default search action
Journal of Intelligent Information Systems, Volume 36
Volume 36, Number 1, February 2011
- Haidong Yang, Jianhua Guo, Feiqi Deng:
Collaborative RFID intrusion detection with an artificial immune system. 1-26 - Ilaria Lombardi, Luca Console, Pietro Pavese:
Flexible rule-based inference exploiting taxonomies. 27-48 - Cléo Zanella Billa, Jacques Wainer, Claudia Barsottini:
ST-Audit: guideline-based automatic auditing of electronic patient records. 49-72 - Lars Wohlrab, Johannes Fürnkranz:
A review and comparison of strategies for handling missing values in separate-and-conquer rule learning. 73-98 - Aída Jiménez, Miguel Molina-Solana, Fernando Berzal, Waldo Fajardo:
Mining transposed motifs in music. 99-115 - José M. Perea-Ortega, Arturo Montejo-Ráez, María Teresa Martín-Valdivia, Luis Alfonso Ureña López:
Using web sources for improving video categorization. 117-130
Volume 36, Number 2, April 2011
- Federica Cena:
Integrating web service and semantic dialogue model for user models interoperability on the web. 131-166 - Stefano Montanelli, Devis Bianchini, Carola Aiello, Roberto Baldoni, Cristiana Bolchini, Silvia Bonomi, Silvana Castano, Tiziana Catarci, Valeria De Antonellis, Alfio Ferrara, Michele Melchiori, Elisa Quintarelli, Monica Scannapieco, Fabio Alberto Schreiber, Letizia Tanca:
The ESTEEM platform: enabling P2P semantic collaboration through emerging collective knowledge. 167-195 - Jun Liu, Lu Jiang, Zhaohui Wu, Qinghua Zheng:
Deep Web adaptive crawling based on minimum executable pattern. 197-215 - Cui Zhu, Hiroyuki Kitagawa, Spiros Papadimitriou, Christos Faloutsos:
Outlier detection by example. 217-247
Volume 36, Number 3, June 2011
- Shusaku Tsumoto, Tzung-Pei Hong:
Special issue on data mining for decision making and risk management. 249-251 - Chao Deng, Maozu Guo:
A new co-training-style random forest for computer aided diagnosis. 253-281 - Anita Prinzie, Dirk Van den Poel:
Modeling complex longitudinal consumer behavior with Dynamic Bayesian networks: an Acquisition Pattern Analysis application. 283-304 - Lien-Chin Chen, Chun-Hao Chen, Hsiao-Ming Chen, Vincent S. Tseng:
Hybrid data mining approaches for prevention of drug dispensing errors. 305-327 - Shyue-Liang Wang, Jyun-Da Chen, Paul A. Stirpe, Tzung-Pei Hong:
Risk-neutral evaluation of information security investment on data centers. 329-345 - Yu-Ping Ou Yang, How-Ming Shieh, Gwo-Hshiung Tzeng, Leon Yen, Chien-Chung Chan:
Combined rough sets with flow graph and formal concept analysis for business aviation decision-making. 347-366 - Philippe Baecke, Dirk Van den Poel:
Data augmentation by predicting spending pleasure using commercially available external data. 367-383 - Katsutoshi Yada:
String analysis technique for shopping path in a supermarket. 385-402 - Shusaku Tsumoto, Shoji Hirano:
Detection of risk factors using trajectory mining. 403-425
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.