong Hu, Yansheng Lu, Lei Zou, Chong Zhou in Emerging Technologies in Knowledge Discove… (2007)

  12. No Access

    Chapter and Conference Paper

    Proposion and Analysis of a TCP Feature of P2P Traffic

    Over the last years, the wide use of the P2P application has lead to the rapid growth of network traffic. Thus, the accurate classification of P2P traffic becomes a challenging problem. This paper proposes som...

    Li-Juan Zhou, Zhi-Tang Li, Hao Tu in Advances in Knowledge Discovery and Data Mining (2007)

  13. No Access

    Chapter and Conference Paper

    A Hierarchical Clustering Algorithm Based on GiST

    The hierarchical clustering is an important method of clustering analysis. This kind of method can decompose the data into different levels, and the clustering result has a hierarchical coarseness to fine repr...

    Bing Zhou, He-xing Wang, Cui-rong Wang in Advanced Intelligent Computing Theories an… (2007)

  14. No Access

    Chapter and Conference Paper

    A Novel Relative Space Based Gene Feature Extraction and Cancer Recognition

    Recognizing patient samples with gene expression profiles is used to cancer diagnosis and therapy. In the high dimensional, huge redundant and noisy gene expression data the cancerogenic factor’s locality is s...

    **nguo Lu, Ya** Lin, Haijun Wang in Advances in Knowledge Discovery and Data M… (2007)

  15. No Access

    Chapter and Conference Paper

    A Hybrid Command Sequence Model for Anomaly Detection

    A new anomaly detection method based on models of user behavior at the command level is proposed as an intrusion detection technique. The hybrid command sequence (HCS) model is trained from historical session ...

    Zhou Jian, Haruhiko Shirai, Isamu Takahashi in Advances in Knowledge Discovery and Data M… (2007)

  16. No Access

    Chapter and Conference Paper

    An Effective Gene Selection Method Based on Relevance Analysis and Discernibility Matrix

    Selecting a small number of discriminative genes from thousands of genes in microarray data is very important for accurate classification of diseases or phenotypes. In this paper, we provide more elaborate and...

    Li-Juan Zhang, Zhou-Jun Li in Advances in Knowledge Discovery and Data Mining (2007)

  17. No Access

    Chapter and Conference Paper

    Evaluate Structure Similarity in XML Documents with Merge-Edit-Distance

    XML language is widely used as a standard for data representation and exchange among Web applications. In recent years, many efforts have been spent in querying, integrating and clustering XML documents. Measu...

    Chong Zhou, Yansheng Lu, Lei Zou, Rong Hu in Emerging Technologies in Knowledge Discove… (2007)

  18. No Access

    Chapter and Conference Paper

    Interpreting Metaphors in a New Semantic Theory of Concept

    We present a formalism of metaphor that is based on a newly developed semantic interpretation of concept in the line of Montague’s type theory, and exposit the role that metaphoric expressions play in linking ...

    Yi Mao, Beihai Zhou in New Frontiers in Artificial Intelligence (2007)

  19. Chapter and Conference Paper

    PANTO: A Portable Natural Language Interface to Ontologies

    Providing a natural language interface to ontologies will not only offer ordinary users the convenience of acquiring needed information from ontologies, but also expand the influence of ontologies and the sema...

    Chong Wang, Miao **ong, Qi Zhou, Yong Yu in The Semantic Web: Research and Applications (2007)

  20. No Access

    Chapter and Conference Paper

    A Framework for Modeling Positive Class Expansion with Single Snapshot

    In many real-world data mining tasks, the coverage of the target concept may change as the time changes. For example,the coverage of “learned knowledge” of a student today may be different from his/er “learned...

    Yang Yu, Zhi-Hua Zhou in Advances in Knowledge Discovery and Data Mining (2008)

previous disabled Page of 23