Abstract is missing.
- What Data Mining Can Discover From Your Face... No More Lying About Your Age!Kate Smith-Miles. 3 [doi]
- Towards Web Search Engine Scale Data MiningJian Pei. 5 [doi]
- Credit Scoring and Data MiningRoss W. Gayler. 7 [doi]
- Efficiently Mining Frequent SubpathsSumanta Guha. 11-16 [doi]
- Distributed Association Rule Mining with Minimum Communication OverheadMd. Golam Kaosar, Zhuojia Xu, Xun Yi. 17-24 [doi]
- Applying Clustering and Ensemble Clustering Approaches to phishing ProfilingJohn Yearwood, Dean Webb, Liping Ma, Peter Vamplew, Bahadorreza Ofoghi, Andrei V. Kelarev. 25-34 [doi]
- Clustering Interval-valued Data Using an Overlapped Interval DivergenceYongli Ren, Yu-Hsn Liu, Jia Rong, Robert Dew. 35-42 [doi]
- Reference Point Transformation for VisualisationCheng G. Weng, Josiah Poon. 43-54 [doi]
- FlowRecommender: A Workflow Recommendation Technique for Process ProvenanceJi Zhang, Qing Liu, Kai Xu 0003. 55-62 [doi]
- Negative-GSP: An Efficient Method for Mining Negative Sequential PatternsZhigang Zheng, Yanchang Zhao, Ziye Zuo, Longbing Cao. 63-68 [doi]
- Non-Redundant Rare Itemset GenerationYun Sing Koh, Russel Pears. 69-74 [doi]
- Monetising User Generated Content Using Data Mining TechniquesYu-Hsn Liu, Yongli Ren, Robert Dew. 75-82 [doi]
- QUEST: Discovering Insights from Survey ResponsesGirish K. Palshikar, Shailesh Deshpande, Srivatsa S. Bhat. 83-92 [doi]
- Discovering inappropriate billings with local density based outlier detection methodYin Shan, D. Wayne Murray, Alison Sutinen. 93-98 [doi]
- Predictive analytics that takes in account network relations: A case study of research data of a contemporary universityEkta Nankani, Simeon J. Simoff. 99-108 [doi]
- Kernel-based Principal Components Analysis on Large Telecommunication DataT. Sato, Bing Quan Huang, Guillem Lefait, M. Tahar Kechadi, Brian Buckley. 109-116 [doi]
- SparseDTW: A Novel Approach to Speed up Dynamic Time WarpingGhazi Al-Naymat, Sanjay Chawla, Javid Taheri. 117-128 [doi]
- HDAX: Historical Symbolic Modelling of Delay Time Series in a Communications NetworkHooman Homayounfard, Paul J. Kennedy. 129-138 [doi]
- A Query Based Approach for Mining Evolving GraphsAndrey Kan, Jeffrey Chan, James Bailey, Christopher Leckie. 139-150 [doi]
- Mining Minimal Constrained Flow Cycles from Complex Transaction DataMeng Xu, Michael Bain. 151-158 [doi]
- Studying Genotype-Phenotype Attack on k-anonymised Medical and Genomic DataMuzammil M. Baig, Jiuyong Li, Jixue Liu, Hua Wang. 159-166 [doi]
- Building a Generic Graph-based Descriptor Set for use in Drug DiscoveryPhillip Lock, Nicolas Le Mercier, Jiuyong Li, Markus Stumptner. 167-174 [doi]
- Single Document Semantic SpacesJorge J. Villalón, Rafael A. Calvo. 175-182 [doi]
- Efficient Mining of Top-k Breaker Emerging Subgraph Patterns from Graph DatasetsMin Gan, Honghua Dai. 183-192 [doi]
- Edge Evaluation in Bayesian Network StructuresSaaid Baraty, Dan A. Simovici. 193-200 [doi]