![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Int. J. Business Intelligence and Data Mining, Volume 2
Volume 2, Number 1, 2007
- Aaron Ceglar, John F. Roddick
:
GAM: a guidance enabled association mining environment. 3-28 - Mafruz Zaman Ashrafi, David Taniar, Kate A. Smith
:
Redundant association rules reduction techniques. 29-63 - William Perrizo, Qin Ding, Maleq Khan, Anne Denton, Qiang Ding:
An efficient weighted nearest neighbour classifier using vertical data representation. 64-78 - Jérôme Darmont
, Fadila Bentayeb, Omar Boussaid:
Benchmarking data warehouses. 79-104 - Tho Manh Nguyen, Josef Schiefer, A Min Tjoa
:
ZELESSA: an enabler for real-time sensing, analysing and acting on continuous event streams. 105-141
Volume 2, Number 2, 2007
- Subhagata Chattopadhyay
, Dilip Kumar Pratihar, Sanjib Chandra De Sarkar:
Some studies on fuzzy clustering of psychosis data. 143-159 - Anthony Scime, Gregg R. Murray
:
Vote prediction by iterative domain knowledge and attribute elimination. 160-176 - John Wang, Xiaohua Hu, Dan Zhu:
Diminishing downsides of Data Mining. 177-196 - Justin Zhijun Zhan, Stan Matwin
, LiWu Chang:
Privacy-preserving multi-party decision tree induction. 197-212 - Johannes Grabmeier, Larry A. Lambe:
Decision trees for binary classification variables grow equally with the Gini impurity measure and Pearson's chi-square test. 213-226 - Valbona Barolli, Heihachiro Fukuda, Leonard Barolli, Makoto Takizawa
:
Turning point from economies of scale to quality enhancement: a marketable quality and profitability model for corporations. 227-248
Volume 2, Number 3, 2007
- Hai Wang, Shouhong Wang:
A data mining approach to assessing the extent of damage of missing values in survey. 249-260 - Qinbao Song, Martin J. Shepperd:
Missing Data Imputation Techniques. 261-291 - Marvin L. Brown, John Francis Kros:
A comparison of imputation methods in the presence of imprecise data when employing a neural network s-Sigmoid function. 292-310 - Joseph Fong, Shi-Ming Huang, Hsiang-Yuan Hsueh:
Online analytical mining association rules using Chi-square test. 311-327 - S. Kami Makki, Seema Jani, Xiaohua Jia
, Wuxu Peng:
Preference-Function Algorithm: a novel approach for selection of the users' preferred websites. 328-346 - Reinhold Decker, Sören W. Scholz:
Unsupervised Topic Detection in document collections: an application in marketing and business journals. 347-364
Volume 2, Number 4, 2007
- Bhavani Thuraisingham, Murat Kantarcioglu, Srinivasan Iyer:
Extended RBAC-based design and implementation for a secure data warehouse. 367-382 - Marcin Gorawski, Jakub Bularz:
Distribution-based methods of preserving data privacy in Distributed Spatial Data Warehouse. 383-400 - Nasrullah Memon, David L. Hicks, Henrik Legind Larsen, Muhammad Aslam Uqaili:
Understanding the structure of terrorist networks. 401-425 - Indra Budi
, Stéphane Bressan:
Application of association rules mining to Named Entity Recognition and co-reference resolution for the Indonesian language. 426-446 - Peter Géczy
, Noriaki Izumi, Shotaro Akaho
, Kôiti Hasida
:
Knowledge worker intranet behaviour and usability. 447-470 - Shirish S. Sane, Ashok A. Ghatol:
A novel Supervised Instance Selection algorithm. 471-495 - Longbing Cao
, Dan Luo, Chengqi Zhang
:
Knowledge actionability: satisfying technical and business interestingness. 496-514
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.