


default search action
Journal of Intelligent Information Systems, Volume 36
Volume 36, Number 1, February 2011
- Haidong Yang, Jianhua Guo, Feiqi Deng
:
Collaborative RFID intrusion detection with an artificial immune system. 1-26 - Ilaria Lombardi, Luca Console, Pietro Pavese:
Flexible rule-based inference exploiting taxonomies. 27-48 - Cléo Zanella Billa, Jacques Wainer
, Claudia Barsottini
:
ST-Audit: guideline-based automatic auditing of electronic patient records. 49-72 - Lars Wohlrab, Johannes Fürnkranz
:
A review and comparison of strategies for handling missing values in separate-and-conquer rule learning. 73-98 - Aída Jiménez, Miguel Molina-Solana
, Fernando Berzal
, Waldo Fajardo
:
Mining transposed motifs in music. 99-115 - José M. Perea-Ortega
, Arturo Montejo-Ráez
, María Teresa Martín-Valdivia
, Luis Alfonso Ureña López
:
Using web sources for improving video categorization. 117-130
Volume 36, Number 2, April 2011
- Federica Cena
:
Integrating web service and semantic dialogue model for user models interoperability on the web. 131-166 - Stefano Montanelli, Devis Bianchini, Carola Aiello, Roberto Baldoni, Cristiana Bolchini
, Silvia Bonomi
, Silvana Castano
, Tiziana Catarci
, Valeria De Antonellis, Alfio Ferrara
, Michele Melchiori
, Elisa Quintarelli
, Monica Scannapieco, Fabio Alberto Schreiber
, Letizia Tanca:
The ESTEEM platform: enabling P2P semantic collaboration through emerging collective knowledge. 167-195 - Jun Liu, Lu Jiang, Zhaohui Wu, Qinghua Zheng:
Deep Web adaptive crawling based on minimum executable pattern. 197-215 - Cui Zhu, Hiroyuki Kitagawa
, Spiros Papadimitriou, Christos Faloutsos
:
Outlier detection by example. 217-247
Volume 36, Number 3, June 2011
- Shusaku Tsumoto, Tzung-Pei Hong
:
Special issue on data mining for decision making and risk management. 249-251 - Chao Deng, Maozu Guo:
A new co-training-style random forest for computer aided diagnosis. 253-281 - Anita Prinzie, Dirk Van den Poel
:
Modeling complex longitudinal consumer behavior with Dynamic Bayesian networks: an Acquisition Pattern Analysis application. 283-304 - Lien-Chin Chen, Chun-Hao Chen, Hsiao-Ming Chen, Vincent S. Tseng:
Hybrid data mining approaches for prevention of drug dispensing errors. 305-327 - Shyue-Liang Wang, Jyun-Da Chen, Paul A. Stirpe, Tzung-Pei Hong
:
Risk-neutral evaluation of information security investment on data centers. 329-345 - Yu-Ping Ou Yang, How-Ming Shieh, Gwo-Hshiung Tzeng
, Leon Yen, Chien-Chung Chan:
Combined rough sets with flow graph and formal concept analysis for business aviation decision-making. 347-366 - Philippe Baecke, Dirk Van den Poel
:
Data augmentation by predicting spending pleasure using commercially available external data. 367-383 - Katsutoshi Yada:
String analysis technique for shopping path in a supermarket. 385-402 - Shusaku Tsumoto, Shoji Hirano:
Detection of risk factors using trajectory mining. 403-425

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.