![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Int. J. Business Intelligence and Data Mining, Volume 5
Volume 5, Number 1, 2010
- Han-Wen Chang, Yu-chin Tai, Jane Yung-jen Hsu:
Context-aware taxi demand hotspots prediction. 3-18 - Jenn-Long Liu, Chao-Wei Chou, Chia-Mei Chen:
Optimising mobile base station placement using an enhanced Multi-Objective Genetic Algorithm. 19-42 - Jyh-Jong Tsay, Chi-Hsiang Lin, Tzung-Bang Chen:
Category mapping for the automatic integration of category-constrained web search. 43-55 - Huang-Cheng Kuo, Tsung-Lung Lee, Jen-Peng Huang:
Cluster analysis on time series gene expression data. 56-76 - Bai-En Shie, Fong-Lin Jang, Vincent S. Tseng:
Intelligent panic disorder treatment by using biofeedback analysis and web technologies. 77-93 - Cheng-Fa Tsai, Chun-Yi Sung:
EIDBSCAN: An Extended Improving DBSCAN algorithm with sampling techniques. 94-111
Volume 5, Number 2, 2010
- Carlos Blanco
, Ignacio García Rodríguez de Guzmán
, Eduardo Fernández-Medina
, Juan Trujillo
, Mario Piattini
:
Defining and transforming security rules in an MDA approach for DWs. 116-133 - Nasrullah Memon, Uffe Kock Wiil, Abdul Rasool Qureshi:
Practical algorithms for subgroup detection in covert networks. 134-155 - Toshiya Fujii, Tadashi Dohi:
Identifying statistical failure mechanism of web server systems: measurement and reliability analysis. 156-171 - Vik Tor Goh, Jacob Zimmermann, Mark Looi:
Experimenting with an Intrusion Detection System for Encrypted Networks. 172-191 - Russel A. Apu, Marina L. Gavrilova:
Shape matching through contour extraction using Circular Augmented Rotational Trajectory (CART) algorithm. 192-210
Volume 5, Number 3, 2010
- Shigeaki Sakurai, Kouichirou Mori:
Discovery of characteristic patterns from tabular structured data including missing values. 213-230 - Wen-Yang Lin, Ko-Wei Huang, Chin-Ang Wu:
MCFPTree: An FP-tree-based algorithm for multi-constraint patterns discovery. 231-246 - Andri Mirzal:
On the relationship between trading network and WWW network: a preferential attachment perspective. 247-268 - Gjergji Mino, Leonard Barolli, Fatos Xhafa
, Arjan Durresi, Akio Koyama:
Performance evaluation of a fuzzy-based CAC scheme for wireless cellular networks: a case study considering priority of on-going connections. 269-284 - Cosmin Lazar, Andrei Doncescu, Nabil Kabbaj
:
Non Negative Matrix Factorisation clustering capabilities; application on multivariate image segmentation. 285-296 - Mordechai Gal-Or, Jerrold H. May, William E. Spangler:
When to choose an ensemble classifier model for data mining. 297-318
Volume 5, Number 4, 2010
- Mouna Torjmen, Karen Pinel-Sauvagnat
, Mohand Boughanem:
Using textual and structural context for searching Multimedia Elements. 323-352 - Rudra Narayan Hota, Shahanaz Syed, P. Radha Krishna:
Local-feature-based image retrieval with weighted relevance feedback. 353-369 - Marcos R. Vieira, Fabio Jun Takada Chino, Caetano Traina Jr.
, Agma J. M. Traina:
A visual framework to understand similarity queries and explore data in Metric Access Methods. 370-397 - Andreas Schönberger, Christoph Pflügler, Guido Wirtz
:
Translating shared state based ebXML BPSS models to WS-BPEL. 398-442
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.