default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 160 matches
- 2013
- Bing Hu, Yanping Chen, Jesin Zakaria, Liudmila Ulanova, Eamonn J. Keogh:
Classification of Multi-dimensional Streaming Time Series by Weighting Each Classifier's Track Record. ICDM 2013: 281-290 - Aaron B. Adcock, Blair D. Sullivan, Michael W. Mahoney:
Tree-Like Structure in Large Social and Information Networks. ICDM 2013: 1-10 - Abhijin Adiga, Anil Kumar S. Vullikanti, Dante Wiggins:
Subgraph Enumeration in Dynamic Graphs. ICDM 2013: 11-20 - Emin Aksehirli, Bart Goethals, Emmanuel Müller, Jilles Vreeken:
Cartification: A Neighborhood Preserving Transformation for Mining High Dimensional Data. ICDM 2013: 937-942 - Carlos Alzate, Mathieu Sinn:
Improved Electricity Load Forecasting via Kernel Spectral Clustering of Smart Meters. ICDM 2013: 943-948 - Nicola Barbieri, Francesco Bonchi, Giuseppe Manco:
Influence-Based Network-Oblivious Community Detection. ICDM 2013: 955-960 - Radim Belohlávek, Markéta Krmelová:
Beyond Boolean Matrix Decompositions: Toward Factor Analysis and Dimensionality Reduction of Ordinal Data. ICDM 2013: 961-966 - Laure Berti-Équille, Ji Meng Loh, Tamraparni Dasu:
A Masking Index for Quantifying Hidden Glitches. ICDM 2013: 21-30 - Glenn S. Bevilacqua, Shealen Clare, Amit Goyal, Laks V. S. Lakshmanan:
Validating Network Value of Influencers by Means of Explanations. ICDM 2013: 967-972 - Yuanjun Bi, Weili Wu, Yuqing Zhu:
CSI: Charged System Influence Model for Human Behavior Prediction. ICDM 2013: 31-40 - Forrest Briggs, Xiaoli Z. Fern, Raviv Raich:
Context-Aware MIML Instance Annotation. ICDM 2013: 41-50 - Zhuhua Cai, Christopher M. Jermaine, Zografoula Vagena, Dionysios Logothetis, Luis Leopoldo Perez:
The Pairwise Gaussian Random Field for High-Dimensional Data Imputation. ICDM 2013: 61-70 - Wenbin Cai, Ya Zhang, Jun Zhou:
Maximizing Expected Model Change for Active Learning in Regression. ICDM 2013: 51-60 - Toon Calders, Asim Karim, Faisal Kamiran, Wasif Ali, Xiangliang Zhang:
Controlling Attribute Effect in Linear Regression. ICDM 2013: 71-80 - Shayok Chakraborty, Jiayu Zhou, Vineeth Nallure Balasubramanian, Sethuraman Panchanathan, Ian Davidson, Jieping Ye:
Active Matrix Completion. ICDM 2013: 81-90 - Hau Chan, Leman Akoglu:
External Evaluation of Topic Models: A Graph Mining Approach. ICDM 2013: 973-978 - Shiyu Chang, Guo-Jun Qi, Jinhui Tang, Qi Tian, Yong Rui, Thomas S. Huang:
Multimedia LEGO: Learning Structured Model by Probabilistic Logic Ontology Tree. ICDM 2013: 979-984 - Snigdha Chaturvedi, Hal Daumé III, Taesun Moon:
Discriminatively Enhanced Topic Models. ICDM 2013: 985-990 - Scott Deeann Chen, Ying-Yu Chen, Jiawei Han, Pierre Moulin:
A Feature-Enhanced Ranking-Based Classifier for Multimodal Data and Heterogeneous Information Networks. ICDM 2013: 997-1002 - Keke Chen, Shumin Guo:
PerturBoost: Practical Confidential Classifier Learning in the Cloud. ICDM 2013: 991-996 - Zhitang Chen, Kun Zhang, Laiwan Chan:
Nonlinear Causal Discovery for High Dimensional Data: A Kernelized Trace Method. ICDM 2013: 1003-1008 - Freddy Chong Tat Chua, Richard Jayadi Oentaryo, Ee-Peng Lim:
Modeling Temporal Adoptions Using Dynamic Matrix Factorization. ICDM 2013: 91-100 - Bing Tian Dai, Hady Wirawan Lauw:
Modeling Preferences with Availability Constraints. ICDM 2013: 101-110 - Barnan Das, Narayanan Chatapuram Krishnan, Diane J. Cook:
wRACOG: A Gibbs Sampling-Based Oversampling Technique. ICDM 2013: 111-120 - Abir De, Niloy Ganguly, Soumen Chakrabarti:
Discriminative Link Prediction Using Local Links, Node Features and Community Structure. ICDM 2013: 1009-1018 - Vinay Deolalikar:
Most Clusters Can Be Retrieved with Short Disjunctive Queries. ICDM 2013: 1019-1024 - Nemanja Djuric, Slobodan Vucetic:
Efficient Visualization of Large-Scale Data Tables through Reordering and Entropy Minimization. ICDM 2013: 121-130 - Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee. ICDM 2013: 1025-1030 - Nan Du, Jing Gao, Aidong Zhang:
Progression Analysis of Community Strengths in Dynamic Networks. ICDM 2013: 1031-1036 - Liang Du, Zhiyong Shen, Xuan Li, Peng Zhou, Yi-Dong Shen:
Local and Global Discriminative Learning for Unsupervised Feature Selection. ICDM 2013: 131-140
skipping 130 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-25 01:49 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint