333 | -- | 352 | Ying Hu, Guizhong Liu. Singer identification based on computational auditory scene analysis and missing feature methods |
353 | -- | 370 | Jiangtao Qiu, Zhangxi Lin. D-HOCS: an algorithm for discovering the hierarchical overlapping community structure of a social network |
371 | -- | 391 | Maria Soledad Pera, Yiu-Kai Ng. Exploiting the wisdom of social connections to make personalized recommendations on scholarly articles |
393 | -- | 413 | Amir Hossein Razavi, Stan Matwin, Joseph De Koninck, Ray Reza Amini. Dream sentiment analysis using second order soft co-occurrences (SOSCO) and time course representations |
415 | -- | 455 | Richard Gil, Maria J. Martín-Bautista. SMOL: a systemic methodology for ontology learning from heterogeneous sources |
457 | -- | 484 | Shariq Bashir, Akmal Saeed Khattak. Producing efficient retrievability ranks of documents using normalized retrievability scoring function |
485 | -- | 505 | Feng Qian, Kevin Chiew, Qinming He, Hao Huang. Mining regional co-location patterns with kNNG |
507 | -- | 530 | Kun-Huang Chen, Li-Fei Chen, Chao-Ton Su. A new particle swarm feature selection method for classification |
531 | -- | 566 | Cássio M. M. Pereira, Rodrigo Fernandes de Mello. TS-stream: clustering time series on data streams |
567 | -- | 594 | Haiying Shen, Ze Li, Ting Li. Token list based information search in a multi-dimensional massive database |
595 | -- | 618 | Rohit Raghunathan, Sushovan De, Subbarao Kambhampati. Bayesian networks for supporting query processing over incomplete autonomous databases |
619 | -- | 644 | Mina Sohrabi, Mohammad M. Javidi, Sattar Hashemi. Detecting intrusion transactions in database systems: a novel approach |
645 | -- | 669 | Simon Dooms, Pieter Audenaert, Jan Fostier, Toon De Pessemier, Luc Martens. In-memory, distributed content-based recommender system |
671 | -- | 694 | Jia Wu, Zhihua Cai. A naive Bayes probability estimation model based on self-adaptive differential evolution |