default search action
Journal of Intelligent Information Systems, Volume 42
Volume 42, Number 1, February 2014
- Tevfik Aytekin, Mahmut Özge Karakaya:
Clustering-based diversity improvement in top-N recommendation. 1-18 - Bing Zhou, Yiyu Yao, Jigang Luo:
Cost-sensitive three-way email spam filtering. 19-45 - Robert Piché, Marko Järvenpää, Esko Turunen, Milan Simunek:
Bayesian analysis of GUHA hypotheses. 47-73 - Jyh-Jong Tsay, Chi-Hsiang Lin:
Hierarchical directory mapping for category-constrained meta-search. 75-94 - Songhao Zhu, Liming Zou, Baojie Fang:
Content based image retrieval via a transductive model. 95-109 - Hui Chen:
Mining top-k frequent patterns over data streams sliding window. 111-131 - Song Chen, Vandana P. Janeja:
Human perspective to anomaly detection for cybersecurity. 133-153 - Gianni Costa, Giuseppe Manco, Elio Masciari:
Dealing with trajectory streams by clustering and mathematical transforms. 155-177
Volume 42, Number 2, April 2014
- Annalisa Appice, Michelangelo Ceci, Corrado Loglisci, Elio Masciari, Giuseppe Manco:
Mining complex patterns. 179-180 - Nicola Di Mauro, Claudio Taranto, Floriana Esposito:
Link classification with probabilistic graphs. 181-206 - Ayman Hajja, Zbigniew W. Ras, Alicja Wieczorkowska:
Hierarchical object-driven action rules. 207-232 - Anze Vavpetic, Vid Podpecan, Nada Lavrac:
Semantic subgroup explanations. 233-254 - Ondrej Kuzelka, Andrea Szabóová, Filip Zelezný:
A method for reduction of examples in relational learning. 255-281 - Elias Egho, Nicolas Jay, Chedy Raïssi, Dino Ienco, Pascal Poncelet, Maguelonne Teisseire, Amedeo Napoli:
A contribution to the discovery of multidimensional patterns in healthcare trajectories. 283-305 - Michael Davis, Weiru Liu, Paul Miller:
Finding the most descriptive substructures in graphs with discrete and numeric labels. 307-332
Volume 42, Number 3, June 2014
- Ying Hu, Guizhong Liu:
Singer identification based on computational auditory scene analysis and missing feature methods. 333-352 - Jiangtao Qiu, Zhangxi Lin:
D-HOCS: an algorithm for discovering the hierarchical overlapping community structure of a social network. 353-370 - Maria Soledad Pera, Yiu-Kai Ng:
Exploiting the wisdom of social connections to make personalized recommendations on scholarly articles. 371-391 - Amir Hossein Razavi, Stan Matwin, Joseph De Koninck, Ray Reza Amini:
Dream sentiment analysis using second order soft co-occurrences (SOSCO) and time course representations. 393-413 - Richard Gil, María J. Martín-Bautista:
SMOL: a systemic methodology for ontology learning from heterogeneous sources. 415-455 - Shariq Bashir, Akmal Saeed Khattak:
Producing efficient retrievability ranks of documents using normalized retrievability scoring function. 457-484 - Feng Qian, Kevin Chiew, Qinming He, Hao Huang:
Mining regional co-location patterns with kNNG. 485-505 - Kun-Huang Chen, Li-Fei Chen, Chao-Ton Su:
A new particle swarm feature selection method for classification. 507-530 - Cássio M. M. Pereira, Rodrigo Fernandes de Mello:
TS-stream: clustering time series on data streams. 531-566 - Haiying Shen, Ze Li, Ting Li:
Token list based information search in a multi-dimensional massive database. 567-594 - Rohit Raghunathan, Sushovan De, Subbarao Kambhampati:
Bayesian networks for supporting query processing over incomplete autonomous databases. 595-618 - Mina Sohrabi, Mohammad Masoud Javidi, Sattar Hashemi:
Detecting intrusion transactions in database systems: a novel approach. 619-644 - Simon Dooms, Pieter Audenaert, Jan Fostier, Toon De Pessemier, Luc Martens:
In-memory, distributed content-based recommender system. 645-669 - Jia Wu, Zhihua Cai:
A naive Bayes probability estimation model based on self-adaptive differential evolution. 671-694
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.