skip to main content
Skip header Section
Data mining: practical machine learning tools and techniques with Java implementationsJanuary 2000
Publisher:
  • Morgan Kaufmann Publishers Inc.
  • 340 Pine Street, Sixth Floor
  • San Francisco
  • CA
  • United States
ISBN:978-1-55860-552-7
Published:01 January 2000
Pages:
371
Skip Bibliometrics Section
Reflects downloads up to 01 Nov 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Pham Q, Kumar M, Di Nunno F, Elbeltagi A, Granata F, Islam A, Talukdar S, Nguyen X, Ahmed A and Anh D (2022). Groundwater level prediction using machine learning algorithms in a drought-prone area, Neural Computing and Applications, 34:13, (10751-10773), Online publication date: 1-Jul-2022.
  2. ACM
    Pogorelov K, Schroeder D, Filkuková P, Brenner S and Langguth J WICO Text Proceedings of the 2021 Workshop on Open Challenges in Online Social Networks, (21-25)
  3. Chondrodima E, Georgiou H, Pelekis N and Theodoridis Y Public Transport Arrival Time Prediction Based on GTFS Data Machine Learning, Optimization, and Data Science, (481-495)
  4. ACM
    Schlotterbeck D, Uribe P, Araya R, Jimenez A and Caballero D What Classroom Audio Tells About Teaching: A Cost-effective Approach for Detection of Teaching Practices Using Spectral Audio Features LAK21: 11th International Learning Analytics and Knowledge Conference, (132-140)
  5. Ciba M, Bestel R, Nick C, de Arruda G, Peron T, Henrique C, Costa L, Rodrigues F and Thielemann C (2020). Comparison of Different Spike Train Synchrony Measures Regarding Their Robustness to Erroneous Data From Bicuculline-Induced Epileptiform Activity, Neural Computation, 32:5, (887-911), Online publication date: 1-May-2020.
  6. Chou J, Pham T, Nguyen T, Pham A and Ngo N (2019). Shear strength prediction of reinforced concrete beams by baseline, ensemble, and hybrid machine learning models, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:5, (3393-3411), Online publication date: 1-Mar-2020.
  7. Weidner D, Atzmueller M and Seipel D Finding Maximal Non-redundant Association Rules in Tennis Data Declarative Programming and Knowledge Management, (59-78)
  8. Baturay M and Toker S (2019). Internet addiction among college students: Some causes and effects, Education and Information Technologies, 24:5, (2863-2885), Online publication date: 1-Sep-2019.
  9. ACM
    Otoom A, Al-jdaeh S and Hammad M Automated Classification of Software Bug Reports Proceedings of the 9th International Conference on Information Communication and Management, (17-21)
  10. Tripathi R, Jalal A and Agrawal S (2019). Abandoned or removed object detection from visual surveillance, Multimedia Tools and Applications, 78:6, (7585-7620), Online publication date: 1-Mar-2019.
  11. ACM
    Ndirangu D, Mwangi W and Nderu L An Ensemble Filter Feature Selection Method and Outlier Detection Method for Multiclass Classification Proceedings of the 2019 8th International Conference on Software and Computer Applications, (373-379)
  12. Murtza I, Khan A and Akhtar N (2019). Object detection using hybridization of static and dynamic feature spaces and its exploitation by ensemble classification, Neural Computing and Applications, 31:2, (347-361), Online publication date: 1-Feb-2019.
  13. Wright J and Leyton-Brown K (2019). Level-0 models for predicting human behavior in games, Journal of Artificial Intelligence Research, 64:1, (357-383), Online publication date: 1-Jan-2019.
  14. ACM
    Ndirangu D, Mwangi W and Nderu L Improving multiclass classification and outlier detection method through ensemble technique Proceedings of the 4th International Conference on Communication and Information Processing, (180-185)
  15. Yang C, Lou Q, Liu J, Yang Y and Cheng Q (2018). Particle filtering-based methods for time to failure estimation with a real-world prognostic application, Applied Intelligence, 48:8, (2516-2526), Online publication date: 1-Aug-2018.
  16. ACM
    Yildirim P Classification with incomplete data and ensemble learners for the prediction of cervical cancer risk Proceedings of the International Conference on Intelligent Science and Technology, (1-5)
  17. ACM
    Yang S and Tzerpos V A model for analysis and presentation of design pattern detection results Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (1500-1509)
  18. Viegas F, Rocha L, Gonalves M, Mouro F, S G, Salles T, Andrade G and Sandin I (2018). A Genetic Programming approach for feature selection in highly dimensional skewed data, Neurocomputing, 273:C, (554-569), Online publication date: 17-Jan-2018.
  19. Nath A and Subbiah K (2018). The role of pertinently diversified and balanced training as well as testing data sets in achieving the true performance of classifiers in predicting the antifreeze proteins, Neurocomputing, 272:C, (294-305), Online publication date: 10-Jan-2018.
  20. Klionskiy D, Kaplun D and Geppener V (2018). Empirical Mode Decomposition for Signal Preprocessing and Classification of Intrinsic Mode Functions, Pattern Recognition and Image Analysis, 28:1, (122-132), Online publication date: 1-Jan-2018.
  21. Nawrocki P and Sniezynski B (2018). Adaptive Service Management in Mobile Cloud Computing by Means of Supervised and Reinforcement Learning, Journal of Network and Systems Management, 26:1, (1-22), Online publication date: 1-Jan-2018.
  22. Maity M, Dhane D, Mungle T, Maiti A and Chakraborty C (2017). Web-Enabled Distributed Health-Care Framework for Automated Malaria Parasite Classification, Journal of Medical Systems, 41:12, (1-18), Online publication date: 1-Dec-2017.
  23. Verbeke W, Martens D and Baesens B (2017). RULEM, Applied Soft Computing, 60:C, (858-873), Online publication date: 1-Nov-2017.
  24. ACM
    Yao Y, Xiao Z, Wang B, Viswanath B, Zheng H and Zhao B Complexity vs. performance Proceedings of the 2017 Internet Measurement Conference, (384-397)
  25. Affonso C, Rossi A, Vieira F and de Carvalho A (2017). Deep learning for biological image classification, Expert Systems with Applications: An International Journal, 85:C, (114-122), Online publication date: 1-Nov-2017.
  26. Malatras A, Geneiatakis D and Vakalis I (2017). On the efficiency of user identification, International Journal of Information Security, 16:6, (653-671), Online publication date: 1-Nov-2017.
  27. Nawrocki P and Sniezynski B (2017). Autonomous Context-Based Service Optimization in Mobile Cloud Computing, Journal of Grid Computing, 15:3, (343-356), Online publication date: 1-Sep-2017.
  28. Olson C, Hunn D and Lyons H (2017). Efficient Monte Carlo clustering in subspaces, Knowledge and Information Systems, 52:3, (751-772), Online publication date: 1-Sep-2017.
  29. Abe H (2017). Extracting user behavior-related words and phrases using temporal patterns of sequential pattern evaluation indices, Vietnam Journal of Computer Science, 4:3, (147-160), Online publication date: 1-Aug-2017.
  30. Hu X and Kando N (2017). Task complexity and difficulty in music information retrieval, Journal of the Association for Information Science and Technology, 68:7, (1711-1723), Online publication date: 1-Jul-2017.
  31. Ofek N, Rokach L, Stern R and Shabtai A (2017). Fast-CBUS, Neurocomputing, 243:C, (88-102), Online publication date: 21-Jun-2017.
  32. Ni A and Li M Cost-effective build outcome prediction using cascaded classifiers Proceedings of the 14th International Conference on Mining Software Repositories, (455-458)
  33. Bagga P, Hans R and Sharma V (2017). A Biological Immune System (BIS) inspired Mobile Agent Platform (MAP) security architecture, Expert Systems with Applications: An International Journal, 72:C, (269-282), Online publication date: 15-Apr-2017.
  34. Negnevitsky M, Lim M and Hartnett J Analysis of E-mail Communication Activities for Detecting Patterns of Pathological Behaviour Proceedings of the 20th Conference of Open Innovations Association FRUCT, (322-327)
  35. Beheshti S, Benatallah B, Venugopal S, Ryu S, Motahari-Nezhad H and Wang W (2017). A systematic review and comparative analysis of cross-document coreference resolution methods and tools, Computing, 99:4, (313-349), Online publication date: 1-Apr-2017.
  36. Wang S and Wei J (2017). Feature selection based on measurement of ability to classify subproblems, Neurocomputing, 224:C, (155-165), Online publication date: 8-Feb-2017.
  37. Shaikh R, Adi K and Logrippo L (2017). A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets, International Journal of Information Security, 16:1, (91-113), Online publication date: 1-Feb-2017.
  38. Dalip D, Gonçalves M, Cristo M and Calado P (2017). A general multiview framework for assessing the quality of collaboratively created content on web 2.0, Journal of the Association for Information Science and Technology, 68:2, (286-308), Online publication date: 1-Feb-2017.
  39. ACM
    Manli H and Zhihai W Genetic Algorithm Based on Attribute Correlation for Multi-label Classification Proceedings of the 2017 International Conference on Machine Learning and Soft Computing, (88-92)
  40. Khalid A, Ghazanfar M, Azam M, Aldhafiri Y and Zahra S (2017). Scalable and practical One-Pass clustering algorithm for recommender system, Intelligent Data Analysis, 21:2, (279-310), Online publication date: 1-Jan-2017.
  41. Yang C, Letourneau S, Liu J, Cheng Q and Yang Y (2017). Machine learning-based methods for TTF estimation with application to APU prognostics, Applied Intelligence, 46:1, (227-239), Online publication date: 1-Jan-2017.
  42. Bačić B (2016). Predicting golf ball trajectories from swing plane, Expert Systems with Applications: An International Journal, 65:C, (423-438), Online publication date: 15-Dec-2016.
  43. Somu N, Raman M, Kirthivasan K and Sriram V (2016). Hypergraph Based Feature Selection Technique for Medical Diagnosis, Journal of Medical Systems, 40:11, (1-16), Online publication date: 1-Nov-2016.
  44. ACM
    Ferreira R, Ferreira R, Lins R, Oliveira H, Riss M and Simske S Appling Link Target Identification and Content Extraction to improve Web News Summarization Proceedings of the 2016 ACM Symposium on Document Engineering, (197-200)
  45. (2016). Assessing sentence similarity through lexical, syntactic and semantic analysis, Computer Speech and Language, 39:C, (1-28), Online publication date: 1-Sep-2016.
  46. ACM
    Fan B, Chen L, Chong Y and He Z (2016). Mining for spatio-temporal distribution rules of illegal dumping from large dataset, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 47:3, (41-53), Online publication date: 1-Aug-2016.
  47. Roy N, Pathak N and Misra A (2016). Fine-grained appliance usage and energy monitoring through mobile and power-line sensing, Pervasive and Mobile Computing, 30:C, (132-150), Online publication date: 1-Aug-2016.
  48. Hincks S, Afergan D and Jacob R Using fNIRS for Real-Time Cognitive Workload Assessment Proceedings, Part I, 10th International Conference on Foundations of Augmented Cognition: Neuroergonomics and Operational Neuroscience - Volume 9743, (198-208)
  49. Bosch N, D'Mello S, Baker R, Ocumpaugh J, Shute V, Ventura M, Wang L and Zhao W Detecting student emotions in computer-enabled classrooms Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (4125-4129)
  50. Wang L and Zhou Z Cost-saving effect of crowdsourcing learning Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (2111-2117)
  51. ACM
    Moreno V, Génova G, Alejandres M and Fraga A Automatic classification of web images as UML diagrams Proceedings of the 4th Spanish Conference on Information Retrieval, (1-8)
  52. Hodge V, O'Keefe S and Austin J (2016). Hadoop neural network for parallel and distributed feature selection, Neural Networks, 78:C, (24-35), Online publication date: 1-Jun-2016.
  53. Oussalah M, Escallier B and Daher D (2016). An automated system for grammatical analysis of Twitter messages. A learning task application, Knowledge-Based Systems, 101:C, (31-47), Online publication date: 1-Jun-2016.
  54. ACM
    Kater C and Jäschke R You shall not pass Proceedings of the 1st International Workshop on Online Safety, Trust and Fraud Prevention, (1-6)
  55. Shuai H, Shen C, Yang D, Lan Y, Lee W, Yu P and Chen M Mining Online Social Data for Detecting Social Network Mental Disorders Proceedings of the 25th International Conference on World Wide Web, (275-285)
  56. ACM
    Patel H and Parikh S Comparative analysis of different statistical and neural network based forecasting tools for prediction of stock data Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-6)
  57. Afify A (2016). A fuzzy rule induction algorithm for discovering classification rules, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 30:6, (3067-3085), Online publication date: 1-Jan-2016.
  58. Chen Z, Wu C, Zhang Y, Huang Z, Ran B, Zhong M and Lyu N (2015). Feature selection with redundancy-complementariness dispersion, Knowledge-Based Systems, 89:C, (203-217), Online publication date: 1-Nov-2015.
  59. Zhang Y, Yang C, Yang A, Xiong C, Zhou X and Zhang Z (2015). Feature selection for classification with class-separability strategy and data envelopment analysis, Neurocomputing, 166:C, (172-184), Online publication date: 20-Oct-2015.
  60. ACM
    Siebra C and Mello M The importance of replications in software engineering Proceedings of the 2015 Conference on research in adaptive and convergent systems, (376-381)
  61. ACM
    Filho R, Almeida J and Pappa G Twitter Population Sample Bias and its impact on predictive outcomes Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (1254-1261)
  62. Jiang F, Sui Y and Zhou L (2015). A relative decision entropy-based feature selection approach, Pattern Recognition, 48:7, (2151-2163), Online publication date: 1-Jul-2015.
  63. Liu K, Guo Y, Wang S, Wu L, Yue B and Hou B Semi-supervised Learning Based on Improved Co-training by Committee Revised Selected Papers, Part II, of the 5th International Conference on Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques - Volume 9243, (413-421)
  64. Abe H Analyzing User Behaviors Based on Temporal Patterns of Sequential Pattern Evaluation Indices on Twitter Revised Selected Papers of the PAKDD 2015 Workshops on Trends and Applications in Knowledge Discovery and Data Mining - Volume 9441, (177-188)
  65. Nikravesh A, Ajila S and Lung C Towards an autonomic auto-scaling prediction system for cloud resource provisioning Proceedings of the 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, (35-45)
  66. Silva-Ramírez E, Pino-Mejías R and López-Coello M (2015). Single imputation with multilayer perceptron and multiple imputation combining multilayer perceptron and k-nearest neighbours for monotone patterns, Applied Soft Computing, 29:C, (65-74), Online publication date: 1-Apr-2015.
  67. ACM
    Long D, Dillon N, Wang K, Carter J and Dewan P Interactive Control and Visualization of Difficulty Inferences from User-Interface Commands Companion Proceedings of the 20th International Conference on Intelligent User Interfaces, (25-28)
  68. ACM
    Feng Z, Xiong S, Cao D, Deng X, Wang X, Yang Y, Zhou X, Huang Y and Wu G HRS Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, (19-26)
  69. Gligoric N, Uzelac A, Krco S, Kovacevic I and Nikodijevic A (2015). Smart classroom system for detecting level of interest a lecture creates in a classroom, Journal of Ambient Intelligence and Smart Environments, 7:2, (271-284), Online publication date: 1-Mar-2015.
  70. Wang Y, Gao R, Chen Z, Wong W and Luo B (2014). WAS, Journal of Systems and Software, 98:C, (44-58), Online publication date: 1-Dec-2014.
  71. Hsu Y, Chen W, Chen S and Kao H (2014). Using hidden Markov models to predict DNA-binding proteins with sequence and structure information, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 18:12, (2365-2376), Online publication date: 1-Dec-2014.
  72. Stahl F and Bramer M (2014). Random Prism, Expert Systems: The Journal of Knowledge Engineering, 31:5, (411-420), Online publication date: 1-Nov-2014.
  73. ACM
    Basgalupp M, Barros R and Barabasz T A grammatical evolution based hyper-heuristic for the automatic design of split criteria Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (1311-1318)
  74. ACM
    Wright J and Leyton-Brown K Level-0 meta-models for predicting human behavior in games Proceedings of the fifteenth ACM conference on Economics and computation, (857-874)
  75. Ghazanfar M and Prügel-Bennett A (2014). Leveraging clustering approaches to solve the gray-sheep users problem in recommender systems, Expert Systems with Applications: An International Journal, 41:7, (3261-3275), Online publication date: 1-Jun-2014.
  76. Zhang X and Song Q (2014). Predicting the number of nearest neighbors for the k-NN classification algorithm, Intelligent Data Analysis, 18:3, (449-464), Online publication date: 1-May-2014.
  77. Yildirim S A Knowledge-Poor Approach to Turkish Text Categorization Proceedings of the 15th International Conference on Computational Linguistics and Intelligent Text Processing - Volume 8404, (428-440)
  78. ACM
    Costaguta R and de los Angeles Menini M An assistant agent for group formation in CSCL based on student learning styles Proceedings of the 7th Euro American Conference on Telematics and Information Systems, (1-4)
  79. Peña-Ayala A (2014). Review, Expert Systems with Applications: An International Journal, 41:4, (1432-1462), Online publication date: 1-Mar-2014.
  80. Verbraken T, Verbeke W and Baesens B (2014). Profit optimizing customer churn prediction with Bayesian network classifiers, Intelligent Data Analysis, 18:1, (3-24), Online publication date: 1-Jan-2014.
  81. Amasyali M, Demırhan A and Bal M (2014). Analysis of changes in market shares of commercial banks operating in turkey using computational intelligence algorithms, Advances in Artificial Intelligence, 2014, (1-1), Online publication date: 1-Jan-2014.
  82. Serrano E, Such J, Botía J and García-Fornes A (2014). Strategies for avoiding preference profiling in agent-based e-commerce environments, Applied Intelligence, 40:1, (127-142), Online publication date: 1-Jan-2014.
  83. Kheau C, Alfred R and Lau H eDARA Part II of the Proceedings of the 9th International Conference on Advanced Data Mining and Applications - Volume 8347, (71-82)
  84. Vaidya J, Shafiq B, Basu A and Hong Y Differentially Private Naive Bayes Classification Proceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 01, (571-576)
  85. ACM
    Vaidya J, Shafiq B, Lorenzi D and Badar N Incorporating Privacy into the Undergraduate Curriculum Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference, (1-7)
  86. ACM
    Chattopadhyay R, Wang Z, Fan W, Davidson I, Panchanathan S and Ye J (2013). Batch Mode Active Sampling Based on Marginal Probability Distribution Matching, ACM Transactions on Knowledge Discovery from Data, 7:3, (1-25), Online publication date: 1-Sep-2013.
  87. Wang Y, Di G, Yu J, Lei J and Coenen F Feature representation for customer attrition risk prediction in retail banking Proceedings of the 13th international conference on Advances in Data Mining: applications and theoretical aspects, (229-238)
  88. Lee J and Giraud-Carrier C (2013). Automatic selection of classification learning algorithms for data mining practitioners, Intelligent Data Analysis, 17:4, (665-678), Online publication date: 1-Jul-2013.
  89. ACM
    Beach T, Rana O and Avis N Integrating acceleration devices using CometCloud Proceedings of the first ACM workshop on Optimization techniques for resources management in clouds, (17-24)
  90. Chattopadhyay R, Fan W, Davidson I, Panchanathan S and Ye J Joint transfer and batch-mode active learning Proceedings of the 30th International Conference on International Conference on Machine Learning - Volume 28, (III-253-III-261)
  91. ACM
    Oliveira N, Cortez P and Areal N Some experiments on modeling stock market behavior using investor sentiment analysis and posting volume from Twitter Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics, (1-8)
  92. Chen N, Chen A and Ribeiro B (2013). Influence of class distribution on cost-sensitive learning, Intelligent Data Analysis, 17:3, (423-437), Online publication date: 1-May-2013.
  93. Comito C and Talia D Energy Characterization of Data Mining Algorithms on Mobile Devices Revised Selected Papers of the COST IC0804 European Conference on Energy Efficiency in Large Scale Distributed Systems - Volume 8046, (98-113)
  94. Tsumoto S and Abe H Mining Clinical Process in Order Histories Using Sequential Pattern Mining Approach Revised Selected Papers of PAKDD 2013 International Workshops on Trends and Applications in Knowledge Discovery and Data Mining - Volume 7867, (234-246)
  95. Ciesielski V, Barile P and Trist K Finding image features associated with high aesthetic value by machine learning Proceedings of the Second international conference on Evolutionary and Biologically Inspired Music, Sound, Art and Design, (47-58)
  96. Mac ParthaláIn N and Jensen R (2013). Unsupervised fuzzy-rough set-based dimensionality reduction, Information Sciences: an International Journal, 229, (106-121), Online publication date: 1-Apr-2013.
  97. ACM
    Bixler R and D'Mello S Detecting boredom and engagement during writing with keystroke analysis, task appraisals, and stable traits Proceedings of the 2013 international conference on Intelligent user interfaces, (225-234)
  98. ACM
    Basgalupp M, Barros R, da Silva T and de Carvalho A Software effort prediction Proceedings of the 28th Annual ACM Symposium on Applied Computing, (1109-1116)
  99. Fernandes J, Lozano J, Inza I, Irigoien X, Pérez A and Rodríguez J (2013). Supervised pre-processing approaches in multiple class variables classification for fish recruitment forecasting, Environmental Modelling & Software, 40:C, (245-254), Online publication date: 1-Feb-2013.
  100. Marin-Castro H, Sosa-Sosa V, Martinez-Trinidad J and Lopez-Arevalo I (2013). Automatic discovery of Web Query Interfaces using machine learning techniques, Journal of Intelligent Information Systems, 40:1, (85-108), Online publication date: 1-Feb-2013.
  101. Zhang S, Zhang R, Liu X and Sun H A Personalized Trust-Aware Model for Travelogue Discovering Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03, (112-116)
  102. Dell'Arciprete L, Murphy B and Zanzotto F Parallels between machine and brain decoding Proceedings of the 2012 international conference on Brain Informatics, (162-174)
  103. Mc Leod P and Verma B A multilayered ensemble architecture for the classification of masses in digital mammograms Proceedings of the 25th Australasian joint conference on Advances in Artificial Intelligence, (85-94)
  104. Alfred R, Amran I, Beng L and Fun T Unsupervised learning of mutagenesis molecules structure based on an evolutionary-based features selection in DARA Proceedings of the 25th Australasian joint conference on Advances in Artificial Intelligence, (291-299)
  105. Stella F and Amer Y (2012). Continuous time Bayesian network classifiers, Journal of Biomedical Informatics, 45:6, (1108-1119), Online publication date: 1-Dec-2012.
  106. ACM
    Meneely A and Williams O (2012). Interactive churn metrics, ACM SIGSOFT Software Engineering Notes, 37:6, (1-6), Online publication date: 27-Nov-2012.
  107. Armengol E and García-Cerdaña À Refining discretizations of continuous-valued attributes Proceedings of the 9th international conference on Modeling Decisions for Artificial Intelligence, (258-269)
  108. Yan X, Liang B, Ban T, Guo S and Wang L TrafficS Proceedings of the 19th international conference on Neural Information Processing - Volume Part IV, (100-107)
  109. Chinta P and Murty M Discriminative feature analysis and selection for document classification Proceedings of the 19th international conference on Neural Information Processing - Volume Part I, (366-374)
  110. Benkhider S, Dahmri O and Drias H A memetic approach for the knowledge extraction Proceedings of the 19th international conference on Neural Information Processing - Volume Part I, (135-141)
  111. Kang Y, Li Y and Krishnaswamy S Predicting reasoning performance using ontology metrics Proceedings of the 11th international conference on The Semantic Web - Volume Part I, (198-214)
  112. Zaffalon M, Corani G and Mauá D (2012). Evaluating credal classifiers by utility-discounted predictive accuracy, International Journal of Approximate Reasoning, 53:8, (1282-1301), Online publication date: 1-Nov-2012.
  113. ACM
    Kacimi M and Gamper J MOUNA Proceedings of the 21st ACM international conference on Information and knowledge management, (2722-2724)
  114. Zhao C, Zhang X and Guo Q The Application of Machine-Learning on Lower Limb Motion Analysis in Human Exoskeleton System Social Robotics, (600-611)
  115. Cesario E and Talia D (2012). Distributed data mining patterns and services: an architecture and experiments, Concurrency and Computation: Practice & Experience, 24:15, (1751-1774), Online publication date: 1-Oct-2012.
  116. Czúni L, Szöke T and Gál M Recognition of Hand-Written Archive Text Documents Proceedings of the International Conference on Computer Vision and Graphics - Volume 7594, (337-344)
  117. Sergio A and Ludermir T PSO for reservoir computing optimization Proceedings of the 22nd international conference on Artificial Neural Networks and Machine Learning - Volume Part I, (685-692)
  118. Huang J, Sayyad-Shirabad J, Matwin S and Su J (2012). Improving multi-view semi-supervised learning with agreement-based sampling, Intelligent Data Analysis, 16:5, (745-761), Online publication date: 1-Sep-2012.
  119. ACM
    Paltoglou G and Thelwall M (2012). Twitter, MySpace, Digg, ACM Transactions on Intelligent Systems and Technology, 3:4, (1-19), Online publication date: 1-Sep-2012.
  120. Marozzo F, Talia D and Trunfio P Using clouds for scalable knowledge discovery applications Proceedings of the 18th international conference on Parallel processing workshops, (220-227)
  121. Marozzo F, Lordan F, Rafanell R, Lezzi D, Talia D and Badia R Enabling cloud interoperability with COMPSs Proceedings of the 18th international conference on Parallel Processing, (16-27)
  122. ACM
    He J, Hollink V and de Vries A Combining implicit and explicit topic representations for result diversification Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, (851-860)
  123. ACM
    Chattopadhyay R, Wang Z, Fan W, Davidson I, Panchanathan S and Ye J Batch mode active sampling based on marginal probability distribution matching Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (741-749)
  124. ACM
    Verma H, Toshniwal D and Peddoju S Distributed frequent itemset mining framework for incremental data using MPI-style WSRF services Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (74-81)
  125. Wixon M, Baker R, Gobert J, Ocumpaugh J and Bachmann M WTF? detecting students who are conducting inquiry without thinking fastidiously Proceedings of the 20th international conference on User Modeling, Adaptation, and Personalization, (286-296)
  126. Nastase V, Judea A, Markert K and Strube M Local and global context for supervised and unsupervised metonymy resolution Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, (183-193)
  127. Gambs S, Gmati A and Hurfin M Reconstruction attack through classifier analysis Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy, (274-281)
  128. Su Y, Zhang Y, Ji D, Wang Y and Wu H Ensemble learning for sentiment classification Proceedings of the 13th Chinese conference on Chinese Lexical Semantics, (84-93)
  129. Parvin H, Parvin S, Rezaei Z and Mohamadi M A heuristically perturbation of dataset to achieve a diverse ensemble of classifiers Proceedings of the 4th Mexican conference on Pattern Recognition, (197-206)
  130. Idris M, Mehrabian A, Hamou-Lhadj A and Khoury R Pattern-Based Trace Correlation Technique to Compare Software Versions Proceedings of the Third International Conference on Autonomous and Intelligent Systems - Volume 7326, (159-166)
  131. de Oliveira I, Grégio A and Cansian A A malware detection system inspired on the human immune system Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV, (286-301)
  132. Silberer C and Frank A Casting implicit role linking as an anaphora resolution task Proceedings of the First Joint Conference on Lexical and Computational Semantics - Volume 1: Proceedings of the main conference and the shared task, and Volume 2: Proceedings of the Sixth International Workshop on Semantic Evaluation, (1-10)
  133. Chen C and Tsai Y (2012). A novel business cycle surveillance system using the query logs of search engines, Knowledge-Based Systems, 30, (104-114), Online publication date: 1-Jun-2012.
  134. Lu J, Chen S, Wang W and Ran B (2012). Automatic traffic incident detection based on nFOIL, Expert Systems with Applications: An International Journal, 39:7, (6547-6556), Online publication date: 1-Jun-2012.
  135. Fu B, Wang Z, Pan R, Xu G and Dolog P Learning tree structure of label dependency for multi-label learning Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, (159-170)
  136. Ferone A and Petrosino A A Rough Fuzzy Perspective to Dimensionality Reduction Revised Selected Papers of the First International Workshop on Clustering High--Dimensional Data - Volume 7627, (134-147)
  137. Kalyanpur A, Patwardhan S, Boguraev B, Chu-Carroll J and Lally A Parallel and nested decomposition for factoid questions Proceedings of the 13th Conference of the European Chapter of the Association for Computational Linguistics, (851-860)
  138. Costa F and Branco A Aspectual type and temporal relation classification Proceedings of the 13th Conference of the European Chapter of the Association for Computational Linguistics, (266-275)
  139. Zhang Y and Zhang Z (2012). Feature subset selection with cumulate conditional mutual information minimization, Expert Systems with Applications: An International Journal, 39:5, (6078-6088), Online publication date: 1-Apr-2012.
  140. Lu J, Chen S, Wang W and van Zuylen H (2012). A hybrid model of partial least squares and neural network for traffic incident detection, Expert Systems with Applications: An International Journal, 39:5, (4775-4784), Online publication date: 1-Apr-2012.
  141. Ur-Rahman N and Harding J (2012). Textual data mining for industrial knowledge management and text classification, Expert Systems with Applications: An International Journal, 39:5, (4729-4739), Online publication date: 1-Apr-2012.
  142. Lee Y, Hu P, Cheng T and Hsieh Y (2012). A cost-sensitive technique for positive-example learning supporting content-based product recommendations in B-to-C e-commerce, Decision Support Systems, 53:1, (245-256), Online publication date: 1-Apr-2012.
  143. Luo S and Cheng B (2012). Diagnosing Breast Masses in Digital Mammography Using Feature Selection and Ensemble Methods, Journal of Medical Systems, 36:2, (569-577), Online publication date: 1-Apr-2012.
  144. Kramer O, Wilken O, Beenken P, Hein A, Hüwel A, Klingenberg T, Meinecke C, Raabe T and Sonnenschein M On ensemble classifiers for nonintrusive appliance load monitoring Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part I, (322-331)
  145. ACM
    Banthia D and Gupta A Investigating fault prediction capabilities of five prediction models for software quality Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1259-1261)
  146. ACM
    Basgalupp M, Barros R and Ruiz D Predicting software maintenance effort through evolutionary-based decision trees Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1209-1214)
  147. ACM
    Jin Y, Duffield N, Erman J, Haffner P, Sen S and Zhang Z (2012). A Modular Machine Learning System for Flow-Level Traffic Classification in Large Networks, ACM Transactions on Knowledge Discovery from Data, 6:1, (1-34), Online publication date: 1-Mar-2012.
  148. ACM
    Kumar P and Singh Y (2012). Assessment of software testing time using soft computing techniques, ACM SIGSOFT Software Engineering Notes, 37:1, (1-6), Online publication date: 27-Jan-2012.
  149. Fernandez Martinez R, Lostado Lorza R, Fernandez Ceniceros J and Martinez-de-Pison Ascacibar F (2012). Comparative analysis of learning and meta-learning algorithms for creating models for predicting the probable alcohol level during the ripening of grape berries, Computers and Electronics in Agriculture, 80, (54-62), Online publication date: 1-Jan-2012.
  150. Das A, Sil J and Phadikar S Attribute clustering and dimensionality reduction based on in/out degree of attributes in dependency graph Proceedings of the Second international conference on Swarm, Evolutionary, and Memetic Computing - Volume Part I, (372-380)
  151. Grover J, Laxmi V and Gaur M Misbehavior detection based on ensemble learning in VANET Proceedings of the 2011 international conference on Advanced Computing, Networking and Security, (602-611)
  152. Salinas S, Garino C and Zunino A An architecture for resource behavior prediction to improve scheduling systems performance on enterprise desktop grids Proceedings of the Second international conference on Advances in New Technologies, Interactive Interfaces and Communicability, (186-196)
  153. Li F, Lei J, Tian Y, Punyapatthanakul S and Wang Y Model selection strategy for customer attrition risk prediction in retail banking Proceedings of the Ninth Australasian Data Mining Conference - Volume 121, (119-124)
  154. Alvarez S, Ruiz C, Kawato T and Kogel W (2011). Neural expert networks for faster combined collaborative and content-based recommendation, Journal of Computational Methods in Sciences and Engineering, 11:4, (161-172), Online publication date: 1-Dec-2011.
  155. Marin-Castro H, Sosa-Sosa V and Lopez-Arevalo I Automatic identification of web query interfaces Proceedings of the 10th international conference on Artificial Intelligence: advances in Soft Computing - Volume Part II, (297-306)
  156. Kiritchenko S and Matwin S Email classification with co-training Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research, (301-312)
  157. Guo H, Viktor H and Paquet E Privacy leakage in multi-relational learning via unwanted classification models Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research, (45-59)
  158. Escudero-Mancebo D, Aguilar L, Ferreras C, Pascual C and Cardeñoso-Payo V Cross-lingual English Spanish tonal accent labeling using decision trees and neural networks Proceedings of the 5th international conference on Advances in nonlinear speech processing, (63-70)
  159. Lee J and Giraud-Carrier C (2011). A metric for unsupervised metalearning, Intelligent Data Analysis, 15:6, (827-841), Online publication date: 1-Nov-2011.
  160. ACM
    Ma T, Ge J and Wang J Combining active learning and semi-supervised for improving learning performance Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, (1-5)
  161. ACM
    den Akker H, Moualed L, Jones V and Hermens H A self-learning personalized feedback agent for motivating physical activity Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, (1-5)
  162. ACM
    Aiello L, Donato D, Ozertem U and Menczer F Behavior-driven clustering of queries into topics Proceedings of the 20th ACM international conference on Information and knowledge management, (1373-1382)
  163. ACM
    Kacimi M and Gamper J Diversifying search results of controversial queries Proceedings of the 20th ACM international conference on Information and knowledge management, (93-98)
  164. Kang Y, Krishnaswamy S and Zaslavsky A A case retrieval approach using similarity and association knowledge Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I, (218-235)
  165. ACM
    Rahman M, Ali A, Plarre K, al'Absi M, Ertin E and Kumar S mConverse Proceedings of the 2nd Conference on Wireless Health, (1-10)
  166. Wang F, Verhelst W and Sahli H Relevance vector machine based speech emotion recognition Proceedings of the 4th international conference on Affective computing and intelligent interaction - Volume Part II, (111-120)
  167. Pérez-Espinosa H, Reyes-García C and Villaseñor-Pineda L Emowisconsin Proceedings of the 4th international conference on Affective computing and intelligent interaction - Volume Part II, (62-71)
  168. Healey J Recording affect in the field Proceedings of the 4th international conference on Affective computing and intelligent interaction - Volume Part I, (107-116)
  169. Shi H and Liu Y Naïve bayes vs. support vector machine Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II, (680-687)
  170. Śnieżyński B and Koźlak J Agent-based system with learning capabilities for transport problems Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part II, (100-109)
  171. ACM
    Aljarah I, Banitaan S, Abufardeh S, Jin W and Salem S Selecting discriminating terms for bug assignment Proceedings of the 7th International Conference on Predictive Models in Software Engineering, (1-7)
  172. ACM
    Minku L and Yao X A principled evaluation of ensembles of learning machines for software effort estimation Proceedings of the 7th International Conference on Predictive Models in Software Engineering, (1-10)
  173. Howald B and Katz E On the explicit and implicit spatiotemporal architecture of narratives of personal experience Proceedings of the 10th international conference on Spatial information theory, (434-454)
  174. Guzmán-Martínez R and Alaiz-Rodríguez R Feature selection stability assessment based on the Jensen-Shannon divergence Proceedings of the 2011 European conference on Machine learning and knowledge discovery in databases - Volume Part I, (597-612)
  175. Guzmán-Martínez R and Alaiz-Rodríguez R Feature selection stability assessment based on the Jensen-Shannon divergence Proceedings of the 2011th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I, (597-612)
  176. Escudero-Mancebo D, Pascual C, Ferreras C, Cardeñoso-Payo V and Aguilar L Analysis of inconsistencies in cross-lingual automatic ToBI tonal accent labeling Proceedings of the 14th international conference on Text, speech and dialogue, (41-48)
  177. Bisbal J, Engelbrecht G, Villa-Uriol M and Frangi A Prediction of cerebral aneurysm rupture using hemodynamic, morphologic and clinical features Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part II, (59-73)
  178. Abellán J, Cano A, Masegosa A and Moral S (2011). A memory efficient semi-Naive Bayes classifier with grouping of cases, Intelligent Data Analysis, 15:3, (299-318), Online publication date: 1-Aug-2011.
  179. ACM
    Du N, Li K, Mahajan S, Schwartz S, Nair B, Hsiao C and Zhang A Gene Co-Adaboost Proceedings of the 2nd ACM Conference on Bioinformatics, Computational Biology and Biomedicine, (531-535)
  180. ACM
    Anvik J and Murphy G (2011). Reducing the effort of bug report triage, ACM Transactions on Software Engineering and Methodology, 20:3, (1-35), Online publication date: 1-Aug-2011.
  181. Marcano-Cedeño A, Quintanilla-Domínguez J and Andina D (2011). WBCD breast cancer database classification applying artificial metaplasticity neural network, Expert Systems with Applications: An International Journal, 38:8, (9573-9579), Online publication date: 1-Aug-2011.
  182. Farkas R Learning local content shift detectors from document-level information Proceedings of the Conference on Empirical Methods in Natural Language Processing, (759-770)
  183. Turney P, Neuman Y, Assaf D and Cohen Y Literal and metaphorical sense identification through concrete and abstract context Proceedings of the Conference on Empirical Methods in Natural Language Processing, (680-690)
  184. ACM
    Dumlu E, Yilmaz C, Cohen M and Porter A Feedback driven adaptive combinatorial testing Proceedings of the 2011 International Symposium on Software Testing and Analysis, (243-253)
  185. Metze F, Black A and Polzehl T A review of personality in voice-based man machine interaction Proceedings of the 14th international conference on Human-computer interaction: interaction techniques and environments - Volume Part II, (358-367)
  186. Samorani M, Laguna M, DeLisle R and Weaver D (2011). A Randomized Exhaustive Propositionalization Approach for Molecule Classification, INFORMS Journal on Computing, 23:3, (331-345), Online publication date: 1-Jul-2011.
  187. Gravano A and Hirschberg J (2011). Turn-taking cues in task-oriented dialogue, Computer Speech and Language, 25:3, (601-634), Online publication date: 1-Jul-2011.
  188. Abe H and Tsumoto S Mining classification rules for detecting medication order changes by using characteristic CPOE subsequences Proceedings of the 19th international conference on Foundations of intelligent systems, (80-89)
  189. Zhou L and Jiang F A rough set based decision tree algorithm and its application in intrusion detection Proceedings of the 4th international conference on Pattern recognition and machine intelligence, (333-338)
  190. Acosta O, Villavicencio A and Moreira V Identification and treatment of multiword expressions applied to information retrieval Proceedings of the Workshop on Multiword Expressions: from Parsing and Generation to the Real World, (101-109)
  191. Wang B, Zhang H, Spencer B and Guo Y The unsymmetrical-style co-training Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part I, (100-111)
  192. Zhang C and Zhang J Mining tourist preferences with twice-learning Proceedings of the 15th international conference on New Frontiers in Applied Data Mining, (483-493)
  193. Estivill-Castro V The instance easiness of supervised learning for cluster validity Proceedings of the 15th international conference on New Frontiers in Applied Data Mining, (197-208)
  194. Martins B A supervised machine learning approach for duplicate detection over gazetteer records Proceedings of the 4th international conference on GeoSpatial semantics, (34-51)
  195. Pardoe D and Stone P A particle filter for bid estimation in ad auctions with periodic ranking observations The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (887-894)
  196. Castillo C and Davison B (2011). Adversarial Web Search, Foundations and Trends in Information Retrieval, 4:5, (377-486), Online publication date: 1-May-2011.
  197. Ferreiro S, Sierra B, Irigoien I and Gorritxategi E (2011). Data mining for quality control, Computers and Industrial Engineering, 60:4, (801-810), Online publication date: 1-May-2011.
  198. Kang Y, Krishnaswamy S and Zaslavsky A A retrieval strategy using the integrated knowledge of similarity and associations Proceedings of the 16th international conference on Database systems for advanced applications: Part II, (16-30)
  199. ACM
    Perlich C and Świrszcz G (2011). On cross-validation and stacking, ACM SIGKDD Explorations Newsletter, 12:2, (11-15), Online publication date: 31-Mar-2011.
  200. ACM
    Patil N, Toshniwal D and Garg K Species identification based on approximate matching Proceedings of the Fourth Annual ACM Bangalore Conference, (1-4)
  201. Saggion H Learning predicate insertion rules for document abstracting Proceedings of the 12th international conference on Computational linguistics and intelligent text processing - Volume Part II, (301-312)
  202. Howald B and Katz E The exploitation of spatial information in narrative discourse Proceedings of the Ninth International Conference on Computational Semantics, (175-184)
  203. Abe H and Tsumoto S Evaluating a temporal pattern detection method for finding research keys in bibliographical data Transactions on rough sets XIV, (1-17)
  204. Tallón-Ballesteros A and Hervás-Martínez C (2011). A two-stage algorithm in evolutionary product unit neural networks for classification, Expert Systems with Applications: An International Journal, 38:1, (743-754), Online publication date: 1-Jan-2011.
  205. Sobol-Shikler T (2011). Automatic inference of complex affective states, Computer Speech and Language, 25:1, (45-62), Online publication date: 1-Jan-2011.
  206. Parthaláin N and Jensen R (2010). Measures for unsupervised fuzzy-rough feature selection, International Journal of Hybrid Intelligent Systems, 7:4, (249-259), Online publication date: 1-Dec-2010.
  207. Yada K, Washio T and Ukai Y (2010). Modelling deposit outflow in financial crises: application to branch management and customer relationship management, International Journal of Advanced Intelligence Paradigms, 2:2/3, (254-270), Online publication date: 1-Dec-2010.
  208. Abe H, Tsumoto S, Ohsaki M and Yamaguchi T (2010). Improving a rule evaluation support method based on objective indices, International Journal of Advanced Intelligence Paradigms, 2:2/3, (180-197), Online publication date: 1-Dec-2010.
  209. Özyurt Ö and Köse C (2010). Chat mining, Expert Systems with Applications: An International Journal, 37:12, (8705-8710), Online publication date: 1-Dec-2010.
  210. Patil B, Joshi R and Toshniwal D (2010). Hybrid prediction model for Type-2 diabetic patients, Expert Systems with Applications: An International Journal, 37:12, (8102-8108), Online publication date: 1-Dec-2010.
  211. Deisy C, Baskar S, Ramraj N, Saravanan Koori J and Jeevanandam P (2010). A novel information theoretic-interact algorithm (IT-IN) for feature selection using three machine learning algorithms, Expert Systems with Applications: An International Journal, 37:12, (7589-7597), Online publication date: 1-Dec-2010.
  212. Ali S, Razali A, Bakar A and Suradi N Developing treatment plan support in outpatient health care delivery with decision trees technique Proceedings of the 6th international conference on Advanced data mining and applications - Volume Part II, (475-482)
  213. ACM
    D'Avolio L, Nguyen T and Fiore L The automated retrieval console (ARC) Proceedings of the 1st ACM International Health Informatics Symposium, (469-473)
  214. ACM
    Namata G and Getoor L (2010). Identifying graphs from noisy and incomplete data, ACM SIGKDD Explorations Newsletter, 12:1, (33-39), Online publication date: 9-Nov-2010.
  215. ACM
    Carter J and Dewan P Design, implementation, and evaluation of an approach for determining when programmers are having difficulty Proceedings of the 2010 ACM International Conference on Supporting Group Work, (215-224)
  216. ACM
    Lu H, Yang J, Liu Z, Lane N, Choudhury T and Campbell A The Jigsaw continuous sensing engine for mobile phone applications Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems, (71-84)
  217. ACM
    Zhang J HC-DT/SVM Proceedings of the 1st ACM SIGSPATIAL International Workshop on Data Mining for Geoinformatics, (9-18)
  218. ACM
    Pawlish M and Varde A A decision support system for green data centers Proceedings of the 3rd workshop on Ph.D. students in information and knowledge management, (47-56)
  219. ACM
    Punera K and Merugu S The anatomy of a click Proceedings of the 19th ACM international conference on Information and knowledge management, (989-998)
  220. ACM
    Wimalasuriya D and Dou D Components for information extraction Proceedings of the 19th ACM international conference on Information and knowledge management, (9-18)
  221. Duan J, Lin Z, Yi W and Lu M Scaling up the accuracy of Bayesian classifier based on frequent itemsets by m-estimate Proceedings of the 2010 international conference on Artificial intelligence and computational intelligence: Part I, (357-364)
  222. Bohlin T, Jonsson B and Soleimanifard S Inferring compact models of communication protocol entities Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part I, (658-672)
  223. Pavlekovic M, Bensic M and Zekic-Susac M (2010). Modeling children's mathematical gift by neural networks and logistic regression, Expert Systems with Applications: An International Journal, 37:10, (7167-7173), Online publication date: 1-Oct-2010.
  224. ACM
    Pouke M, Hickey S, Kuroda T and Noma H Activity recognition of the elderly Proceedings of the 4th ACM International Workshop on Context-Awareness for Self-Managing Systems, (46-52)
  225. ACM
    Lakshmi R and Radha N Spam classification using supervised learning techniques Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, (1-4)
  226. ACM
    Pillai R and Idicula S Linear text segmentation using classification techniques Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, (1-4)
  227. Luo Y, Ben K and Mi L Software metrics reduction for fault-proneness prediction of software modules Proceedings of the 2010 IFIP international conference on Network and parallel computing, (432-441)
  228. Monedero I, Biscarri F, León C, Guerrero J, Biscarri J and Millán R Using regression analysis to identify patterns of non-technical losses on power utilities Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part I, (410-419)
  229. ACM
    Zhou X, Ruan J and Zhang W Promoter prediction based on a multiple instance learning scheme Proceedings of the First ACM International Conference on Bioinformatics and Computational Biology, (295-301)
  230. Wang W, Zeng G and Tang D (2010). Using evidence based content trust model for spam detection, Expert Systems with Applications: An International Journal, 37:8, (5599-5606), Online publication date: 1-Aug-2010.
  231. ACM
    Tan Y, Gu X and Wang H Adaptive system anomaly prediction for large-scale hosting infrastructures Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, (173-182)
  232. Nikolaos L and Iordanis E Default prediction and Bankruptcy hazard analysis into recurent neuro-genetic hybrid networks to AdaBoost M1 regression and logistic regression models in finance Proceedings of the 14th WSEAS international conference on Systems: part of the 14th WSEAS CSCC multiconference - Volume I, (35-41)
  233. Lopez P and Romary L HUMB: Automatic key term extraction from scientific articles in GROBID Proceedings of the 5th International Workshop on Semantic Evaluation, (248-251)
  234. Celli F UNITN: Part-of-speech counting in relation extraction Proceedings of the 5th International Workshop on Semantic Evaluation, (198-201)
  235. Paltoglou G and Thelwall M A study of information retrieval weighting schemes for sentiment analysis Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, (1386-1395)
  236. ACM
    Icke I and Rosenberg A Dimensionality reduction using symbolic regression Proceedings of the 12th annual conference companion on Genetic and evolutionary computation, (2085-2086)
  237. ACM
    Mayfield E and Penstein-Rosé C Using feature construction to avoid large feature spaces in text classification Proceedings of the 12th annual conference on Genetic and evolutionary computation, (1299-1306)
  238. ACM
    Zafra A and Ventura S Grammar guided genetic programming for multiple instance learning Proceedings of the 12th annual conference on Genetic and evolutionary computation, (909-916)
  239. Hady M and Schwenker F (2010). Combining committee-based semi-supervised learning and active learning, Journal of Computer Science and Technology, 25:4, (681-698), Online publication date: 1-Jul-2010.
  240. ACM
    Talia D and Trunfio P (2010). How distributed data mining tasks can thrive as knowledge services, Communications of the ACM, 53:7, (132-137), Online publication date: 1-Jul-2010.
  241. Hamerly G and Speegle G Efficient model selection for large-scale nearest-neighbor data mining Proceedings of the 27th British national conference on Data Security and Security Data, (37-54)
  242. Huang J, Shirabad J, Matwin S and Su J Improving co-training with agreement-based sampling Proceedings of the 7th international conference on Rough sets and current trends in computing, (197-206)
  243. ACM
    Crotti M, Gringoli F and Salgarelli L Optimizing statistical classifiers of network traffic Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, (758-763)
  244. Pardoe D and Stone P Boosting for regression transfer Proceedings of the 27th International Conference on International Conference on Machine Learning, (863-870)
  245. Xu W, Huang L, Fox A, Patterson D and Jordan M Detecting large-scale system problems by mining console logs Proceedings of the 27th International Conference on International Conference on Machine Learning, (37-46)
  246. Wang Q and Zhang L Ensemble learning based on multi-task class labels Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II, (464-475)
  247. Mac Parthaláin N and Zwiggelaar R Machine learning techniques and mammographic risk assessment Proceedings of the 10th international conference on Digital Mammography, (664-672)
  248. Siddharthan A and Katsos N Reformulating discourse connectives for non-expert readers Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, (1002-1010)
  249. Lampert A, Dale R and Paris C Detecting emails containing requests for action Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, (984-992)
  250. Passonneau R, Epstein S, Ligorio T, Gordon J and Bhutada P Learning about voice search for spoken dialogue systems Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, (840-848)
  251. Montero M, Ruíz R, García-Torres M and Sarro L Feature selection applied to data from the Sloan digital sky survey Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part I, (611-620)
  252. Bella A, Ferri C, Hernández-Orallo J and Ramírez-Quintana M Data mining strategies for CRM negotiation prescription problems Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part I, (520-530)
  253. Pendharkar P (2010). Probabilistic estimation of software size and effort, Expert Systems with Applications: An International Journal, 37:6, (4435-4440), Online publication date: 1-Jun-2010.
  254. Razavi A, Inkpen D, Uritsky S and Matwin S Offensive language detection using multi-level classification Proceedings of the 23rd Canadian conference on Advances in Artificial Intelligence, (16-27)
  255. Wang B and Zhang H Semi-supervised probability propagation on instance-attribute graphs Proceedings of the 23rd Canadian conference on Advances in Artificial Intelligence, (161-172)
  256. Förster K, Biasiucci A, Chavarriaga R, del R. Millán J, Roggen D and Tröster G On the use of brain decoded signals for online user adaptive gesture recognition systems Proceedings of the 8th international conference on Pervasive Computing, (427-444)
  257. Healey J, Nachman L, Subramanian S, Shahabdeen J and Morris M Out of the lab and into the fray Proceedings of the 8th international conference on Pervasive Computing, (156-173)
  258. Singh D, Sardina S, Padgham L and Airiau S Learning context conditions for BDI plan selection Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (325-332)
  259. Abdel Hady M, Schwenker F and Palm G (2010). 2010 Special Issue, Neural Networks, 23:4, (497-509), Online publication date: 1-May-2010.
  260. ACM
    Donato D, Bonchi F, Chi T and Maarek Y Do you want to take notes? Proceedings of the 19th international conference on World wide web, (321-330)
  261. Motaal A, El-Gayar N and Osman N Different regions identification in composite strain-encoded (C-SENC) images using machine learning techniques Proceedings of the 4th IAPR TC3 conference on Artificial Neural Networks in Pattern Recognition, (231-240)
  262. ACM
    Amershi S, Fogarty J, Kapoor A and Tan D Examining multiple potential models in end-user interactive concept learning Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (1357-1360)
  263. Li Y and Hu C Aesthetic learning in an interactive evolutionary art system Proceedings of the 2010 international conference on Applications of Evolutionary Computation - Volume Part II, (301-310)
  264. Chung E, Miksa S and Hastings S (2010). A framework of automatic subject term assignment for text categorization: An indexing conception-based approach, Journal of the American Society for Information Science and Technology, 61:4, (688-699), Online publication date: 1-Apr-2010.
  265. Lim A and Lee C (2010). Processing online analytics with classification and association rule mining, Knowledge-Based Systems, 23:3, (248-255), Online publication date: 1-Apr-2010.
  266. ACM
    McKay C and Fujinaga I Improving automatic music classification performance by extracting features from different types of data Proceedings of the international conference on Multimedia information retrieval, (257-266)
  267. Mazid M, Ali A and Tickle K Improved C4.5 algorithm for rule based classification Proceedings of the 9th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases, (296-301)
  268. ACM
    Anastácio I, Martins B and Calado P Using the geographic scopes of web documents for contextual advertising Proceedings of the 6th Workshop on Geographic Information Retrieval, (1-8)
  269. ACM
    Odon de Alencar R, Davis C and Gonçalves M Geographical classification of documents using evidence from Wikipedia Proceedings of the 6th Workshop on Geographic Information Retrieval, (1-8)
  270. ACM
    Carter J and Dewan P Are you having difficulty? Proceedings of the 2010 ACM conference on Computer supported cooperative work, (211-214)
  271. ACM
    Taneva B, Kacimi M and Weikum G Gathering and ranking photos of named entities with high precision, high recall, and diversity Proceedings of the third ACM international conference on Web search and data mining, (431-440)
  272. Romei A and Turini F (2010). XML data mining, Software—Practice & Experience, 40:2, (101-130), Online publication date: 1-Feb-2010.
  273. Haddadin K and Lauer T Efficient online aggregates in dense-region-based data cube representations Transactions on large-scale data- and knowledge-centered systems II, (73-102)
  274. Haddadin K and Lauer T Efficient online aggregates in dense-region-based data cube representations Transactions on large-scale data- and knowledge-centered systems II, (73-102)
  275. Mclaren B, Scheuer O and Mikšátko J (2010). Supporting Collaborative Learning and E-Discussions Using Artificial Intelligence Techniques, International Journal of Artificial Intelligence in Education, 20:1, (1-46), Online publication date: 1-Jan-2010.
  276. Zhang S, Ramamohanarao K and Bezdek J EP-based robust weighting scheme for fuzzy SVMs Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104, (123-132)
  277. Ledezma A, Aler R, Sanchis A and Borrajo D (2010). GA-stacking: Evolutionary stacked generalization, Intelligent Data Analysis, 14:1, (89-119), Online publication date: 1-Jan-2010.
  278. Hou Y, Chang Y, Chen T, Laih C and Chen C (2010). Malicious web content detection by machine learning, Expert Systems with Applications: An International Journal, 37:1, (55-60), Online publication date: 1-Jan-2010.
  279. Ewald R and Uhrmacher A Automating the runtime performance evaluation of simulation algorithms Winter Simulation Conference, (1079-1091)
  280. Abe H and Tsumoto S (2009). Investigating Accuracies of Classifications for Randomized Imbalanced Class Distributions, Fundamenta Informaticae, 90:4, (369-378), Online publication date: 1-Dec-2009.
  281. ACM
    Feizy R, Wakeman I and Chalmers D (2009). Are your friends who they say they are?, XRDS: Crossroads, The ACM Magazine for Students, 16:2, (19-23), Online publication date: 1-Dec-2009.
  282. ACM
    Kirke A and Miranda E (2009). A survey of computer systems for expressive music performance, ACM Computing Surveys, 42:1, (1-41), Online publication date: 1-Dec-2009.
  283. Liu H, Liu L and Zhang H (2009). Boosting feature selection using information metric for classification, Neurocomputing, 73:1-3, (295-303), Online publication date: 1-Dec-2009.
  284. Thongkam J, Xu G, Zhang Y and Huang F (2009). Toward breast cancer survivability prediction models through improving training space, Expert Systems with Applications: An International Journal, 36:10, (12200-12209), Online publication date: 1-Dec-2009.
  285. Nemati S, Basiri M, Ghasem-Aghaee N and Aghdam M (2009). A novel ACO-GA hybrid algorithm for feature selection in protein function prediction, Expert Systems with Applications: An International Journal, 36:10, (12086-12094), Online publication date: 1-Dec-2009.
  286. Appavu alias Balamurugan S and Rajaram R (2009). Effective solution for unhandled exception in decision tree induction algorithms, Expert Systems with Applications: An International Journal, 36:10, (12113-12119), Online publication date: 1-Dec-2009.
  287. Crotti M, Gringoli F and Salgarelli L Impact of asymmetric routing on statistical traffic classification Proceedings of the 28th IEEE conference on Global telecommunications, (655-662)
  288. Zhou J, Xu Q, Chen J and Qu W A Multi-view Approach for Relation Extraction Proceedings of the International Conference on Web Information Systems and Mining, (53-62)
  289. ACM
    Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P and Witten I (2009). The WEKA data mining software, ACM SIGKDD Explorations Newsletter, 11:1, (10-18), Online publication date: 16-Nov-2009.
  290. Ferreira C, Gama J and Costa V Sequential pattern mining in multi-relational datasets Proceedings of the Current topics in artificial intelligence, and 13th conference on Spanish association for artificial intelligence, (121-130)
  291. ACM
    Wimalasuriya D and Dou D Using multiple ontologies in information extraction Proceedings of the 18th ACM conference on Information and knowledge management, (235-244)
  292. Li X and Sarkar S (2009). Against Classification Attacks, Operations Research, 57:6, (1496-1509), Online publication date: 1-Nov-2009.
  293. Langseth H and Nielsen T (2009). Latent classification models for binary data, Pattern Recognition, 42:11, (2724-2736), Online publication date: 1-Nov-2009.
  294. Çakır A, Çalış H and Küçüksille E (2009). Data mining approach for supply unbalance detection in induction motor, Expert Systems with Applications: An International Journal, 36:9, (11808-11813), Online publication date: 1-Nov-2009.
  295. Huang Y, McCullagh P and Black N (2009). An optimization of ReliefF for classification in large datasets, Data & Knowledge Engineering, 68:11, (1348-1356), Online publication date: 1-Nov-2009.
  296. ACM
    Yonezawa K, Miyaki T and Rekimoto J Cat@Log Proceedings of the International Conference on Advances in Computer Entertainment Technology, (149-156)
  297. Zanzotto F and Croce D Reading what machines "think" Proceedings of the 2009 international conference on Brain informatics, (159-170)
  298. ACM
    Xu W, Huang L, Fox A, Patterson D and Jordan M Detecting large-scale system problems by mining console logs Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, (117-132)
  299. Marton Z, Rusu R, Jain D, Klank U and Beetz M Probabilistic categorization of kitchen objects in table settings with a composite sensor Proceedings of the 2009 IEEE/RSJ international conference on Intelligent robots and systems, (4777-4784)
  300. Giraud-Carrier C, Pixton B and Rocha R (2009). Bariatric surgery performance: A predictive informatics case study, Intelligent Data Analysis, 13:5, (741-754), Online publication date: 1-Oct-2009.
  301. Goh Y, Giess M and McMahon C (2009). Facilitating design learning through faceted classification of in-service information, Advanced Engineering Informatics, 23:4, (497-511), Online publication date: 1-Oct-2009.
  302. Zimmermann A and Raedt L (2009). Cluster-grouping, Machine Language, 77:1, (125-159), Online publication date: 1-Oct-2009.
  303. Hui B, Yang Y and Webb G (2009). Anytime classification for a pool of instances, Machine Language, 77:1, (61-102), Online publication date: 1-Oct-2009.
  304. ACM
    Albinali F, Goodwin M and Intille S Recognizing stereotypical motor movements in the laboratory and classroom Proceedings of the 11th international conference on Ubiquitous computing, (71-80)
  305. Hao J, Zhang C and Wang H Using Keywords Clustering to Construct Ontological Hierarchies Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (247-250)
  306. Stent A and Molina M Evaluating automatic extraction of rules for sentence plan construction Proceedings of the SIGDIAL 2009 Conference: The 10th Annual Meeting of the Special Interest Group on Discourse and Dialogue, (290-297)
  307. Gravano A and Hirschberg J Turn-yielding cues in task-oriented dialogue Proceedings of the SIGDIAL 2009 Conference: The 10th Annual Meeting of the Special Interest Group on Discourse and Dialogue, (253-261)
  308. op den Akker H and op den Akker R Are you being addressed? Proceedings of the SIGDIAL 2009 Conference: The 10th Annual Meeting of the Special Interest Group on Discourse and Dialogue, (21-28)
  309. Jannach D, Shchekotykhin K and Friedrich G (2009). Automated ontology instantiation from tabular web sources-The AllRight system, Web Semantics: Science, Services and Agents on the World Wide Web, 7:3, (136-153), Online publication date: 1-Sep-2009.
  310. Zhang J, Gruenwald L and Gertz M (2009). VDM-RS, Computers & Geosciences, 35:9, (1827-1836), Online publication date: 1-Sep-2009.
  311. Kennedy K, Namee B and Delany S Learning without default Proceedings of the 20th Irish conference on Artificial intelligence and cognitive science, (174-187)
  312. Fang X Are you becoming a diabetic? a data mining approach Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 5, (18-22)
  313. Gao S, Alhajj R and Rokne J Modeling knowledge discovery in financial forecasting Proceedings of the 10th IEEE international conference on Information Reuse & Integration, (41-46)
  314. Saggion H A classification algorithm for predicting the structure of summaries Proceedings of the 2009 Workshop on Language Generation and Summarisation, (31-38)
  315. Akhmatova E and Dras M Using hypernymy acquisition to tackle (part of) textual entailment Proceedings of the 2009 Workshop on Applied Textual Inference, (52-60)
  316. Lampert A, Dale R and Paris C Segmenting email message text into zones Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 2 - Volume 2, (919-928)
  317. Boukobza R and Rappoport A Multi-word expression identification using sentence surface features Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 2 - Volume 2, (468-477)
  318. Jensen R and Shen Q (2009). New approaches to fuzzy-rough feature selection, IEEE Transactions on Fuzzy Systems, 17:4, (824-838), Online publication date: 1-Aug-2009.
  319. Pinto F and Santos M Ontological assistance for knowledge discovery in databases process Proceedings of the WSEAES 13th international conference on Computers, (453-458)
  320. Fornells A, Recio-García J, Díaz-Agudo B, Golobardes E and Fornells E Integration of a Methodology for Cluster-Based Retrieval in jColibri Proceedings of the 8th International Conference on Case-Based Reasoning Research and Development - Volume 5650, (418-433)
  321. ACM
    Fouché S, Cohen M and Porter A Incremental covering array failure characterization in large configuration spaces Proceedings of the eighteenth international symposium on Software testing and analysis, (177-188)
  322. ACM
    Weninger T, Hsu W, Xia J and Aljandal W An evolutionary approach to constructive induction for link discovery Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers, (2167-2172)
  323. ACM
    Weninger T, Hsu W, Xia J and Aljandal W An evolutionary approach to constructive induction for link discovery Proceedings of the 11th Annual conference on Genetic and evolutionary computation, (1941-1942)
  324. ACM
    Shahzad M, Zahid S and Farooq M A hybrid GA-PSO fuzzy system for user identification on smart phones Proceedings of the 11th Annual conference on Genetic and evolutionary computation, (1617-1624)
  325. ACM
    Bacardit J and Krasnogor N A mixed discrete-continuous attribute list representation for large scale classification domains Proceedings of the 11th Annual conference on Genetic and evolutionary computation, (1155-1162)
  326. Horng J, Wu L, Liu B, Kuo J, Kuo W and Zhang J (2009). An expert system to classify microarray gene expression data using gene selection by decision tree, Expert Systems with Applications: An International Journal, 36:5, (9072-9081), Online publication date: 1-Jul-2009.
  327. Liu H, Sun J, Liu L and Zhang H (2009). Feature selection with dynamic mutual information, Pattern Recognition, 42:7, (1330-1339), Online publication date: 1-Jul-2009.
  328. Izadinia H, Sadeghi F and Ebadzadeh M (2009). 2009 Special Issue, Neural Networks, 22:5-6, (633-641), Online publication date: 1-Jul-2009.
  329. Wu D (2009). Supplier selection, Expert Systems with Applications: An International Journal, 36:5, (9105-9112), Online publication date: 1-Jul-2009.
  330. Sarlija N, Bensic M and Zekic-Susac M (2009). Comparison procedure of predicting the time to default in behavioural scoring, Expert Systems with Applications: An International Journal, 36:5, (8778-8788), Online publication date: 1-Jul-2009.
  331. Abe H and Tsumoto S A Comparison of Composed Objective Rule Evaluation Indices Using PCA and Single Indices Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology, (160-167)
  332. ACM
    Namata G and Getoor L Identifying graphs from noisy and incomplete data Proceedings of the 1st ACM SIGKDD Workshop on Knowledge Discovery from Uncertain Data, (23-29)
  333. ACM
    Beygelzimer A and Langford J The offset tree for learning with partial labels Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (129-138)
  334. Mahdhaoui A, Chetouani M and Kessous L Time-Frequency features extraction for infant directed speech discrimination Proceedings of the 2009 international conference on Advances in Nonlinear Speech Processing, (120-127)
  335. Adeodato P, Arnaud A, Vasconcelos G, Cunha R, Gurgel T and Monteiro D The role of temporal feature extraction and bagging of MLP neural networks for solving the WCCI 2008 ford classification challenge Proceedings of the 2009 international joint conference on Neural Networks, (2685-2690)
  336. Ribeiro A, Zárate L and de L. P. Duarte Figueiredo F A representative validation of a neural 3G admission control through rules extraction Proceedings of the 2009 international joint conference on Neural Networks, (1877-1883)
  337. Izadinia H, Sadeghi F and Ebadzadeh M A hybrid fuzzy neuro-immune network based on multi-epitope approach Proceedings of the 2009 international joint conference on Neural Networks, (1610-1615)
  338. ACM
    Smith R and Jiang M MILCS in protein structure prediction with default hierarchies Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, (953-956)
  339. Nulty P and Costello F Using lexical patterns in the Google Web 1T corpus to deduce semantic relations between nouns Proceedings of the Workshop on Semantic Evaluations: Recent Achievements and Future Directions, (58-63)
  340. Preiss J, Dehdari J, King J and Mehay D Refining the most frequent sense baseline Proceedings of the Workshop on Semantic Evaluations: Recent Achievements and Future Directions, (10-18)
  341. Matykiewicz P, Duch W and Pestian J Clustering semantic spaces of suicide notes and newsgroups articles Proceedings of the Workshop on Current Trends in Biomedical Natural Language Processing, (179-184)
  342. Wong W, Martinez D and Cavedon L Extraction of named entities from tables in gene mutation literature Proceedings of the Workshop on Current Trends in Biomedical Natural Language Processing, (46-54)
  343. O'Hara T and Wiebe J (2009). Exploiting semantic role resources for preposition disambiguation, Computational Linguistics, 35:2, (151-184), Online publication date: 1-Jun-2009.
  344. Nikam S and Agarwal S (2009). Ridgelet-based fake fingerprint detection, Neurocomputing, 72:10-12, (2491-2506), Online publication date: 1-Jun-2009.
  345. Minku F, Inoue H and Yao X (2009). Negative correlation in incremental learning, Natural Computing: an international journal, 8:2, (289-320), Online publication date: 1-Jun-2009.
  346. Gabani K, Sherman M, Solorio T, Liu Y, Bedore L and Peña E A corpus-based approach for the prediction of language impairment in monolingual English and Spanish-English bilingual children Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics, (46-55)
  347. Baba-Ali A A novel two level evolutionary approach for classification rules extraction Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (3306-3313)
  348. Qu L, Min Y, Weihong W and Xiaohong C Dynamic split-point selection method for decision tree evolved by gene expression programming Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (736-740)
  349. ACM
    Beach T and Avis N An intelligent semi-automatic application porting system for application accelerators Proceedings of the combined workshops on UnConventional high performance computing workshop plus memory access workshop, (7-10)
  350. ACM
    Inomata T, Naya F, Kuwahara N, Hattori F and Kogure K Activity recognition from interactions with objects using dynamic Bayesian network Proceedings of the 3rd ACM International Workshop on Context-Awareness for Self-Managing Systems, (39-42)
  351. Mac Parthaláin N and Shen Q (2009). Exploring the boundary region of tolerance rough sets for feature selection, Pattern Recognition, 42:5, (655-667), Online publication date: 1-May-2009.
  352. Vanhulsel M, Janssens D, Wets G and Vanhoof K (2009). Simulation of sequential data, Expert Systems with Applications: An International Journal, 36:4, (8032-8039), Online publication date: 1-May-2009.
  353. Osunmakinde I and Bagula A Supporting Scalable Bayesian Networks Using Configurable Discretizer Actuators Proceedings of the 2009 conference on Adaptive and Natural Computing Algorithms - Volume 5495, (323-332)
  354. ACM
    Xie S, Fan W, Peng J, Verscheure O and Ren J Latent space domain transfer between high dimensional overlapping distributions Proceedings of the 18th international conference on World wide web, (91-100)
  355. Zhao Z and Liu H (2009). Searching for interacting features in subset selection, Intelligent Data Analysis, 13:2, (207-228), Online publication date: 1-Apr-2009.
  356. Abe H and Tsumoto S (2009). Investigating Accuracies of Classifications for Randomized Imbalanced Class Distributions, Fundamenta Informaticae, 90:4, (369-378), Online publication date: 1-Apr-2009.
  357. Saar-Tsechansky M, Melville P and Provost F (2009). Active Feature-Value Acquisition, Management Science, 55:4, (664-684), Online publication date: 1-Apr-2009.
  358. Wegener D, Sengstag T, Sfakianakis S, Rüping S and Assi A (2009). GridR, Future Generation Computer Systems, 25:4, (481-488), Online publication date: 1-Apr-2009.
  359. Yang Z, Deng F, Liu W and Fang Y (2009). A CBR method for CFW prevention and treatment, Expert Systems with Applications: An International Journal, 36:3, (5469-5474), Online publication date: 1-Apr-2009.
  360. Xie D, Xu W, Foster K and Bronlund J (2009). Object-oriented knowledge framework for modelling human mastication of foods, Expert Systems with Applications: An International Journal, 36:3, (4810-4821), Online publication date: 1-Apr-2009.
  361. Stoyanchev S and Stent A Predicting concept types in user corrections in dialog Proceedings of the 2nd Workshop on Semantic Representation of Spoken Language, (42-49)
  362. Ewald R, Uhrmacher A and Saha K Data mining for simulation algorithm selection Proceedings of the 2nd International Conference on Simulation Tools and Techniques, (1-10)
  363. ACM
    Chen B, Ramakrishnan R, Shavlik J and Tamma P (2009). Bellwether analysis, ACM Transactions on Knowledge Discovery from Data, 3:1, (1-49), Online publication date: 1-Mar-2009.
  364. delaOssa L, Gámez J and Puerta J (2009). Learning weighted linguistic fuzzy rules by using specifically-tailored hybrid estimation of distribution algorithms, International Journal of Approximate Reasoning, 50:3, (541-560), Online publication date: 1-Mar-2009.
  365. Chen S and Wang W (2009). Decision tree learning for freeway automatic incident detection, Expert Systems with Applications: An International Journal, 36:2, (4101-4105), Online publication date: 1-Mar-2009.
  366. Chu H, Chen M and Chen Y (2009). A semantic-based approach to content abstraction and annotation for content management, Expert Systems with Applications: An International Journal, 36:2, (2360-2376), Online publication date: 1-Mar-2009.
  367. Gaudioso E, Montero M, Talavera L and Hernandez-del-Olmo F (2009). Supporting teachers in collaborative student modeling, Expert Systems with Applications: An International Journal, 36:2, (2260-2265), Online publication date: 1-Mar-2009.
  368. Yeh I and Lien C (2009). The comparisons of data mining techniques for the predictive accuracy of probability of default of credit card clients, Expert Systems with Applications: An International Journal, 36:2, (2473-2480), Online publication date: 1-Mar-2009.
  369. Liu Y, Lin S, Hsueh Y and Lee M (2009). Automatic target defect identification for TFT-LCD array process inspection using kernel FCM-based fuzzy SVDD ensemble, Expert Systems with Applications: An International Journal, 36:2, (1978-1998), Online publication date: 1-Mar-2009.
  370. Shafi K, Kovacs T, Abbass H and Zhu W (2009). Intrusion detection with evolutionary learning classifier systems, Natural Computing: an international journal, 8:1, (3-27), Online publication date: 1-Mar-2009.
  371. Sirikham A, Chiracharit W and Chamnongthai K Banknote and coin speaker device for blind people Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3, (2137-2140)
  372. Berthier R and Cukier M (2009). An evaluation of connection characteristics for separating network attacks, International Journal of Security and Networks, 4:1/2, (110-124), Online publication date: 1-Feb-2009.
  373. Gunes H and Piccardi M (2009). Automatic temporal segment detection and affect recognition from face and body display, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 39:1, (64-84), Online publication date: 1-Feb-2009.
  374. Celli F and Nissim M Automatic identification of semantic relations in Italian complex nominals Proceedings of the Eighth International Conference on Computational Semantics, (45-60)
  375. Quinn A, Stranieri A, Yearwood J and Hafen G A classification algorithm that derives weighted sum scores for insight into disease Proceedings of the Third Australasian Workshop on Health Informatics and Knowledge Management - Volume 97, (13-18)
  376. Castillo G and Gama J (2009). Adaptive Bayesian network classifiers, Intelligent Data Analysis, 13:1, (39-59), Online publication date: 1-Jan-2009.
  377. Ledezma A, Aler R, Sanchis A and Borrajo D (2009). OMBO: An opponent modeling approach, AI Communications, 22:1, (21-35), Online publication date: 1-Jan-2009.
  378. Basgalupp M, Carvalho A, Barros R, Ruiz D and Freitas A (2009). Lexicographic multi-objective evolutionary induction of decision trees, International Journal of Bio-Inspired Computation, 1:1/2, (105-117), Online publication date: 1-Jan-2009.
  379. ACM
    Chuang K, Chen H and Chen M (2009). Feature-preserved sampling over streaming data, ACM Transactions on Knowledge Discovery from Data, 2:4, (1-45), Online publication date: 1-Jan-2009.
  380. Malagón-Borja L and Fuentes O (2009). Object detection using image reconstruction with PCA, Image and Vision Computing, 27:1-2, (2-9), Online publication date: 1-Jan-2009.
  381. Wang W, Li Q and Qi X Gene Expression Programming Neural Network for Regression and Classification Proceedings of the 3rd International Symposium on Advances in Computation and Intelligence, (212-219)
  382. Soiraya B, Mingkhwan A and Haruechaiyasak C An Analysis of Visual and Presentation Factors Influencing the Design of E-commerce Web Sites Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (525-528)
  383. Chaoji V, Al Hasan M, Salem S and Zaki M (2008). An integrated, generic approach to pattern mining, Data Mining and Knowledge Discovery, 17:3, (457-495), Online publication date: 1-Dec-2008.
  384. Milicevic M, Zubrinic K and Zakarija I Adaptive progress indicator for long running SQL queries Proceedings of the 8th conference on Applied computer scince, (281-284)
  385. ACM
    Moncrieff S, Venkatesh S and West G (2008). Dynamic privacy assessment in a smart house environment using multimodal sensing, ACM Transactions on Multimedia Computing, Communications, and Applications, 5:2, (1-29), Online publication date: 1-Nov-2008.
  386. Minku F and Ludermir T (2008). Clustering and co-evolution to construct neural network ensembles, Neural Networks, 21:9, (1363-1379), Online publication date: 1-Nov-2008.
  387. Martens D, Bruynseels L, Baesens B, Willekens M and Vanthienen J (2008). Predicting going concern opinion with data mining, Decision Support Systems, 45:4, (765-777), Online publication date: 1-Nov-2008.
  388. ACM
    Fersini E, Messina E and Archetti F Granular modeling of web documents Proceedings of the 10th ACM workshop on Web information and data management, (111-118)
  389. ACM
    Pires D, dos Santos G, Ruiz E and Teixeira C Reutilização de artefatos de software com suporte a ontologias e a comunicação multimídia para o ensino médico Companion Proceedings of the XIV Brazilian Symposium on Multimedia and the Web, (121-124)
  390. ACM
    Geng X, Smith-Miles K and Zhou Z Facial age estimation by nonlinear aging pattern subspace Proceedings of the 16th ACM international conference on Multimedia, (721-724)
  391. ACM
    Forman G BNS feature scaling Proceedings of the 17th ACM conference on Information and knowledge management, (263-270)
  392. Solorio T and Liu Y Part-of-speech tagging for English-Spanish code-switched text Proceedings of the Conference on Empirical Methods in Natural Language Processing, (1051-1060)
  393. Solorio T and Liu Y Learning to predict code-switching points Proceedings of the Conference on Empirical Methods in Natural Language Processing, (973-981)
  394. ACM
    Khomh F and Guéhéneuc Y DEQUALITE Proceedings of the 15th Conference on Pattern Languages of Programs, (1-7)
  395. ACM
    Vaidya J, Clifton C, Kantarcioglu M and Patterson A (2008). Privacy-preserving decision trees over vertically partitioned data, ACM Transactions on Knowledge Discovery from Data, 2:3, (1-27), Online publication date: 1-Oct-2008.
  396. Pattaraintakorn P and Cercone N (2008). A foundation of rough sets theoretical and computational hybrid intelligent system for survival analysis, Computers & Mathematics with Applications, 56:7, (1699-1708), Online publication date: 1-Oct-2008.
  397. Alaiz-Rodríguez R, Japkowicz N and Tischer P A visualization-based exploratory technique for classifier comparison with respect to multiple metrics and multiple domains Proceedings of the 2008th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II, (660-665)
  398. Eichinger F, Böhm K and Huber M Mining edge-weighted call graphs to localise software bugs Proceedings of the 2008th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I, (333-348)
  399. Eaton E, desJardins M and Lane T Modeling transfer relationships between learning tasks for improved inductive transfer Proceedings of the 2008th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I, (317-332)
  400. Abe H and Tsumoto S Analyzing Behavior of Objective Rule Evaluation Indices Based on a Correlation Coefficient Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II, (758-765)
  401. Varde A, Bique S, Rundensteiner E, Brown D, Liang J, Sisson R, Sheybani E and Sayre B Component Selection to Optimize Distance Function Learning in Complex Scientific Data Sets Proceedings of the 19th international conference on Database and Expert Systems Applications, (269-282)
  402. ACM
    Lozano A and Abe N Multi-class cost-sensitive boosting with p-norm loss functions Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, (506-514)
  403. ACM
    Ketter W, Batchu A, Berosik G and McCreary D A semantic web architecture for advocate agents to determine preferences and facilitate decision making Proceedings of the 10th international conference on Electronic commerce, (1-10)
  404. ACM
    Kovalchuk Y and Fasli M Adaptive strategies for predicting bidding prices in supply chain management Proceedings of the 10th international conference on Electronic commerce, (1-10)
  405. Turney P A uniform approach to analogies, synonyms, antonyms, and associations Proceedings of the 22nd International Conference on Computational Linguistics - Volume 1, (905-912)
  406. Naughton M, Stokes N and Carthy J Investigating statistical techniques for sentence-level event classification Proceedings of the 22nd International Conference on Computational Linguistics - Volume 1, (617-624)
  407. Luyckx K and Daelemans W Authorship attribution and verification with many authors and limited data Proceedings of the 22nd International Conference on Computational Linguistics - Volume 1, (513-520)
  408. Malazizi L, Neagu D and Chaudhry Q Improving Imbalanced Multidimensional Dataset Learner Performance with Artificial Data Generation Proceedings of the 8th industrial conference on Advances in Data Mining: Medical Applications, E-Commerce, Marketing, and Theoretical Aspects, (165-176)
  409. Patel K, Fogarty J, Landay J and Harrison B Examining difficulties software developers encounter in the adoption of statistical machine learning Proceedings of the 23rd national conference on Artificial intelligence - Volume 3, (1563-1566)
  410. ACM
    Teixidó-Navarro F, Orriols-Puig A and Bernadó-Mansilla E Hierarchical evolution of linear regressors Proceedings of the 10th annual conference on Genetic and evolutionary computation, (1413-1420)
  411. ACM
    Llorà X, Yasui N and Goldberg D Graph-theoretic measure for active iGAs Proceedings of the 10th annual conference on Genetic and evolutionary computation, (985-992)
  412. ACM
    Su J, Zhang H, Ling C and Matwin S Discriminative parameter learning for Bayesian networks Proceedings of the 25th international conference on Machine learning, (1016-1023)
  413. Fersini E, Messina E and Archetti F (2008). Enhancing web page classification through image-block importance analysis, Information Processing and Management: an International Journal, 44:4, (1431-1447), Online publication date: 1-Jul-2008.
  414. Kamphuis C, Pietersma D, van der Tol R, Wiedemann M and Hogeveen H (2008). Using sensor data patterns from an automatic milking system to develop predictive variables for classifying clinical mastitis and abnormal milk, Computers and Electronics in Agriculture, 62:2, (169-181), Online publication date: 1-Jul-2008.
  415. Dumitriu L, Craciun M, Cocu A and Segal C Pre-processing Techniques for the QSAR Problem Proceedings of the 2008 conference on New Trends in Multimedia and Network Information Systems, (107-114)
  416. Wang Q, Zhang L, Chi M and Guo J MTForest Proceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence, (122-126)
  417. ACM
    Shrinivas L and Naughton J Issues in applying data mining to grid job failure detection and diagnosis Proceedings of the 17th international symposium on High performance distributed computing, (239-240)
  418. Ewald R, Himmelspach J and Uhrmacher A An Algorithm Selection Approach for Simulation Systems Proceedings of the 22nd Workshop on Principles of Advanced and Distributed Simulation, (91-98)
  419. Jorgensen Z, Zhou Y and Inge M (2008). A Multiple Instance Learning Strategy for Combating Good Word Attacks on Spam Filters, The Journal of Machine Learning Research, 9, (1115-1146), Online publication date: 1-Jun-2008.
  420. Garriga G, Kralj P and Lavrač N (2008). Closed Sets for Labeled Data, The Journal of Machine Learning Research, 9, (559-580), Online publication date: 1-Jun-2008.
  421. Bibi S, Stamelos I and Angelis L (2008). Combining probabilistic models for explanatory productivity estimation, Information and Software Technology, 50:7-8, (656-669), Online publication date: 1-Jun-2008.
  422. ACM
    Fawcett T (2008). Data mining with cellular automata, ACM SIGKDD Explorations Newsletter, 10:1, (32-39), Online publication date: 31-May-2008.
  423. Wang B, Spencer B, Ling C and Zhang H Semi-supervised self-training for sentence subjectivity classification Proceedings of the Canadian Society for computational studies of intelligence, 21st conference on Advances in artificial intelligence, (344-355)
  424. Alaiz-Rodríguez R and Japkowicz N Assessing the impact of changing environments on classifier performance Proceedings of the Canadian Society for computational studies of intelligence, 21st conference on Advances in artificial intelligence, (13-24)
  425. Alaiz-Rodríguez R Local decision bagging of binary neural classifiers Proceedings of the Canadian Society for computational studies of intelligence, 21st conference on Advances in artificial intelligence, (1-12)
  426. Gopal R and Meher S Customer churn time prediction in mobile telecommunication industry using ordinal regression Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining, (884-889)
  427. Abe H and Tsumoto S Analyzing correlation coefficients of objective rule evaluation indices on classification rules Proceedings of the 3rd international conference on Rough sets and knowledge technology, (467-474)
  428. García-Rojas A, Gutiérrez M and Thalmann D Simulation of individual spontaneous reactive behavior Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 1, (143-150)
  429. ACM
    Bettenburg N, Premraj R, Zimmermann T and Kim S Extracting structural information from bug reports Proceedings of the 2008 international working conference on Mining software repositories, (27-30)
  430. Huang C, Yang D and Chuang Y (2008). Application of wrapper approach and composite classifier to the stock trend prediction, Expert Systems with Applications: An International Journal, 34:4, (2870-2878), Online publication date: 1-May-2008.
  431. Tsai C and Wu J (2008). Using neural network ensembles for bankruptcy prediction and credit scoring, Expert Systems with Applications: An International Journal, 34:4, (2639-2649), Online publication date: 1-May-2008.
  432. ACM
    Krause B, Schmitz C, Hotho A and Stumme G The anti-social tagger Proceedings of the 4th international workshop on Adversarial information retrieval on the web, (61-68)
  433. ACM
    Castillo C, Corsi C, Donato D, Ferragina P and Gionis A Query-log mining for detecting spam Proceedings of the 4th international workshop on Adversarial information retrieval on the web, (17-20)
  434. De Falco I, Cioppa A, Maisto D, Scafuri U and Tarantino E Automatic recognition of hand gestures with differential evolution Proceedings of the 2008 conference on Applications of evolutionary computing, (265-274)
  435. Qin Z and Lawry J (2008). LFOIL, Fuzzy Sets and Systems, 159:4, (435-448), Online publication date: 20-Feb-2008.
  436. Malagón C, Barrio J and Nieto D Pixel-by-pixel base representation in image classification from Cherenkov telescopes Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications, (12-16)
  437. ACM
    Becchetti L, Castillo C, Donato D, Baeza-YATES R and Leonardi S (2008). Link analysis for Web spam detection, ACM Transactions on the Web, 2:1, (1-42), Online publication date: 1-Feb-2008.
  438. Šajn L and Kononenko I (2008). Multiresolution image parametrization for improving texture classification, EURASIP Journal on Advances in Signal Processing, 2008, (1-12), Online publication date: 1-Jan-2008.
  439. Tsymbal A, Pechenizkiy M, Cunningham P and Puuronen S (2008). Dynamic integration of classifiers for handling concept drift, Information Fusion, 9:1, (56-68), Online publication date: 1-Jan-2008.
  440. Podolak I (2008). Hierarchical classifier with overlapping class groups, Expert Systems with Applications: An International Journal, 34:1, (673-682), Online publication date: 1-Jan-2008.
  441. Jonsdottir T, Hvannberg E, Sigurdsson H and Sigurdsson S (2008). The feasibility of constructing a Predictive Outcome Model for breast cancer using the tools of data mining, Expert Systems with Applications: An International Journal, 34:1, (108-118), Online publication date: 1-Jan-2008.
  442. Hung C and Huang Y (2008). Conflict-sensitivity contexture learning algorithm for mining interesting patterns using neuro-fuzzy network with decision rules, Expert Systems with Applications: An International Journal, 34:1, (159-172), Online publication date: 1-Jan-2008.
  443. Kalles D (2008). Students working for students on programming courses, Computers & Education, 50:1, (91-97), Online publication date: 1-Jan-2008.
  444. Nepomuceno-Chamorro I, Aguilar-Ruiz J, Díaz-Díaz N, Rodríguez-Baena D and García J A deterministic model to infer gene networks from microarray data Proceedings of the 8th international conference on Intelligent data engineering and automated learning, (850-859)
  445. Leite R and Brazdil P An iterative process for building learning curves and predicting relative performance of classifiers Proceedings of the aritficial intelligence 13th Portuguese conference on Progress in artificial intelligence, (87-98)
  446. Christen P Evaluation of a graduate level data mining course with industry participants Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70, (233-241)
  447. Stewart B Reflection on development and delivery of a data mining unit Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70, (225-232)
  448. Quinn A, Stranieri A and Yearwood J Classification for accuracy and insight Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70, (203-208)
  449. Zhou Y, Leung H and Winoto P (2007). MNav, IEEE Transactions on Software Engineering, 33:12, (869-890), Online publication date: 1-Dec-2007.
  450. Geng X, Zhou Z and Smith-Miles K (2007). Automatic Age Estimation Based on Facial Aging Patterns, IEEE Transactions on Pattern Analysis and Machine Intelligence, 29:12, (2234-2240), Online publication date: 1-Dec-2007.
  451. Yang Y, Webb G, Cerquides J, Korb K, Boughton J and Ting K (2007). To Select or To Weigh, IEEE Transactions on Knowledge and Data Engineering, 19:12, (1652-1665), Online publication date: 1-Dec-2007.
  452. Celikel E, Kantarcioglu M, Thuraisingham B and Bertino E Managing Risks in RBAC Employed Distributed Environments On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, (1548-1566)
  453. ACM
    Rienks R, Nijholt A and Heylen D Verbal behavior of the more and the less influential meeting participant Proceedings of the 2007 workshop on Tagging, mining and retrieval of human related activity information, (1-8)
  454. Osei-Bryson K (2007). Post-pruning in decision tree induction using multiple performance measures, Computers and Operations Research, 34:11, (3331-3345), Online publication date: 1-Nov-2007.
  455. Castillo C, Donato D and Gionis A Estimating number of citations using author reputation Proceedings of the 14th international conference on String processing and information retrieval, (107-117)
  456. ACM
    Avgustinov P, Tibble J and de Moor O (2007). Making trace monitors feasible, ACM SIGPLAN Notices, 42:10, (589-608), Online publication date: 21-Oct-2007.
  457. ACM
    Avgustinov P, Tibble J and de Moor O Making trace monitors feasible Proceedings of the 22nd annual ACM SIGPLAN conference on Object-oriented programming systems, languages and applications, (589-608)
  458. ACM
    Mutlu B, Krause A, Forlizzi J, Guestrin C and Hodgins J Robust, low-cost, non-intrusive sensing and recognition of seated postures Proceedings of the 20th annual ACM symposium on User interface software and technology, (149-158)
  459. Apolloni B and Bassis S (2007). A new goodness-of-fit statistical test, Intelligent Decision Technologies, 1:4, (205-218), Online publication date: 1-Oct-2007.
  460. Kuo R, Lin S and Shih C (2007). Mining association rules through integration of clustering analysis and ant colony system for health insurance database in Taiwan, Expert Systems with Applications: An International Journal, 33:3, (794-808), Online publication date: 1-Oct-2007.
  461. Alfred R and Kazakov D Discretization numbers for multiple-instances problem in relational database Proceedings of the 11th East European conference on Advances in databases and information systems, (55-65)
  462. ACM
    Moncrieff S, Venkatesh S and West G Privacy and the access of information in a smart house environment Proceedings of the 15th ACM international conference on Multimedia, (671-680)
  463. Bulitko V, Björnsson Y, Luštrek M, Schaeffer J and Sigmundarson S Dynamic control in path-planning with real-time heuristic search Proceedings of the Seventeenth International Conference on International Conference on Automated Planning and Scheduling, (49-56)
  464. Abe H, Hirabayashi S, Ohsaki M and Yamaguchi T Evaluating accuracies of a trading rule mining method based on temporal pattern extraction Proceedings of the 3rd ECML/PKDD international conference on Mining complex data, (72-81)
  465. Hofer J and Fahringer T Grid Application Fault Diagnosis Using Wrapper Services and Machine Learning Proceedings of the 5th international conference on Service-Oriented Computing, (233-244)
  466. Sheng V and Ling C Roulette Sampling for Cost-Sensitive Learning Proceedings of the 18th European conference on Machine Learning, (724-731)
  467. Park S and Fürnkranz J Efficient Pairwise Classification Proceedings of the 18th European conference on Machine Learning, (658-665)
  468. Lomasky R, Brodley C, Aernecke M, Walt D and Friedl M Active Class Selection Proceedings of the 18th European conference on Machine Learning, (640-647)
  469. Abe H, Hirabayashi S, Ohsaki M and Yamaguchi T Evaluating accuracies of a trading rule mining method based on temporal pattern extraction Proceedings of the Third International Conference on Mining Complex Data, (72-81)
  470. Logan B, Healey J, Philipose M, Tapia E and Intille S A long-term evaluation of sensing modalities for activity recognition Proceedings of the 9th international conference on Ubiquitous computing, (483-500)
  471. Kuznetsov S Computing graph-based lattices from smallest projections Proceedings of the First international conference on Knowledge processing and data analysis, (35-47)
  472. Hilas C and Sahalos J An Application of Decision Trees for Rule Extraction Towards Telecommunications Fraud Detection Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference, (1112-1121)
  473. Abe H, Tsumoto S, Ohsaki M and Yamaguchi T Evaluating a Constructive Meta-learning Algorithm for a Rule Evaluation Support Method Based on Objective Indices Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference, (934-941)
  474. Bie R, Jin X, Chen C, Xu C and Huang R Meta learning intrusion detection in real time network Proceedings of the 17th international conference on Artificial neural networks, (809-816)
  475. Del Campo-Ávila J, Ramos-Jiménez G and Morales-Bueno R Incremental learning with multiple classifier systems using correction filters for classification Proceedings of the 7th international conference on Intelligent data analysis, (106-117)
  476. Zhang M, Jiang W, Clifton C and Prabhakar S Identifying rare classes with sparse training data Proceedings of the 18th international conference on Database and Expert Systems Applications, (751-760)
  477. Zhang H and Zhang X (2007). Comments on "Data Mining Static Code Attributes to Learn Defect Predictors", IEEE Transactions on Software Engineering, 33:9, (635-637), Online publication date: 1-Sep-2007.
  478. ACM
    Eisenstein J and Davis R Visual and linguistic information in gesture classification ACM SIGGRAPH 2007 courses, (15-es)
  479. Rosset S, Perlich C and Zadrozny B (2007). Ranking-based evaluation of regression models, Knowledge and Information Systems, 12:3, (331-353), Online publication date: 3-Aug-2007.
  480. Khoshgoftaar T, Van Hulse J, Seiffert C and Zhao L (2007). The multiple imputation quantitative noise corrector, Intelligent Data Analysis, 11:3, (245-263), Online publication date: 1-Aug-2007.
  481. Kuncheva L, del Rio Vilas V and Rodríguez J (2007). Diagnosing scrapie in sheep, Computers in Biology and Medicine, 37:8, (1194-1202), Online publication date: 1-Aug-2007.
  482. Pietraszek T (2007). On the use of ROC analysis for the optimization of abstaining classifiers, Machine Language, 68:2, (137-169), Online publication date: 1-Aug-2007.
  483. Razavi A, Gill H, Åhlfeldt H and Shahsavar N (2007). Predicting Metastasis in Breast Cancer, Journal of Medical Systems, 31:4, (263-273), Online publication date: 1-Aug-2007.
  484. Loukeris N Corporate financial analysis with efficient logistic regressions and hybrids of neuro-genetic networks Proceedings of the 11th WSEAS International Conference on Computers, (689-694)
  485. ACM
    Castillo C, Donato D, Gionis A, Murdock V and Silvestri F Know your neighbors Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, (423-430)
  486. ACM
    Huffman S, Lehman A, Stolboushkin A, Wong-Toi H, Yang F and Roehrig H Multiple-signal duplicate detection for search evaluation Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, (223-230)
  487. Berka P and Labsky M Predicting page occurrence in a click-stream data Proceedings of the 7th industrial conference on Advances in data mining: theoretical aspects and applications, (135-147)
  488. ACM
    Petrakis E, Voutsakis E and Milios E Searching for logo and trademark images on the web Proceedings of the 6th ACM international conference on Image and video retrieval, (541-548)
  489. ACM
    Hodge V, Eakins J and Austin J Inducing a perceptual relevance shape classifier Proceedings of the 6th ACM international conference on Image and video retrieval, (138-145)
  490. ACM
    Shankar A, Louis S, Dascalu S, Houmanfar R and Hayes L XCS for adaptive user-interfaces Proceedings of the 9th annual conference on Genetic and evolutionary computation, (1876-1876)
  491. ACM
    Smith M and Bull L Improving the human readability of features constructed by genetic programming Proceedings of the 9th annual conference on Genetic and evolutionary computation, (1694-1701)
  492. ACM
    Bacardit J, Stout M, Hirst J, Sastry K, Llorà X and Krasnogor N Automated alphabet reduction method with evolutionary algorithms for protein structure prediction Proceedings of the 9th annual conference on Genetic and evolutionary computation, (346-353)
  493. Tirenni G, Labbi A, Berrospi C, Elisseeff A, Bhose T, Pauro K and Pöyhönen S (2007). The 2005 ISMS Practice Prize Winner---Customer Equity and Lifetime Management CELM Finnair Case Study, Marketing Science, 26:4, (553-565), Online publication date: 1-Jul-2007.
  494. ACM
    Jones R and Diaz F (2007). Temporal profiles of queries, ACM Transactions on Information Systems, 25:3, (14-es), Online publication date: 1-Jul-2007.
  495. Rooney N, Patterson D and Nugent C (2007). Non-strict heterogeneous Stacking, Pattern Recognition Letters, 28:9, (1050-1061), Online publication date: 1-Jul-2007.
  496. Wang R and Neumann G Recognizing textual entailment using sentence similarity based on dependency tree skeletons Proceedings of the ACL-PASCAL Workshop on Textual Entailment and Paraphrasing, (36-41)
  497. Gao M, Liu J, Zhong N, Liu C and Chen F A Learning-Based Model for Semantic Mapping from Natural Language Questions to OWL Proceedings of the international conference on Rough Sets and Intelligent Systems Paradigms, (803-812)
  498. Nulty P Semantic classification of noun phrases using web counts and learning algorithms Proceedings of the 45th Annual Meeting of the ACL: Student Research Workshop, (79-84)
  499. Nulty P UCD-PN Proceedings of the 4th International Workshop on Semantic Evaluations, (374-377)
  500. Hendrickx I, Morante R, Sporleder C and van den Bosch A ILK Proceedings of the 4th International Workshop on Semantic Evaluations, (187-190)
  501. Franco L, Subirats J, Molina I, Alba E, Jerez J and Jerez J Early breast cancer prognosis prediction and rule extraction using a new constructive neural network algorithm Proceedings of the 9th international work conference on Artificial neural networks, (1004-1011)
  502. Bernik M, Florjančič J, Črnigoj D and Bernik I Using information technology for human resource management decisions Proceedings of the 8th Conference on 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics - Volume 8, (130-133)
  503. Jin X and Bie R Frequent variable sets based clustering for artificial neural networks particle classification Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management, (857-867)
  504. ACM
    Ha J, Rossbach C, Davis J, Roy I, Ramadan H, Porter D, Chen D and Witchel E Improved error reporting for software that uses black-box components Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation, (101-111)
  505. ACM
    Shepherd D, Pollock L and Vijay-Shanker K Case study Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, (49-54)
  506. Lombriser C, Bharatula N, Roggen D and Tröster G On-body activity recognition in a dynamic sensor network Proceedings of the ICST 2nd international conference on Body area networks, (1-6)
  507. Kotsiantis S Supervised Machine Learning Proceedings of the 2007 conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies, (3-24)
  508. ACM
    Ha J, Rossbach C, Davis J, Roy I, Ramadan H, Porter D, Chen D and Witchel E (2007). Improved error reporting for software that uses black-box components, ACM SIGPLAN Notices, 42:6, (101-111), Online publication date: 10-Jun-2007.
  509. Juhola M, Aalto H and Hirvonen T (2007). Using results of eye movement signal analysis in the neural network recognition of otoneurological patients, Computer Methods and Programs in Biomedicine, 86:3, (216-226), Online publication date: 1-Jun-2007.
  510. de Sousa E, Traina C, Traina A, Wu L and Faloutsos C (2007). A fast and effective method to find correlations among attributes in databases, Data Mining and Knowledge Discovery, 14:3, (367-407), Online publication date: 1-Jun-2007.
  511. Benediktsson J, Chanussot J and Fauvel M Multiple classifier systems in remote sensing Proceedings of the 7th international conference on Multiple classifier systems, (501-512)
  512. Zhang L, Li Z and Chen H An effective gene selection method based on relevance analysis and discernibility matrix Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining, (1088-1095)
  513. Aßfalg J, Kriegel H, Pryakhin A and Schubert M Multi-represented classification based on confidence estimation Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining, (23-34)
  514. ACM
    Pardoe D and Stone P Adapting in agent-based markets Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, (1-3)
  515. ACM
    Bourgne G, El Fallah Segrouchni A and Soldano H SMILE Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, (1-8)
  516. Chen L, Goldgof D, Hall L and Eschrich S Noise-based feature perturbation as a selection method for microarray data Proceedings of the 3rd international conference on Bioinformatics research and applications, (237-247)
  517. Macskassy S and Provost F (2007). Classification in Networked Data: A Toolkit and a Univariate Case Study, The Journal of Machine Learning Research, 8, (935-983), Online publication date: 1-May-2007.
  518. Landwehr N, Kersting K and Raedt L (2007). Integrating Naïve Bayes and FOIL, The Journal of Machine Learning Research, 8, (481-507), Online publication date: 1-May-2007.
  519. ACM
    Moncrieff S, Venkatesh S and West G (2007). Online audio background determination for complex audio environments, ACM Transactions on Multimedia Computing, Communications, and Applications, 3:2, (8-es), Online publication date: 1-May-2007.
  520. ACM
    Fogarty J and Hudson S Toolkit support for developing and deploying sensor-based statistical models of human situations Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (135-144)
  521. Falcone J, Kreuter R, Belin D and Chopard B Understanding signal sequences with machine learning Proceedings of the 5th European conference on Evolutionary computation, machine learning and data mining in bioinformatics, (57-67)
  522. Monz C Model tree learning for query term weighting in question answering Proceedings of the 29th European conference on IR research, (589-596)
  523. Kotsiantis S, Tzelepis D, Koumanakos E and Tampakas V (2007). Selective costing voting for bankruptcy prediction, International Journal of Knowledge-based and Intelligent Engineering Systems, 11:2, (115-127), Online publication date: 1-Apr-2007.
  524. Kharbat F, Odeh M and Bull L (2007). New approach for extracting knowledge from the XCS learning classifier system, International Journal of Hybrid Intelligent Systems, 4:2, (49-62), Online publication date: 1-Apr-2007.
  525. Chuang K, Lin K and Chen M (2007). Quality-Aware Sampling and Its Applications in Incremental Data Mining, IEEE Transactions on Knowledge and Data Engineering, 19:4, (468-484), Online publication date: 1-Apr-2007.
  526. Weskamp N, Hullermeier E, Kuhn D and Klebe G (2007). Multiple Graph Alignment for the Structural Analysis of Protein Active Sites, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 4:2, (310-320), Online publication date: 1-Apr-2007.
  527. Naveed M, Cowling P and Hossain M Hybrid Evolutionary Learning Approaches for The Virus Game Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Games, (196-202)
  528. Alexe G, Alexe S, Bonates T and Kogan A (2007). Logical analysis of data --- the vision of Peter L. Hammer, Annals of Mathematics and Artificial Intelligence, 49:1-4, (265-312), Online publication date: 1-Apr-2007.
  529. Amirbekyan A and Estivill-Castro V The privacy of k-NN retrieval for horizontal partitioned data Proceedings of the eighteenth conference on Australasian database - Volume 63, (33-42)
  530. ACM
    Jin X, Li R, Shen X and Bie R Automatic web pages categorization with ReliefF and Hidden Naive Bayes Proceedings of the 2007 ACM symposium on Applied computing, (617-621)
  531. ACM
    Pinto C and Gama J Incremental discretization, application to data with concept drift Proceedings of the 2007 ACM symposium on Applied computing, (467-468)
  532. THABTAH F (2007). A review of associative classification mining, The Knowledge Engineering Review, 22:1, (37-65), Online publication date: 1-Mar-2007.
  533. Zhao Y and Zobel J Searching with style Proceedings of the thirtieth Australasian conference on Computer science - Volume 62, (59-68)
  534. ACM
    Shankar A, Louis S, Dascalu S, Hayes L and Houmanfar R User-context for adaptive user interfaces Proceedings of the 12th international conference on Intelligent user interfaces, (321-324)
  535. ACM
    Avgustinov P, Hajiyev E, Ongkingco N, de Moor O, Sereni D, Tibble J and Verbaere M Semantics of static pointcuts in aspectJ Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (11-23)
  536. ACM
    Avgustinov P, Hajiyev E, Ongkingco N, de Moor O, Sereni D, Tibble J and Verbaere M (2007). Semantics of static pointcuts in aspectJ, ACM SIGPLAN Notices, 42:1, (11-23), Online publication date: 17-Jan-2007.
  537. Rooney N and Patterson D A fusion of stacking with dynamic integration Proceedings of the 20th international joint conference on Artifical intelligence, (2844-2849)
  538. Filho J and Wainer J Using a hierarchical Bayesian model to handle high cardinality attributes with relevant interactions in a classification problem Proceedings of the 20th international joint conference on Artifical intelligence, (2504-2509)
  539. Kumar M, Garera N and Rudnicky A Learning from the report-writing behavior of individuals Proceedings of the 20th international joint conference on Artifical intelligence, (1641-1646)
  540. Zhao Z and Liu H Searching for interacting features Proceedings of the 20th international joint conference on Artifical intelligence, (1156-1161)
  541. Wildstrom J, Stone P, Witchel E and Dahlin M Machine learning for on-line hardware reconfiguration Proceedings of the 20th international joint conference on Artifical intelligence, (1113-1118)
  542. Li J, Zhang C, Wang T and Zhang Y Generalized additive Bayesian network classifiers Proceedings of the 20th international joint conference on Artifical intelligence, (913-918)
  543. Alvarez I, Bernard S and Deffuant G Keep the decision tree and estimate the class probabilities using its decision boundary Proceedings of the 20th international joint conference on Artifical intelligence, (654-659)
  544. Stone P Learning and multiagent reasoning for autonomous agents Proceedings of the 20th international joint conference on Artifical intelligence, (13-30)
  545. Xu J (2007). Formalizing natural-language spatial relations between linear objects with topological and metric properties, International Journal of Geographical Information Science, 21:4, (377-395), Online publication date: 4-Jan-2007.
  546. Bacardit J and Garrell J Bloat control and generalization pressure using the minimum description length principle for a pittsburgh approach learning classifier system Proceedings of the 2003-2005 international conference on Learning classifier systems, (59-79)
  547. Scholz M and Klinkenberg R (2007). Boosting classifiers for drifting concepts, Intelligent Data Analysis, 11:1, (3-28), Online publication date: 1-Jan-2007.
  548. Banfield R, Hall L, Bowyer K and Kegelmeyer W (2007). A Comparison of Decision Tree Ensemble Creation Techniques, IEEE Transactions on Pattern Analysis and Machine Intelligence, 29:1, (173-180), Online publication date: 1-Jan-2007.
  549. Poliner G and Ellis D (2007). A discriminative model for polyphonic piano transcription, EURASIP Journal on Advances in Signal Processing, 2007:1, (154-154), Online publication date: 1-Jan-2007.
  550. ACM
    Inkpen D (2007). A statistical model for near-synonym choice, ACM Transactions on Speech and Language Processing , 4:1, (1-17), Online publication date: 1-Jan-2007.
  551. Güneş Koru A and Liu H (2007). Identifying and characterizing change-prone classes in two large-scale open-source products, Journal of Systems and Software, 80:1, (63-73), Online publication date: 1-Jan-2007.
  552. Pérez M, Sánchez A, Robles V, Herrero P and Peña J (2007). Design and implementation of a data mining grid-aware architecture, Future Generation Computer Systems, 23:1, (42-47), Online publication date: 1-Jan-2007.
  553. Nock R and Nielsen F (2007). A Real generalization of discrete AdaBoost, Artificial Intelligence, 171:1, (25-41), Online publication date: 1-Jan-2007.
  554. Varde A, Liang J, Rundensteiner E and Sisson R Mining images of material nanostructure data Proceedings of the Third international conference on Distributed Computing and Internet Technology, (403-413)
  555. Reddy D, Dash S and Pujari A New malicious code detection using variable length n-grams Proceedings of the Second international conference on Information Systems Security, (276-288)
  556. Symeonidis A, Nikolaidou V and Mitkas P Exploiting Data Mining Techniques for Improving the Efficiency of a Supply Chain Management Agent Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, (23-26)
  557. Jung S, Kang M and Kwon H Hybrid approach to extracting information from web-tables Proceedings of the 21st international conference on Computer Processing of Oriental Languages: beyond the orient: the research challenges ahead, (109-119)
  558. Ali S and Smith-Miles K Improved support vector machine generalization using normalized input space Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence, (362-371)
  559. Bouckaert R Voting massive collections of bayesian network classifiers for data streams Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence, (243-252)
  560. Bouckaert R Efficient AUC learning curve calculation Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence, (181-191)
  561. Sun B, Ryu J and Han K Structure detection system from web documents through backpropagation network learning Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence, (1281-1287)
  562. Liang H and Yan Y Lazy learning for improving ranking of decision trees Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence, (1173-1178)
  563. Scanlan J, Hartnett J and Williams R DynamicWEB Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence, (1059-1063)
  564. Van Hulse J and Khoshgoftaar T (2006). Class noise detection using frequent itemsets, Intelligent Data Analysis, 10:6, (487-507), Online publication date: 1-Dec-2006.
  565. Bevk M and Kononenko I (2006). Towards symbolic mining of images with association rules: Preliminary results on textures, Intelligent Data Analysis, 10:4, (379-393), Online publication date: 1-Dec-2006.
  566. Ahn H (2006). Utilizing Popularity Characteristics for Product Recommendation, International Journal of Electronic Commerce, 11:2, (59-80), Online publication date: 1-Dec-2006.
  567. ACM
    Li B, Li W and Lu Q (2006). Topic tracking with time granularity reasoning, ACM Transactions on Asian Language Information Processing, 5:4, (388-412), Online publication date: 1-Dec-2006.
  568. Kurgan L and Homaeian L (2006). Prediction of structural classes for protein sequences and domains-Impact of prediction algorithms, sequence representation and homology, and test procedures on accuracy, Pattern Recognition, 39:12, (2323-2343), Online publication date: 1-Dec-2006.
  569. Uludag M and Tolun M (2006). Short communication, Knowledge-Based Systems, 19:8, (765-771), Online publication date: 1-Dec-2006.
  570. Lauría E and Duchessi P (2006). A Bayesian belief network for IT implementation decision support, Decision Support Systems, 42:3, (1573-1588), Online publication date: 1-Dec-2006.
  571. Chen Y, Li Y, Cheng X and Guo L Survey and taxonomy of feature selection algorithms in intrusion detection system Proceedings of the Second SKLOIS conference on Information Security and Cryptology, (153-167)
  572. ACM
    Tuler E, Prates R, Almir F, Rocha L and Meira W Caracterizando desafios de interação com sistemas de mineração de regras de associação Proceedings of VII Brazilian symposium on Human factors in computing systems, (40-49)
  573. Abe H, Tsumoto S, Ohsaki M and Yamaguchi T Evaluating learning models for a rule evaluation support method based on objective indices Proceedings of the 5th international conference on Rough Sets and Current Trends in Computing, (687-695)
  574. Lee Y, Kang J, Kang B and Ryu K Sampling of virtual examples to improve classification accuracy for nominal attribute data Proceedings of the 5th international conference on Rough Sets and Current Trends in Computing, (637-646)
  575. Jensen R and Shen Q Webpage classification with ACO-enhanced fuzzy-rough feature selection Proceedings of the 5th international conference on Rough Sets and Current Trends in Computing, (147-156)
  576. Menzies T, Chen Z, Hihn J and Lum K (2006). Selecting Best Practices for Effort Estimation, IEEE Transactions on Software Engineering, 32:11, (883-895), Online publication date: 1-Nov-2006.
  577. Kostin A (2006). A simple and fast multi-class piecewise linear pattern classifier, Pattern Recognition, 39:11, (1949-1962), Online publication date: 1-Nov-2006.
  578. Chen G, Liu H, Yu L, Wei Q and Zhang X (2006). A new approach to classification based on association rule mining, Decision Support Systems, 42:2, (674-689), Online publication date: 1-Nov-2006.
  579. ACM
    Zhou Q, Gu L, Wang C, Wang-jun and Chen S Using an improved C4.5 for imbalanced dataset of intrusion Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-4)
  580. Jeong J, Shin D, Cho C and Shin D Structural similarity mining in semi-structured microarray data for efficient storage construction Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I, (720-729)
  581. ACM
    Witt H and Kenn H Towards implicit interaction by using wearable interaction device sensors for more than one task Proceedings of the 3rd international conference on Mobile technology, applications & systems, (20-es)
  582. ACM
    Fernández G, Cuenca P, Barbosa L and Kalva H Very low complexity MPEG-2 to H.264 transcoding using machine learning Proceedings of the 14th ACM international conference on Multimedia, (931-940)
  583. Lee H, Monard M and Wu F A fractal dimension based filter algorithm to select features for supervised learning Proceedings of the 2nd international joint conference, and Proceedings of the 10th Ibero-American Conference on AI 18th Brazilian conference on Advances in Artificial Intelligence, (278-288)
  584. de Aquino R, Ferreira A, Carvalho M, Lira M, Silva G and Neto O Development of a hybrid intelligent system for electrical load forecasting Proceedings of the 2nd international joint conference, and Proceedings of the 10th Ibero-American Conference on AI 18th Brazilian conference on Advances in Artificial Intelligence, (228-237)
  585. Lee M and Park S Comparative analysis of classification methods for protein interaction verification system Proceedings of the 4th international conference on Advances in Information Systems, (227-236)
  586. ACM
    Fogarty J, Au C and Hudson S Sensing from the basement Proceedings of the 19th annual ACM symposium on User interface software and technology, (91-100)
  587. ACM
    Gómez Hidalgo J, Bringas G, Sánz E and García F Content based SMS spam filtering Proceedings of the 2006 ACM symposium on Document engineering, (107-114)
  588. Zhang L and Li Z Gene selection for classifying microarray data using grey relation analysis Proceedings of the 9th international conference on Discovery Science, (378-382)
  589. Minku F and Ludermir T EFuNN ensembles construction using a clustering method and a coevolutionary multi-objective genetic algorithm Proceedings of the 13th international conference on Neural information processing - Volume Part III, (884-891)
  590. Ahn H, Lee K and Kim K Global optimization of support vector machines using genetic algorithms for bankruptcy prediction Proceedings of the 13th international conference on Neural information processing - Volume Part III, (420-429)
  591. de Souto M, Bittencourt V and Costa J An empirical analysis of under-sampling techniques to balance a protein structural class dataset Proceedings of the 13th international conference on Neural information processing - Volume Part III, (21-29)
  592. Jiang T and Tuzhilin A (2006). Segmenting Customers from Population to Individuals, IEEE Transactions on Knowledge and Data Engineering, 18:10, (1297-1311), Online publication date: 1-Oct-2006.
  593. Thomassey S and Fiordaliso A (2006). A hybrid sales forecasting system based on clustering and decision trees, Decision Support Systems, 42:1, (408-421), Online publication date: 1-Oct-2006.
  594. Petruzzellis S, Licchelli O, Palmisano I, Bavaro V and Palmisano C Employee profiling in the total reward management Proceedings of the 16th international conference on Foundations of Intelligent Systems, (739-744)
  595. Abe H, Tsumoto S, Ohsaki M and Yamaguchi T Evaluating learning algorithms for a rule evaluation support method based on objective rule evaluation indices Proceedings of the 16th international conference on Foundations of Intelligent Systems, (379-388)
  596. ACM
    Markov Z and Russell I (2006). An introduction to the WEKA data mining system, ACM SIGCSE Bulletin, 38:3, (367-368), Online publication date: 26-Sep-2006.
  597. Guo G, Neagu D, Huang X and Bi Y An effective combination of multiple classifiers for toxicity prediction Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery, (481-490)
  598. Jiang L, Zhang H and Cai Z Dynamic k-nearest-neighbor naive bayes with attribute weighted Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery, (365-368)
  599. Quang V, Castelli E and Yên P A decision tree-based method for speech processing Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery, (1205-1212)
  600. Annunziato M, Bertini I, Iannone R and Pizzuti S Evolving feed-forward neural networks through evolutionary mutation parameters Proceedings of the 7th international conference on Intelligent Data Engineering and Automated Learning, (554-561)
  601. Tsymbal A, Pechenizkiy M and Cunningham P Dynamic integration with random forests Proceedings of the 17th European conference on Machine Learning, (801-808)
  602. Körner C and Wrobel S Multi-class ensemble-based active learning Proceedings of the 17th European conference on Machine Learning, (687-694)
  603. Brinker K and Hüllermeier E Case-Based label ranking Proceedings of the 17th European conference on Machine Learning, (566-573)
  604. Wang B and Zhang H Improving the ranking performance of decision trees Proceedings of the 17th European conference on Machine Learning, (461-472)
  605. Scholz M Boosting in PN spaces Proceedings of the 17th European conference on Machine Learning, (377-388)
  606. Pappa G and Freitas A Automatically evolving rule induction algorithms Proceedings of the 17th European conference on Machine Learning, (341-352)
  607. Öztürk Ö and Çiloğlu T Segmental duration modelling in turkish Proceedings of the 9th international conference on Text, Speech and Dialogue, (669-676)
  608. de Aquino R, Ferreira A, Carvalho M, Lira M, Silva G and Neto O Combining artificial neural networks and heuristic rules in a hybrid intelligent load forecast system Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II, (757-766)
  609. Kotsiantis S, Koumanakos E, Tzelepis D and Tampakas V Financial application of neural networks Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II, (672-681)
  610. McDonnell N and Cunningham P A knowledge-light approach to regression using case-based reasoning Proceedings of the 8th European conference on Advances in Case-Based Reasoning, (91-105)
  611. Li X and Sarkar S (2006). Privacy Protection in Data Mining, Information Systems Research, 17:3, (254-270), Online publication date: 1-Sep-2006.
  612. ACM
    Zhang Y and Jin X (2006). An automatic construction and organization strategy for ensemble learning on data streams, ACM SIGMOD Record, 35:3, (28-33), Online publication date: 1-Sep-2006.
  613. Durant K and Smith M Predicting the political sentiment of web log posts using supervised machine learning techniques coupled with feature selection Proceedings of the 8th Knowledge discovery on the web international conference on Advances in web mining and web usage analysis, (187-206)
  614. ACM
    Mierswa I, Wurst M, Klinkenberg R, Scholz M and Euler T YALE Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (935-940)
  615. ACM
    Ling C, Sheng V, Bruckhaus T and Madhavji N Maximum profit mining and its application in software development Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (929-934)
  616. ACM
    Guo H and Viktor H Mining relational data through correlation-based multiple view validation Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (567-573)
  617. ACM
    Buciluǎ C, Caruana R and Niculescu-Mizil A Model compression Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (535-541)
  618. ACM
    Forman G Quantifying trends accurately despite classifier error and class imbalance Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (157-166)
  619. ACM
    Achtert E, Böhm C, Kriegel H, Kröger P and Zimek A Deriving quantitative models for correlation clusters Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (4-13)
  620. Alfred R and Kazakov D Data summarization approach to relational domain learning based on frequent pattern to support the development of decision making Proceedings of the Second international conference on Advanced Data Mining and Applications, (889-898)
  621. Li H, Zhao R, Chen J and Xiang Y Research on multi-valued and multi-labeled decision trees Proceedings of the Second international conference on Advanced Data Mining and Applications, (247-254)
  622. Neagu D, Guo G and Wang S An effective combination based on class-wise expertise of diverse classifiers for predictive toxicology data mining Proceedings of the Second international conference on Advanced Data Mining and Applications, (165-172)
  623. Jiang L and Zhang H Weightily averaged one-dependence estimators Proceedings of the 9th Pacific Rim international conference on Artificial intelligence, (970-974)
  624. Li C and Jiang L Using locally weighted learning to improve SMOreg for regression Proceedings of the 9th Pacific Rim international conference on Artificial intelligence, (375-384)
  625. Abe H, Tsumoto S, Ohsaki M, Yokoi H and Yamaguchi T Evaluating learning algorithms with meta-learning schemes for a rule evaluation support method based on objective indices Proceedings of the 9th Pacific Rim Knowledge Acquisition international conference on Advances in Knowledge Acquisition and Management, (75-88)
  626. Kang B, Kelarev A, Sale A and Williams R A new model for classifying DNA code inspired by neural networks and FSA Proceedings of the 9th Pacific Rim Knowledge Acquisition international conference on Advances in Knowledge Acquisition and Management, (187-198)
  627. ACM
    Stein S, Argamon S and Frieder O The effect of OCR errors on stylistic text classification Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, (701-702)
  628. ACM
    Forman G Tackling concept drift by temporal inductive transfer Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, (252-259)
  629. Canuto A, Fagundes D, Abreu M and Junior J (2006). Using weighted dynamic classifier selection methods in ensembles with different levels of diversity, International Journal of Hybrid Intelligent Systems, 3:3, (147-158), Online publication date: 1-Aug-2006.
  630. ACM
    Eisenstein J and Davis R Visual and linguistic information in gesture classification ACM SIGGRAPH 2006 Courses, (30-es)
  631. Abe H, Tsumoto S, Ohsaki M and Yamaguchi T Developing a rule evaluation support method based on objective indices Proceedings of the First international conference on Rough Sets and Knowledge Technology, (456-461)
  632. Stoyanov V and Cardie C Partially supervised coreference resolution for opinion summarization through structured rule learning Proceedings of the 2006 Conference on Empirical Methods in Natural Language Processing, (336-344)
  633. Nissim M Learning information status of discourse entities Proceedings of the 2006 Conference on Empirical Methods in Natural Language Processing, (94-102)
  634. Oberlander J and Nowson S Whose thumb is it anyway? Proceedings of the COLING/ACL on Main conference poster sessions, (627-634)
  635. Su J and Zhang H A fast decision tree learning algorithm Proceedings of the 21st national conference on Artificial intelligence - Volume 1, (500-505)
  636. Lavesson N and Davidsson P Quantifying the impact of learning algorithm parameter tuning Proceedings of the 21st national conference on Artificial intelligence - Volume 1, (395-400)
  637. Fdez-Riverola F, Borrajo L, Laza R, Rodríguez F and Martínez D HTTPHunting Proceedings of the 6th Industrial Conference on Data Mining conference on Advances in Data Mining: applications in Medicine, Web Mining, Marketing, Image and Signal Mining, (91-105)
  638. Kaur H, Wasan S, Al-Hegami A and Bhatnagar V A unified approach for discovery of interesting association rules in medical databases Proceedings of the 6th Industrial Conference on Data Mining conference on Advances in Data Mining: applications in Medicine, Web Mining, Marketing, Image and Signal Mining, (53-63)
  639. Wu W, Gao Q and Wang M Extended fast feature selection for classification modeling Proceedings of the 10th WSEAS international conference on Computers, (13-18)
  640. ACM
    Belda I, Traus I, Gordo S, Tarragó T, Madurga S, Llorá X and Giralt E Peptide data mining Proceedings of the 8th annual conference on Genetic and evolutionary computation, (297-298)
  641. ACM
    Bacardit J, Stout M, Krasnogor N, Hirst J and Blazewicz J Coordination number prediction using learning classifier systems Proceedings of the 8th annual conference on Genetic and evolutionary computation, (247-254)
  642. Berlin J and Motro A TupleRank Proceedings of the 6th international conference on Next Generation Information Technologies and Systems, (13-25)
  643. Alhammady H and Ramamohanarao K (2006). Using Emerging Patterns to Construct Weighted Decision Trees, IEEE Transactions on Knowledge and Data Engineering, 18:7, (865-876), Online publication date: 1-Jul-2006.
  644. Chien B, Lu C and Hsu S Handling incomplete categorical data for supervised learning Proceedings of the 19th international conference on Advances in Applied Artificial Intelligence: industrial, Engineering and Other Applications of Applied Intelligent Systems, (1318-1328)
  645. Kang J, Ryu K and Kim K Determination of storage locations for incoming containers of uncertain weight Proceedings of the 19th international conference on Advances in Applied Artificial Intelligence: industrial, Engineering and Other Applications of Applied Intelligent Systems, (1159-1168)
  646. ACM
    Markov Z and Russell I An introduction to the WEKA data mining system Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education, (367-368)
  647. ACM
    Zheng F and Webb G Efficient lazy elimination for averaged one-dependence estimators Proceedings of the 23rd international conference on Machine learning, (1113-1120)
  648. ACM
    Su J and Zhang H Full Bayesian network classifiers Proceedings of the 23rd international conference on Machine learning, (897-904)
  649. ACM
    Singhi S and Liu H Feature subset selection bias for classification learning Proceedings of the 23rd international conference on Machine learning, (849-856)
  650. ACM
    Plaisant C, Rose J, Yu B, Auvil L, Kirschenbaum M, Smith M, Clement T and Lord G Exploring erotics in Emily Dickinson's correspondence with text mining and visual interfaces Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries, (141-150)
  651. Banerjee S and Rudnicky A You are what you say Proceedings of the HLT-NAACL 2006 Workshop on Analyzing Conversations in Text and Speech, (23-30)
  652. Su J and Zhang H Probabilistic inference trees for classification and ranking Proceedings of the 19th international conference on Advances in Artificial Intelligence: Canadian Society for Computational Studies of Intelligence, (526-537)
  653. Jiang L and Zhang H Lazy averaged one-dependence estimators Proceedings of the 19th international conference on Advances in Artificial Intelligence: Canadian Society for Computational Studies of Intelligence, (515-525)
  654. Jiang L and Zhang H Learning naive bayes for probability estimation by feature selection Proceedings of the 19th international conference on Advances in Artificial Intelligence: Canadian Society for Computational Studies of Intelligence, (503-514)
  655. Liang H and Yan Y Learning naïve bayes tree for conditional probability estimation Proceedings of the 19th international conference on Advances in Artificial Intelligence: Canadian Society for Computational Studies of Intelligence, (455-466)
  656. Eisenstein J and Davis R Gesture improves coreference resolution Proceedings of the Human Language Technology Conference of the NAACL, Companion Volume: Short Papers, (37-40)
  657. Duboue P and Chu-Carroll J Answering the question you wish they had asked Proceedings of the Human Language Technology Conference of the NAACL, Companion Volume: Short Papers, (33-36)
  658. Padmanabhan B, Zheng Z and Kimbrough S (2006). An empirical analysis of the value of complete information for ECRM models, MIS Quarterly, 30:2, (247-267), Online publication date: 1-Jun-2006.
  659. Fan H and Ramamohanarao K (2006). Fast Discovery and the Generalization of Strong Jumping Emerging Patterns for Building Compact and Accurate Classifiers, IEEE Transactions on Knowledge and Data Engineering, 18:6, (721-737), Online publication date: 1-Jun-2006.
  660. Ripoche G and Sansonnet J (2006). Experiences in Automating the Analysis of Linguistic Interactions for the Study of Distributed Collectives, Computer Supported Cooperative Work, 15:2-3, (149-183), Online publication date: 1-Jun-2006.
  661. ACM
    Anvik J Automating bug report assignment Proceedings of the 28th international conference on Software engineering, (937-940)
  662. ACM
    Anvik J, Hiew L and Murphy G Who should fix this bug? Proceedings of the 28th international conference on Software engineering, (361-370)
  663. Rodríguez D, Cuadrado J, Sicilia M and Ruiz R Segmentation of software engineering datasets using the m5 algorithm Proceedings of the 6th international conference on Computational Science - Volume Part IV, (789-796)
  664. Jin X, Liu Z, Bie R, Zhao G and Ma J Support vector machines for regression and applications to software quality prediction Proceedings of the 6th international conference on Computational Science - Volume Part IV, (781-788)
  665. Merschmann L and Plastino A HiSP Proceedings of the 6th international conference on Computational Science - Volume Part II, (863-870)
  666. Crăciun M, Cocu A, Dumitriu L and Segal C A hybrid feature selection algorithm for the QSAR problem Proceedings of the 6th international conference on Computational Science - Volume Part I, (172-178)
  667. Eapen A, Ponnambalam K, Arocha J, Shioda R, Smith T, Poss J and Hirdes J Data mining in mental health Proceedings of the 17th IASTED international conference on Modelling and simulation, (122-127)
  668. Fuller C, Biros D, Adkins M, Burgoon J, Nunamaker J and Coulon S Detecting deception in person-of-interest statements Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics, (504-509)
  669. Pham S and Hoffmann A Efficient Knowledge Acquisition for Extracting Temporal Relations Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (521-525)
  670. Nock R and Nielsen F A Real generalization of discrete AdaBoost Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (509-515)
  671. ACM
    Sun Z, Stent A and Ramakrishnan I Dialog generation for voice browsing Proceedings of the 2006 international cross-disciplinary workshop on Web accessibility (W4A): Building the mobile web: rediscovering accessibility?, (49-56)
  672. Kotsiantis S, Koumanakos E, Tzelepis D and Tampakas V Predicting fraudulent financial statements with machine learning techniques Proceedings of the 4th Helenic conference on Advances in Artificial Intelligence, (538-542)
  673. Hadzilacos T, Kalles D, Pierrakeas C and Xenos M On small data sets revealing big differences Proceedings of the 4th Helenic conference on Advances in Artificial Intelligence, (512-515)
  674. Tzanis G and Vlahavas I Prediction of translation initiation sites using classifier selection Proceedings of the 4th Helenic conference on Advances in Artificial Intelligence, (367-377)
  675. Mporas I, Ganchev T, Zervas P and Fakotakis N Recognition of greek phonemes using support vector machines Proceedings of the 4th Helenic conference on Advances in Artificial Intelligence, (290-300)
  676. Kotsiantis S, Kanellopoulos D and Pintelas P Local additive regression of decision stumps Proceedings of the 4th Helenic conference on Advances in Artificial Intelligence, (148-157)
  677. Kontogounis I, Chatzidimitriou K, Symeonidis A and Mitkas P A robust agent design for dynamic SCM environments Proceedings of the 4th Helenic conference on Advances in Artificial Intelligence, (127-136)
  678. Kanaris I, Kanaris K and Stamatatos E Spam detection using character n-grams Proceedings of the 4th Helenic conference on Advances in Artificial Intelligence, (95-104)
  679. Talia D, Trunfio P and Verta O WSRF services for composing distributed data mining applications on grids Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I, (1080-1089)
  680. Khoshgoftaar T and Van Hulse J (2006). Determining noisy instances relative to attributes of interest, Intelligent Data Analysis, 10:3, (251-268), Online publication date: 1-May-2006.
  681. Vens C and Blockeel H (2006). A simple regression based heuristic for learning model trees, Intelligent Data Analysis, 10:3, (215-236), Online publication date: 1-May-2006.
  682. Lee C, Liu A and Chen W (2006). Pattern Discovery of Fuzzy Time Series for Financial Prediction, IEEE Transactions on Knowledge and Data Engineering, 18:5, (613-625), Online publication date: 1-May-2006.
  683. Kelly D and Tangney B (2006). Adapting to intelligence profile in an adaptive educational system, Interacting with Computers, 18:3, (385-409), Online publication date: 1-May-2006.
  684. ACM
    Berger H, Merkl D and Dittenbach M Exploiting partial decision trees for feature subset selection in e-mail categorization Proceedings of the 2006 ACM symposium on Applied computing, (1105-1109)
  685. ACM
    Gama J and Pinto C Discretization from data streams Proceedings of the 2006 ACM symposium on Applied computing, (662-667)
  686. ACM
    Pechenizkiy M, Puuronen S and Tsymbal A The impact of sample reduction on PCA-based feature extraction for supervised learning Proceedings of the 2006 ACM symposium on Applied computing, (553-558)
  687. ACM
    De Meo P, Quattrone G, Fadil H and Ursino D A multi-agent system for efficiently managing query answering in an e-government scenario Proceedings of the 2006 ACM symposium on Applied computing, (308-312)
  688. ACM
    Wong J and Cho S Facial emotion recognition by adaptive processing of tree structures Proceedings of the 2006 ACM symposium on Applied computing, (23-30)
  689. Stout M, Bacardit J, Hirst J, Krasnogor N and Blazewicz J From HP lattice models to real proteins Proceedings of the 2006 international conference on Applications of Evolutionary Computing, (208-220)
  690. Bouma L and de Rijke M Specificity helps text classification Proceedings of the 28th European conference on Advances in Information Retrieval, (539-542)
  691. Ernst-Gerlach A and Fuhr N Generating search term variants for text collections with historic spellings Proceedings of the 28th European conference on Advances in Information Retrieval, (49-60)
  692. Yin L and Power R Adapting the naive bayes classifier to rank procedural texts Proceedings of the 28th European conference on Advances in Information Retrieval, (179-190)
  693. De Falco I, Della Cioppa A and Tarantino E Automatic classification of handsegmented image parts with differential evolution Proceedings of the 2006 international conference on Applications of Evolutionary Computing, (403-414)
  694. Estébanez C, Valls J and Aler R Projecting financial data using genetic programming in classification and regression tasks Proceedings of the 9th European conference on Genetic Programming, (202-212)
  695. Abe H, Tsumoto S, Ohsaki M and Yamaguchi T Evaluating a rule evaluation support method based on objective rule evaluation indices Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining, (509-519)
  696. Fan H, Fan M, Ramamohanarao K and Liu M Further improving emerging pattern based classifiers via bagging Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining, (91-96)
  697. Abe H and Yamaguchi T Constructive meta-level feature selection method based on method repositories Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining, (70-80)
  698. Jin X, Xu A, Bie R and Guo P Machine learning techniques and chi-square feature selection for cancer classification using SAGE gene expression profiles Proceedings of the 2006 international conference on Data Mining for Biomedical Applications, (106-115)
  699. Yin L A two-stage approach to retrieving answers for how-to questions Proceedings of the Eleventh Conference of the European Chapter of the Association for Computational Linguistics: Student Research Workshop, (63-70)
  700. Quarteroni S and Manandhar S Adaptivity in question answering with user modelling and a dialogue interface Proceedings of the Eleventh Conference of the European Chapter of the Association for Computational Linguistics: Posters & Demonstrations, (199-202)
  701. Quarteroni S and Manandhar S Incorporating user models in question answering to improve readability Proceedings of the Workshop KRAQ'06 on Knowledge and Reasoning for Language Processing, (50-57)
  702. Abe H, Tsumoto S, Ohsaki M and Yamaguchi T Evaluating model construction methods with objective rule evaluation indices to support human experts Proceedings of the Third international conference on Modeling Decisions for Artificial Intelligence, (93-104)
  703. ACM
    Musicant D (2006). A data mining course for computer science, ACM SIGCSE Bulletin, 38:1, (538-542), Online publication date: 31-Mar-2006.
  704. ACM
    Musicant D A data mining course for computer science Proceedings of the 37th SIGCSE technical symposium on Computer science education, (538-542)
  705. Shrestha D and Solomatine D (2006). 2006 Special issue, Neural Networks, 19:2, (225-235), Online publication date: 1-Mar-2006.
  706. Bhattacharya B and Solomatine D (2006). 2006 Special issue, Neural Networks, 19:2, (208-214), Online publication date: 1-Mar-2006.
  707. Bhattacharya B and Solomatine D (2006). 2006 Special issue, Neural Networks, 19:2, (186-195), Online publication date: 1-Mar-2006.
  708. Abe H, Ohsaki M, Yokoi H and Yamaguchi T Implementing an integrated time-series data mining environment based on temporal pattern extraction methods Proceedings of the 2005 international conference on New Frontiers in Artificial Intelligence, (425-435)
  709. Gonçalves T, Silva C, Quaresma P and Vieira R Analysing part-of-speech for portuguese text classification Proceedings of the 7th international conference on Computational Linguistics and Intelligent Text Processing, (551-562)
  710. Jung S and Kwon H A machine learning based approach for separating head from body in web-tables Proceedings of the 7th international conference on Computational Linguistics and Intelligent Text Processing, (524-535)
  711. Olguin S and Cortés L Predicting dialogue acts from prosodic information Proceedings of the 7th international conference on Computational Linguistics and Intelligent Text Processing, (355-365)
  712. Jung S and Kwon H (2006). A Scalable Hybrid Approach for Extracting Head Components from Web Tables, IEEE Transactions on Knowledge and Data Engineering, 18:2, (174-187), Online publication date: 1-Feb-2006.
  713. Perlich C and Provost F (2006). Distribution-based aggregation for relational learning with identifier attributes, Machine Language, 62:1-2, (65-105), Online publication date: 1-Feb-2006.
  714. Železný F and Lavrač N (2006). Propositionalization-based relational subgroup discovery with RSD, Machine Language, 62:1-2, (33-63), Online publication date: 1-Feb-2006.
  715. Kotsiantis S (2006). Local averaging of heterogeneous regression models, International Journal of Hybrid Intelligent Systems, 3:2, (99-107), Online publication date: 30-Jan-2006.
  716. ACM
    Jaimes A Posture and activity silhouettes for self-reporting, interruption management, and attentive interfaces Proceedings of the 11th international conference on Intelligent user interfaces, (24-31)
  717. Zou X, Kittler J and Messer K Ambient illumination variation removal by active Near-IR imaging Proceedings of the 2006 international conference on Advances in Biometrics, (19-25)
  718. Nguyen T, Willis C, Paddon D, Nguyen S and Nguyen H (2006). Learning Sunspot Classification, Fundamenta Informaticae, 72:1-3, (295-309), Online publication date: 1-Jan-2006.
  719. Nguyen H Approximate boolean reasoning Transactions on Rough Sets V, (334-506)
  720. Stankovski V and Trnkoczy J Application of decision trees to smart homes Designing Smart Homes, (132-145)
  721. Lovell N Illumination independent object recognition RoboCup 2005, (384-395)
  722. Kleiner A, Brenner M, Bräuer T, Dornhege C, Göbelbecker M, Luber M, Prediger J, Stückler J and Nebel B Successful search and rescue in simulated disaster areas RoboCup 2005, (323-334)
  723. Wang X and Huang J A case-based data mining platform Data Mining, (28-38)
  724. Rooney N, Patterson D and Nugent C (2006). Pruning extensions to stacking, Intelligent Data Analysis, 10:1, (47-66), Online publication date: 1-Jan-2006.
  725. Yilmaz C, Cohen M and Porter A (2006). Covering Arrays for Efficient Fault Characterization in Complex Configuration Spaces, IEEE Transactions on Software Engineering, 32:1, (20-34), Online publication date: 1-Jan-2006.
  726. Ahmad A and Dey L Algorithm for fuzzy clustering of mixed data with numeric and categorical attributes Proceedings of the Second international conference on Distributed Computing and Internet Technology, (561-572)
  727. Yu L, Wang S and Lai K Mining stock market tendency using GA-Based support vector machines Proceedings of the First international conference on Internet and Network Economics, (336-345)
  728. Kim J and Kang S Feature selection by fuzzy inference and its application to spam-mail filtering Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I, (361-366)
  729. Cornforth D and Jelinek H Automated classification of dementia subtypes from post-mortem cortex images Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence, (1285-1288)
  730. Cao M and Gao X Combining contents and citations for scientific document classification Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence, (143-152)
  731. Kim J, Kang S and Kim B A fuzzy inference method for spam-mail filtering Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence, (1112-1115)
  732. Chen C, Soo V and Kuo C Application of expectation maximization clustering to transcription factor binding positions for cDNA microarray analysis Proceedings of the 2005 joint annual satellite conference on Systems biology and regulatory genomics, (138-149)
  733. Gibert K, Sànchez-Marrè M and Flores X (2005). Cluster discovery in environmental databases using GESCONDA: The added value of comparisons, AI Communications, 18:4, (319-331), Online publication date: 1-Dec-2005.
  734. Perini A and Susi A (2005). AI in support of Plant Disease Management, AI Communications, 18:4, (281-291), Online publication date: 1-Dec-2005.
  735. Sigletos G, Paliouras G, Spyropoulos C and Hatzopoulos M (2005). Combining Information Extraction Systems Using Voting and Stacked Generalization, The Journal of Machine Learning Research, 6, (1751-1782), Online publication date: 1-Dec-2005.
  736. Chen C, Hwang S and Oyang Y (2005). A statistics-based approach to control the quality of subclusters in incremental gravitational clustering, Pattern Recognition, 38:12, (2256-2269), Online publication date: 1-Dec-2005.
  737. Hartmann K, Hartmann S and Feustel M Motif definition and classification to structure non-linear plots and to control the narrative flow in interactive dramas Proceedings of the Third international conference on Virtual Storytelling: using virtual reality technologies for storytelling, (158-167)
  738. Silva M, Camara G, Souza R, Valeriano D and Escada M Mining Patterns of Change in Remote Sensing Image Databases Proceedings of the Fifth IEEE International Conference on Data Mining, (362-369)
  739. Jiang L and Zhang H Learning Instance Greedily Cloning Naive Bayes for Ranking Proceedings of the Fifth IEEE International Conference on Data Mining, (202-209)
  740. Melville P, Saar-Tsechansky M, Provost F and Mooney R An Expected Utility Approach to Active Feature-Value Acquisition Proceedings of the Fifth IEEE International Conference on Data Mining, (745-748)
  741. Kalousis A, Prados J and Hilario M Stability of Feature Selection Algorithms Proceedings of the Fifth IEEE International Conference on Data Mining, (218-225)
  742. Abe H, Tsumoto S, Ohsaki M and Yamaguchi T A Rule Evaluation Support Method with Learning Models Based on Objective Rule Evaluation Indexes Proceedings of the Fifth IEEE International Conference on Data Mining, (549-552)
  743. Ling C, Sheng S, Bruckhaus T and Madhavji N Predicting Software Escalations with Maximum ROI Proceedings of the Fifth IEEE International Conference on Data Mining, (717-720)
  744. Huang J and Ling C Partial Ensemble Classifiers Selection for Better Ranking Proceedings of the Fifth IEEE International Conference on Data Mining, (653-656)
  745. Butterworth R, Piatetsky-Shapiro G and Simovici D On Feature Selection through Clustering Proceedings of the Fifth IEEE International Conference on Data Mining, (581-584)
  746. Bisbal E, Tomás D, Moreno L, Vicedo J and Suárez A A multilingual SVM-based question classification system Proceedings of the 4th Mexican international conference on Advances in Artificial Intelligence, (806-815)
  747. ACM
    Jaimes A Sit straight (and tell me what I did today) Proceedings of the 2nd ACM workshop on Continuous archival and retrieval of personal experiences, (23-34)
  748. Diplaris S, Tsoumakas G, Mitkas P and Vlahavas I Protein classification with multiple algorithms Proceedings of the 10th Panhellenic conference on Advances in Informatics, (448-456)
  749. Xiong F, Huang H, Ford J, Makedon F and Pearlman J A new test system for stability measurement of marker gene selection in DNA microarray data analysis Proceedings of the 10th Panhellenic conference on Advances in Informatics, (437-447)
  750. Tzanis G, Berberidis C, Alexandridou A and Vlahavas I Improving the accuracy of classifiers for the prediction of translation initiation sites in genomic sequences Proceedings of the 10th Panhellenic conference on Advances in Informatics, (426-436)
  751. Katakis I, Tsoumakas G and Vlahavas I On the utility of incremental feature selection for the classification of textual data streams Proceedings of the 10th Panhellenic conference on Advances in Informatics, (338-348)
  752. Kotsiantis S, Tsekouras G and Pintelas P Bagging model trees for classification problems Proceedings of the 10th Panhellenic conference on Advances in Informatics, (328-337)
  753. Wozniak M Boosted decision trees for diagnosis type of hypertension Proceedings of the 6th International conference on Biological and Medical Data Analysis, (223-230)
  754. Hüntemann A, González J and Tapia E Tumor classification from gene expression data Proceedings of the 6th International conference on Biological and Medical Data Analysis, (211-222)
  755. ACM
    Menzies T, Port D, Chen Z and Hihn J Specialization and extrapolation of software cost models Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, (384-387)
  756. ACM
    Iyengar G, Duygulu P, Feng S, Ircing P, Khudanpur S, Klakow D, Krause M, Manmatha R, Nock H, Petkova D, Pytlik B and Virga P Joint visual-text modeling for automatic retrieval of multimedia documents Proceedings of the 13th annual ACM international conference on Multimedia, (21-30)
  757. Tsoumakas G, Angelis L and Vlahavas I (2005). Selective fusion of heterogeneous classifiers, Intelligent Data Analysis, 9:6, (511-525), Online publication date: 1-Nov-2005.
  758. Reich Y and Kapeliuk A (2005). A framework for organizing the space of decision problems with application to solving subjective, context-dependent problems, Decision Support Systems, 41:1, (1-19), Online publication date: 1-Nov-2005.
  759. Li X (2005). A scalable decision tree system and its application in pattern recognition and intrusion detection, Decision Support Systems, 41:1, (112-130), Online publication date: 1-Nov-2005.
  760. Zhou Z and Li M (2005). Tri-Training, IEEE Transactions on Knowledge and Data Engineering, 17:11, (1529-1541), Online publication date: 1-Nov-2005.
  761. Muharram M and Smith G (2005). Evolutionary Constructive Induction, IEEE Transactions on Knowledge and Data Engineering, 17:11, (1518-1528), Online publication date: 1-Nov-2005.
  762. Chen Z, Boehm B, Menzies T and Port D (2005). Finding the Right Data for Software Cost Modeling, IEEE Software, 22:6, (38-46), Online publication date: 1-Nov-2005.
  763. Koru A and Liu H (2005). Building Defect Prediction Models in Practice, IEEE Software, 22:6, (23-29), Online publication date: 1-Nov-2005.
  764. Li X (2005). A scalable decision tree system and its application in pattern recognition and intrusion detection, Decision Support Systems, 41:1, (112-130), Online publication date: 1-Nov-2005.
  765. ACM
    Boese E and Howe A Effects of web document evolution on genre classification Proceedings of the 14th ACM international conference on Information and knowledge management, (632-639)
  766. ACM
    Whitelaw C, Garg N and Argamon S Using appraisal groups for sentiment analysis Proceedings of the 14th ACM international conference on Information and knowledge management, (625-631)
  767. ACM
    Ramakrishnan G, Paranjpe D and Dom B A structure-sensitive framework for text categorization Proceedings of the 14th ACM international conference on Information and knowledge management, (337-338)
  768. De Meo P, Quattrone G, Terracina G and Ursino D An approach for clustering semantically heterogeneous XML schemas Proceedings of the 2005 Confederated international conference on On the Move to Meaningful Internet Systems - Volume >Part I, (329-346)
  769. Chan A and Freitas A A new classification-rule pruning procedure for an ant colony algorithm Proceedings of the 7th international conference on Artificial Evolution, (25-36)
  770. ACM
    Cohen I, Zhang S, Goldszmidt M, Symons J, Kelly T and Fox A Capturing, indexing, clustering, and retrieving system history Proceedings of the twentieth ACM symposium on Operating systems principles, (105-118)
  771. Gunes H and Piccardi M Fusing face and body display for bi-modal emotion recognition Proceedings of the First international conference on Affective Computing and Intelligent Interaction, (102-111)
  772. Kapur A, Kapur A, Virji-Babul N, Tzanetakis G and Driessen P Gesture-Based affective computing on motion capture data Proceedings of the First international conference on Affective Computing and Intelligent Interaction, (1-7)
  773. ACM
    Cohen I, Zhang S, Goldszmidt M, Symons J, Kelly T and Fox A (2005). Capturing, indexing, clustering, and retrieving system history, ACM SIGOPS Operating Systems Review, 39:5, (105-118), Online publication date: 20-Oct-2005.
  774. ACM
    Gil J and Maman I Micro patterns in Java code Proceedings of the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (97-116)
  775. Zhao Y and Zobel J Effective and scalable authorship attribution using function words Proceedings of the Second Asia conference on Asia Information Retrieval Technology, (174-189)
  776. Lu W and Kan M Supervised categorization of JavaScript™ using program analysis features Proceedings of the Second Asia conference on Asia Information Retrieval Technology, (160-173)
  777. ACM
    Gil J and Maman I (2005). Micro patterns in Java code, ACM SIGPLAN Notices, 40:10, (97-116), Online publication date: 12-Oct-2005.
  778. Uzuner Ö and Katz B A comparative study of language models for book and author recognition Proceedings of the Second international joint conference on Natural Language Processing, (969-980)
  779. ACM
    Ladner R, Ivory M, Rao R, Burgstahler S, Comden D, Hahn S, Renzelmann M, Krisnandi S, Ramasamy M, Slabosky B, Martin A, Lacenski A, Olsen S and Groce D Automating tactile graphics translation Proceedings of the 7th international ACM SIGACCESS conference on Computers and accessibility, (150-157)
  780. Wang S, Lin Z and Zhang C Network boosting for BCI applications Proceedings of the 8th international conference on Discovery Science, (386-388)
  781. Jorge A and Azevedo P An experiment with association rules and classification Proceedings of the 8th international conference on Discovery Science, (137-149)
  782. Bos J and Markert K Recognising textual entailment with logical inference Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, (628-635)
  783. Munson A, Cardie C and Caruana R Optimizing to arbitrary NLP metrics using ensemble selection Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, (539-546)
  784. Nomoto T Bayesian learning in text summarization Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, (249-256)
  785. Postolache O, Kruijff-Korbayová I and Kruijff G Data-driven approaches for information structure identification Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, (9-16)
  786. Forman G Counting positives accurately despite inaccurate classification Proceedings of the 16th European conference on Machine Learning, (564-575)
  787. Wang S and Zhang C Network game and boosting Proceedings of the 16th European conference on Machine Learning, (461-472)
  788. Melville P, Yang S, Saar-Tsechansky M and Mooney R Active learning for probability estimation using jensen-shannon divergence Proceedings of the 16th European conference on Machine Learning, (268-279)
  789. Cerquides J and de Mántaras R Robust bayesian linear classifier ensembles Proceedings of the 16th European conference on Machine Learning, (72-83)
  790. da Silva J, Giannella C, Bhargava R, Kargupta H and Klusch M (2005). Distributed data mining and agents, Engineering Applications of Artificial Intelligence, 18:7, (791-807), Online publication date: 1-Oct-2005.
  791. Lachiche N Good and bad practices in propositionalisation Proceedings of the 9th conference on Advances in Artificial Intelligence, (50-61)
  792. Alhammady H and Ramamohanarao K Mining Emerging Patterns and Classification in Data Streams Proceedings of the 2005 IEEE/WIC/ACM International Conference on Web Intelligence, (272-275)
  793. Labsky M, Svatek V, Svab O, Praks P, Kratky M and Snasel V Information Extraction from HTML Product Catalogues Proceedings of the 2005 IEEE/WIC/ACM International Conference on Web Intelligence, (401-404)
  794. Voutsakis E, Petrakis E and Milios E Weighted Link Analysis for Logo and Trademark Image Retrieval on the Web Proceedings of the 2005 IEEE/WIC/ACM International Conference on Web Intelligence, (581-585)
  795. De Falco I, Della Cioppa A and Tarantino E Evaluation of particle swarm optimization effectiveness in classification Proceedings of the 6th international conference on Fuzzy Logic and Applications, (164-171)
  796. Flores M and Gámez J Breeding value classification in manchego sheep Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II, (1338-1346)
  797. Shadabi F, Cox R, Sharma D and Petrovsky N A hybrid decision tree – artificial neural networks ensemble approach for kidney transplantation outcomes prediction Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II, (116-122)
  798. Jaimes A and Liu J Hotspot components for gesture-based interaction Proceedings of the 2005 IFIP TC13 international conference on Human-Computer Interaction, (1062-1066)
  799. Podolak I, Biel S and Bobrowski M Hierarchical classifier Proceedings of the 6th international conference on Parallel Processing and Applied Mathematics, (591-598)
  800. Amft O, Stäger M, Lukowicz P and Tröster G Analysis of chewing sounds for dietary monitoring Proceedings of the 7th international conference on Ubiquitous Computing, (56-72)
  801. Ferreira A, Ludermir T and de Aquino R Comparing neural network architecture for pattern recognize system on artificial noses Proceedings of the 15th international conference on Artificial Neural Networks: biological Inspirations - Volume Part I, (635-640)
  802. Ruiz R, Aguilar–Ruiz J, Riquelme J and Díaz–Díaz N Analysis of feature rankings for classification Proceedings of the 6th international conference on Advances in Intelligent Data Analysis, (362-372)
  803. Meservy T, Jensen M, Kruse J, Twitchell D, Tsechpenakis G, Burgoon J, Metaxas D and Nunamaker Jr. J (2005). Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior, IEEE Intelligent Systems, 20:5, (36-43), Online publication date: 1-Sep-2005.
  804. Carvalho D and Freitas A (2005). Evaluating Six Candidate Solutions for the Small-Disjunct Problem and Choosing the Best Solution via Meta-Learning, Artificial Intelligence Review, 24:1, (61-98), Online publication date: 1-Sep-2005.
  805. Tapia E and Rojas R Recognition of On-Line Handwritten Mathematical Expressions in the E-Chalk System - An Extension Proceedings of the Eighth International Conference on Document Analysis and Recognition, (1206-1210)
  806. Nguyen S, Nguyen T and Nguyen H Rough set approach to sunspot classification problem Proceedings of the 10th international conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume Part II, (263-272)
  807. Ramos-Jiménez G, del Campo-Ávila J and Morales-Bueno R ML-CIDIM Proceedings of the 10th international conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume Part II, (138-146)
  808. Chen B, Chen L, Lin Y and Ramakrishnan R Prediction cubes Proceedings of the 31st international conference on Very large data bases, (982-993)
  809. Zhuang L, Dai H and Hang X A novel field learning algorithm for dual imbalance text classification Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part II, (39-48)
  810. Guo G, Neagu D and Cronin M A study on feature selection for toxicity prediction Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part II, (31-34)
  811. Hruschka E, Hruschka E and Ebecken N Missing values imputation for a clustering genetic algorithm Proceedings of the First international conference on Advances in Natural Computation - Volume Part III, (245-254)
  812. Varma A, Aggour K and Bonissone P Selecting the best units in a fleet Proceedings of the 6th international conference on Case-Based Reasoning Research and Development, (595-609)
  813. Redmond S and Heneghan C A non-parametric dimensionality reduction technique using gradient descent of misclassification rate Proceedings of the Third international conference on Pattern Recognition and Image Analysis - Volume Part II, (155-164)
  814. Guo G, Neagu D and Cronin M Using kNN model for automatic feature selection Proceedings of the Third international conference on Advances in Pattern Recognition - Volume Part I, (410-419)
  815. Lindsay D and Cox S Effective probability forecasting for time series data using standard machine learning techniques Proceedings of the Third international conference on Advances in Pattern Recognition - Volume Part I, (35-44)
  816. ACM
    Varde A, Rundensteiner E, Ruiz C, Maniruzzaman M and Sisson R Learning semantics-preserving distance metrics for clustering graphical data Proceedings of the 6th international workshop on Multimedia data mining: mining integrated media and complex data, (107-112)
  817. ACM
    Korner C and Wrobel S Bias-free hypothesis evaluation in multirelational domains Proceedings of the 4th international workshop on Multi-relational mining, (33-38)
  818. ACM
    Guo H and Viktor H Mining relational databases with multi-view learning Proceedings of the 4th international workshop on Multi-relational mining, (15-24)
  819. ACM
    Melville P, Provost F, Saar-Tsechansky M and Mooney R Economical active feature-value acquisition through Expected Utility estimation Proceedings of the 1st international workshop on Utility-based data mining, (10-16)
  820. ACM
    Kalos A and Rey T Data mining in the chemical industry Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (763-769)
  821. ACM
    Mane S, Srivastava J and Hwang S Estimating missed actual positives using independent classifiers Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (648-653)
  822. ACM
    Yang C and Létourneau S Learning to predict train wheel failures Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (516-525)
  823. ACM
    Scholz M Sampling-based sequential subgroup mining Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (265-274)
  824. Kakkonen T, Sutinen E and Timonen J Noise reduction in LSA-based essay assessment Proceedings of the 5th WSEAS international conference on Simulation, modelling and optimization, (190-195)
  825. Kuznetsov S and Samokhin M Learning closed sets of labeled graphs for chemical applications Proceedings of the 15th international conference on Inductive Logic Programming, (190-208)
  826. Yun Z and Keong K Identifying Simple Discriminatory Gene Vectors with an Information Theory Approach Proceedings of the 2005 IEEE Computational Systems Bioinformatics Conference, (13-24)
  827. ACM
    Zhang H, Jiang L and Su J Augmenting naive Bayes for ranking Proceedings of the 22nd international conference on Machine learning, (1020-1027)
  828. ACM
    Pietraszek T Optimizing abstaining classifiers using ROC analysis Proceedings of the 22nd international conference on Machine learning, (665-672)
  829. ACM
    Macskassy S, Provost F and Rosset S ROC confidence bands Proceedings of the 22nd international conference on Machine learning, (537-544)
  830. ACM
    Khoussainov R, Heß A and Kushmerick N Ensembles of biased classifiers Proceedings of the 22nd international conference on Machine learning, (425-432)
  831. Kotsiantis S and Pintelas P (2005). Local voting of weak classifiers, International Journal of Knowledge-based and Intelligent Engineering Systems, 9:3, (239-248), Online publication date: 1-Aug-2005.
  832. Li G, Leong T and Zhang L (2005). Translation Initiation Sites Prediction with Mixture Gaussian Models in Human cDNA Sequences, IEEE Transactions on Knowledge and Data Engineering, 17:8, (1152-1160), Online publication date: 1-Aug-2005.
  833. Koppel M and Schler J Using neutral examples for learning polarity Proceedings of the 19th international joint conference on Artificial intelligence, (1616-1617)
  834. Jin R and Liu H A novel approach to model generation for heterogeneous data classification Proceedings of the 19th international joint conference on Artificial intelligence, (746-751)
  835. Alvarez I and Bernard S Ranking cases with decision trees Proceedings of the 19th international joint conference on Artificial intelligence, (635-640)
  836. Monteiro M, de Souto M, Gonçalves L and Agnez-Lima L Machine learning techniques for predicting promoters Proceedings of the 2005 Brazilian conference on Advances in Bioinformatics and Computational Biology, (77-84)
  837. Lindsay D and Cox S Effective confidence region prediction using probability forecasters Proceedings of the 10th conference on Artificial Intelligence in Medicine, (494-503)
  838. Razavi A, Gill H, Åhlfeldt H and Shahsavar N A data pre-processing method to increase efficiency and accuracy in data mining Proceedings of the 10th conference on Artificial Intelligence in Medicine, (434-443)
  839. Ou M, West G, Lazarescu M and Clay C Interactive knowledge validation in CBR for decision support in medicine Proceedings of the 10th conference on Artificial Intelligence in Medicine, (289-299)
  840. Meng L, van der Putten P and Wang H A comprehensive benchmark of the artificial immune recognition system (AIRS) Proceedings of the First international conference on Advanced Data Mining and Applications, (575-582)
  841. Jiang L, Zhang H, Cai Z and Su J One dependence augmented naive bayes Proceedings of the First international conference on Advanced Data Mining and Applications, (186-194)
  842. Jiang L, Zhang H and Su J Learning k-nearest neighbor naive bayes for ranking Proceedings of the First international conference on Advanced Data Mining and Applications, (175-185)
  843. Sug H A comprehensively sized decision tree generation method for interactive data mining of very large databases Proceedings of the First international conference on Advanced Data Mining and Applications, (141-148)
  844. Ramos-Jiménez G, del Campo-Ávila J and Morales-Bueno R E-CIDIM Proceedings of the First international conference on Advanced Data Mining and Applications, (108-117)
  845. Milicevic M, Baranovic M and Batos V QoS control based on query response time prediction Proceedings of the 9th WSEAS International Conference on Computers, (1-5)
  846. Rudrapatna M, Mai V, Sowmya A and Wilson P Knowledge-Driven automated detection of pleural plaques and thickening in high resolution CT of the lung Proceedings of the 19th international conference on Information Processing in Medical Imaging, (270-285)
  847. Zhang H, Jiang L and Su J Hidden naive Bayes Proceedings of the 20th national conference on Artificial intelligence - Volume 2, (919-924)
  848. Su J and Zhang H Representing conditional independence using decision trees Proceedings of the 20th national conference on Artificial intelligence - Volume 2, (874-879)
  849. Beygelzimer A, Langford J and Zadrozny B Weighted one-against-all Proceedings of the 20th national conference on Artificial intelligence - Volume 2, (720-725)
  850. Ou M, West G, Lazarescu M and Clay C Interactive knowledge validation and query refinement in CBR Proceedings of the 20th national conference on Artificial intelligence - Volume 1, (222-227)
  851. Kotsiantis S, Tsekouras G and Pintelas P Bagging random trees for estimation of tissue softness Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition, (674-681)
  852. Kotsiantis S, Tsekouras G, Raptis C and Pintelas P Modeling the organoleptic properties of matured wine distillates Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition, (667-673)
  853. Kuhlmann A, Vetter R, Lübbing C and Thole C Data mining on crash simulation data Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition, (558-569)
  854. Pray K and Ruiz C Mining expressive temporal associations from complex data Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition, (384-394)
  855. Eick C, Rouhana A, Bagherjeiran A and Vilalta R Using clustering to learn distance functions for supervised similarity assessment Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition, (120-131)
  856. Wakabayashi M, Hawkins J, Maetschke S and Bodén M Exploiting sequence dependencies in the prediction of peroxisomal proteins Proceedings of the 6th international conference on Intelligent Data Engineering and Automated Learning, (454-461)
  857. Povalej P, Lenič M and Kokol P Improving ensembles with classificational cellular automata Proceedings of the 6th international conference on Intelligent Data Engineering and Automated Learning, (242-249)
  858. Kotsiantis S and Pintelas P Predicting Students' Marks in Hellenic Open University Proceedings of the Fifth IEEE International Conference on Advanced Learning Technologies, (664-668)
  859. ACM
    Boetticher G (2005). Nearest neighbor sampling for better defect prediction, ACM SIGSOFT Software Engineering Notes, 30:4, (1-6), Online publication date: 1-Jul-2005.
  860. ACM
    Koru A and Liu H (2005). An investigation of the effect of module size on defect prediction using static measures, ACM SIGSOFT Software Engineering Notes, 30:4, (1-5), Online publication date: 1-Jul-2005.
  861. ACM
    Chen Z, Menzies T, Port D and Boehm B (2005). Feature subset selection can improve software cost estimation accuracy, ACM SIGSOFT Software Engineering Notes, 30:4, (1-6), Online publication date: 1-Jul-2005.
  862. ACM
    Menzies T, Port D, Chen Z and Hihn J (2005). Simple software cost analysis, ACM SIGSOFT Software Engineering Notes, 30:4, (1-6), Online publication date: 1-Jul-2005.
  863. ACM
    Massey B (2005). Longitudinal analysis of long-timescale open source repository data, ACM SIGSOFT Software Engineering Notes, 30:4, (1-5), Online publication date: 1-Jul-2005.
  864. Navigli R and Velardi P (2005). Structural Semantic Interconnections, IEEE Transactions on Pattern Analysis and Machine Intelligence, 27:7, (1075-1086), Online publication date: 1-Jul-2005.
  865. Poesio M and Almuhareb A Identifying concept attributes using a classifier Proceedings of the ACL-SIGLEX Workshop on Deep Lexical Acquisition, (18-27)
  866. Marciniak T and Strube M Beyond the pipeline Proceedings of the Ninth Conference on Computational Natural Language Learning, (136-143)
  867. Kauchak D and Chen F Feature-based segmentation of narrative documents Proceedings of the ACL Workshop on Feature Engineering for Machine Learning in Natural Language Processing, (32-39)
  868. Uzuner Ö, Katz B and Nahnsen T Using syntactic information to identify plagiarism Proceedings of the second workshop on Building Educational Applications Using NLP, (37-44)
  869. Postolache O Learning information structure in the Prague treebank Proceedings of the ACL Student Research Workshop, (115-120)
  870. Solorio T Exploiting named entity taggers in a second language Proceedings of the ACL Student Research Workshop, (25-30)
  871. Pecina P An extensive empirical study of collocation extraction methods Proceedings of the ACL Student Research Workshop, (13-18)
  872. Langford J and Beygelzimer A Sensitive error correcting output codes Proceedings of the 18th annual conference on Learning Theory, (158-172)
  873. Light M, Arens R and Lu X Web-based interfaces for natural language processing tools Proceedings of the Second ACL Workshop on Effective Tools and Methodologies for Teaching Natural Language Processing and Computational Linguistics, (28-31)
  874. Hearst M Teaching applied natural language processing Proceedings of the Second ACL Workshop on Effective Tools and Methodologies for Teaching Natural Language Processing and Computational Linguistics, (1-8)
  875. ACM
    Bacardit J Analysis of the initialization stage of a Pittsburgh approach learning classifier system Proceedings of the 7th annual conference on Genetic and evolutionary computation, (1843-1850)
  876. Kotsiantis S, Tsekouras G and Pintelas P Local bagging of decision stumps Proceedings of the 18th international conference on Innovations in Applied Artificial Intelligence, (406-411)
  877. Rodríguez B, Pérez Ó, García J and Molina J Application of machine learning techniques for simplifying the association problem in a video surveillance system Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II, (509-518)
  878. Pekar V Information extraction from email announcements Proceedings of the 10th international conference on Natural Language Processing and Information Systems, (372-375)
  879. Sharma V, Sarda P and Sharma S An add-on to rule-based sifters for multi-recipient spam emails Proceedings of the 10th international conference on Natural Language Processing and Information Systems, (361-364)
  880. Heß A, Khoussainov R and Kushmerick N Ensemble learning with biased classifiers Proceedings of the 6th international conference on Multiple Classifier Systems, (226-235)
  881. Tapia E, Serra E and González J Recursive ECOC for microarray data classification Proceedings of the 6th international conference on Multiple Classifier Systems, (108-117)
  882. Goldszmidt M, Cohen I, Fox A and Zhang S Three research challenges at the intersection of machine learning, statistical induction, and systems Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10, (10-10)
  883. ACM
    Avgustinov P, Christensen A, Hendren L, Kuzins S, Lhoták J, Lhoták O, de Moor O, Sereni D, Sittampalam G and Tibble J Optimising aspectJ Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, (117-128)
  884. ACM
    Avgustinov P, Christensen A, Hendren L, Kuzins S, Lhoták J, Lhoták O, de Moor O, Sereni D, Sittampalam G and Tibble J (2005). Optimising aspectJ, ACM SIGPLAN Notices, 40:6, (117-128), Online publication date: 12-Jun-2005.
  885. ACM
    Kan M and Poo D Detecting and supporting known item queries in online public access catalogs Proceedings of the 5th ACM/IEEE-CS joint conference on Digital libraries, (91-99)
  886. ACM
    Gonçalves T and Quaresma P Is linguistic information relevant for the classification of legal texts? Proceedings of the 10th international conference on Artificial intelligence and law, (168-176)
  887. Gao J, Denzinger J and James R A cooperative multi-agent data mining model and its application to medical data on diabetes Proceedings of the 2005 international conference on Autonomous Intelligent Systems: agents and Data Mining, (93-107)
  888. Zhang C, Zhang Z and Cao L Agents and data mining Proceedings of the 2005 international conference on Autonomous Intelligent Systems: agents and Data Mining, (50-61)
  889. Mitkas P Knowledge discovery for training intelligent agents Proceedings of the 2005 international conference on Autonomous Intelligent Systems: agents and Data Mining, (2-18)
  890. Byron D, Dalwani A, Gerritsen R, Keck M, Mampilly T, Sharma V, Stoia L, Weale T and Xu T Natural noun phrase variation for interactive characters Proceedings of the First AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, (15-20)
  891. Langseth H and Nielsen T (2005). Latent Classification Models, Machine Language, 59:3, (237-265), Online publication date: 1-Jun-2005.
  892. Patterson D, Galushka M and Rooney N (2005). Characterisation of a Novel Indexing Technique for Case-Based Reasoning, Artificial Intelligence Review, 23:4, (359-393), Online publication date: 1-Jun-2005.
  893. ACM
    Boetticher G Nearest neighbor sampling for better defect prediction Proceedings of the 2005 workshop on Predictor models in software engineering, (1-6)
  894. ACM
    Koru A and Liu H An investigation of the effect of module size on defect prediction using static measures Proceedings of the 2005 workshop on Predictor models in software engineering, (1-5)
  895. ACM
    Chen Z, Menzies T, Port D and Boehm B Feature subset selection can improve software cost estimation accuracy Proceedings of the 2005 workshop on Predictor models in software engineering, (1-6)
  896. ACM
    Menzies T, Port D, Chen Z and Hihn J Simple software cost analysis Proceedings of the 2005 workshop on Predictor models in software engineering, (1-6)
  897. ACM
    Massey B Longitudinal analysis of long-timescale open source repository data Proceedings of the 2005 workshop on Predictor models in software engineering, (1-5)
  898. ACM
    Menzies T, Port D, Chen Z, Hihn J and Stukes S Validation methods for calibrating software effort models Proceedings of the 27th international conference on Software engineering, (587-595)
  899. ACM
    Yin X and Lee W Understanding the function of web elements for mobile content delivery using random walk models Special interest tracks and posters of the 14th international conference on World Wide Web, (1150-1151)
  900. Nadeau D and Turney P A supervised learning approach to acronym identification Proceedings of the 18th Canadian Society conference on Advances in Artificial Intelligence, (319-329)
  901. Jiang L, Zhang H and Su J Instance cloning local naive bayes Proceedings of the 18th Canadian Society conference on Advances in Artificial Intelligence, (280-291)
  902. Pechenizkiy M The impact of feature extraction on the performance of a classifier Proceedings of the 18th Canadian Society conference on Advances in Artificial Intelligence, (268-279)
  903. Wang X and Hamilton H Towards an ontology-based spatial clustering framework Proceedings of the 18th Canadian Society conference on Advances in Artificial Intelligence, (205-216)
  904. Khoshgoftaar T, Gao K and Ibrahim N (2005). Evaluating indirect and direct classification techniques for network intrusion detection, Intelligent Data Analysis, 9:3, (309-326), Online publication date: 1-May-2005.
  905. Lee Y, Hsieh W and Huang C (2005). epsilon-SSVR, IEEE Transactions on Knowledge and Data Engineering, 17:5, (678-685), Online publication date: 1-May-2005.
  906. Landwehr N, Hall M and Frank E (2005). Logistic Model Trees, Machine Language, 59:1-2, (161-205), Online publication date: 1-May-2005.
  907. Matwin S, Felty A, Hernádvölgyi I and Capretta V Privacy in data mining using formal methods Proceedings of the 7th international conference on Typed Lambda Calculi and Applications, (278-292)
  908. Jiang L, Zhang H, Cai Z and Su J Learning tree augmented naive bayes for ranking Proceedings of the 10th international conference on Database Systems for Advanced Applications, (688-698)
  909. Xie Z, Zhang Q, Hsu W and Lee M Enhancing SNNB with local accuracy estimation and ensemble techniques Proceedings of the 10th international conference on Database Systems for Advanced Applications, (523-535)
  910. Pechenizkiy M, Tsymbal A, Puuronen S, Shifrin M and Alexandrova I Knowledge discovery from microbiology data Proceedings of the Third Biennial conference on Professional Knowledge Management, (360-372)
  911. Jiang W, Vaidya J, Balaporia Z, Clifton C and Banich B Knowledge Discovery from Transportation Network Data Proceedings of the 21st International Conference on Data Engineering, (1061-1072)
  912. ACM
    Fogarty J, Ko A, Aung H, Golden E, Tang K and Hudson S Examining task engagement in sensor-based statistical models of human interruptibility Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (331-340)
  913. Minz S and Jain R (2005). Refining decision tree classifiers using rough set tools, International Journal of Hybrid Intelligent Systems, 2:2, (133-148), Online publication date: 1-Apr-2005.
  914. Bernstein A, Provost F and Hill S (2005). Toward Intelligent Assistance for a Data Mining Process, IEEE Transactions on Knowledge and Data Engineering, 17:4, (503-518), Online publication date: 1-Apr-2005.
  915. Liu H and Yu L (2005). Toward Integrating Feature Selection Algorithms for Classification and Clustering, IEEE Transactions on Knowledge and Data Engineering, 17:4, (491-502), Online publication date: 1-Apr-2005.
  916. ACM
    De Falco I, Tarantino E, Cioppa A and Fontanella F A new variable---length genome genetic algorithm for data clustering in semeiotics Proceedings of the 2005 ACM symposium on Applied computing, (923-927)
  917. Zaki M, Parimi N, De N, Gao F, Phoophakdee B, Urban J, Chaoji V, Hasan M and Salem S Towards generic pattern mining Proceedings of the Third international conference on Formal Concept Analysis, (1-20)
  918. Solorio T and López A Learning named entity recognition in portuguese from spanish Proceedings of the 6th international conference on Computational Linguistics and Intelligent Text Processing, (762-768)
  919. Mahmud R and Ramsay A Finding discourse relations in student essays Proceedings of the 6th international conference on Computational Linguistics and Intelligent Text Processing, (116-119)
  920. Kadous M and Sammut C (2005). Classification of Multivariate Time Series and Structured Data Using Constructive Induction, Machine Language, 58:2-3, (179-216), Online publication date: 1-Feb-2005.
  921. Hetland M and Sætrom P (2005). Evolutionary Rule Mining in Time Series Databases, Machine Language, 58:2-3, (107-125), Online publication date: 1-Feb-2005.
  922. Kuhlmann G, Stone P and Lallinger J The UT austin villa 2003 champion simulator coach RoboCup 2004, (636-644)
  923. Devaney J, Satterfield S, Hagedorn J, Kelso J, Peskin A, George W, Griffin T, Hung H and Kriz R Science at the speed of thought Ambient Intelligence for Scientific Discovery, (1-24)
  924. Khoshgoftaar T, Zhong S and Joshi V (2005). Enhancing software quality estimation using ensemble-classifier based noise filtering, Intelligent Data Analysis, 9:1, (3-27), Online publication date: 1-Jan-2005.
  925. Basak J and Krishnapuram R (2005). Interpretable Hierarchical Clustering by Constructing an Unsupervised Decision Tree, IEEE Transactions on Knowledge and Data Engineering, 17:1, (121-132), Online publication date: 1-Jan-2005.
  926. Bhattacharya B and Solomatine D (2005). Neural networks and M5 model trees in modelling water level-discharge relationship, Neurocomputing, 63, (381-396), Online publication date: 1-Jan-2005.
  927. Romero C, Ventura S and Bra P (2005). Knowledge Discovery with Genetic Programming for Providing Feedback to Courseware Authors, User Modeling and User-Adapted Interaction, 14:5, (425-464), Online publication date: 1-Jan-2005.
  928. Štiglic G and Kokol P Rule-based microarray classification system using multi-agent approach Proceedings of the 4th WSEAS International Conference on Applied Informatics and Communications, (1-4)
  929. Cohen I, Goldszmidt M, Kelly T, Symons J and Chase J Correlating instrumentation data to system states Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (16-16)
  930. Berger H and Merkl D A comparison of text-categorization methods applied to n-gram frequency statistics Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence, (998-1003)
  931. Ou M, West G, Lazarescu M and Clay C User friendly decision support techniques in a case-based reasoning system Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence, (718-729)
  932. Mutter S, Hall M and Frank E Using classification to evaluate the output of confidence-based association rule mining Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence, (538-549)
  933. Hruschka E, Hruschka E and Ebecken N Towards efficient imputation by nearest-neighbors Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence, (513-525)
  934. Kibriya A, Frank E, Pfahringer B and Holmes G Multinomial naive bayes for text categorization revisited Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence, (488-499)
  935. Li M, Holmes G and Pfahringer B Clustering large datasets using cobweb and k-means in tandem Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence, (368-379)
  936. Guo H and Hsu W A learning-based algorithm selection meta-reasoner for the real-time MPE problem Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence, (307-318)
  937. Ler D, Koprinska I and Chawla S A landmarker selection algorithm based on correlation and efficiency criteria Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence, (296-306)
  938. Bouckaert R Naive bayes classifiers that perform well with continuous variables Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence, (1089-1094)
  939. Wu W, Lee V and Tan T Contributions of domain knowledge and stacked generalization in AI-Based classification models Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence, (1049-1054)
  940. Rooney N, Patterson D and Galushka M (2004). A comprehensive review of recursive Naïve Bayes Classifiers, Intelligent Data Analysis, 8:6, (615-628), Online publication date: 1-Dec-2004.
  941. Yu L and Liu H (2004). Efficient Feature Selection via Analysis of Relevance and Redundancy, The Journal of Machine Learning Research, 5, (1205-1224), Online publication date: 1-Dec-2004.
  942. Kääriäinen M, Malinen T and Elomaa T (2004). Selective Rademacher Penalization and Reduced Error Pruning of Decision Trees, The Journal of Machine Learning Research, 5, (1107-1126), Online publication date: 1-Dec-2004.
  943. Lavrač N, Kavšek B, Flach P and Todorovski L (2004). Subgroup Discovery with CN2-SD, The Journal of Machine Learning Research, 5, (153-188), Online publication date: 1-Dec-2004.
  944. ACM
    Foussette C, Hakenjos D and Scholz M (2004). KDD-Cup 2004, ACM SIGKDD Explorations Newsletter, 6:2, (128-131), Online publication date: 1-Dec-2004.
  945. Gärtner T, Lloyd J and Flach P (2004). Kernels and Distances for Structured Data, Machine Language, 57:3, (205-232), Online publication date: 1-Dec-2004.
  946. Zheng Q, Zhang M and Wang W A hybrid approach to detect adult web images Proceedings of the 5th Pacific Rim Conference on Advances in Multimedia Information Processing - Volume Part II, (609-616)
  947. Jaimes A, Wang Q, Kato N, Ikeda H and Miyazaki J Visual trigger templates for knowledge-based indexing Proceedings of the 5th Pacific Rim Conference on Advances in Multimedia Information Processing - Volume Part II, (154-161)
  948. Sinha A and May J (2004). Evaluating and Tuning Predictive Data Mining Models Using Receiver Operating Characteristic Curves, Journal of Management Information Systems, 21:3, (249-280), Online publication date: 1-Nov-2004.
  949. ACM
    Heisig S and Moyle S Using model trees to characterize computer resource usage Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems, (80-84)
  950. Lee K and Kim J Sentence compression learned by news headline for displaying in small device Proceedings of the 2004 international conference on Asian Information Retrieval Technology, (61-70)
  951. ACM
    Eisenstein J and Davis R Visual and linguistic information in gesture classification Proceedings of the 6th international conference on Multimodal interfaces, (113-120)
  952. Jaimes A, Ruiz-Del-Solar J, Verschae R, Baeza-Yates R, Castillo C, Yaksic D and Davis E (2004). On the image content of a web segment, Journal of Web Engineering, 3:2, (153-168), Online publication date: 1-Oct-2004.
  953. Van Der Putten P and Van Someren M (2004). A Bias-Variance Analysis of a Real World Learning Problem, Machine Language, 57:1-2, (177-195), Online publication date: 1-Oct-2004.
  954. Krogel M and Scheffer T (2004). Multi-Relational Learning, Text Mining, and Semi-Supervised Learning for Functional Genomics, Machine Language, 57:1-2, (61-81), Online publication date: 1-Oct-2004.
  955. Šuc D, Vladušič D and Bratko I (2004). Qualitatively faithful quantitative prediction, Artificial Intelligence, 158:2, (189-214), Online publication date: 1-Oct-2004.
  956. Maxville V, Armarego J and Lam C Intelligent Component Selection Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01, (244-249)
  957. Chan J, Koprinska I and Poon J Co-training with a Single Natural Feature Set Applied to Email Classification Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence, (586-589)
  958. Chua S and Kulathuramaiyer N Semantic Feature Selection Using WordNet Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence, (166-172)
  959. Pérez-Coutiño M, Solorio T, Montes-y-Gómez M, López-López A and Villaseñor-Pineda L Question answering for spanish supported by lexical context annotation Proceedings of the 5th conference on Cross-Language Evaluation Forum: multilingual Information Access for Text, Speech and Images, (502-511)
  960. Huang Z, Chen H, Hsu C, Chen W and Wu S (2004). Credit rating analysis with support vector machines and neural networks, Decision Support Systems, 37:4, (543-558), Online publication date: 1-Sep-2004.
  961. Thor A and Rahm E AWESOME Proceedings of the Thirtieth international conference on Very large data bases - Volume 30, (384-395)
  962. Solorio T, Pérez-Coutiño M, Montes-y-Gémez M, Villaseñor-Pineda L and López-López A A language independent method for question classification Proceedings of the 20th international conference on Computational Linguistics, (1374-es)
  963. O'Hara T, Bertolo S, Witbrock M, Aldag B, Curtis J, Panton K, Schneider D and Salay N Inferring parts of speech for lexical mappings via the Cyc KB Proceedings of the 20th international conference on Computational Linguistics, (1305-es)
  964. ACM
    Zheng Z, Padmanabhan B and Zheng H A DEA approach for model combination Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (755-760)
  965. ACM
    Yu L and Liu H Redundancy based feature selection for microarray data Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (737-742)
  966. ACM
    Kantarcioǧlu M, Jin J and Clifton C When do data mining results violate privacy? Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (599-604)
  967. ACM
    Kolter J and Maloof M Learning to detect malicious executables in the wild Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (470-478)
  968. Stone J, Wu X and Greenblatt M An Intelligent Digital Library System for Biologists Proceedings of the 2004 IEEE Computational Systems Bioinformatics Conference, (491-492)
  969. Liu H, Li J and Wong L Selection of Patient Samples and Genes for Outcome Prediction Proceedings of the 2004 IEEE Computational Systems Bioinformatics Conference, (382-392)
  970. Cruz R, Pérez J, Landero N, Del Angel S, Álvarez V and Peréz V An ordered preprocessing scheme for data mining Proceedings of the 8th Pacific Rim International Conference on Trends in Artificial Intelligence, (1007-1008)
  971. Yang J, Kim T and Choi J An interface agent for wrapper-based information extraction Proceedings of the 7th Pacific Rim international conference on Intelligent Agents and Multi-Agent Systems, (291-302)
  972. ACM
    Diaz F and Jones R Using temporal profiles of queries for precision prediction Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval, (18-24)
  973. Maeireizo B, Litman D and Hwa R Co-training for predicting emotions with spoken dialogue data Proceedings of the ACL 2004 on Interactive poster and demonstration sessions, (28-es)
  974. Hutchinson B Acquiring the meaning of discourse markers Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics, (684-es)
  975. Litman D and Forbes-Riley K Predicting student emotions in computer-human tutoring dialogues Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics, (351-es)
  976. Pardoe D and Stone P Bidding for customer orders in TAC SCM Proceedings of the 6th AAMAS international conference on Agent-Mediated Electronic Commerce: theories for and Engineering of Distributed Mechanisms and Systems, (143-157)
  977. ACM
    Yilmaz C, Cohen M and Porter A Covering arrays for efficient fault characterization in complex configuration spaces Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis, (45-54)
  978. Oldham N, Thomas C, Sheth A and Verma K METEOR-S web service annotation framework with machine learning classification Proceedings of the First international conference on Semantic Web Services and Web Process Composition, (137-146)
  979. ACM
    Baskiotis N and Sebag M C4.5 competence map Proceedings of the twenty-first international conference on Machine learning
  980. ACM
    Appice A, Ceci M, Rawles S and Flach P Redundant feature elimination for multi-class problems Proceedings of the twenty-first international conference on Machine learning
  981. ACM
    Ferri C, Flach P and Hernández-Orallo J Delegating classifiers Proceedings of the twenty-first international conference on Machine learning
  982. ACM
    Rückert U and Kramer S Towards tight bounds for rule learning Proceedings of the twenty-first international conference on Machine learning
  983. ACM
    Melville P and Mooney R Diverse ensembles for active learning Proceedings of the twenty-first international conference on Machine learning
  984. ACM
    Jin R and Liu H Robust feature induction for support vector machines Proceedings of the twenty-first international conference on Machine learning
  985. ACM
    Frank E and Kramer S Ensembles of nested dichotomies for multi-class problems Proceedings of the twenty-first international conference on Machine learning
  986. ACM
    Forman G A pitfall and solution in multi-class feature selection for text classification Proceedings of the twenty-first international conference on Machine learning
  987. ACM
    Bouckaert R Estimating replicability of classifier learning experiments Proceedings of the twenty-first international conference on Machine learning
  988. Huang Y, McCullagh P, Black N and Harper R Feature selection and classification model construction on type 2 diabetic patient’s data Proceedings of the 4th international conference on Advances in Data Mining: applications in Image Mining, Medicine and Biotechnology, Management and Environmental Control, and Telecommunications, (153-162)
  989. ACM
    Yilmaz C, Cohen M and Porter A (2004). Covering arrays for efficient fault characterization in complex configuration spaces, ACM SIGSOFT Software Engineering Notes, 29:4, (45-54), Online publication date: 1-Jul-2004.
  990. Fernández F and Isasi P (2004). Evolutionary Design of Nearest Prototype Classifiers, Journal of Heuristics, 10:4, (431-454), Online publication date: 1-Jul-2004.
  991. Popescu-Belis A, Clark A, Georgescul M, Lalanne D and Zufferey S Shallow dialogue processing using machine learning algorithms (or not) Proceedings of the First international conference on Machine Learning for Multimodal Interaction, (277-290)
  992. ACM
    Pant G, Tsioutsiouliklis K, Johnson J and Giles C Panorama Proceedings of the 4th ACM/IEEE-CS joint conference on Digital libraries, (142-150)
  993. ACM
    Phua C, Alahakoon D and Lee V (2004). Minority report in fraud detection, ACM SIGKDD Explorations Newsletter, 6:1, (50-59), Online publication date: 1-Jun-2004.
  994. ACM
    Guo H and Viktor H (2004). Learning from imbalanced data sets with boosting and data generation, ACM SIGKDD Explorations Newsletter, 6:1, (30-39), Online publication date: 1-Jun-2004.
  995. ACM
    Parsons L, Haque E and Liu H (2004). Subspace clustering for high dimensional data, ACM SIGKDD Explorations Newsletter, 6:1, (90-105), Online publication date: 1-Jun-2004.
  996. Huang C and Liao W (2004). Application of Probabilistic Neural Networks to the Class Prediction of Leukemia and Embryonal Tumor of Central Nervous System, Neural Processing Letters, 19:3, (211-226), Online publication date: 1-Jun-2004.
  997. Gama J (2004). Functional Trees, Machine Language, 55:3, (219-250), Online publication date: 1-Jun-2004.
  998. Madden M and Howley T (2004). Transfer of Experience Between Reinforcement Learning Environments with Progressive Difficulty, Artificial Intelligence Review, 21:3-4, (375-398), Online publication date: 1-Jun-2004.
  999. Prudêncio R, Ludermir T and de Carvalho F (2004). A Modal Symbolic Classifier for selecting time series models, Pattern Recognition Letters, 25:8, (911-921), Online publication date: 1-Jun-2004.
  1000. Tsoumakas G, Angelis L and Vlahavas I (2004). Clustering classifiers for knowledge discovery from physically distributed databases, Data & Knowledge Engineering, 49:3, (223-242), Online publication date: 1-Jun-2004.
  1001. ACM
    Ramakrishnan G, Chakrabarti S, Paranjpe D and Bhattacharya P Is question answering an acquired skill? Proceedings of the 13th international conference on World Wide Web, (111-120)
  1002. Arens R A preliminary look into the use of named entity information for bioscience text tokenization Proceedings of the Student Research Workshop at HLT-NAACL 2004, (37-42)
  1003. Connelly R (2004). Introducing data mining, Journal of Computing Sciences in Colleges, 19:5, (87-96), Online publication date: 1-May-2004.
  1004. Huang C and Lee H (2004). A Grey-Based Nearest Neighbor Approach for Missing Attribute Value Prediction, Applied Intelligence, 20:3, (239-252), Online publication date: 1-May-2004.
  1005. Faceli K, De Carvalho A and Rezende S (2004). Combining Intelligent Techniques for Sensor Fusion, Applied Intelligence, 20:3, (199-213), Online publication date: 1-May-2004.
  1006. Sousa T, Silva A and Neves A (2004). Particle swarm based Data Mining Algorithms for classification tasks, Parallel Computing, 30:5-6, (767-783), Online publication date: 1-May-2004.
  1007. ACM
    Fogarty J, Hudson S and Lai J Examining the robustness of sensor-based statistical models of human interruptibility Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (207-214)
  1008. Mladenic D and Grobelnik M Visualizing very large graphs using clustering neighborhoods Proceedings of the 2004 international conference on Local Pattern Detection, (89-97)
  1009. Scholz M Knowledge-Based sampling for subgroup discovery Proceedings of the 2004 international conference on Local Pattern Detection, (171-189)
  1010. Overton J Querying to mine clusters Proceedings of the 2nd annual conference on Mid-south college computing, (183-191)
  1011. ACM
    Calderón-Benavides M, González-Caro C, Pérez-Alcázar J, García-Díaz J and Delgado J A comparison of several predictive algorithms for collaborative filtering on multi-valued ratings Proceedings of the 2004 ACM symposium on Applied computing, (1033-1039)
  1012. ACM
    Eggermont J, Kok J and Kosters W Genetic Programming for data classification Proceedings of the 2004 ACM symposium on Applied computing, (1001-1005)
  1013. ACM
    Rodríguez J and Alonso C Interval and dynamic time warping-based decision trees Proceedings of the 2004 ACM symposium on Applied computing, (548-552)
  1014. ACM
    Aguilar-Ruiz J, Costa R and Divina F Knowledge discovery from doctor-patient relationship Proceedings of the 2004 ACM symposium on Applied computing, (280-284)
  1015. Džeroski S, Todorovski L and Ljubič P Inductive queries on polynomial equations Proceedings of the 2004 European conference on Constraint-Based Mining and Inductive Databases, (127-154)
  1016. Zimmermann A and De Raedt L Inductive querying for discovering subgroups and clusters Proceedings of the 2004 European conference on Constraint-Based Mining and Inductive Databases, (380-399)
  1017. Zaki M, De N, Gao F, Palmerini P, Parimi N, Pathuri J, Phoophakdee B and Urban J Generic pattern mining via data mining template library Proceedings of the 2004 European conference on Constraint-Based Mining and Inductive Databases, (362-379)
  1018. Atzmueller M, Baumeister J and Puppe F Quality measures and semi-automatic mining of diagnostic rule bases Proceedings of the 15th international conference on Applications of Declarative Programming and Knowledge Management, and 18th international conference on Workshop on Logic Programming, (65-78)
  1019. Zhong S, Khoshgoftaar T and Seliya N (2004). Analyzing Software Measurement Data with Clustering Techniques, IEEE Intelligent Systems, 19:2, (20-27), Online publication date: 1-Mar-2004.
  1020. Zhou L, Burgoon J, Twitchell D, Qin T and Nunamaker J (2004). A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication, Journal of Management Information Systems, 20:4, (139-166), Online publication date: 1-Mar-2004.
  1021. Džeroski S and Ženko B (2004). Is Combining Classifiers with Stacking Better than Selecting the Best One?, Machine Language, 54:3, (255-273), Online publication date: 1-Mar-2004.
  1022. ACM
    Schupp S, Zalewski M and Ross K Rapid performance prediction for library components Proceedings of the 4th international workshop on Software and performance, (69-73)
  1023. Mitri G, Uitdenbogerd A and Ciesielski V Automatic music classification problems Proceedings of the 27th Australasian conference on Computer science - Volume 26, (315-322)
  1024. Ammerlaan J and Wright D Adaptive cooperative fuzzy logic controller Proceedings of the 27th Australasian conference on Computer science - Volume 26, (255-263)
  1025. Maglia A, Leopold J and Ghatti V Identifying character non-independence in phylogenetic data using data mining techniques Proceedings of the second conference on Asia-Pacific bioinformatics - Volume 29, (181-189)
  1026. Brumen B, Golob I, Jaakkola H, Welzer T and Rozman I Early assessment of classification performance Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32, (91-96)
  1027. Degemmis M, Lops P, Semeraro G, Costabile M, Guida S and Licchelli O Improving collaborative recommender systems by means of user profiles Designing personalized user experiences in eCommerce, (253-274)
  1028. ACM
    Schupp S, Zalewski M and Ross K (2004). Rapid performance prediction for library components, ACM SIGSOFT Software Engineering Notes, 29:1, (69-73), Online publication date: 1-Jan-2004.
  1029. Van Gestel T, Suykens J, Baesens B, Viaene S, Vanthienen J, Dedene G, De Moor B and Vandewalle J (2004). Benchmarking Least Squares Support Vector Machine Classifiers, Machine Language, 54:1, (5-32), Online publication date: 1-Jan-2004.
  1030. Appice A, Ceci M, Lanza A, Lisi F and Malerba D (2003). Discovery of spatial association rules in geo-referenced census data: A relational mining approach, Intelligent Data Analysis, 7:6, (541-566), Online publication date: 1-Dec-2003.
  1031. Hall L, Bowyer K, Banfield R, Bhadoria D, Kegelmeyer W and Eschrich S Comparing Pure Parallel Ensemble Creation Techniques Against Bagging Proceedings of the Third IEEE International Conference on Data Mining
  1032. ACM
    Davulcu H, Koduri S and Nagarajan S Datarover Proceedings of the 5th ACM international workshop on Web information and data management, (9-14)
  1033. Menzies T and Hu Y (2003). Data Mining for Very Busy People, Computer, 36:11, (22-29), Online publication date: 1-Nov-2003.
  1034. ACM
    Uzuner Ö and Davis R Content and expression-based copy recognition for intellectual property protection Proceedings of the 3rd ACM workshop on Digital rights management, (103-110)
  1035. Fürnkranz J (2003). Round robin ensembles, Intelligent Data Analysis, 7:5, (385-403), Online publication date: 1-Oct-2003.
  1036. ACM
    Elnahrawy E and Nath B Cleaning and querying noisy sensors Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, (78-87)
  1037. Bernadó-Mansilla E and Garrell-Guiu J (2003). Accuracy-based learning classifier systems, Evolutionary Computation, 11:3, (209-238), Online publication date: 1-Sep-2003.
  1038. ACM
    Yu L and Liu H Efficiently handling feature redundancy in high-dimensional data Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, (685-690)
  1039. ACM
    Bilenko M and Mooney R Adaptive duplicate detection using learnable string similarity measures Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, (39-48)
  1040. Yu L and Liu H Feature selection for high-dimensional data Proceedings of the Twentieth International Conference on International Conference on Machine Learning, (856-863)
  1041. Lachiche N and Flach P Improving accuracy and cost of two-class and multi-class probabilistic classifiers using ROC curves Proceedings of the Twentieth International Conference on International Conference on Machine Learning, (416-423)
  1042. Krawiec K and Bhanu B Visual learning by evolutionary feature synthesis Proceedings of the Twentieth International Conference on International Conference on Machine Learning, (376-383)
  1043. Jensen D, Neville J and Hay M Avoiding bias when aggregating relational data with degree disparity Proceedings of the Twentieth International Conference on International Conference on Machine Learning, (274-281)
  1044. Bouckaert R Choosing between two learning algorithms based on calibrated tests Proceedings of the Twentieth International Conference on International Conference on Machine Learning, (51-58)
  1045. Shan Y, Milios E, Roger A, Blouin C and Susko E Automatic Recognition of Regions of Intrinsically Poor Multiple Alignment Using Machine Learning Proceedings of the IEEE Computer Society Conference on Bioinformatics
  1046. O'Hara T, Witbrock M, Aldag B, Bertolo S, Salay N, Curtis J and Panton K Inducing criteria for lexicalization parts of speech using the Cyc KB Proceedings of the 18th international joint conference on Artificial intelligence, (1496-1497)
  1047. Liu H, Mandvikar A, Foschi P and Torkkola K Active learning with ensembles for image classification Proceedings of the 18th international joint conference on Artificial intelligence, (1435-1436)
  1048. Sue D, Vladusic D and Bratko I Qualitatively faithful quantitative prediction Proceedings of the 18th international joint conference on Artificial intelligence, (1052-1057)
  1049. Melville P and Mooney R Constructing diverse classifier ensembles using artificial training examples Proceedings of the 18th international joint conference on Artificial intelligence, (505-510)
  1050. Llorà X and Garrell J (2003). Prototype induction and attribute selection via evolutionary algorithms, Intelligent Data Analysis, 7:3, (193-208), Online publication date: 1-Aug-2003.
  1051. Divina F, Keijzer M and Marchiori E A method for handling numerical attributes in GA-based inductive concept learners Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI, (898-908)
  1052. Krawiec K and Bhanu B Coevolution and linear genetic programming for visual learning Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI, (332-343)
  1053. Bacardit J and Garrell J Evolving multiple discretizations with adaptive intervals for a Pittsburgh rule-based learning classifier system Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII, (1818-1831)
  1054. Gordon A, Kazemzadeh A, Nair A and Petrova M Recognizing expressions of commonsense psychology in English Text Proceedings of the 41st Annual Meeting on Association for Computational Linguistics - Volume 1, (208-215)
  1055. Fleischman M, Hovy E and Echihabi A Offline strategies for online question answering Proceedings of the 41st Annual Meeting on Association for Computational Linguistics - Volume 1, (1-7)
  1056. Krawiec K and Bhanu B Coevolutionary feature learning for object recognition Proceedings of the 3rd international conference on Machine learning and data mining in pattern recognition, (224-238)
  1057. Estruch V, Ferri C, Hernández-Orallo J and Ramírez-Quintana M Simple mimetic classifiers Proceedings of the 3rd international conference on Machine learning and data mining in pattern recognition, (156-171)
  1058. Aina O, Hartmann K and Strothotte T Extracting emotion from speech Proceedings of the 3rd international conference on Smart graphics, (162-171)
  1059. Woon F, Knight B and Petridis M Case base reduction using solution-space metrics Proceedings of the 5th international conference on Case-based reasoning: Research and Development, (652-664)
  1060. Redmond M and Line C Empirical analysis of case-based reasoning and other prediction methods in a social science domain Proceedings of the 5th international conference on Case-based reasoning: Research and Development, (452-464)
  1061. Zhu T, Greiner R and Häubl G Learning a model of a web user's interests Proceedings of the 9th international conference on User modeling, (65-75)
  1062. Jaser E, Kittler J and Christmas W Building classifier ensembles for automatic sports classification Proceedings of the 4th international conference on Multiple classifier systems, (366-374)
  1063. Tapia E, González J and García-Villalba J Good error correcting output codes for adaptive multiclass learning Proceedings of the 4th international conference on Multiple classifier systems, (156-165)
  1064. Zaluski M, Japkowicz N and Matwin S Case authoring from text and historical experiences Proceedings of the 16th Canadian society for computational studies of intelligence conference on Advances in artificial intelligence, (222-236)
  1065. Ranilla J, Díaz I and Fernández J Text categorisation using a partial-matching strategy Proceedings of the Artificial and natural neural networks 7th international conference on Computational methods in neural modeling - Volume 1, (262-269)
  1066. Lamma E, Riguzzi F, Storari S, Mello P and Nanetti A (2003). Discovering validation rules from microbiological data, New Generation Computing, 21:2, (123-133), Online publication date: 1-Jun-2003.
  1067. Curran J Blueprint for a high performance NLP infrastructure Proceedings of the HLT-NAACL 2003 workshop on Software engineering and architecture of language technology systems - Volume 8, (39-44)
  1068. Tablan V, Bontcheva K, Maynard D and Cunningham H OLLIE Proceedings of the HLT-NAACL 2003 workshop on Software engineering and architecture of language technology systems - Volume 8, (17-24)
  1069. O'Hara T and Wiebe J Preposition semantic classification via Penn Treebank and FrameNet Proceedings of the seventh conference on Natural language learning at HLT-NAACL 2003 - Volume 4, (79-86)
  1070. Peters J, Ramanna S and Szczuka M Towards a line-crawling robot obstacle classification system Proceedings of the 9th international conference on Rough sets, fuzzy sets, data mining, and granular computing, (303-307)
  1071. Oberle D, Berendt B, Hotho A and Gonzalez J Conceptual user tracking Proceedings of the 1st international Atlantic web intelligence conference on Advances in web intelligence, (155-164)
  1072. Menzies T and Di Stefano J (2003). More Success and Failure Factors in Software Reuse, IEEE Transactions on Software Engineering, 29:5, (474-477), Online publication date: 1-May-2003.
  1073. Menzies T (2003). Guest Editor's Introduction, IEEE Intelligent Systems, 18:3, (18-24), Online publication date: 1-May-2003.
  1074. Liu H, Yu L, Dash M and Motoda H Active feature selection using classes Proceedings of the 7th Pacific-Asia conference on Advances in knowledge discovery and data mining, (474-485)
  1075. Shi H, Wang Z, Webb G and Huang H A new restricted Bayesian network classifier Proceedings of the 7th Pacific-Asia conference on Advances in knowledge discovery and data mining, (265-270)
  1076. Nguyen H, Velamuru P, Kolippakkam D, Davulcu H, Liu H and Ates M Mining "Hidden phrase" definitions from the web Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications, (156-165)
  1077. Smith M and Bull L Feature construction and selection using genetic programming and a genetic algorithm Proceedings of the 6th European conference on Genetic programming, (229-237)
  1078. Bojarczuk C, Lopes H and Freitas A An innovative application of a constrained-syntax genetic programming system to the problem of predicting survival of patients Proceedings of the 6th European conference on Genetic programming, (11-21)
  1079. Semeraro G, Degemmis M, Lops P, Thiel U and L'Abbate M A personalized information search process based on dialoguing agents and user profiling Proceedings of the 25th European conference on IR research, (613-621)
  1080. Lapata M and Lascarides A Detecting novel compounds Proceedings of the tenth conference on European chapter of the Association for Computational Linguistics - Volume 1, (235-242)
  1081. ACM
    Hudson S, Fogarty J, Atkeson C, Avrahami D, Forlizzi J, Kiesler S, Lee J and Yang J Predicting human interruptibility with sensors Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (257-264)
  1082. Todorovski L and Džeroski S (2003). Combining Classifiers with Meta Decision Trees, Machine Language, 50:3, (223-249), Online publication date: 1-Mar-2003.
  1083. O'Hara T and Wiebe J Classifying functional relations in factotum via WordNet hypernym associations Proceedings of the 4th international conference on Computational linguistics and intelligent text processing, (347-359)
  1084. Allison L Types and classes of machine learning and data mining Proceedings of the 26th Australasian computer science conference - Volume 16, (207-215)
  1085. Lu Y and Bettine J (2003). Data mining, Journal of Computing Sciences in Colleges, 18:3, (81-86), Online publication date: 1-Feb-2003.
  1086. Ciesielski V and Lalani A Data mining of web access logs from an academic web site Design and application of hybrid intelligent systems, (1034-1043)
  1087. Ismail M and Ciesielski V An empirical investigation of the impact of discretization on common data distributions Design and application of hybrid intelligent systems, (692-701)
  1088. Minz S and Jain R Hybridized rough set framework for classification Design and application of hybrid intelligent systems, (631-640)
  1089. Bhattacharya B and Solomatine D An algorithm for clustering and classification of series data with constraint of contiguity Design and application of hybrid intelligent systems, (489-498)
  1090. Solomatine D Mixtures of simple models vs ANNs in hydrological modelling Design and application of hybrid intelligent systems, (76-85)
  1091. Berthold M and Hand D References Intelligent data analysis, (475-500)
  1092. Tan A and Gilbert D An empirical comparison of supervised machine learning techniques in bioinformatics Proceedings of the First Asia-Pacific bioinformatics conference on Bioinformatics 2003 - Volume 19, (219-222)
  1093. Keener L Bibliography Technology supporting business solutions, (179-191)
  1094. Zhou Z (2003). Book review: Three perspectives of data mining, Artificial Intelligence, 143:1, (139-146), Online publication date: 1-Jan-2003.
  1095. Krawiec K (2002). Genetic Programming-based Construction of Features for Machine Learning and Knowledge Discovery Tasks, Genetic Programming and Evolvable Machines, 3:4, (329-343), Online publication date: 1-Dec-2002.
  1096. ACM
    Spangler S and Kreulen J Interactive methods for taxonomy editing and validation Proceedings of the eleventh international conference on Information and knowledge management, (665-668)
  1097. Quasthoff U, Biemann C and Wolff C Named entity learning and verification proceedings of the 6th conference on Natural language learning - Volume 20, (1-7)
  1098. Fleischman M and Hovy E Fine grained classification of named entities Proceedings of the 19th international conference on Computational linguistics - Volume 1, (1-7)
  1099. Chakrabarti S, Roy S and Soundalgekar M Fast and accurate text classification via multiple linear discriminant projections Proceedings of the 28th international conference on Very Large Data Bases, (658-669)
  1100. Zaffalon M and Hutter M Robust feature selection by mutual information distributions Proceedings of the Eighteenth conference on Uncertainty in artificial intelligence, (577-584)
  1101. ACM
    Little B, Johnston W, Lovell A, Rejesus R and Steed S Collusion in the U.S. crop insurance program Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, (594-598)
  1102. ACM
    Ester M, Kriegel H and Schubert M Web site mining Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, (249-258)
  1103. ACM
    Denaro G, Morasca S and Pezzè M Deriving models of software fault-proneness Proceedings of the 14th international conference on Software engineering and knowledge engineering, (361-368)
  1104. Pedersen T Evaluating the effectiveness of ensembles of decision trees in disambiguating SENSEVAL lexical samples Proceedings of the ACL-02 workshop on Word sense disambiguation: recent successes and future directions - Volume 8, (81-87)
  1105. Gärtner T, Lloyd J and Flach P Kernels for structured data Proceedings of the 12th international conference on Inductive logic programming, (66-83)
  1106. Czuba K, Prager J and Chu-Carroll J A machine learning approach to introspection in a Question Answering system Proceedings of the ACL-02 conference on Empirical methods in natural language processing - Volume 10, (265-272)
  1107. Lee Y and Ng H An empirical evaluation of knowledge sources and learning algorithms for word sense disambiguation Proceedings of the ACL-02 conference on Empirical methods in natural language processing - Volume 10, (41-48)
  1108. Clough P, Gaizauskas R, Piao S and Wilks Y METER Proceedings of the 40th Annual Meeting on Association for Computational Linguistics, (152-159)
  1109. Johnson M A simple pattern-matching algorithm for recovering empty nodes and their antecedents Proceedings of the 40th Annual Meeting on Association for Computational Linguistics, (136-143)
  1110. Rowe N (2002). Marie-4, IEEE Intelligent Systems, 17:4, (8-14), Online publication date: 1-Jul-2002.
  1111. ACM
    Estivill-Castro V (2002). Why so many clustering algorithms, ACM SIGKDD Explorations Newsletter, 4:1, (65-75), Online publication date: 1-Jun-2002.
  1112. ACM
    Denaro G and Pezzè M An empirical evaluation of fault-proneness models Proceedings of the 24th International Conference on Software Engineering, (241-251)
  1113. ACM
    Hidalgo J Evaluating cost-sensitive Unsolicited Bulk Email categorization Proceedings of the 2002 ACM symposium on Applied computing, (615-620)
  1114. Fürnkranz J (2002). Round robin classification, The Journal of Machine Learning Research, 2, (721-747), Online publication date: 1-Mar-2002.
  1115. Ragg T (2002). Bayesian learning and evolutionary parameter optimization, AI Communications, 15:1, (61-74), Online publication date: 1-Jan-2002.
  1116. ACM
    de Vel O, Anderson A, Corney M and Mohay G (2001). Mining e-mail content for author identification forensics, ACM SIGMOD Record, 30:4, (55-64), Online publication date: 1-Dec-2001.
  1117. ACM
    Barbará D, Couto J, Jajodia S and Wu N (2001). ADAM, ACM SIGMOD Record, 30:4, (15-24), Online publication date: 1-Dec-2001.
  1118. Kiritchenko S and Matwin S Email classification with co-training Proceedings of the 2001 conference of the Centre for Advanced Studies on Collaborative research
  1119. Dězeroski S Data mining in a nutshell Relational Data Mining, (3-27)
  1120. ACM
    Lavrač N and Flach P (2001). An extended transformation approach to inductive logic programming, ACM Transactions on Computational Logic, 2:4, (458-494), Online publication date: 1-Oct-2001.
  1121. Rodríguez J, Alonso C and Boström H (2001). Boosting interval based literals, Intelligent Data Analysis, 5:3, (245-262), Online publication date: 1-Aug-2001.
  1122. Pedersen T A decision tree of bigrams is an accurate predictor of word sense Proceedings of the second meeting of the North American Chapter of the Association for Computational Linguistics on Language technologies, (1-8)
  1123. Drossos N, Papagelis A and Kalles D Decision Tree Toolkit Proceedings of the 4th European Conference on Principles of Data Mining and Knowledge Discovery, (381-387)
  1124. Chauchat J, Rakotomalala R and Robert D Sampling Strategies for Targeting Rare Groups from a Bank Customer Database Proceedings of the 4th European Conference on Principles of Data Mining and Knowledge Discovery, (181-190)
  1125. Gómez Hidalgo J, López M and Sanz E Combining text and heuristics for cost-sensitive spam filtering Proceedings of the 2nd workshop on Learning language in logic and the 4th conference on Computational natural language learning - Volume 7, (99-102)
  1126. Jones D and Rusk G Toward a scoring function for quality-driven machine translation Proceedings of the 18th conference on Computational linguistics - Volume 1, (376-382)
  1127. Jensen R and Mac Parthalain N Discovering fuzzy-rough reducts through Estimation of Distribution Algorithms 2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-8)
Contributors
  • The University of Waikato
  • The University of Waikato
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations