Stop the war!
Остановите войну!
for scientists:
default search action
8. AusDM 2009: Melbourne, Australia
- Paul J. Kennedy, Kok-Leong Ong, Peter Christen:
Eighth Australasian Data Mining Conference, AusDM 2009, Melbourne, Australia, December 2009. CRPIT 101, Australian Computer Society 2009, ISBN 978-1-920682-82-8 - Kate Smith-Miles:
What Data Mining Can Discover From Your Face... No More Lying About Your Age! 3 - Jian Pei:
Towards Web Search Engine Scale Data Mining. 5 - Ross W. Gayler:
Credit Scoring and Data Mining. 7 - Sumanta Guha:
Efficiently Mining Frequent Subpaths. 11-16 - Md. Golam Kaosar, Zhuojia Xu, Xun Yi:
Distributed Association Rule Mining with Minimum Communication Overhead. 17-24 - John Yearwood, Dean Webb, Liping Ma, Peter Vamplew, Bahadorreza Ofoghi, Andrei V. Kelarev:
Applying Clustering and Ensemble Clustering Approaches to phishing Profiling. 25-34 - Yongli Ren, Yu-Hsn Liu, Jia Rong, Robert Dew:
Clustering Interval-valued Data Using an Overlapped Interval Divergence. 35-42 - Cheng G. Weng, Josiah Poon:
Reference Point Transformation for Visualisation. 43-54 - Ji Zhang, Qing Liu, Kai Xu:
FlowRecommender: A Workflow Recommendation Technique for Process Provenance. 55-62 - Zhigang Zheng, Yanchang Zhao, Ziye Zuo, Longbing Cao:
Negative-GSP: An Efficient Method for Mining Negative Sequential Patterns. 63-68 - Yun Sing Koh, Russel Pears:
Non-Redundant Rare Itemset Generation. 69-74 - Yu-Hsn Liu, Yongli Ren, Robert Dew:
Monetising User Generated Content Using Data Mining Techniques. 75-82 - Girish K. Palshikar, Shailesh Deshpande, Savita S. Bhat:
QUEST: Discovering Insights from Survey Responses. 83-92 - Yin Shan, D. Wayne Murray, Alison Sutinen:
Discovering inappropriate billings with local density based outlier detection method. 93-98 - Ekta Nankani, Simeon J. Simoff:
Predictive analytics that takes in account network relations: A case study of research data of a contemporary university. 99-108 - Takeshi Sato, Bing Quan Huang, Guillem Lefait, M. Tahar Kechadi, Brian Buckley:
Kernel-based Principal Components Analysis on Large Telecommunication Data. 109-116 - Ghazi Al-Naymat, Sanjay Chawla, Javid Taheri:
SparseDTW: A Novel Approach to Speed up Dynamic Time Warping. 117-128 - Hooman Homayounfard, Paul J. Kennedy:
HDAX: Historical Symbolic Modelling of Delay Time Series in a Communications Network. 129-138 - Andrey Kan, Jeffrey Chan, James Bailey, Christopher Leckie:
A Query Based Approach for Mining Evolving Graphs. 139-150 - Meng Xu, Michael Bain:
Mining Minimal Constrained Flow Cycles from Complex Transaction Data. 151-158 - Muzammil M. Baig, Jiuyong Li, Jixue Liu, Hua Wang:
Studying Genotype-Phenotype Attack on k-anonymised Medical and Genomic Data. 159-166 - Phillip Lock, Nicolas Le Mercier, Jiuyong Li, Markus Stumptner:
Building a Generic Graph-based Descriptor Set for use in Drug Discovery. 167-174 - Jorge J. Villalón, Rafael A. Calvo:
Single Document Semantic Spaces. 175-182 - Min Gan, Honghua Dai:
Efficient Mining of Top-k Breaker Emerging Subgraph Patterns from Graph Datasets. 183-192 - Saaid Baraty, Dan A. Simovici:
Edge Evaluation in Bayesian Network Structures. 193-200
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.