


default search action
ACM Transactions on Intelligent Systems and Technology, Volume 2
Volume 2, Number 1, January 2011
- Daqing Zhang, Matthai Philipose, Qiang Yang:

Introduction to the special issue on intelligent systems for activity recognition. 1:1-1:4 - Yu Zheng, Xing Xie

:
Learning travel recommendations from user-generated GPS traces. 2:1-2:29 - Katayoun Farrahi

, Daniel Gatica-Perez
:
Discovering routines from large-scale human locations using probabilistic topic models. 3:1-3:27 - Jane Yung-jen Hsu, Chia-chun Lian, Wan-rong Jih:

Probabilistic models for concurrent chatting activity recognition. 4:1-4:20 - Yue Zhou, Bingbing Ni, Shuicheng Yan

, Thomas S. Huang:
Recognizing pair-activities by causality analysis. 5:1-5:20 - Jamie A. Ward, Paul Lukowicz, Hans-Werner Gellersen

:
Performance metrics for activity recognition. 6:1-6:23 - Danny Wyatt, Tanzeem Choudhury, Jeff A. Bilmes, James A. Kitts:

Inferring colocation and conversation networks from privacy-sensitive audio with implications for computational social science. 7:1-7:41 - Xinlong Bao, Thomas G. Dietterich:

FolderPredictor: Reducing the cost of reaching the right folder. 8:1-8:23
Volume 2, Number 2, February 2011
- Xian-Sheng Hua, Qi Tian, Alberto Del Bimbo

, Ramesh C. Jain:
Introduction to the special issue on intelligent multimedia systems and technology. 9:1-9:2 - Meng Wang, Xian-Sheng Hua:

Active learning in multimedia annotation and retrieval: A survey. 10:1-10:21 - Yuanlong Shao, Yuan Zhou, Deng Cai:

Variational inference with graph regularization for image annotation. 11:1-11:21 - Jie Yu, Xin Jin, Jiawei Han, Jiebo Luo

:
Collection-based sparse label propagation and its application on social group suggestion from photos. 12:1-12:21 - Lei Wu, Steven C. H. Hoi

, Rong Jin, Jianke Zhu, Nenghai Yu:
Distance metric learning from uncertain side information for automated photo tagging. 13:1-13:28 - Jinhui Tang, Richang Hong, Shuicheng Yan, Tat-Seng Chua, Guo-Jun Qi

, Ramesh C. Jain:
Image annotation by kNN-sparse graph-based label propagation over noisily tagged web images. 14:1-14:15 - Xiaofeng Tong, Jia Liu, Tao Wang, Yimin Zhang

:
Automatic player labeling, tracking and field registration and trajectory mapping in broadcast soccer video. 15:1-15:32 - Qingzhong Liu

, Andrew H. Sung, Mengyu Qiao:
Neighboring joint density-based JPEG steganalysis. 16:1-16:16 - Chidansh Amitkumar Bhatt, Mohan S. Kankanhalli

:
Probabilistic temporal multimedia data mining. 17:1-17:19
Volume 2, Number 3, April 2011
- Charles X. Ling:

Introduction to special issue on machine learning for business applications. 18:1-18:2 - Vasant Dhar:

Prediction in financial markets: The case for small disjuncts. 19:1-19:22 - Szu-Hao Huang

, Shang-Hong Lai
, Shih-Hsien Tai:
A learning-based contrarian trading strategy via a dual-classifier model. 20:1-20:20 - Bin Li, Steven C. H. Hoi

, Vivekanand Gopalkrishnan:
CORN: Correlation-driven nonparametric learning approach for portfolio selection. 21:1-21:29 - Francesco Bonchi, Carlos Castillo

, Aristides Gionis, Alejandro Jaimes:
Social Network Analysis and Mining for Business Applications. 22:1-22:37 - Richong Zhang, Thomas T. Tran:

A helpfulness modeling framework for electronic word-of-mouth on consumer opinion platforms. 23:1-23:18 - Yong Ge, Hui Xiong, Wenjun Zhou

, Siming Li, Ramendra K. Sahoo:
Multifocal learning for customer problem analysis. 24:1-24:22 - Chun-Nan Hsu:

Introduction to special issue on large-scale machine learning. 25:1-25:2 - Zhiyuan Liu

, Yuzhou Zhang, Edward Y. Chang, Maosong Sun:
PLDA+: Parallel latent dirichlet allocation with data placement and pipeline processing. 26:1-26:18 - Chih-Chung Chang, Chih-Jen Lin

:
LIBSVM: A library for support vector machines. 27:1-27:27 - Gilles Gasso, Aristidis Pappaioannou, Marina Spivak, Léon Bottou:

Batch and online learning algorithms for nonconvex neyman-pearson classification. 28:1-28:19 - Hao Ma, Irwin King

, Michael R. Lyu:
Learning to recommend with explicit and implicit social relations. 29:1-29:19 - Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:

Learning to detect malicious URLs. 30:1-30:24
Volume 2, Number 4, July 2011
- Carla P. Gomes, Qiang Yang:

Introduction to special issue on computational sustainability. 31:1-31:2 - Andreas Krause, Carlos Guestrin:

Submodularity and its applications in optimized information gathering. 32:1-32:20 - Massimiliano Cattafi, Marco Gavanelli

, Michela Milano, Paolo Cagnoli:
Sustainable biomass power plant location in the Italian Emilia-Romagna region. 33:1-33:19 - Debprakash Patnaik, Manish Marwah, Ratnesh K. Sharma, Naren Ramakrishnan

:
Temporal data mining approaches for sustainable chiller management in data centers. 34:1-34:29 - Sarvapali D. Ramchurn

, Perukrishnen Vytelingum, Alex Rogers, Nicholas R. Jennings
:
Agent-based homeostatic control for green energy in the smart grid. 35:1-35:28 - Varun Mithal, Ashish Garg, Shyam Boriah, Michael S. Steinbach

, Vipin Kumar, Christopher Potter, Steven A. Klooster, Juan Carlos Castilla-Rubio:
Monitoring global forest cover using data mining. 36:1-36:24 - Zhenhui Li, Jiawei Han, Ming Ji, Lu-An Tang, Yintao Yu, Bolin Ding, Jae-Gil Lee, Roland Kays

:
MoveMine: Mining moving object data for discovery of animal movement patterns. 37:1-37:32 - Jameson L. Toole, Nathan Eagle, Joshua B. Plotkin:

Spatiotemporal correlations in criminal offense records. 38:1-38:18 - Wei Ding

, Tomasz F. Stepinski, Yang Mu, Lourenço P. C. Bandeira
, Ricardo Vilalta, Youxi Wu
, Zhenyu Lu, Tianyu Cao, Xindong Wu:
Subkilometer crater discovery with boosting and transfer learning. 39:1-39:22 - Pauline M. Berry, Melinda T. Gervasio, Bart Peintner, Neil Yorke-Smith:

PTIME: Personalized assistance for calendaring. 40:1-40:22 - Sudhakar Y. Reddy, Jeremy Frank, Michael Iatauro, Matthew E. Boyce, Elif Kürklü, Mitchell Ai-Chang, Ari K. Jónsson:

Planning solar array operations on the international space station. 41:1-41:24 - Karen Zita Haigh, Fusun Yaman:

RECYCLE: Learning looping workflows from annotated traces. 42:1-42:32

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














