


default search action
Knowledge and Information Systems, Volume 60
Volume 60, Number 1, July 2019
- Lobna Nassar
, Fakhri Karray:
Overview of the crowdsourcing process. 1-24 - Huiyu Zhou
, Kotaro Hirasawa:
Spatiotemporal traffic network analysis: technology and applications. 25-61 - Ronaldo C. Prati
, Julián Luengo
, Francisco Herrera:
Emerging topics and challenges of learning from noisy data in nonstandard classification: a survey beyond binary class noise. 63-97 - Xavier Limón, Alejandro Guerra-Hernández
, Nicandro Cruz-Ramírez, Francisco Grimaldo:
Modeling and implementing distributed data mining strategies in JaCa-DDM. 99-143 - Dariusz Mrozek
, Marek Suwala, Bozena Malysiak-Mrozek
:
High-throughput and scalable protein function identification with Hadoop and Map-only pattern of the MapReduce processing model. 145-178 - Zahra Toosinezhad, Mohamad Mohamadpoor, Hadi Tabatabaee Malazi
:
Dynamic windowing mechanism to combine sentiment and N-gram analysis in detecting events from social media. 179-196 - Trung Le, Khanh Nguyen, Vu Nguyen
, Tu Dinh Nguyen, Dinh Q. Phung
:
GoGP: scalable geometric-based Gaussian process for online regression. 197-226 - Desamparados Blazquez
, Josep Domenech
, José A. Gil
, Ana Pont
:
Monitoring e-commerce adoption from online data. 227-245 - Hsun-Ping Hsieh
, Fandel Lin, Cheng-Te Li
, Ian En-Hsu Yen, Hsin-Yu Chen:
Temporal popularity prediction of locations for geographical placement of retail stores. 247-273 - Malanga Kennedy Ndenga
, Ivaylo Ganchev, Jean Mehat, Franklin Wabwoba
, Herman Akdag:
Performance and cost-effectiveness of change burst metrics in predicting software faults. 275-302 - Qianyi Zhan, Jiawei Zhang, Philip S. Yu:
Integrated anchor and social link predictions across multiple social networks. 303-326 - Rinki Arya, R. K. Agrawal
, Navjot Singh
:
A novel approach for salient object detection using double-density dual-tree complex wavelet transform in conjunction with superpixel segmentation. 327-361 - Jaime Andres Rincon, Ângelo Costa
, Paulo Novais
, Vicente Julián
, Carlos Carrascosa
:
A new emotional robot assistant that facilitates human interaction and persuasion. 363-383 - Vu Nguyen
, Sunil Gupta
, Santu Rana
, Cheng Li, Svetha Venkatesh:
Filtering Bayesian optimization approach in weakly specified search space. 385-413 - Xixian Han
, Bailing Wang, Jianzhong Li, Hong Gao:
Ranking the big sky: efficient top-k skyline computation on massive data. 415-446 - Avinash Achar
, P. S. Sastry:
Discovering frequent chain episodes. 447-494 - Junhua Chen, Wei Zeng
, Junming Shao, Ge Fan
:
Preference modeling by exploiting latent components of ratings. 495-521 - Yu-Ling Hsueh
, Hong-Min Huang:
Personalized itinerary recommendation with time constraints using GPS datasets. 523-544 - Yuxiang Zhang, Jiamei Fu, Chengyi Yang, Chunjing Xiao:
A local expansion propagation algorithm for social link identification. 545-568 - Manuel López Martín
, Belén Carro
, Antonio Sánchez-Esguevillas:
Variational data generative model for intrusion detection. 569-590
Volume 60, Number 2, August 2019
- Igor Goldenberg
, Geoffrey I. Webb
:
Survey of distance measures for quantifying concept drift and shift in numeric data. 591-615 - Lin Yue, Weitong Chen, Xue Li
, Wanli Zuo, Minghao Yin
:
A survey of sentiment analysis in social media. 617-663 - Armin Moharrer
, Stratis Ioannidis
:
Distributing Frank-Wolfe via map-reduce. 665-690 - Alaaeddine Yousfi
, Mathias Weske:
Discovering commute patterns via process mining. 691-713 - Anna Formica
:
Similarity reasoning in formal concept analysis: from one- to many-valued contexts. 715-739 - Shuangfei Fan
, Bert Huang
:
Recurrent collective classification. 741-755 - Han Zhang, Chang-Dong Wang, Jian-Huang Lai, Philip S. Yu:
Community detection using multilayer edge mixture model. 757-779 - Zhicheng He, Jie Liu, Caihua Liu, Yuan Wang, Airu Yin, Yalou Huang:
Dropout non-negative matrix factorization. 781-806 - Angeliki Rapti
, Kostas Tsichlas
, Spyros Sioutas, Giannis Tzimas:
Virus propagation: threshold conditions for multiple profile networks. 807-836 - Long-Hao Yang
, Jun Liu, Ying-Ming Wang, Luis Martínez-López
:
New activation weight calculation and parameter optimization for extended belief rule-based system based on sensitivity analysis. 837-878 - Kittakorn Sriwanna
, Tossapon Boongoen
, Natthakan Iam-on
:
Graph clustering-based discretization approach to microarray data. 879-906 - Radhia Toujani, Jalel Akaichi
:
An approach based on mixed hierarchical clustering and optimization for graph analysis in social media network: toward globally hierarchical community structure. 907-947 - Liangxiao Jiang
, Chaoqun Li:
Two improved attribute weighting schemes for value difference metric. 949-970 - M. M. Gowthul Alam
, S. Baulkani:
Local and global characteristics-based kernel hybridization to increase optimal support vector machine performance for stock market prediction. 971-1000 - Mojtaba Tahani, Narek Babayan:
Flow Regime Algorithm (FRA): a physics-based meta-heuristics algorithm. 1001-1038 - Jinyan Wang, Kai Du, Xudong Luo
, Xianxian Li:
Two privacy-preserving approaches for data publishing with identity reservation. 1039-1080 - Guangming Lang
, Qingguo Li, Mingjie Cai
, Hamido Fujita
, Hongyun Zhang:
Related families-based methods for updating reducts under dynamic object sets. 1081-1104 - Yanqing Ye
, Jiang Jiang, Bingfeng Ge, Yajie Dou, Kewei Yang:
Similarity measures for time series data classification using grid representation and matrix distance. 1105-1134 - Yan Zhu
, Makoto Imamura, Daniel Nikovski, Eamonn J. Keogh:
Introducing time series chains: a new primitive for time series data mining. 1135-1161 - Angeliki Rapti
, Kostas Tsichlas, Spyros Sioutas, Giannis Tzimas:
Correction to: Virus propagation: threshold conditions for multiple profile networks. 1163-1164
Volume 60, Number 3, September 2019
- T. Ramalingeswara Rao, Pabitra Mitra, Ravindara Bhatt
, Adrijit Goswami:
The big data system, components, tools, and technologies: a survey. 1165-1245 - Kwan Hui Lim
, Jeffrey Chan
, Shanika Karunasekera, Christopher Leckie
:
Tour recommendation and trip planning using location-based social media: a survey. 1247-1275 - Alexander Marx
, Jilles Vreeken
:
Telling cause from effect by local and global regression. 1277-1305 - Bozhong Liu
, Ling Chen
, Xingquan Zhu
, Weidong Qiu:
Encrypted data indexing for the secure outsourcing of spectral clustering. 1307-1328 - Poorya ZareMoodi, Sajjad Kamali Siahroudi, Hamid Beigy
:
Concept-evolution detection in non-stationary data streams: a fuzzy clustering approach. 1329-1352 - Heyan Huang, Hao Wu, Xiaochi Wei, Yang Gao, Shumin Shi:
Mapping sentences to concept transferred space for semantic textual similarity. 1353-1376 - Maroti Deshmukh
, Neeta Nain
, Mushtaq Ahmed
:
Secret sharing scheme based on binary trees and Boolean operation. 1377-1396 - Bhawani Selvaretnam, Mohammed Belkhatir:
Coupled intrinsic and extrinsic human language resource-based query expansion. 1397-1426 - Shrawan Kumar Trivedi
, Shubhamoy Dey:
A modified content-based evolutionary approach to identify unsolicited emails. 1427-1451 - Shweta Yadav, Asif Ekbal, Sriparna Saha:
Information theoretic-PSO-based feature selection: an application in biomedical entity extraction. 1453-1478 - Sandra Álvarez-García, Borja Freire, Susana Ladra
, Óscar Pedreira Fernández
:
Compact and efficient representation of general graph databases. 1479-1510 - Xixian Han
, Xue Li, Bailing Wang, Hong Gao:
PRS: efficient range skyline computation on massive data via presorting. 1511-1548 - Marco Botta, Rossella Cancelliere
, Leo Ghignone, Fabio Tango, Patrick Gallinari, Clara Luison:
Real-time detection of driver distraction: random projections for pseudo-inversion-based neural training. 1549-1564 - Xu Wu:
A trust-based detection scheme to explore anomaly prevention in social networks. 1565-1586 - Ayumi Sugiyama
, Vourchteang Sea, Toshiharu Sugawara
:
Emergence of divisional cooperation with negotiation and re-learning and evaluation of flexibility in continuous cooperative patrol problem. 1587-1609 - Ming Liu
, Yanyan Zhao
, Bing Qin, Ting Liu:
Collective entity linking: a random walk-based perspective. 1611-1643 - Dalila Durães
, Fernando de la Prieta
, Paulo Novais
:
Enriching behavior patterns with learning styles using peripheral devices. 1645-1662 - Yuchen Bian
, Jingchao Ni, Wei Cheng, Xiang Zhang:
The multi-walker chain and its application in local community detection. 1663-1691 - Debrup Banerjee, Kazi Aminul Islam
, Keyi Xue, Gang Mei, Lemin Xiao, Guangfan Zhang, Roger Xu, Cai Lei, Shuiwang Ji
, Jiang Li:
A deep transfer learning approach for improved post-traumatic stress disorder diagnosis. 1693-1724 - Zhengxing Huang
, Yi Lu, Wei Dong:
Utilizing electronic health records to predict multi-type major adverse cardiovascular events after acute coronary syndrome. 1725-1752

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.