default search action
DSAA 2014: Shanghai, China
- International Conference on Data Science and Advanced Analytics, DSAA 2014, Shanghai, China, October 30 - November 1, 2014. IEEE 2014, ISBN 978-1-4799-6991-3
- Qingbo Hu, Guan Wang, Philip S. Yu:
Assessing the longevity of online videos: A new insight of a video's quality. 1-10 - Philip S. Yu, Masaru Kitsuregawa, Hiroshi Motoda, Bart Goethals, Minyi Guo, Longbing Cao, George Karypis, Irwin King, Wei Wang:
Welcome from DSAA 2014 chairs. 9-10 - Jung-Jung Yeh, Tsung-Ting Kuo, William Chen, Shou-De Lin:
Minimizing expected loss for risk-avoiding reinforcement learning. 11-17 - Denis Krompass, Maximilian Nickel, Volker Tresp:
Large-scale factorization of type-constrained multi-relational data. 18-24 - Wenrong Zeng, Xue-wen Chen, Hong Cheng:
Pseudo labels for imbalanced multi-label learning. 25-31 - Seungwhan Moon, Jaime G. Carbonell:
Proactive learning with multiple class-sensitive labelers. 32-38 - Seyed Hamid Mirisaee, Éric Gaussier, Alexandre Termier:
Itemset approximation using Constrained Binary Matrix Factorization. 39-45 - Rushed Kanawati:
Community detection in social networks: The power of ensemble methods. 46-52 - Haichuan Yang, Xiao Bai, Jun Zhou, Peng Ren, Jian Cheng, Lu Bai:
Semi-randomized hashing for large scale data retrieval. 53-58 - Yan Xie, Philip S. Yu:
Storage efficient graph search by composite dynamic-and-static indexing of a single network. 59-65 - Da-Cheng Yu, Wei-Guang Teng:
Indexing and retrieval of human motion data based on a growing self-organizing map. 66-71 - Min Shao, Xiaofang Jin, Libiao Jin:
An improved dynamic adaptive multi-tree search anti-collision algorithm based on RFID. 72-75 - Wen-Yuan Zhu, Wen-Chih Peng, Ling-Jyh Chen:
Exploiting mobility for location promotion in location-based social networks. 76-82 - Massimo Melucci:
Investigating sample selection bias in the relevance feedback algorithm of the vector space model for Information Retrieval. 83-89 - Maximilien Danisch, Jean-Loup Guillaume, Bénédicte Le Grand:
Learning a proximity measure to complete a community. 90-96 - Qi Gu, Yan Zhang, Jian Cao, Guandong Xu, Alfredo Cuzzocrea:
A confidence-based entity resolution approach with incomplete information. 97-103 - Shiwei Ye, Yuan Sun, Yi Sun:
Matrix completion based on feature vector and function approximation. 104-109 - Yuntian Brian Bai, Mani Williams, Falin Wu, Allison Kealy, Kefei Zhang:
An accuracy enhancement algorithm for fingerprinting method. 110-114 - Dequan Zhou, Xin Wang:
Probabilistic Category-based Location Recommendation Utilizing Temporal Influence and Geographical Influence. 115-121 - Juan Zhao, Kejun Dong, Jianjun Yu:
Recommending funding collaborators with scholar social networks. 122-127 - Chia-Ling Hsiao, Zih-Syuan Wang, Wei-Guang Teng:
An incremental scheme for large-scale social-based recommender systems. 128-134 - Maunendra Sankar Desarkar, Neha Shinde:
Diversification in news recommendation for privacy concerned users. 135-141 - Sowmya Kamath S., Ananthanarayana V. S.:
Similarity analysis of service descriptions for efficient Web service discovery. 142-148 - Weizhong Zhu, Robert B. Allen:
Active learning for text classification: Using the LSI Subspace Signature Model. 149-155 - Pratibha Rani, Vikram Pudi, Dipti Misra Sharma:
A semisupervised associative classification method for POS tagging. 156-162 - Cho-Yi Hsiao, Hung-Yi Lo, Tu-Chun Yin, Shou-De Lin:
Optimizing specificity under perfect sensitivity for medical data classification. 163-169 - Floris Geerts, Reuben Ndindi:
Interactive correlation clustering. 170-176 - Asma Ammar, Zied Elouedi, Pawan Lingras:
Rough possibilistic meta-clustering of retail datasets. 177-183 - Yang Liu, Mingyan Liu:
Detecting hidden propagation structure and its application to analyzing phishing. 184-190 - Pranjal Mallick, Vikash Kumar Sharma, Parikshit Bhinde, Mutha Mandapati Reddy:
Account level demand estimation and intelligence framework. 191-195 - Fei Long, Xingjun Wang:
A new pre-pushing VoD scheme in hierarchical network environment. 196-202 - Gabriel Mota, Joana Fernandes, Orlando Belo:
Usage signatures analysis an alternative method for preventing fraud in E-Commerce applications. 203-208 - M. Saravanan, A. M. Thoufeeq, S. Akshaya, V. L. Jayasre Manchari:
Exploring new privacy approaches in a scalable classification framework. 209-215 - Masahiro Kimura, Kazumi Saito, Kouzou Ohara, Hiroshi Motoda:
Efficient analysis of node influence based on SIR model over huge complex networks. 216-222 - Hui-Ju Hung, De-Nian Yang, Wang-Chien Lee:
Social influence-aware reverse nearest neighbor search. 223-229 - Jun-Li Lu, Ling-Yin Wei, Mi-Yen Yeh:
Influence maximization in a social network in the presence of multiple influences and acceptances. 230-236 - Li-Yen Kuo, Ming-Syan Chen:
Diversified ranking on graphs from the influence maximization viewpoint. 237-243 - Chang Liao, Yinfei Huang, Xibin Shi, Xin Jin:
Mining influence in evolving entities: A study on stock market. 244-250 - Zhitao Wang, Zhiwen Yu, Liming Chen, Bin Guo:
Sentiment detection and visualization of Chinese micro-blog. 251-257 - Lian-Zhi Huo, Zheng Zhang, Liang Tang:
Critical class sensitive active learning method for classification of remote sensing imagery. 258-262 - A. V. Trinath, P. Gowtham Srinivas, P. Krishna Reddy:
Content specific coverage patterns for banner advertisement placement. 263-269 - Antonio Ridi, Christophe Gisler, Jean Hennebert:
Appliance and state recognition using Hidden Markov Models. 270-276 - Shuting Wang, Wang-Chien Lee, Zhen Lei, Xianliang Zhang, Yu-Hsuan Kuo:
Exploring technological trends for patent evaluation. 277-283 - Yukino Baba, Nozomi Nori, Shigeru Saito, Hisashi Kashima:
Crowdsourced data analytics: A case study of a predictive modeling competition. 284-289 - Bo-Heng Chen, Kun-Ta Chuang:
A model-selection framework for concept-drifting data streams. 290-296 - Michael Geilke, Andreas Karwath, Stefan Kramer:
A probabilistic condensed representation of data for stream mining. 297-303 - Yi-Cheng Chen, Julia Tzu-Ya Weng, Jun-Zhe Wang, Chien-Li Chou, Jiun-Long Huang, Suh-Yin Lee:
Incrementally mining temporal patterns in interval-based databases. 304-311 - Salvatore Rinzivillo, Lorenzo Gabrielli, Mirco Nanni, Luca Pappalardo, Dino Pedreschi, Fosca Giannotti:
The purpose of motion: Learning activities from Individual Mobility Networks. 312-318 - Gunarto Sindoro Njoo, Yu-Hsiang Peng, Kuo-Wei Hsu, Wen-Chih Peng:
On selecting feature-value pairs on smart phones for activity inferences. 319-325 - Melih S. Aslan, Xue-wen Chen, Hong Cheng:
Learning sparse and scale-free networks. 326-332 - Yajun Gu, Bofeng Zhang, Guobing Zou, Mingqing Huang, Keyuan Jiang:
Overlapping Community Detection in social network based on Microblog User Model. 333-339 - Wan-Hsin Tang, Mi-Yen Yeh, Anthony J. T. Lee:
Information diffusion among users on Facebook fan pages over time: Its impact on movie box office. 340-346 - Tsung-Hao Hsu, Chien-Cheng Chen, Meng-Fen Chiang, Kuo-Wei Hsu, Wen-Chih Peng:
Inferring potential users in mobile social networks. 347-353 - Kai Zheng, Weihua Jiang:
A token authentication solution for hadoop based on kerberos pre-authentication. 354-360 - Jiangtao Luo, Yan Liang, Wei Gao, Junchao Yang:
Hadoop based Deep Packet Inspection system for traffic analysis of e-business websites. 361-366 - Heng Xie, Mei Wang, Jiajin Le:
A data reusing strategy based on hive. 367-373 - Chang-Miao Hu, Xiaojun Shan, Zheng Zhang:
Dehazing algorithm's high performance and parallel computing for GF-1 Satellite Images. 374-378 - Marcin Gorawski, Michal Lorek:
General in-situ matrix transposition algorithm for massively parallel environments. 379-384 - Sein Minn, Shunkai Fu, Michel C. Desmarais:
Efficient learning of general Bayesian network Classifier by Local and Adaptive Search. 385-391 - Jiaqi Ge, Yuni Xia, Jian Wang:
A naïve Bayesian classifier in categorical uncertain data streams. 392-398 - Hussein Mohsen, Hasan Kurban, Mark Jenne, Mehmet M. Dalkilic:
A new set of Random Forests with varying dynamic data reduction and voting techniques. 399-405 - Libiao Zhang, Yuefeng Li, Yue Xu, Dian Tjondronegoro, Chao Sun:
Centroid Training to achieve effective text classification. 406-412 - Hang Yin, Chunhong Zhang, Yunkai Zhu, Yang Ji:
Representing sentence with unfolding recursive autoencoders and dynamic average pooling. 413-419 - Li Sun, Sheng Li, Jiyun Li, JuTao Lv:
A novel context-based implicit feature extracting method. 420-424 - Zheng Zhang, Liang Tang, Ping Tang:
Local feature based dynamic time warping. 425-429 - Danqin Wang, Xiaolong Zhang:
Mobile user stability prediction with Random Forest model. 430-434 - Koosha Golmohammadi, Osmar R. Zaïane, David Diaz:
Detecting stock market manipulation using supervised learning algorithms. 435-441 - Sooyoung Oh, Zhen Lei, Wang-Chien Lee, John Yen:
Recommending missing citations for newly granted patents. 442-448 - Soumaya Guesmi, Chiraz Trabelsi, Chiraz Latiri:
FCA for Common Interest Communities discovering. 449-455 - Jianxing Zheng, Bofeng Zhang, Guobing Zou, Xiaodong Yue:
Diversification recommendation of popular articles in micro-blog scenario. 456-462 - Bo Dao, Thin Nguyen, Svetha Venkatesh, Dinh Q. Phung:
Analysis of circadian rhythms from online communities of individuals with affective disorders. 463-469 - Qinna Wang:
Link prediction and threads in email networks. 470-476 - Eirini Spyropoulou, Tijl De Bie:
Mining approximate multi-relational patterns. 477-483 - Xiaofeng Wang, Gongshen Liu, Jianhua Li:
A detecting community method in complex networks with fuzzy clustering. 484-490 - Elif Ezgi Yusufoglu, Murat Ayyildiz, Ensar Gul:
Neural network-based approaches for predicting query response times. 491-497 - Zong-Hua Yang, Hung-Yu Kao:
User preference space partition and product filters for reverse top-k queries. 498-504 - Xiangfu Meng, Jingyu Shao:
Finding top-k semantically related terms from relational keyword search. 505-511 - Francesco Di Tria, Ezio Lefons, Filippo Tangorra:
Design process for Big Data Warehouses. 512-518 - Nima Bari, Roman Vichr, Kamran Kowsari, Simon Y. Berkovich:
23-bit metaknowledge template towards Big Data knowledge discovery and management. 519-526 - Chi-Min Huang, Josh Jia-Ching Ying, Vincent S. Tseng, Zhi-Hua Zhou:
Location semantics prediction for living analytics by mining smartphone data. 527-533 - Ruihan Bao, Hongming Cai:
Management of complex data objects in ship designing process. 534-540 - Sizhe Chen, Haipeng Wang:
SAR target recognition based on deep learning. 541-547 - Kuan-Ying Chen, Bijay Prasad Jaysawal, Jen-Wei Huang, Yong-Bin Wu:
Mining frequent Time Interval-based Event with duration patterns from temporal database. 548-554 - Kalpana Singh, Jia Rong, Lynn Margaret Batten:
Sharing sensitive medical data sets for research purposes - A case study. 555-562 - Yan Luo, Charles X. Ling, Shuang Ao:
Mobile-based food classification for Type-2 Diabetes using nutrient and textual features. 563-569 - Nguyen Thanh Binh, Wei Luo, Terry Caelli, Svetha Venkatesh, Dinh Q. Phung:
Individualized arrhythmia detection with ECG signals from wearable devices. 570-576 - Nicoletta Di Blas, Mirjana Mazuran, Paolo Paolini, Elisa Quintarelli, Letizia Tanca:
Exploratory computing: a draft Manifesto. 577-580 - Paolo Paolini, Nicoletta Di Blas:
Exploratory portals: The need for a new generation. 581-586 - Patrick Hennig, Philipp Berger, Christoph Meinel, Lukas Pirl, Lukas Schulze:
Exploring emotions over time within the blogosphere. 587-592 - Michel de Rougemont:
StatsReduce in the cloud for approximate Analytics. 593-599 - Yun-Te Lin, Yung-Hsiang Huang, Yi-Hao Hsiao, Yu-Jung Cheng, Jih-Sheng Chang, Sheng-Wen Wang, Fang-Pang Lin, Chung-Ming Wang:
An implementation of the efficient huge amount of pseudo-random unique numbers generator and the acceleration analysis of parallelization. 600-606 - JongWoo Ha, Jung-Hyun Lee, Won-Jun Jang, Yong-Ku Lee, SangKeun Lee:
Toward robust classification using the Open Directory Project. 607-612 - Gabriella Pasi, Romano Fantacci:
Generating, communicating, accessing and analyzing data in a context-aware perspective. 613-617
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.