Abstract is missing.
- Erratum: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist NetworksNasrullah Memon, David L. Hicks, Henrik Legind Larsen. [doi]
- Mining Ambiguous Data with Multi-instance Multi-label RepresentationZhi-Hua Zhou. 1 [doi]
- ::::DELAY:::: : A Lazy Approach for Mining Frequent Patterns over High Speed Data StreamsHui Yang, Hongyan Liu, Jun He. 2-14 [doi]
- Exploring Content and Linkage Structures for Searching Relevant Web PagesDarren Davis, Eric Jiang. 15-22 [doi]
- CLBCRA-Approach for Combination of Content-Based and Link-Based Ranking in Web SearchHao-ming Wang, Ye Guo. 23-34 [doi]
- Rough Sets in Hybrid Soft Computing SystemsRenpu Li, Yongsheng Zhao, Fuzeng Zhang, Lihua Song. 35-44 [doi]
- Discovering Novel Multistage Attack StrategiesZhitang Li, Aifang Zhang, Dong Li, Li Wang. 45-56 [doi]
- Privacy Preserving DBSCAN Algorithm for ClusteringK. Anil Kumar, C. Pandu Rangan. 57-68 [doi]
- A New Multi-level Algorithm Based on Particle Swarm Optimization for Bisecting GraphLingyu Sun, Ming Leng, Songnian Yu. 69-80 [doi]
- A Supervised Subspace Learning Algorithm: Supervised Neighborhood Preserving EmbeddingXianhua Zeng, Siwei Luo. 81-88 [doi]
- A ::::k:::: -Anonymity Clustering Method for Effective Data Privacy PreservationChuang-Cheng Chiu, Chieh-Yuan Tsai. 89-99 [doi]
- LSSVM with Fuzzy Pre-processing Model Based Aero Engine Data Mining TechnologyXuhui Wang, Shengguo Huang, Li Cao, Dinghao Shi, Ping Shu. 100-109 [doi]
- A Coding Hierarchy Computing Based Clustering AlgorithmJing Peng, Changjie Tang, Dongqing Yang, An-long Chen, Lei Duan. 110-121 [doi]
- Mining Both Positive and Negative Association Rules from Frequent and Infrequent ItemsetsXiangjun Dong, Zhendong Niu, Xuelin Shi, Xiaodan Zhang, Donghua Zhu. 122-133 [doi]
- Survey of Improving Naive Bayes for ClassificationLiangxiao Jiang, Dianhong Wang, Zhihua Cai, Xuesong Yan. 134-145 [doi]
- Privacy Preserving BIRCH Algorithm for Clustering over Arbitrarily Partitioned DatabasesP. Krishna Prasad, C. Pandu Rangan. 146-157 [doi]
- Unsupervised Outlier Detection in Sensor Networks Using Aggregation TreeKejia Zhang, Shengfei Shi, Hong Gao, Jianzhong Li. 158-169 [doi]
- Separator: Sifting Hierarchical Heavy Hitters Accurately from Data StreamsYuan Lin, Hongyan Liu. 170-182 [doi]
- Spatial Fuzzy Clustering Using Varying CoefficientsHuaqiang Yuan, Yaxun Wang, Jie Zhang, Wei Tan, Chao Qu, Wenbin He. 183-190 [doi]
- Collaborative Target Classification for Image Recognition in Wireless Sensor NetworksXue Wang, Sheng Wang, Junjie Ma. 191-202 [doi]
- Dimensionality Reduction for Mass Spectrometry DataYihui Liu. 203-213 [doi]
- The Study of Dynamic Aggregation of Relational Attributes on Relational Data MiningRayner Alfred. 214-226 [doi]
- Learning Optimal Kernel from Distance Metric in Twin Kernel Embedding for Dimensionality Reduction and Visualization of FingerprintsYi Guo, Paul Wing Hing Kwan, Junbin Gao. 227-238 [doi]
- Efficiently Monitoring Nearest Neighbors to a Moving ObjectCheqing Jin, Weibin Guo. 239-251 [doi]
- A Novel Text Classification Approach Based on Enhanced Association RuleJiangtao Qiu, Changjie Tang, Tao Zeng, Shaojie Qiao, Jie Zuo, Peng Chen, Jun Zhu. 252-263 [doi]
- Applications of the Moving Average of ::::n:::: ::: ::::th:::: ::: -Order Difference Algorithm for Time Series PredictionYang Lan, Daniel Neagu. 264-275 [doi]
- Inference of Gene Regulatory Network by Bayesian Network Using Metropolis-Hastings AlgorithmKhwunta Kirimasthong, Aompilai Manorat, Jeerayut Chaijaruwanich, Sukon Prasitwattanaseree, Chinae Thammarongtham. 276-286 [doi]
- A Consensus Recommender for Web UsersMurat Göksedef, Sule Gündüz Ögüdücü. 287-299 [doi]
- Constructing Classification Rules Based on SVR and Its Derivative CharacteristicsDexian Zhang, Zhixiao Yang, Yanfeng Fan, Ziqiang Wang. 300-309 [doi]
- Hiding Sensitive Associative Classification Rule by Data ReductionJuggapong Natwichai, Maria E. Orlowska, Xingzhi Sun. 310-322 [doi]
- AOG-ags Algorithms and ApplicationsLizhen Wang, Junli Lu, Joan Lu, Jim Yip. 323-334 [doi]
- A Framework for Titled Document Categorization with Modified Multinomial Naivebayes ClassifierHang Guo, Lizhu Zhou. 335-344 [doi]
- Prediction of Protein Subcellular Locations by Combining K-Local Hyperplane Distance Nearest NeighborHong Liu, Haodi Feng, Daming Zhu. 345-351 [doi]
- A Similarity Retrieval Method in Brain Image Sequence DatabaseHaiwei Pan, Qilong Han, Xiaoqin Xie, Zhang Wei, Jianzhong Li. 352-364 [doi]
- A Criterion for Learning the Data-Dependent Kernel for ClassificationJun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan. 365-376 [doi]
- Topic Extraction with AGAPEJulien Velcin, Jean-Gabriel Ganascia. 377-388 [doi]
- Clustering Massive Text Data Streams by Semantic Smoothing ModelYubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu. 389-400 [doi]
- ::::GraSeq:::: : A Novel Approximate Mining Approach of Sequential Patterns over Data StreamHaifeng Li, Hong Chen. 401-411 [doi]
- A Novel Greedy Bayesian Network Structure Learning Algorithm for Limited DataFeng Liu, Fengzhan Tian, QiLiang Zhu. 412-421 [doi]
- Optimum Neural Network Construction Via Linear Programming Minimum Sphere Set CoveringXunkai Wei, Yinghong Li, Yufei Li. 422-429 [doi]
- How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist NetworksNasrullah Memon, David L. Hicks, Henrik Legind Larsen. 430-441 [doi]
- Prediction of Enzyme Class by Using ::::Reactive Motifs:::: Generated from Binding and Catalytic SitesPeera Liewlom, Thanawin Rakthanmanon, Kitsana Waiyamai. 442-453 [doi]
- Bayesian Network Structure Ensemble LearningFeng Liu, Fengzhan Tian, QiLiang Zhu. 454-465 [doi]
- Fusion of Palmprint and Iris for Personal AuthenticationXiangqian Wu, David Zhang, Kuanquan Wang, Ning Qi. 466-475 [doi]
- Enhanced Graph Based Genealogical Record LinkageCary Sweet, Tansel Özyer, Reda Alhajj. 476-487 [doi]
- A Fuzzy Comprehensive Clustering MethodShuliang Wang, Xinzhou Wang. 488-499 [doi]
- CACS: A Novel Classification Algorithm Based on Concept SimilarityJing Peng, Dongqing Yang, Changjie Tang, Jing Zhang, Jianjun Hu. 500-507 [doi]
- Data Mining in Tourism Demand Analysis: A Retrospective AnalysisRob Law, Henry Mok, Carey Goh. 508-515 [doi]
- Chinese Patent Mining Based on Sememe Statistics and Key-Phrase ExtractionBo Jin, Hongfei Teng, Yanjun Shi, Fuzheng Qu. 516-523 [doi]
- Classification of Business Travelers Using SVMs Combined with Kernel Principal Component AnalysisXin Xu, Rob Law, Tao Wu. 524-532 [doi]
- Research on the Traffic Matrix Based on Sampling ModelFengjun Shang. 533-544 [doi]
- A Causal Analysis for the Expenditure Data of Business TravelersRob Law, Gang Li. 545-552 [doi]
- A Visual and Interactive Data Exploration Method for Large Data Sets and ClusteringDavid Da Costa, Gilles Venturini. 553-561 [doi]
- Explorative Data Mining on Stock Data - Experimental Results and FindingsLay-Ki Soon, Sang Ho Lee. 562-569 [doi]
- Graph Structural Mining in Terrorist NetworksMuhammad Akram Shaikh, Jiaxin Wang, Zehong Yang, Yixu Song. 570-577 [doi]
- Characterizing Pseudobase and Predicting RNA Secondary Structure with Simple H-Type Pseudoknots Based on Dynamic ProgrammingOyun-Erdene Namsrai, Keun Ho Ryu. 578-585 [doi]
- Locally Discriminant Projection with Kernels for Feature ExtractionJun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan. 586-593 [doi]
- A GA-Based Feature Subset Selection and Parameter Optimization of Support Vector Machine for Content - Based Image RetrievalKwang-Kyu Seo. 594-604 [doi]
- E-Stream: Evolution-Based Technique for Stream ClusteringKomkrit Udommanetanakit, Thanawin Rakthanmanon, Kitsana Waiyamai. 605-615 [doi]
- H-BayesClust: A New Hierarchical Clustering Based on Bayesian NetworksMorteza Haghir Chehreghani, Hassan Abolhassani. 616-624 [doi]
- An Improved AdaBoost Algorithm Based on Adaptive Weight AdjustingLili Cheng, Jianpei Zhang, Jing Yang, Jun Ma. 625-632 [doi]