


default search action
IEEE Transactions on Knowledge and Data Engineering, Volume 20
Volume 20, Number 1, January 2008
- Deng Cai, Xiaofei He, Jiawei Han:

SRDA: An Efficient Algorithm for Large-Scale Discriminant Analysis. 1-12 - Haifeng Chen, Guofei Jiang, Kenji Yoshihira:

Monitoring High-Dimensional Data for Failure Detection and Localization in Large-Scale Computing Systems. 13-25 - Hai Huong Dam, Hussein A. Abbass

, Chris Lokan, Xin Yao
:
Neural-Based Learning Classifier Systems. 26-39 - Xiang Lian

, Lei Chen
:
Efficient Similarity Search over Future Stream Time Series. 40-54 - Fei Wang, Changshui Zhang:

Label Propagation through Linear Neighborhoods. 55-67 - Sen Zhang, Jason Tsong-Li Wang:

Discovering Frequent Agreement Subtrees from Phylogenetic Data. 68-82 - Yuhai Zhao, Jeffrey Xu Yu, Guoren Wang, Lei Chen

, Bin Wang, Ge Yu:
Maximal Subspace Coregulated Gene Clustering. 83-98 - Joerg Evermann:

An Exploratory Study of Database Integration Processes. 99-115 - Mohamed Shehab

, Elisa Bertino, Arif Ghafoor:
Watermarking Relational Databases Using Optimization-Based Techniques. 116-129 - J. Javier Samper

, Vicente R. Tomás
, Eduardo Carrillo Zambrano
, Rogério Patrício Chagas do Nascimento
:
Visualization of Ontologies to Specify Semantic Descriptions of Services. 130-134
Volume 20, Number 2, February 2008
- Jacob D. Abernethy, Theodoros Evgeniou, Olivier Toubia, Jean-Philippe Vert

:
Eliciting Consumer Preferences Using Robust Adaptive Choice Questionnaires. 145-155 - Elena Baralis, Silvia Chiusano

, Paolo Garza
:
A Lazy Approach to Associative Classification. 156-171 - Ulrik Brandes, Daniel Delling, Marco Gaertler

, Robert Görke, Martin Hoefer, Zoran Nikoloski
, Dorothea Wagner:
On Modularity Clustering. 172-188 - Xiaofei He, Deng Cai, Jiawei Han:

Learning a Maximum Margin Subspace for Image Retrieval. 189-201 - Olfa Nasraoui

, Maha Soliman
, Esin Saka, Antonio Badia
, Richard Germain:
A Web Usage Mining Framework for Mining Evolving User Profiles in Dynamic Web Sites. 202-215 - Fatih Altiparmak, Ertem Tuncel

, Hakan Ferhatosmanoglu:
Incremental Maintenance of Online Summaries Over Multiple Streams. 216-229 - Michael Cammert, Jürgen Krämer, Bernhard Seeger, Sonny Vaupel:

A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems. 230-245 - Michael Gibas, Guadalupe Canahuate, Hakan Ferhatosmanoglu:

Online Index Recommendations for High-Dimensional Databases Using Query Workloads. 246-260 - Soe-Tsyr Yuan, Yen-Chuan Chen:

Semantic Ideation Learning for Agent-Based E-Brainstorming. 261-275 - Hai Zhuge, Liang Feng:

Distributed Suffix Tree Overlay for Peer-to-Peer Search. 276-285
Volume 20, Number 3, March 2008
- Tzu-Chuan Chou, Meng Chang Chen:

Using Incremental PLSI for Threshold-Resilient Online Event Analysis. 289-299 - Alexandre Termier, Marie-Christine Rousset, Michèle Sebag, Kouzou Ohara, Takashi Washio, Hiroshi Motoda:

DryadeParent, An Efficient and Robust Closed Attribute Tree Mining Algorithm. 300-320 - Lei Chen

, Xiang Lian
:
Efficient Similarity Search in Nonmetric Spaces with Local Constant Embedding. 321-336 - Shantanu Joshi, Christopher M. Jermaine:

Materialized Sample Views for Database Approximation. 337-351 - Peng-Yeng Yin, Bir Bhanu

, Kuang-Cheng Chang, Anlei Dong:
Long-Term Cross-Session Relevance Feedback Using Virtual Features. 352-368 - Zeng Zeng, Bharadwaj Veeravalli:

On the Design of Distributed Object Placement and Load Balancing Strategies in Large-Scale Networked Multimedia Storage Systems. 369-382 - Yong-Hyuk Kim, Yourim Yoon

, Byung Ro Moon:
A Lagrangian Approach for Multiple Personalized Campaigns. 383-396 - Georgios Meditskos, Nick Bassiliades

:
A Rule-Based Object-Oriented OWL Reasoner. 397-410 - Ramakrishna Varadarajan, Vagelis Hristidis

, Tao Li:
Beyond Single-Page Web Search Results. 411-424 - Wai Yin Mok:

Characterizing the MVDs That Hold in a Connected Subtree of a Join Tree: A Correction. 425-426 - Paul Wu, Alan D. Fekete, Uwe Röhm

:
The Efficacy of Commutativity-Based Semantic Locking in a Real-World Application. 427-431
Volume 20, Number 4, April 2008
- Yan Huang

, Liqin Zhang, Pusheng Zhang:
A Framework for Mining Sequential Patterns from Spatio-Temporal Event Data Sets. 433-448 - Hui Wang

, Fionn Murtagh:
A Study of the Neighborhood Counting Similarity. 449-461 - Nizar Bouguila:

Clustering of Count Data Using Generalized Dirichlet Multinomial Distributions. 462-474 - Kamalika Das, Kanishka Bhaduri, Kun Liu, Hillol Kargupta:

Distributed Identification of Top-l Inner Product Elements and its Application in a Peer-to-Peer Network. 475-488 - Ke Sun, Fengshan Bai:

Mining Weighted Association Rules without Preassigned Weights. 489-495 - Nimit Kumar, Krishna Kummamuru:

Semisupervised Clustering with Metric Learning using Relative Comparisons. 496-503 - Wei Wang, Chinya V. Ravishankar

:
Adaptive Broadcasting for Similarity Queries in Wireless Content Delivery Systems. 504-518 - Zi Huang

, Heng Tao Shen, Xiaofang Zhou
:
Localized Co-Occurrence Model for Fast Approximate Search in 3D Structure Databases. 519-531 - Julien Lafaye, David Gross-Amblard, Camélia Constantin, Meryem Guerrouani:

Watermill: An Optimized Fingerprinting System for Databases under Constraints. 532-546 - Puwei Wang, Zhi Jin, Lin Liu, Guangjun Cai:

Building toward Capability Specifications of Web Services Based on an Environment Ontology. 547-561 - Lionel Gueguen, Mihai Datcu:

A Similarity Metric for Retrieval of Compressed Objects: Application for Mining Satellite Image Time Series. 562-575
Volume 20, Number 5, May 2008
- Yi Zhang, W. Nick Street:

Bagging with Adaptive Costs. 577-588 - Marko Robnik-Sikonja

, Igor Kononenko:
Explaining Classifications For Individual Instances. 589-600 - Wen-Hui Yang, Dao-Qing Dai, Hong Yan

:
Feature Extraction and Uncorrelated Discriminant Analysis for High-Dimensional Data. 601-614 - Pedro Pereira Rodrigues

, João Gama
, João Pedro Pedroso
:
Hierarchical Clustering of Time-Series Data Streams. 615-627 - Xue-wen Chen, Gopalakrishna Anantha, Xiaotong Lin:

Improving Bayesian Network Structure Learning with Mutual Information-Based Node Ordering in the K2 Algorithm. 628-640 - Yanjun Li, Congnan Luo, Soon M. Chung:

Text Clustering with Feature Selection by Using Statistical Data. 641-652 - Sophia G. Petridou

, Vassiliki A. Koutsonikola, Athena Vakali
, Georgios I. Papadimitriou:
Time-Aware Web Users' Clustering. 653-667 - Song-Yi Yi, Seunghoon Nam, Sungwon Jung

:
Effective Generation of Data Broadcast Schedules with Different Allocation Numbers for Multiple Wireless Channels. 668-677 - Sheng-Po Kuo, Yu-Chee Tseng:

A Scrambling Method for Fingerprint Positioning Based on Temporal Diversity and Spatial Dependency. 678-684 - Shih-Hau Fang, Tsung-Nan Lin

, Po-Chiang Lin:
Location Fingerprinting In A Decorrelated Space. 685-691 - Yannis Theoharis, Yannis Tzitzikas, Dimitris Kotzinos, Vassilis Christophides:

On Graph Features of Semantic Web Schemas. 692-702
Volume 20, Number 6, June 2008
- Gediminas Adomavicius, Jesse C. Bockstedt:

C-TREND: Temporal Cluster Graphs for Identifying and Visualizing Trends in Multiattribute Transactional Data. 721-735 - Deept Kumar, Naren Ramakrishnan

, Richard F. Helm
, Malcolm Potts:
Algorithms for Storytelling. 736-751 - Abdun Naser Mahmood

, Christopher Leckie
, Parampalli Udaya
:
An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis. 752-767 - Khanh Vu, Kien A. Hua, Hao Cheng, Sheau-Dong Lang:

Bounded Approximation: A New Criterion for Dimensionality Reduction Approximation in Similarity Search. 768-783 - Ying-Hsiang Wen, Jen-Wei Huang

, Ming-Syan Chen
:
Hardware-Enhanced Association Rule Mining with Hashing and Pipelining. 784-795 - Xiaoxin Yin, Jiawei Han, Philip S. Yu:

Truth Discovery with Multiple Conflicting Information Providers on the Web. 796-808 - Xiang Lian

, Lei Chen
:
Probabilistic Group Nearest Neighbor Queries in Uncertain Databases. 809-824 - Edi Winarko

, John F. Roddick
:
A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patterns. 825-835 - Jun Guo

, Yi Wang
, Kit-Sang Tang
, Sammy Chan
, Eric W. M. Wong
, Peter G. Taylor
, Moshe Zukerman
:
Evolutionary Optimization of File Assignment for a Large-Scale Video-on-Demand System. 836-850 - Maozhen Li, Bin Yu, Omer F. Rana

, Zidong Wang
:
Grid Service Discovery with Rough Sets. 851-862
Volume 20, Number 7, July 2008
- Xindong Wu:

Editorial: TKDE Editorial Board Changes. 865-867 - Weiguo Sheng, Xiaohui Liu, Michael C. Fairhurst:

A Niching Memetic Algorithm for Simultaneous Clustering and Feature Selection. 868-879 - Christoph Heinz, Bernhard Seeger:

Cluster Kernels: Resource-Aware Kernel Density Estimators over Streaming Data. 880-893 - Ken C. K. Lee, Baihua Zheng

, Wang-Chien Lee:
Ranked Reverse Nearest Neighbor Search. 894-910 - Andrew K. C. Wong, Gary C. L. Li:

Simultaneous Pattern and Data Clustering for Pattern Cluster Analysis. 911-923 - Karsten Sohr

, Michael Drouineaud, Gail-Joon Ahn
, Martin Gogolla:
Analyzing and Managing Role-Based Access Control Policies. 924-939 - Juan Manuel Pérez, Rafael Berlanga Llavori

, María José Aramburu
, Torben Bach Pedersen
:
Integrating Data Warehouses with Web Data: A Survey. 940-955 - Jun Zhang

, Henry Shu-Hung Chung, Wai-Lun Lo:
Chaotic Time Series Prediction Using a Neuro-Fuzzy System with Time-Delay Coordinates. 956-964 - Chung-Wei Yeh, Chih-Ping Chu:

Molecular Verification of Rule-Based Systems Based on DNA Computation. 965-975 - Neoklis Polyzotis, Spiros Skiadopoulos

, Panos Vassiliadis
, Alkis Simitsis, Nils-Erik Frantzell:
Meshing Streaming Updates with Persistent Data in an Active Data Warehouse. 976-991 - Themis Palpanas, Michail Vlachos

, Eamonn J. Keogh, Dimitrios Gunopulos
:
Streaming Time Series Summarization Using User-Defined Amnesic Functions. 992-1006
Volume 20, Number 8, August 2008
- Daniel Dajun Zeng, Hsinchun Chen, Fei-Yue Wang, Hillol Kargupta:

Guest Editors' Introduction: Special Section on Intelligence and Security Informatics. 1009-1012 - Yu Chen, Wesley W. Chu:

Protection of Database Security via Collaborative Inference Detection. 1013-1027 - Nan Zhang, Wei Zhao

:
Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems. 1028-1033 - Francesc Sebé

, Josep Domingo-Ferrer, Antoni Martínez-Ballesté
, Yves Deswarte, Jean-Jacques Quisquater:
Efficient Remote Data Possession Checking in Critical Information Infrastructures. 1034-1038 - Shou-De Lin

, Hans Chalupsky:
Discovering and Explaining Abnormal Nodes in Semantic Graphs. 1039-1052 - Longbing Cao

, Yanchang Zhao
, Chengqi Zhang
:
Mining Impact-Targeted Activity Patterns in Imbalanced Data. 1053-1066 - SzeWang Fong, Dmitri Roussinov, David B. Skillicorn

:
Detecting Word Substitutions in Text. 1067-1076 - Lina Zhou, Yongmei Shi, Dongsong Zhang:

A Statistical Language Modeling Approach to Online Deception Detection. 1077-1081 - Jie Yin

, Qiang Yang, Jeffrey Junfeng Pan:
Sensor-Based Abnormal Human-Activity Detection. 1082-1090 - Taekyoung Kwon, Hyeonjoon Moon:

Biometric Authentication for Border Control Applications. 1091-1096 - Arun Ross, Rohan Nadgir:

A Thin-Plate Spline Calibration Model For Fingerprint Sensor Interoperability. 1097-1110 - Segev Wasserkrug, Avigdor Gal, Opher Etzion:

Inference of Security Hazards from Event Composition Based on Incomplete or Uncertain Information. 1111-1114 - Sangho Kim, Shashi Shekhar, Manki Min:

Contraflow Transportation Network Reconfiguration for Evacuation Route Planning. 1115-1129 - De-Nian Yang

, Ming-Syan Chen
:
On Bandwidth-Efficient Data Broadcast. 1130-1144 - Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee:

Ring Signature with Weak Linkability and Its Applications. 1145-1148
Volume 20, Number 9, September 2008
- Jen-Wei Huang

, Chi-Yao Tseng, Jian Chih Ou, Ming-Syan Chen
:
A General Model for Sequential Pattern Mining with a Progressive Database. 1153-1167 - Ahmed Abbasi

, Hsinchun Chen, S. Thoms, Tianjun Fu:
Affect Analysis of Web Forums and Blogs Using Correlation Ensembles. 1168-1180 - Jiuyong Li

, Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jian Pei
:
Anonymization by Local Recoding in Data with Attribute Hierarchical Taxonomies. 1181-1194 - Evdoxios Baratis, Euripides G. M. Petrakis

, Evangelos E. Milios
:
Automatic Website Summarization by Image Content: A Case Study with Logo and Trademark Images. 1195-1204 - Zhenjie Zhang, Yin Yang

, Anthony K. H. Tung
, Dimitris Papadias:
Continuous k-Means Monitoring over Moving Objects. 1205-1216 - Hung Chim, Xiaotie Deng

:
Efficient Phrase-Based Document Similarity for Clustering. 1217-1229 - Francisco Javier Ruiz, Cecilio Angulo

, Núria Agell
:
IDD: A Supervised Interval Distance-Based Method for Discretization. 1230-1238 - Robert Nowicki

:
On Combining Neuro-Fuzzy Architectures with the Rough Set Theory to Solve Classification Problems with Incomplete Data. 1239-1253 - Tomoharu Iwata, Kazumi Saito, Takeshi Yamada:

Recommendation Method for Improving Customer Lifetime Value. 1254-1263 - Dino Isa, Lam Hong Lee

, V. P. Kallimani, Rajprasad Rajkumar:
Text Document Preprocessing with the Bayes Formula for Classification Using the Support Vector Machine. 1264-1272 - Hui Guo, Kwok-Tung Lo:

Cooperative Media Data Streaming with Scalable Video Coding. 1273-1281 - Runfang Zhou, Kai Hwang, Min Cai:

GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks. 1282-1295
Volume 20, Number 10, October 2008
- Shenghua Bao, Rui Li, Yong Yu, Yunbo Cao:

Competitor Mining with the Web. 1297-1310 - Shuiwang Ji

, Jieping Ye:
Kernel Uncorrelated and Regularized Discriminant Analysis: A Theoretical and Computational Study. 1311-1321 - Mete Celik

, Shashi Shekhar, James P. Rogers, James A. Shine:
Mixed-Drove Spatiotemporal Co-Occurrence Pattern Mining. 1322-1335 - Alok Sharma

, Kuldip K. Paliwal
:
Rotational Linear Discriminant Analysis Technique for Dimensionality Reduction. 1336-1347 - Pauli Miettinen, Taneli Mielikäinen, Aristides Gionis, Gautam Das

, Heikki Mannila:
The Discrete Basis Problem. 1348-1362 - Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, Patrick Valduriez:

DiSC: Benchmarking Secure Chip DBMS. 1363-1377 - Vandana Pursnani Janeja, Vijayalakshmi Atluri

:
Random Walks to Identify Anomalous Free-Form Spatial Scan Windows. 1378-1392 - Jaewoo Kang, Jeffrey F. Naughton:

Schema Matching Using Interattribute Dependencies. 1393-1407 - Yiming Ma, Dmitri V. Kalashnikov, Sharad Mehrotra:

Toward Managing Uncertain Spatial Information for Situational Awareness Applications. 1408-1423 - Jiang-Liang Hou, Alice W.-J. Tsai:

Knowledge Reuse Enhancement with Motional Visual Representation. 1424-1439
Volume 20, Number 11, November 2008
- Sanghamitra Bandyopadhyay, Sriparna Saha:

A Point Symmetry-Based Clustering Technique for Automatic Evolution of Clusters. 1441-1457 - Hung-Leng Chen, Kun-Ta Chuang, Ming-Syan Chen

:
On Data Labeling for Clustering Categorical Data. 1458-1472 - Fabio Fassetti

, Gianluigi Greco, Giorgio Terracina
:
Mining Loosely Structured Motifs from Biological Data. 1472-1489 - Hady Wirawan Lauw

, Ee-Peng Lim
, Ke Wang:
Bias and Controversy in Evaluation Systems. 1490-1504 - Kenneth Wai-Ting Leung, Wilfred Ng

, Dik Lun Lee
:
Personalized Concept-Based Clustering of Search Engine Queries. 1505-1518 - Mark Junjie Li

, Michael K. Ng
, Yiu-ming Cheung
, Joshua Zhexue Huang:
Agglomerative Fuzzy K-Means Clustering Algorithm with Selection of Number of Clusters. 1519-1534 - Cosimo Palmisano, Alexander Tuzhilin, Michele Gorgoglione:

Using Context to Improve Predictive Modeling of Customers in Personalization Applications. 1535-1549 - Dmitri V. Kalashnikov, Zhaoqi Chen, Sharad Mehrotra, Rabia Nuray-Turan:

Web People Search via Connection Analysis. 1550-1565 - Xiaoyan Li, Lidan Shou, Gang Chen, Tianlei Hu, Jinxiang Dong:

Modeling Image Data for Effective Indexing and Retrieval in Large General Image Databases. 1566-1580
Volume 20, Number 12, December 2008
- Xindong Wu:

TKDE 20(12) (December 2008) EIC Editorial: State of the Transactions. 1585-1586 - Rui Chang, Martin Stetter, Wilfried Brauer:

Quantitative Inference by Qualitative Semantic Knowledge Mining with Bayesian Model Averaging. 1587-1600 - Yiping Ke

, James Cheng, Wilfred Ng
:
Efficient Correlation Search from Graph Databases. 1601-1615 - Xiaoyan Liu, Zhenjiang Lin, Huaiqing Wang:

Novel Online Methods for Time Series Segmentation. 1616-1626 - Songting Chen, Hua-Gang Li, Jun'ichi Tatemura, Wang-Pin Hsiung, Divyakant Agrawal, K. Selçuk Candan:

Scalable Filtering of Multiple Generalized-Tree-Pattern Queries over XML Streams. 1627-1640 - Leong Hou U

, Nikos Mamoulis, Man Lung Yiu
:
Computation and Monitoring of Exclusive Closest Pairs. 1641-1654 - Shan-Hung Wu, Kun-Ta Chuang, Chung-Min Chen, Ming-Syan Chen

:
Toward the Optimal Itinerary-Based KNN Query Processing in Mobile Sensor Networks. 1655-1668 - Ke Yi, Feifei Li, George Kollios

, Divesh Srivastava:
Efficient Processing of Top-k Queries in Uncertain Databases with x-Relations. 1669-1682 - Hamid R. Motahari Nezhad, Régis Saint-Paul, Boualem Benatallah

, Fabio Casati
:
Deriving Protocol Models from Imperfect Service Conversation Logs. 1683-1698 - Mo Li

, Yunhao Liu, Lei Chen
:
Nonthreshold-Based Event Detection for 3D Environment Monitoring in Sensor Networks. 1699-1711 - Hai Zhuge, Xiaoping Sun:

A Virtual Ring Method for Building Small-World Structured P2P Overlays. 1712-1725

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














