Skip to main content

previous disabled Page of 89
and
  1. No Access

    Article

    Vocabulary Use in XML Standards in the Financial Market Domain

    Vocabulary issues are central to XML-based e-commerce standards. The rapid increase in the number of XML standards has made the vocabulary issues a critical area of XML applications. This paper reports the res...

    Jian Qin, Mary D. Taffet in Knowledge and Information Systems (2004)

  2. No Access

    Article

    Mining Condensed Frequent-Pattern Bases

    Frequent-pattern mining has been studied extensively and has many useful applications. However, frequent-pattern mining often generates too many patterns to be truly efficient or effective. In many application...

    Jian Pei, Guozhu Dong, Wei Zou, Jiawei Han in Knowledge and Information Systems (2004)

  3. No Access

    Chapter and Conference Paper

    Planning with Domain Rules Based on State-Independent Activation Sets

    In AI planning community, planning domains with derived predicates are very challenging to many planning system. Derived predicate is a new application of domain rules and domain knowledge acquisition. In this...

    Zhi-hua Jiang, Yun-fei Jiang in Advances in Knowledge Acquisition and Management (2006)

  4. No Access

    Chapter and Conference Paper

    Extracting Minimum Unsatisfiable Cores with a Greedy Genetic Algorithm

    Explaining the causes of infeasibility of Boolean formulas has practical applications in various fields. We are generally interested in a minimum explanation of infeasibility that excludes irrelevant informati...

    Jianmin Zhang, Sikun Li, Shengyu Shen in AI 2006: Advances in Artificial Intelligence (2006)

  5. No Access

    Article

    On efficiently summarizing categorical databases

    Frequent itemset mining was initially proposed and has been studied extensively in the context of association rule mining. In recent years, several studies have also extended its application to transaction or ...

    Jianyong Wang, George Karypis in Knowledge and Information Systems (2006)

  6. No Access

    Chapter and Conference Paper

    Hybrid O( \(n \sqrt{n}\) ) Clustering for Sequential Web Usage Mining

    We propose a natural neighbor inspired O( \(n \sqrt{n}\) ) hybrid clustering algorithm that combines medoid-based partiti...

    Jianhua Yang, Ickjai Lee in AI 2006: Advances in Artificial Intelligence (2006)

  7. No Access

    Chapter and Conference Paper

    Training Classifiers for Unbalanced Distribution and Cost-Sensitive Domains with ROC Analysis

    ROC (Receiver Operating Characteristic) has been used as a tool for the analysis and evaluation of two-class classifiers, even the training data embraces unbalanced class distribution and cost-sensitiveness. H...

    **aolong Zhang, Chuan Jiang, Ming-jian Luo in Advances in Knowledge Acquisition and Mana… (2006)

  8. No Access

    Chapter and Conference Paper

    Clustering Massive Text Data Streams by Semantic Smoothing Model

    Clustering text data streams is an important issue in data mining community and has a number of applications such as news group filtering, text crawling, document organization and topic detection and tracing e...

    Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu in Advanced Data Mining and Applications (2007)

  9. No Access

    Chapter and Conference Paper

    Pattern Recognition in Stock Data Based on a New Segmentation Algorithm

    In trying to find the features and patterns within the stock time series, time series segmentation is often required as one of the fundamental components in stock data mining. In this paper, a new stock time s...

    Zhe Zhang, Jian Jiang, **aoyan Liu in Knowledge Science, Engineering and Managem… (2007)

  10. No Access

    Chapter and Conference Paper

    Recognition of JPEG Compressed Face Images Based on AdaBoost

    This paper presents an advanced face recognition system based on AdaBoost algorithm in the JPEG compressed domain. First, the dimensionality is reduced by truncating some of the block-based DCT coefficients an...

    Chunmei Qing, Jianming Jiang in Semantic Multimedia (2007)

  11. No Access

    Chapter and Conference Paper

    PPN 2007 PC Co-chairs’ Message

    Welcome to the proceedings of the 1st International Workshop on Peer-to-Peer Networks (PPN 2007). The workshop was held in conjunction with the On The Move Federated Conference and Workshops (OTM2007), Novembe...

    Farid Naüt-Abdesselam, Jiankun Hu in On the Move to Meaningful Internet Systems… (2007)

  12. No Access

    Chapter and Conference Paper

    Spectral Edit Distance Method for Image Clustering

    The spectral graph theories have been widely used in the domain of image clustering where editing distances between graphs are critical. This paper presents a method for spectral edit distance between the grap...

    Nian Wang, Jun Tang, Jiang Zhang, Yi-Zheng Fan in Advances in Data and Web Management (2007)

  13. No Access

    Chapter and Conference Paper

    An Improved AdaBoost Algorithm Based on Adaptive Weight Adjusting

    The base classifier, which is trained by AdaBoost ensemble learning algorithm, has a constant weight for all test instances. From the view of iterative process of AdaBoost, every base classifier has good class...

    Lili Cheng, Jianpei Zhang, **g Yang, Jun Ma in Advanced Data Mining and Applications (2007)

  14. No Access

    Chapter and Conference Paper

    Camera Motion Analysis Towards Semantic-Based Video Retrieval in Compressed Domain

    To reduce the semantic gap between low-level visual features and the richness of human semantics, this paper proposes new algorithms, by virtue of the combined camera motion descriptors with multi-threshold, t...

    Ying Weng, Jianmin Jiang in Semantic Multimedia (2007)

  15. No Access

    Book and Conference Proceedings

    Advanced Data Mining and Applications

    Third International Conference, ADMA 2007 Harbin, China, August 6-8, 2007. Proceedings

    Reda Alhajj, Hong Gao, Jianzhong Li in Lecture Notes in Computer Science (2007)

  16. No Access

    Article

    Capabilities of outlier detection schemes in large datasets, framework and methodologies

    Outlier detection is concerned with discovering exceptional behaviors of objects. Its theoretical principle and practical implementation lay a foundation for some important applications such as credit card fra...

    Jian Tang, Zhixiang Chen, Ada Waichee Fu in Knowledge and Information Systems (2007)

  17. No Access

    Chapter and Conference Paper

    Reduction Based Symbolic Value Partition

    Theory of Rough Sets provides good foundations for the attribute reduction processes in data mining. For numeric attributes, it is enriched with appropriately designed discretization methods. However, not much...

    Fan Min, Qihe Liu, Chunlan Fang in Advances in Hybrid Information Technology (2007)

  18. No Access

    Chapter and Conference Paper

    (α, k)-anonymity Based Privacy Preservation by Lossy Join

    Privacy-preserving data publication for data mining is to protect sensitive information of individuals in published data while the distortion to the data is minimized. Recently, it is shown that (α,k)-anonymity i...

    Raymond Chi-Wing Wong, Yubao Liu, Jian Yin in Advances in Data and Web Management (2007)

  19. No Access

    Chapter and Conference Paper

    Mining Invisible Tasks from Event Logs

    Most existing process mining algorithms have problems in dealing with invisible tasks. In this paper, a new process mining algorithm named α # is proposed, which extends the mining capacity of the...

    Lijie Wen, Jianmin Wang, Jiaguang Sun in Advances in Data and Web Management (2007)

  20. No Access

    Chapter and Conference Paper

    Transforming the Adaptive Irregular Out-of-Core Applications for Hiding Communication and Disk I/O

    In adaptive irregular out-of-core applications, communications and mass disk I/O operations occupy a large portion of the overall execution. This paper presents a program transformation scheme to enable overla...

    Changjun Hu, Guangli Yao, Jue Wang in On the Move to Meaningful Internet Systems… (2007)

previous disabled Page of 89