Abstract is missing.
- User-centered design for KDDEric Haseltine. 1 [doi]
- Graphical models for data miningDavid Heckerman. 2 [doi]
- An iterative method for multi-class cost-sensitive learningNaoki Abe, Bianca Zadrozny, John Langford. 3-11 [doi]
- Approximating a collection of frequent setsFoto N. Afrati, Aristides Gionis, Heikki Mannila. 12-19 [doi]
- Mining reference tables for automatic text segmentationEugene Agichtein, Venkatesh Ganti. 20-29 [doi]
- Recovering latent time-series from their observed sums: network tomography with particle filtersEdoardo Airoldi, Christos Faloutsos. 30-39 [doi]
- Fast nonlinear regression via eigenimages applied to galactic morphologyBrigham Anderson, Andrew W. Moore, Andrew Connolly, Robert Nichol. 40-48 [doi]
- Clustering time series from ARMA models with clipped dataAnthony J. Bagnall, Gareth J. Janacek. 49-58 [doi]
- A probabilistic framework for semi-supervised clusteringSugato Basu, Mikhail Bilenko, Raymond J. Mooney. 59-68 [doi]
- Data mining in metric space: an empirical analysis of supervised learning performance criteriaRich Caruana, Alexandru Niculescu-Mizil. 69-78 [doi]
- Fully automatic cross-associationsDeepayan Chakrabarti, Spiros Papadimitriou, Dharmendra S. Modha, Christos Faloutsos. 79-88 [doi]
- Exploiting dictionaries in named entity extraction: combining semi-Markov extraction processes and data integration methodsWilliam W. Cohen, Sunita Sarawagi. 89-98 [doi]
- Adversarial classificationNilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. Sanghai, Deepak Verma. 99-108 [doi]
- Regularized multi--task learningTheodoros Evgeniou, Massimiliano Pontil. 109-117 [doi]
- Fast discovery of connection subgraphsChristos Faloutsos, Kevin S. McCurley, Andrew Tomkins. 118-127 [doi]
- Systematic data selection to mine concept-drifting data streamsWei Fan. 128-137 [doi]
- Efficient closed pattern mining in the presence of tough block constraintsKrishna Gade, Jianyong Wang, George Karypis. 138-147 [doi]
- Discovering complex matchings across web query interfaces: a correlation mining approachBin He, Kevin Chen-Chuan Chang, Jiawei Han. 148-157 [doi]
- Cyclic pattern kernels for predictive graph miningTamás Horváth, Thomas Gärtner, Stefan Wrobel. 158-167 [doi]
- Mining and summarizing customer reviewsMinqing Hu, Bing Liu. 168-177 [doi]
- Interestingness of frequent itemsets using Bayesian networks as background knowledgeSzymon Jaroszewicz, Dan A. Simovici. 178-186 [doi]
- Mining the space of graph propertiesGlen Jeh, Jennifer Widom. 187-196 [doi]
- Web usage mining based on probabilistic latent semantic analysisXin Jin, Yanzan Zhou, Bamshad Mobasher. 197-205 [doi]
- Towards parameter-free data miningEamonn J. Keogh, Stefano Lonardi, Chotirat (Ann) Ratanamahatana. 206-215 [doi]
- A graph-theoretic approach to extract storylines from search resultsRavi Kumar, Uma Mahadevan, D. Sivakumar. 216-225 [doi]
- Incremental maintenance of quotient cube for medianCuiping Li, Gao Cong, Anthony K. H. Tung, Shan Wang. 226-235 [doi]
- Mining, indexing, and querying historical spatiotemporal dataNikos Mamoulis, Huiping Cao, George Kollios, Marios Hadjieleftheriou, Yufei Tao, David W. Cheung. 236-245 [doi]
- Machine learning for online query relaxationIon Muslea. 246-255 [doi]
- Rapid detection of significant spatial clustersDaniel B. Neill, Andrew W. Moore. 256-265 [doi]
- Turning CARTwheels: an alternating algorithm for mining redescriptionsNaren Ramakrishnan, Deept Kumar, Bud Mishra, Malcolm Potts, Richard F. Helm. 266-275 [doi]
- Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usageJude W. Shavlik, Mark Shavlik. 276-285 [doi]
- A Bayesian network framework for reject inferenceAndrew T. Smith, Charles Elkan. 286-295 [doi]
- Support envelopes: a technique for exploring the structure of association patternsMichael Steinbach, Pang-Ning Tan, Vipin Kumar. 296-305 [doi]
- Probabilistic author-topic models for information discoveryMark Steyvers, Padhraic Smyth, Michal Rosen-Zvi, Thomas L. Griffiths. 306-315 [doi]
- Scalable mining of large disk-based graph databasesChen Wang, Wei Wang, Jian Pei, Yongtai Zhu, Baile Shi. 316-325 [doi]
- Incorporating prior knowledge with weighted margin support vector machinesXiaoyun Wu, Rohini K. Srihari. 326-333 [doi]
- Exploiting a support-based upper bound of Pearson s correlation coefficient for efficiently identifying strongly correlated pairsHui Xiong, Shashi Shekhar, Pang-Ning Tan, Vipin Kumar. 334-343 [doi]
- The complexity of mining maximal frequent itemsets and maximal frequent patternsGuizhen Yang. 344-353 [doi]
- GPCA: an efficient dimension reduction scheme for image compression and retrievalJieping Ye, Ravi Janardan, Qi Li. 354-363 [doi]
- IDR/QR: an incremental dimension reduction algorithm via QR decompositionJieping Ye, Qi Li, Hui Xiong, Haesun Park, Ravi Janardan, Vipin Kumar. 364-373 [doi]
- On the discovery of significant statistical quantitative rulesHong Zhang, Balaji Padmanabhan, Alexander Tuzhilin. 374-383 [doi]
- Fast mining of spatial collocationsXin Zhang, Nikos Mamoulis, David W. Cheung, Yutao Shou. 384-393 [doi]
- TiVo: making show recommendations using a distributed collaborative filtering architectureKamal Ali, Wijnand van Stam. 394-401 [doi]
- Predicting customer shopping lists from point-of-sale purchase dataChad M. Cumby, Andrew E. Fano, Rayid Ghani, Marko Krema. 402-409 [doi]
- A rank sum test method for informative gene discoveryLin Deng, Jian Pei, Jinwen Ma, Dik Lun Lee. 410-419 [doi]
- Early detection of insider trading in option marketsSteve Donoho. 420-429 [doi]
- Mining coherent gene clusters from gene-sample-time microarray dataDaxin Jiang, Jian Pei, Murali Ramanathan, Chun Tang, Aidong Zhang. 430-439 [doi]
- Eigenspace-based anomaly detection in computer systemsTsuyoshi Idé, Hisashi Kashima. 440-449 [doi]
- Effective localized regression for damage detection in large complex mechanical structuresAleksandar Lazarevic, Ramdev Kanapady, Chandrika Kamath. 450-459 [doi]
- Visually mining and monitoring massive time seriesJessica Lin, Eamonn J. Keogh, Stefano Lonardi, Jeffrey P. Lankford, Donna M. Nystrom. 460-469 [doi]
- Learning to detect malicious executables in the wildJeremy Z. Kolter, Marcus A. Maloof. 470-478 [doi]
- Predicting prostate cancer recurrence via maximizing the concordance indexLian Yan, David Verbel, Olivier Saidi. 479-485 [doi]
- Density-based spam detectorKenichi Yoshida, Fuminori Adachi, Takashi Washio, Hiroshi Motoda, Teruaki Homma, Akihiro Nakashima, Hiromitsu Fujikawa, Katsuyuki Yamazaki. 486-493 [doi]
- V-Miner: using enhanced parallel coordinates to mine product design and test dataKaidi Zhao, Bing Liu, Thomas M. Tirpak, Andreas Schaller. 494-502 [doi]
- On demand classification of data streamsCharu C. Aggarwal, Jiawei Han, Jianyong Wang, Philip S. Yu. 503-508 [doi]
- A generalized maximum entropy approach to bregman co-clustering and matrix approximationArindam Banerjee, Inderjit S. Dhillon, Joydeep Ghosh, Srujana Merugu, Dharmendra S. Modha. 509-514 [doi]
- An objective evaluation criterion for clusteringArindam Banerjee, John Langford. 515-520 [doi]
- Column-generation boosting methods for mixture of kernelsJinbo Bi, Tong Zhang, Kristin P. Bennett. 521-526 [doi]
- IncSpan: incremental mining of sequential patterns in large databaseHong Cheng, Xifeng Yan, Jiawei Han. 527-532 [doi]
- Parallel computation of high dimensional robust correlation and covariance matricesJames Chilson, Raymond T. Ng, Alan Wagner, Ruben H. Zamar. 533-538 [doi]
- Belief state approaches to signaling alarms in surveillance systemsKaustav Das, Andrew W. Moore, Jeff G. Schneider. 539-544 [doi]
- Locating secret messages in imagesIan Davidson, Goutam Paul. 545-550 [doi]
- Kernel k-means: spectral clustering and normalized cutsInderjit S. Dhillon, Yuqiang Guan, Brian Kulis. 551-556 [doi]
- A microeconomic data mining problem: customer-oriented catalog segmentationMartin Ester, Rong Ge, Wen Jin, Zengjian Hu. 557-562 [doi]
- k-TTP: a new privacy model for large-scale distributed environmentsBobi Gilburd, Assaf Schuster, Ran Wolff. 563-568 [doi]
- Diagnosing extrapolation: tree-based density estimationGiles Hooker. 569-574 [doi]
- Discovering additive structure in black box functionsGiles Hooker. 575-580 [doi]
- SPIN: mining maximal frequent subgraphs from graph databasesJun Huan, Wei Wang 0010, Jan Prins, Jiong Yang. 581-586 [doi]
- On detecting space-time clustersVijay S. Iyengar. 587-592 [doi]
- Why collective inference improves relational classificationDavid Jensen, Jennifer Neville, Brian Gallagher. 593-598 [doi]
- When do data mining results violate privacy?Murat Kantarcioglu, Jiashun Jin, Chris Clifton. 599-604 [doi]
- Improved robustness of signature-based near-replica detection via lexicon randomizationAleksander Kolcz, Abdur Chowdhury, Joshua Alspector. 605-610 [doi]
- Learning spatially variant dissimilarity (SVaD) measuresKrishna Kummamuru, Raghu Krishnapuram, Rakesh Agrawal. 611-616 [doi]
- Clustering moving objectsYifan Li, Jiawei Han, Jiong Yang. 617-622 [doi]
- A framework for ontology-driven subspace clusteringJinze Liu, Wei Wang 0010, Jiong Yang. 623-628 [doi]
- The IOC algorithm: efficient many-class non-parametric classification for high-dimensional dataTing Liu, Ke Yang, Andrew W. Moore. 629-634 [doi]
- Sleeved coclusteringAvraham A. Melkman, Eran Shaham. 635-640 [doi]
- Semantic representation: search and mining of multimedia contentApostol Natsev, Milind R. Naphade, John R. Smith. 641-646 [doi]
- A quickstart in frequent structure mining can make a differenceSiegfried Nijssen, Joost N. Kok. 647-652 [doi]
- Automatic multimedia cross-modal correlation discoveryJia-Yu Pan, Hyung Jeong Yang, Christos Faloutsos, Pinar Duygulu. 653-658 [doi]
- Estimating the size of the telephone universe: a Bayesian Mark-recapture approachDavid Poole. 659-664 [doi]
- Cluster-based concept invention for statistical relational learningAlexandrin Popescul, Lyle H. Ungar. 665-670 [doi]
- Identifying early buyers from purchase dataPaat Rusmevichientong, Shenghuo Zhu, David Selinger. 671-677 [doi]
- Privacy preserving regression modelling via distributed computationAshish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerome P. Reiter. 677-682 [doi]
- Dense itemsetsJouni K. Seppänen, Heikki Mannila. 683-688 [doi]
- Generalizing the notion of supportMichael Steinbach, Pang-Ning Tan, Hui Xiong, Vipin Kumar. 689-694 [doi]
- Ordering patterns by combining opinions from multiple sourcesPang-Ning Tan, Rong Jin. 695-700 [doi]
- A generative probabilistic approach to visualizing sets of symbolic sequencesPeter Tiño, Ata Kabán, Yi Sun. 701-706 [doi]
- Rotation invariant distance measures for trajectoriesMichail Vlachos, Dimitrios Gunopulos, Gautam Das. 707-712 [doi]
- Privacy-preserving Bayesian network structure computation on distributed heterogeneous dataRebecca N. Wright, Zhiqiang Yang. 713-718 [doi]
- Mining scale-free networks using geodesic clusteringAndrew Y. Wu, Michael Garland, Jiawei Han. 719-724 [doi]
- IMMC: incremental maximum margin criterionJun Yan, Benyu Zhang, Shuicheng Yan, Qiang Yang, Hua Li, Zheng Chen, Wensi Xi, Weiguo Fan, Wei-Ying Ma, QianSheng Cheng. 725-730 [doi]
- 2PXMiner: an efficient two pass mining of frequent XML query patternsLiang Huai Yang, Mong-Li Lee, Wynne Hsu, Xinyu Guo. 731-736 [doi]
- Redundancy based feature selection for microarray dataLei Yu, Huan Liu. 737-742 [doi]
- A cross-collection mixture model for comparative text miningChengXiang Zhai, Atulya Velivelli, Bei Yu. 743-748 [doi]
- A data mining approach to modeling relationships among categories in image collectionRuofei Zhang, Zhongfei (Mark) Zhang, Sandeep Khanzode. 749-754 [doi]
- A DEA approach for model combinationZhiqiang Zheng, Balaji Padmanabhan, Haoqiang Zheng. 755-760 [doi]
- Optimal randomization for privacy preserving data miningMichael Yu Zhu, Lei Liu. 761-766 [doi]
- Cross channel optimized marketing by reinforcement learningNaoki Abe, Naval K. Verma, Chidanand Apté, Robert Schroko. 767-772 [doi]
- Interactive training of advanced classifiers for mining remote sensing image archivesSelim Aksoy, Krzysztof Koperski, Carsten Tusk, Giovanni B. Marchisio. 773-782 [doi]
- Exploring the community structure of newsgroupsChristian Borgs, Jennifer T. Chayes, Mohammad Mahdian, Amin Saberi. 783-787 [doi]
- Feature selection in scientific applicationsErick Cantú-Paz, Shawn Newsam, Chandrika Kamath. 788-793 [doi]
- A general approach to incorporate data quality matrices into data mining algorithmsIan Davidson, Ashish Grover, Ashwin Satyanarayana, Giri Kumar Tayi. 794-798 [doi]
- ANN quality diagnostic models for packaging manufacturing: an industrial data mining case studyNicolás de Abajo, Alberto B. Diez, Vanesa Lobato, Sergio R. Cuesta. 799-804 [doi]
- A system for automated mapping of bill-of-materials part numbersJayant Kalagnanam, Moninder Singh, Sudhir Verma, Michael Patek, Yuk Wah Wong. 805-810 [doi]
- Tracking dynamics of topic trends using a finite mixture modelSatoshi Morinaga, Kenji Yamanishi. 811-816 [doi]
- Mining traffic data from probe-car system for travel time predictionTakayuki Nakata, Jun-ichi Takeuchi. 817-822 [doi]
- Programming the K-means clustering algorithm in SQLCarlos Ordonez. 823-828 [doi]
- Document preprocessing for naive Bayes classification and clustering with mixture of multinomialsDmitry Pavlov, Ramnath Balasubramanyan, Byron Dom, Shyam Kapur, Jignashu Parikh. 829-834 [doi]
- Learning a complex metabolomic dataset using random forests and support vector machinesYoung Truong, Xiaodong Lin, Chris Beecher. 835-840 [doi]
- 1-dimensional splines as building blocks for improving accuracy of risk outcomes modelsDavid S. Vogel, Morgan C. Wang. 841-846 [doi]
- Analytical view of business dataAdam Yeh, Jonathan Tang, Youxuan Jin, Sam Skrivan. 847-852 [doi]