default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2011
- Xiongcai Cai, Michael Bain, Alfred Krzywicki, Wayne Wobcke, Yang Sok Kim, Paul Compton, Ashesh Mahidadia:
Learning to Make Social Recommendations: A Model-Based Approach. ADMA (2) 2011: 124-137 - Liang Du, Xuan Li, Yi-Dong Shen:
User Graph Regularized Pairwise Matrix Factorization for Item Recommendation. ADMA (2) 2011: 372-385 - Lei Duan, Changjie Tang, Chi Gou, Min Jiang, Jie Zuo:
Mining Good Sliding Window for Positive Pathogens Prediction in Pathogenic Spectrum Analysis. ADMA (2) 2011: 152-165 - Philippe Fournier-Viger, Vincent S. Tseng:
Mining Top-K Sequential Rules. ADMA (2) 2011: 180-194 - Mohammed Gollapalli, Xue Li, Ian A. Wood, Guido Governatori:
Ontology Guided Data Linkage Framework for Discovering Meaningful Data Facts. ADMA (2) 2011: 252-265 - Jibing Gong, Shengtao Sun:
Individual Doctor Recommendation Model on Medical Social Network. ADMA (2) 2011: 69-81 - Fedja Hadzic, Michael Hecker, Andrea Tagarelli:
XML Document Clustering Using Structure-Preserving Flat Representation of XML Content and Structure. ADMA (2) 2011: 403-416 - Mengxia Jiang, Yueguo Chen, Jinchuan Chen, Xiaoyong Du:
Interactive Predicate Suggestion for Keyword Search on RDF Graphs. ADMA (2) 2011: 96-109 - Aída Jiménez, Fernando Berzal, Juan Carlos Cubero Talavera:
Mining Patterns from Longitudinal Studies. ADMA (2) 2011: 166-179 - Masaji Katagiri, Minoru Etoh:
Social Influence Modeling on Smartphone Usage. ADMA (2) 2011: 292-303 - Adam Koper, Hung Son Nguyen:
Sequential Pattern Mining from Stream Data. ADMA (2) 2011: 278-291 - Rein Kuusik, Grete Lind:
New Developments of Determinacy Analysis. ADMA (2) 2011: 223-236 - Nachai Limsetto, Kitsana Waiyamai:
Handling Concept Drift via Ensemble and Class Distribution Estimation Technique. ADMA (2) 2011: 13-26 - Wicha Meesuksabai, Thanapat Kangkachit, Kitsana Waiyamai:
HUE-Stream: Evolution-Based Clustering Technique for Heterogeneous Data Streams with Uncertainty. ADMA (2) 2011: 27-40 - Marcin Orchel:
Support Vector Regression with A Priori Knowledge Used in Order Execution Strategies Based on VWAP. ADMA (2) 2011: 318-331 - Sylvester Olubolu Orimaye, Saadat M. Alhashmi, Eu-Gene Siew:
Using Predicate-Argument Structures for Context-Dependent Opinion Retrieval. ADMA (2) 2011: 386-402 - Tomonobu Ozaki, Minoru Etoh:
Social Network Inference of Smartphone Users Based on Information Diffusion Models. ADMA (2) 2011: 304-317 - Linsey Xiaolin Pang, Sanjay Chawla, Wei Liu, Yu Zheng:
On Mining Anomalous Patterns in Road Traffic Streams. ADMA (2) 2011: 237-251 - Shiliang Sun:
Multi-view Laplacian Support Vector Machines. ADMA (2) 2011: 209-222 - Tingting Wang, Hongyan Liu, Jun He, Xuan Jiang, Xiaoyong Du:
Predicting New User's Behavior in Online Dating Systems. ADMA (2) 2011: 266-277 - Phiradit Worawitphinyo, Xiaoying Gao, Shahida Jabeen:
Improving Suffix Tree Clustering with New Ranking and Similarity Measures. ADMA (2) 2011: 55-68 - Jui-Yu Wu:
Hybrid Artificial Immune Algorithm and CMAC Neural Network Classifier for Supporting Business and Medical Decision Making. ADMA (2) 2011: 41-54 - Liang Wu, Yuanchun Zhou, Fei Tan, Fenglei Yang, Jianhui Li:
Generating Syntactic Tree Templates for Feature-Based Opinion Mining. ADMA (2) 2011: 1-12 - Yu Xiao, Jian Yu, Shu Gong:
Intrinsic Dimension Induced Similarity Measure for Clustering. ADMA (2) 2011: 110-123 - Xiaobing Xiong, Xiang Niu, Gang Zhou, Ke Xu, Yongzhong Huang:
Microgroup Mining on TSina via Network Structure and User Attribute. ADMA (2) 2011: 138-151 - Wenhua Xu, Zheng Qin, Hao Hu, Nan Zhao:
Mining Uncertain Data Streams Using Clustering Feature Decision Trees. ADMA (2) 2011: 195-208 - Dafeng Xu, Guojie Song, Peng Gao, Rongzeng Cao, Xinwei Nie, Kunqing Xie:
Transportation Modes Identification from Mobile Phone Data Using Probabilistic Models. ADMA (2) 2011: 359-371 - Anrong Xue, Wei Wang, Mingcai Zhang:
Terrorist Organization Behavior Prediction Algorithm Based on Context Subspace. ADMA (2) 2011: 332-345 - Qiuling Yan, Shaosong Guo, Dongqing Yang:
Influence Maximizing and Local Influenced Community Detection Based on Multiple Spread Model. ADMA (2) 2011: 82-95 - Ying Zhao, Wanyu Fu, Shaobin Huang:
Topic Discovery and Topic-Driven Clustering for Audit Method Datasets. ADMA (2) 2011: 346-358
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-09 14:04 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint