


default search action
Knowledge and Information Systems, Volume 45
Volume 45, Number 1, October 2015
- Ahmed K. Farahat, Ahmed Elgohary, Ali Ghodsi, Mohamed S. Kamel:

Greedy column subset selection for large-scale data sets. 1-34 - Robert Moskovitch, Yuval Shahar

:
Classification of multivariate time series via temporal abstraction and time intervals mining. 35-74 - Bei Pan, Ugur Demiryurek, Chetan Gupta, Cyrus Shahabi:

Forecasting spatiotemporal impact of traffic incidents for next-generation navigation systems. 75-104 - Abdullah Mueen, Nikan Chavoshi:

Enumeration of time series motifs of all lengths. 105-132 - Ruochen Liu, Lang Zhang, Bingjie Li, Yajuan Ma, Licheng Jiao

:
Synergy of two mutations based immune multi-objective automatic fuzzy clustering algorithm. 133-157 - Michele Dallachiesa, Gabriela Jacques-Silva, Bugra Gedik, Kun-Lung Wu, Themis Palpanas:

Sliding windows over uncertain data streams. 159-190 - Muhammad Tanveer

:
Application of smoothing techniques for linear programming twin support vector machines. 191-214 - Da Yan, James Cheng, Zhou Zhao, Wilfred Ng

:
Efficient location-based search of trajectories with location importance. 215-245 - Ronaldo C. Prati

, Gustavo E. A. P. A. Batista, Diego Furtado Silva
:
Class imbalance revisited: a new experimental setup to assess the performance of treatment methods. 247-270
Volume 45, Number 2, November 2015
- Jafar Muhammadi, Hamid R. Rabiee

, Seyyed Abbas Hosseini:
A unified statistical framework for crowd labeling. 271-294 - Sonia Bergamaschi

, Riccardo Martoglia
, Serena Sorrentino:
Exploiting semantics for filtering and searching knowledge in a software development context. 295-318 - Son T. Mai, Xiao He, Jing Feng, Claudia Plant

, Christian Böhm:
Anytime density-based clustering of complex data. 319-355 - Reyhan Aydogan

, Tim Baarslag
, Koen V. Hindriks
, Catholijn M. Jonker, Pinar Yolum:
Heuristics for using CP-nets in utility-based negotiation without knowing utilities. 357-388 - Christophe G. Giraud-Carrier

, J. Goodliffe, B. M. Jones, S. Cueva:
Effective record linkage for mining campaign contribution data. 389-416 - Chuanwen Li, Yu Gu, Jianzhong Qi

, Rui Zhang
, Ge Yu:
A safe region based approach to moving KNN queries in obstructed space. 417-451 - Jitendra Agrawal, Shikha Agrawal

, Ankita Singhai, Sanjeev Kumar Sharma
:
SET-PSO-based approach for mining positive and negative association rules. 453-471 - Guangyu Wu, Pádraig Cunningham

:
Integration of multiple network views in Wikipedia. 473-490 - Georgios M. Santipantakis, George A. Vouros

:
Distributed reasoning with coupled ontologies: the E-SHIQ representation framework. 491-534
Volume 45, Number 3, December 2015
- Hai-Long Nguyen, Yew-Kwong Woon, Wee Keong Ng

:
A survey on data stream clustering and classification. 535-569 - Charu C. Aggarwal, Yao Li, Philip S. Yu:

On the anonymizability of graphs. 571-588 - Maede Ashouri-Talouki

, Ahmad Baraani-Dastjerdi, Ali Aydin Selçuk
:
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services. 589-615 - Rong-Hua Li, Jeffrey Xu Yu:

Triangle minimization in large networks. 617-643 - Fragkiskos D. Malliaros, Vasileios Megalooikonomou, Christos Faloutsos:

Estimating robustness in large social graphs. 645-678 - Fangqing Gu, Hai-Lin Liu, Yiu-ming Cheung

, Shengli Xie:
Optimal WCDMA network planning by multiobjective evolutionary algorithm with problem-specific genetic operation. 679-703 - Prasad M. Deshpande, Salil Joshi, Prateek Dewan, Karin Murthy, Mukesh K. Mohania, Sheshnarayan Agrawal:

The Mask of ZoRRo: preventing information leakage from documents. 705-730 - Dmitriy Fradkin, Fabian Mörchen:

Mining sequential patterns for classification. 731-749 - Yang Yang

, Ryan N. Lichtenwalter, Nitesh V. Chawla
:
Evaluating link prediction methods. 751-782 - Jafar Mansouri, Morteza Khademi:

Multiplicative distance: a method to alleviate distance instability for high-dimensional data. 783-805

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














