Advanced Data Mining and Applications
Third International Conference, ADMA 2007 Harbin, China, August 6-8, 2007. Proceedings
Article
Vocabulary issues are central to XML-based e-commerce standards. The rapid increase in the number of XML standards has made the vocabulary issues a critical area of XML applications. This paper reports the res...
Article
Frequent-pattern mining has been studied extensively and has many useful applications. However, frequent-pattern mining often generates too many patterns to be truly efficient or effective. In many application...
Chapter and Conference Paper
In AI planning community, planning domains with derived predicates are very challenging to many planning system. Derived predicate is a new application of domain rules and domain knowledge acquisition. In this...
Chapter and Conference Paper
Explaining the causes of infeasibility of Boolean formulas has practical applications in various fields. We are generally interested in a minimum explanation of infeasibility that excludes irrelevant informati...
Article
Frequent itemset mining was initially proposed and has been studied extensively in the context of association rule mining. In recent years, several studies have also extended its application to transaction or ...
Chapter and Conference Paper
We propose a natural neighbor inspired O( \(n \sqrt{n}\) ) hybrid clustering algorithm that combines medoid-based partiti...
Chapter and Conference Paper
ROC (Receiver Operating Characteristic) has been used as a tool for the analysis and evaluation of two-class classifiers, even the training data embraces unbalanced class distribution and cost-sensitiveness. H...
Chapter and Conference Paper
Clustering text data streams is an important issue in data mining community and has a number of applications such as news group filtering, text crawling, document organization and topic detection and tracing e...
Chapter and Conference Paper
In trying to find the features and patterns within the stock time series, time series segmentation is often required as one of the fundamental components in stock data mining. In this paper, a new stock time s...
Chapter and Conference Paper
This paper presents an advanced face recognition system based on AdaBoost algorithm in the JPEG compressed domain. First, the dimensionality is reduced by truncating some of the block-based DCT coefficients an...
Chapter and Conference Paper
Welcome to the proceedings of the 1st International Workshop on Peer-to-Peer Networks (PPN 2007). The workshop was held in conjunction with the On The Move Federated Conference and Workshops (OTM2007), Novembe...
Chapter and Conference Paper
The spectral graph theories have been widely used in the domain of image clustering where editing distances between graphs are critical. This paper presents a method for spectral edit distance between the grap...
Chapter and Conference Paper
The base classifier, which is trained by AdaBoost ensemble learning algorithm, has a constant weight for all test instances. From the view of iterative process of AdaBoost, every base classifier has good class...
Chapter and Conference Paper
To reduce the semantic gap between low-level visual features and the richness of human semantics, this paper proposes new algorithms, by virtue of the combined camera motion descriptors with multi-threshold, t...
Book and Conference Proceedings
Third International Conference, ADMA 2007 Harbin, China, August 6-8, 2007. Proceedings
Article
Outlier detection is concerned with discovering exceptional behaviors of objects. Its theoretical principle and practical implementation lay a foundation for some important applications such as credit card fra...
Chapter and Conference Paper
Theory of Rough Sets provides good foundations for the attribute reduction processes in data mining. For numeric attributes, it is enriched with appropriately designed discretization methods. However, not much...
Chapter and Conference Paper
Privacy-preserving data publication for data mining is to protect sensitive information of individuals in published data while the distortion to the data is minimized. Recently, it is shown that (α,k)-anonymity i...
Chapter and Conference Paper
Most existing process mining algorithms have problems in dealing with invisible tasks. In this paper, a new process mining algorithm named α # is proposed, which extends the mining capacity of the...
Chapter and Conference Paper
In adaptive irregular out-of-core applications, communications and mass disk I/O operations occupy a large portion of the overall execution. This paper presents a program transformation scheme to enable overla...