callback( { "result":{ "query":":facetid:toc:\"db/journals/kais/kais50.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"197.40" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"36", "@dc":"36", "@oc":"36", "@id":"43472674", "text":":facetid:toc:db/journals/kais/kais50.bht" } }, "hits":{ "@total":"36", "@computed":"36", "@sent":"36", "@first":"0", "hit":[{ "@score":"1", "@id":"2816291", "info":{"authors":{"author":[{"@pid":"33/11518","text":"Nesreen K. Ahmed"},{"@pid":"n/JenniferNeville","text":"Jennifer Neville"},{"@pid":"17/5085","text":"Ryan A. Rossi"},{"@pid":"d/NickGDuffield","text":"Nick G. Duffield"},{"@pid":"40/3641","text":"Theodore L. Willke"}]},"title":"Graphlet decomposition: framework, algorithms, and applications.","venue":"Knowl. Inf. Syst.","volume":"50","number":"3","pages":"689-722","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/AhmedNRDW17","doi":"10.1007/S10115-016-0965-5","ee":"https://doi.org/10.1007/s10115-016-0965-5","url":"https://dblp.org/rec/journals/kais/AhmedNRDW17"}, "url":"URL#2816291" }, { "@score":"1", "@id":"2816297", "info":{"authors":{"author":[{"@pid":"74/723","text":"Vasudha Bhatnagar"},{"@pid":"18/1460","text":"Sharanjit Kaur"},{"@pid":"149/1337","text":"Rakhi Saxena"},{"@pid":"124/3084","text":"Dhriti Khanna"}]},"title":"DASC: data aware algorithm for scalable clustering.","venue":"Knowl. Inf. Syst.","volume":"50","number":"3","pages":"851-881","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/BhatnagarKSK17","doi":"10.1007/S10115-016-0958-4","ee":"https://doi.org/10.1007/s10115-016-0958-4","url":"https://dblp.org/rec/journals/kais/BhatnagarKSK17"}, "url":"URL#2816297" }, { "@score":"1", "@id":"2816298", "info":{"authors":{"author":[{"@pid":"57/7963","text":"Brigitte Boden"},{"@pid":"43/3011","text":"Stephan Günnemann"},{"@pid":"42/1052","text":"Holger Hoffmann"},{"@pid":"s/ThomasSeidl1","text":"Thomas Seidl 0001"}]},"title":"MiMAG: mining coherent subgraphs in multi-layer graphs with edge labels.","venue":"Knowl. Inf. Syst.","volume":"50","number":"2","pages":"417-446","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/BodenGH017","doi":"10.1007/S10115-016-0949-5","ee":"https://doi.org/10.1007/s10115-016-0949-5","url":"https://dblp.org/rec/journals/kais/BodenGH017"}, "url":"URL#2816298" }, { "@score":"1", "@id":"2816302", "info":{"authors":{"author":[{"@pid":"75/1009","text":"Chumphol Bunkhumpornpat"},{"@pid":"59/1398","text":"Krung Sinapiromsaran"}]},"title":"DBMUTE: density-based majority under-sampling technique.","venue":"Knowl. Inf. Syst.","volume":"50","number":"3","pages":"827-850","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/BunkhumpornpatS17","doi":"10.1007/S10115-016-0957-5","ee":"https://doi.org/10.1007/s10115-016-0957-5","url":"https://dblp.org/rec/journals/kais/BunkhumpornpatS17"}, "url":"URL#2816302" }, { "@score":"1", "@id":"2816303", "info":{"authors":{"author":[{"@pid":"30/4231","text":"Artur Caetano"},{"@pid":"81/4067","text":"Gonçalo Antunes"},{"@pid":"66/3567","text":"João Pombinho"},{"@pid":"136/1272","text":"Marzieh Bakhshandeh"},{"@pid":"58/11439","text":"José Granjo"},{"@pid":"27/71","text":"José Borbinha"},{"@pid":"99/745","text":"Miguel Mira da Silva"}]},"title":"Representation and analysis of enterprise models with semantic techniques: an application to ArchiMate, e3value and business model canvas.","venue":"Knowl. Inf. Syst.","volume":"50","number":"1","pages":"315-346","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/CaetanoAPBGBS17","doi":"10.1007/S10115-016-0933-0","ee":"https://doi.org/10.1007/s10115-016-0933-0","url":"https://dblp.org/rec/journals/kais/CaetanoAPBGBS17"}, "url":"URL#2816303" }, { "@score":"1", "@id":"2816305", "info":{"authors":{"author":[{"@pid":"120/9604","text":"Jordi Casas-Roma"},{"@pid":"74/634","text":"Jordi Herrera-Joancomartí"},{"@pid":"t/VicencTorra","text":"Vicenç Torra"}]},"title":"k-Degree anonymity and edge selection: improving data utility in large networks.","venue":"Knowl. Inf. Syst.","volume":"50","number":"2","pages":"447-474","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/Casas-RomaHT17","doi":"10.1007/S10115-016-0947-7","ee":"https://doi.org/10.1007/s10115-016-0947-7","url":"https://dblp.org/rec/journals/kais/Casas-RomaHT17"}, "url":"URL#2816305" }, { "@score":"1", "@id":"2816306", "info":{"authors":{"author":[{"@pid":"c/ArunChauhan2","text":"Arun Chauhan 0002"},{"@pid":"15/5452","text":"Krishna Kummamuru"},{"@pid":"37/640","text":"Durga Toshniwal"}]},"title":"Prediction of places of visit using tweets.","venue":"Knowl. Inf. Syst.","volume":"50","number":"1","pages":"145-166","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/ChauhanKT17","doi":"10.1007/S10115-016-0936-X","ee":"https://doi.org/10.1007/s10115-016-0936-x","url":"https://dblp.org/rec/journals/kais/ChauhanKT17"}, "url":"URL#2816306" }, { "@score":"1", "@id":"2816307", "info":{"authors":{"author":[{"@pid":"70/7635","text":"Shenglei Chen"},{"@pid":"08/3909","text":"Ana M. Martínez"},{"@pid":"w/GeoffreyIWebb","text":"Geoffrey I. Webb"},{"@pid":"68/6610-7","text":"Limin Wang 0007"}]},"title":"Selective AnDE for large data learning: a low-bias memory constrained approach.","venue":"Knowl. Inf. Syst.","volume":"50","number":"2","pages":"475-503","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/ChenMWW17","doi":"10.1007/S10115-016-0937-9","ee":"https://doi.org/10.1007/s10115-016-0937-9","url":"https://dblp.org/rec/journals/kais/ChenMWW17"}, "url":"URL#2816307" }, { "@score":"1", "@id":"2816310", "info":{"authors":{"author":[{"@pid":"42/7075","text":"Gloria Cerasela Crisan"},{"@pid":"19/1046","text":"Camelia-Mihaela Pintea"},{"@pid":"p/VasilePalade","text":"Vasile Palade"}]},"title":"Emergency management using geographic information systems: application to the first Romanian traveling salesman problem instance.","venue":"Knowl. Inf. Syst.","volume":"50","number":"1","pages":"265-285","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/CrisanPP17","doi":"10.1007/S10115-016-0938-8","ee":"https://doi.org/10.1007/s10115-016-0938-8","url":"https://dblp.org/rec/journals/kais/CrisanPP17"}, "url":"URL#2816310" }, { "@score":"1", "@id":"2816312", "info":{"authors":{"author":[{"@pid":"76/296","text":"Eladio Domínguez"},{"@pid":"22/4542","text":"Beatriz Pérez 0001"},{"@pid":"01/3695","text":"Ángel Luis Rubio"},{"@pid":"10/5012","text":"María Antonia Zapata"},{"@pid":"148/2215","text":"Alberto Allué"},{"@pid":"91/3971","text":"Antonio López"}]},"title":"Developing provenance-aware query systems: an occurrence-centric approach.","venue":"Knowl. Inf. Syst.","volume":"50","number":"2","pages":"661-688","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/Dominguez0RZAL17","doi":"10.1007/S10115-016-0950-Z","ee":"https://doi.org/10.1007/s10115-016-0950-z","url":"https://dblp.org/rec/journals/kais/Dominguez0RZAL17"}, "url":"URL#2816312" }, { "@score":"1", "@id":"2816317", "info":{"authors":{"author":[{"@pid":"124/9773","text":"Géraud Fokou"},{"@pid":"j/StephaneJean","text":"Stéphane Jean"},{"@pid":"24/2709","text":"Allel Hadjali"},{"@pid":"08/4942","text":"Mickaël Baron"}]},"title":"Handling failing RDF queries: from diagnosis to relaxation.","venue":"Knowl. Inf. Syst.","volume":"50","number":"1","pages":"167-195","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/FokouJHB17","doi":"10.1007/S10115-016-0941-0","ee":"https://doi.org/10.1007/s10115-016-0941-0","url":"https://dblp.org/rec/journals/kais/FokouJHB17"}, "url":"URL#2816317" }, { "@score":"1", "@id":"2816321", "info":{"authors":{"author":[{"@pid":"129/7045","text":"Btihal El Ghali"},{"@pid":"09/5762","text":"Abderrahim El Qadi"}]},"title":"Context-aware query expansion method using Language Models and Latent Semantic Analyses.","venue":"Knowl. Inf. Syst.","volume":"50","number":"3","pages":"751-762","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/GhaliQ17","doi":"10.1007/S10115-016-0952-X","ee":"https://doi.org/10.1007/s10115-016-0952-x","url":"https://dblp.org/rec/journals/kais/GhaliQ17"}, "url":"URL#2816321" }, { "@score":"1", "@id":"2816325", "info":{"authors":{"author":[{"@pid":"h/RamziAHaraty","text":"Ramzi A. Haraty"},{"@pid":"193/0843","text":"Mohamed El Sai"}]},"title":"Information warfare: a lightweight matrix-based approach for database recovery.","venue":"Knowl. Inf. Syst.","volume":"50","number":"1","pages":"287-313","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/HaratyS17","doi":"10.1007/S10115-016-0940-1","ee":"https://doi.org/10.1007/s10115-016-0940-1","url":"https://dblp.org/rec/journals/kais/HaratyS17"}, "url":"URL#2816325" }, { "@score":"1", "@id":"2816335", "info":{"authors":{"author":[{"@pid":"151/4927","text":"Caner Komurlu"},{"@pid":"151/4915","text":"Jinjian Shao"},{"@pid":"194/7989","text":"Banu Akar"},{"@pid":"158/6540","text":"Elif S. Bayrak"},{"@pid":"93/10461","text":"Eric M. Brey"},{"@pid":"90/2225","text":"Ali Cinar"},{"@pid":"67/500","text":"Mustafa Bilgic 0001"}]},"title":"Active inference for dynamic Bayesian networks with an application to tissue engineering.","venue":"Knowl. Inf. Syst.","volume":"50","number":"3","pages":"917-943","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/KomurluSABBCB17","doi":"10.1007/S10115-016-0963-7","ee":"https://doi.org/10.1007/s10115-016-0963-7","url":"https://dblp.org/rec/journals/kais/KomurluSABBCB17"}, "url":"URL#2816335" }, { "@score":"1", "@id":"2816337", "info":{"authors":{"author":[{"@pid":"120/5463","text":"Christina Lantzaki"},{"@pid":"09/1256","text":"Panagiotis Papadakos"},{"@pid":"a/AnastasiaAnalyti","text":"Anastasia Analyti"},{"@pid":"t/YannisTzitzikas","text":"Yannis Tzitzikas"}]},"title":"Radius-aware approximate blank node matching using signatures.","venue":"Knowl. Inf. Syst.","volume":"50","number":"2","pages":"505-542","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/LantzakiPAT17","doi":"10.1007/S10115-016-0945-9","ee":"https://doi.org/10.1007/s10115-016-0945-9","url":"https://dblp.org/rec/journals/kais/LantzakiPAT17"}, "url":"URL#2816337" }, { "@score":"1", "@id":"2816343", "info":{"authors":{"author":[{"@pid":"26/4644-1","text":"Chaoqun Li 0001"},{"@pid":"46/4017","text":"Liangxiao Jiang"},{"@pid":"39/5544-3","text":"Hongwei Li 0003"},{"@pid":"25/5536-1","text":"Jia Wu 0001"},{"@pid":"21/1048-1","text":"Peng Zhang 0001"}]},"title":"Toward value difference metric with attribute weighting.","venue":"Knowl. Inf. Syst.","volume":"50","number":"3","pages":"795-825","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/LiJLWZ17","doi":"10.1007/S10115-016-0960-X","ee":"https://doi.org/10.1007/s10115-016-0960-x","url":"https://dblp.org/rec/journals/kais/LiJLWZ17"}, "url":"URL#2816343" }, { "@score":"1", "@id":"2816348", "info":{"authors":{"author":[{"@pid":"125/3578","text":"Ngo Van Linh 0001"},{"@pid":"18/9407","text":"Nguyen Kim Anh"},{"@pid":"118/4726","text":"Khoat Than"},{"@pid":"194/7954","text":"Chien Nguyen Dang"}]},"title":"An effective and interpretable method for document classification.","venue":"Knowl. Inf. Syst.","volume":"50","number":"3","pages":"763-793","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/LinhATD17","doi":"10.1007/S10115-016-0956-6","ee":"https://doi.org/10.1007/s10115-016-0956-6","url":"https://dblp.org/rec/journals/kais/LinhATD17"}, "url":"URL#2816348" }, { "@score":"1", "@id":"2816350", "info":{"authors":{"author":[{"@pid":"62/8146","text":"Yanchi Liu"},{"@pid":"04/7212","text":"Chuanren Liu"},{"@pid":"131/4855","text":"Nicholas Jing Yuan"},{"@pid":"83/625","text":"Lian Duan"},{"@pid":"134/3987","text":"Yanjie Fu"},{"@pid":"x/HuiXiong","text":"Hui Xiong 0001"},{"@pid":"88/3319","text":"Songhua Xu"},{"@pid":"35/118-2","text":"Junjie Wu 0002"}]},"title":"Intelligent bus routing with heterogeneous human mobility patterns.","venue":"Knowl. Inf. Syst.","volume":"50","number":"2","pages":"383-415","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/LiuLYDFXXW17","doi":"10.1007/S10115-016-0948-6","ee":"https://doi.org/10.1007/s10115-016-0948-6","url":"https://dblp.org/rec/journals/kais/LiuLYDFXXW17"}, "url":"URL#2816350" }, { "@score":"1", "@id":"2816352", "info":{"authors":{"author":[{"@pid":"10/10649","text":"Luís Marujo"},{"@pid":"23/20-1","text":"Ricardo Ribeiro 0001"},{"@pid":"77/3882","text":"Anatole Gershman"},{"@pid":"24/190","text":"David Martins de Matos"},{"@pid":"89/10649","text":"João Paulo Neto"},{"@pid":"56/3395","text":"Jaime G. Carbonell"}]},"title":"Event-based summarization using a centrality-as-relevance model.","venue":"Knowl. Inf. Syst.","volume":"50","number":"3","pages":"945-968","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/Marujo0GMNC17","doi":"10.1007/S10115-016-0966-4","ee":"https://doi.org/10.1007/s10115-016-0966-4","url":"https://dblp.org/rec/journals/kais/Marujo0GMNC17"}, "url":"URL#2816352" }, { "@score":"1", "@id":"2816353", "info":{"authors":{"author":[{"@pid":"34/954","text":"Xiangfu Meng"},{"@pid":"14/2589","text":"Longbing Cao"},{"@pid":"63/4485","text":"Xiaoyan Zhang"},{"@pid":"153/5197","text":"Jingyu Shao"}]},"title":"Top-k coupled keyword recommendation for relational keyword queries.","venue":"Knowl. Inf. Syst.","volume":"50","number":"3","pages":"883-916","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/MengCZS17","doi":"10.1007/S10115-016-0959-3","ee":"https://doi.org/10.1007/s10115-016-0959-3","url":"https://dblp.org/rec/journals/kais/MengCZS17"}, "url":"URL#2816353" }, { "@score":"1", "@id":"2816355", "info":{"authors":{"author":[{"@pid":"163/2558","text":"Aalaa Mojahed"},{"@pid":"85/6498","text":"Beatriz de la Iglesia"}]},"title":"An adaptive version of k-medoids to deal with the uncertainty in clustering heterogeneous data using an intermediary fusion approach.","venue":"Knowl. Inf. Syst.","volume":"50","number":"1","pages":"27-52","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/MojahedI17","doi":"10.1007/S10115-016-0930-3","ee":"https://doi.org/10.1007/s10115-016-0930-3","url":"https://dblp.org/rec/journals/kais/MojahedI17"}, "url":"URL#2816355" }, { "@score":"1", "@id":"2816362", "info":{"authors":{"author":[{"@pid":"121/4329","text":"Mahsa Orang"},{"@pid":"s/NematollaahShiri","text":"Nematollaah Shiri"}]},"title":"Correlation analysis techniques for uncertain time series.","venue":"Knowl. Inf. Syst.","volume":"50","number":"1","pages":"79-116","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/OrangS17","doi":"10.1007/S10115-016-0939-7","ee":"https://doi.org/10.1007/s10115-016-0939-7","url":"https://dblp.org/rec/journals/kais/OrangS17"}, "url":"URL#2816362" }, { "@score":"1", "@id":"2816365", "info":{"authors":{"author":[{"@pid":"91/8171","text":"Shirui Pan"},{"@pid":"25/5536-1","text":"Jia Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"34/10089","text":"Guodong Long"},{"@pid":"71/964","text":"Chengqi Zhang"}]},"title":"Boosting for graph classification with universum.","venue":"Knowl. Inf. Syst.","volume":"50","number":"1","pages":"53-77","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/PanWZLZ17","doi":"10.1007/S10115-016-0934-Z","ee":"https://doi.org/10.1007/s10115-016-0934-z","url":"https://dblp.org/rec/journals/kais/PanWZLZ17"}, "url":"URL#2816365" }, { "@score":"1", "@id":"2816367", "info":{"authors":{"author":[{"@pid":"86/931","text":"Claude Pasquier"},{"@pid":"53/1920","text":"Frédéric Flouvat"},{"@pid":"116/6380","text":"Jérémy Sanhes"},{"@pid":"13/3368","text":"Nazha Selmaoui-Folcher"}]},"title":"Attributed graph mining in the presence of automorphism.","venue":"Knowl. Inf. Syst.","volume":"50","number":"2","pages":"569-584","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/PasquierFSS17","doi":"10.1007/S10115-016-0953-9","ee":"https://doi.org/10.1007/s10115-016-0953-9","url":"https://dblp.org/rec/journals/kais/PasquierFSS17"}, "url":"URL#2816367" }, { "@score":"1", "@id":"2816375", "info":{"authors":{"author":[{"@pid":"147/9382","text":"Frédéric Ros"},{"@pid":"50/2654","text":"Serge Guillaume"}]},"title":"DIDES: a fast and effective sampling for clustering algorithm.","venue":"Knowl. Inf. Syst.","volume":"50","number":"2","pages":"543-568","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/RosG17","doi":"10.1007/S10115-016-0946-8","ee":"https://doi.org/10.1007/s10115-016-0946-8","url":"https://dblp.org/rec/journals/kais/RosG17"}, "url":"URL#2816375" }, { "@score":"1", "@id":"2816378", "info":{"authors":{"author":[{"@pid":"164/6338","text":"Saber Salah"},{"@pid":"25/3618","text":"Reza Akbarinia"},{"@pid":"m/FlorentMasseglia","text":"Florent Masseglia"}]},"title":"A highly scalable parallel algorithm for maximally informative k-itemset mining.","venue":"Knowl. Inf. Syst.","volume":"50","number":"1","pages":"1-26","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/SalahAM17","doi":"10.1007/S10115-016-0931-2","ee":"https://doi.org/10.1007/s10115-016-0931-2","url":"https://dblp.org/rec/journals/kais/SalahAM17"}, "url":"URL#2816378" }, { "@score":"1", "@id":"2816381", "info":{"authors":{"author":[{"@pid":"122/8151","text":"Ozgur Sanli"},{"@pid":"97/2118","text":"Ibrahim Korpeoglu"},{"@pid":"14/4370","text":"Adnan Yazici"}]},"title":"Rule-based inference and decomposition for distributed in-network processing in wireless sensor networks.","venue":"Knowl. Inf. Syst.","volume":"50","number":"1","pages":"231-264","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/SanliKY17","doi":"10.1007/S10115-016-0942-Z","ee":"https://doi.org/10.1007/s10115-016-0942-z","url":"https://dblp.org/rec/journals/kais/SanliKY17"}, "url":"URL#2816381" }, { "@score":"1", "@id":"2816390", "info":{"authors":{"author":[{"@pid":"177/6460","text":"Jafar Tahmoresnezhad"},{"@pid":"87/5700","text":"Sattar Hashemi"}]},"title":"Visual domain adaptation via transfer feature learning.","venue":"Knowl. Inf. Syst.","volume":"50","number":"2","pages":"585-605","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/TahmoresnezhadH17","doi":"10.1007/S10115-016-0944-X","ee":"https://doi.org/10.1007/s10115-016-0944-x","url":"https://dblp.org/rec/journals/kais/TahmoresnezhadH17"}, "url":"URL#2816390" }, { "@score":"1", "@id":"2816391", "info":{"authors":{"author":[{"@pid":"43/7556","text":"Luciano H. Tamargo"},{"@pid":"90/8671","text":"Sebastian Gottifredi"},{"@pid":"92/3485","text":"Alejandro Javier García"},{"@pid":"s/GuillermoRicardoSimari","text":"Guillermo Ricardo Simari"}]},"title":"Sharing beliefs among agents with different degrees of credibility.","venue":"Knowl. Inf. Syst.","volume":"50","number":"3","pages":"999-1031","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/TamargoGGS17","doi":"10.1007/S10115-016-0964-6","ee":"https://doi.org/10.1007/s10115-016-0964-6","url":"https://dblp.org/rec/journals/kais/TamargoGGS17"}, "url":"URL#2816391" }, { "@score":"1", "@id":"2816400", "info":{"authors":{"author":[{"@pid":"56/10813","text":"Yusheng Xie"},{"@pid":"14/3744","text":"Zhengzhang Chen"},{"@pid":"37/10782","text":"Diana Palsetia"},{"@pid":"66/974","text":"Goce Trajcevski"},{"@pid":"55/5176-1","text":"Ankit Agrawal 0001"},{"@pid":"c/AlokNChoudhary","text":"Alok N. Choudhary"}]},"title":"SILVERBACK+: scalable association mining via fast list intersection for columnar social data.","venue":"Knowl. Inf. Syst.","volume":"50","number":"3","pages":"969-997","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/XieCPTAC17","doi":"10.1007/S10115-016-0962-8","ee":"https://doi.org/10.1007/s10115-016-0962-8","url":"https://dblp.org/rec/journals/kais/XieCPTAC17"}, "url":"URL#2816400" }, { "@score":"1", "@id":"2816407", "info":{"authors":{"author":[{"@pid":"130/7896","text":"Barbaros Yet"},{"@pid":"138/0257","text":"Zane B. Perkins"},{"@pid":"138/0262","text":"Nigel R. M. Tai"},{"@pid":"57/6234","text":"D. William R. Marsh"}]},"title":"Clinical evidence framework for Bayesian networks.","venue":"Knowl. Inf. Syst.","volume":"50","number":"1","pages":"117-143","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/YetPTM17","doi":"10.1007/S10115-016-0932-1","ee":"https://doi.org/10.1007/s10115-016-0932-1","url":"https://dblp.org/rec/journals/kais/YetPTM17"}, "url":"URL#2816407" }, { "@score":"1", "@id":"2816408", "info":{"authors":{"author":[{"@pid":"162/2732","text":"Abdullah Yousafzai"},{"@pid":"12/989","text":"Abdullah Gani"},{"@pid":"93/11067","text":"Rafidah Md Noor"},{"@pid":"74/10542","text":"Mehdi Sookhak"},{"@pid":"157/0070","text":"Hamid Talebian"},{"@pid":"59/3021","text":"Muhammad Shiraz"},{"@pid":"69/821","text":"Muhammad Khurram Khan"}]},"title":"Cloud resource allocation schemes: review, taxonomy, and opportunities.","venue":"Knowl. Inf. Syst.","volume":"50","number":"2","pages":"347-381","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/YousafzaiGNSTSK17","doi":"10.1007/S10115-016-0951-Y","ee":"https://doi.org/10.1007/s10115-016-0951-y","url":"https://dblp.org/rec/journals/kais/YousafzaiGNSTSK17"}, "url":"URL#2816408" }, { "@score":"1", "@id":"2816409", "info":{"authors":{"author":[{"@pid":"134/4036","text":"Linyun Yu"},{"@pid":"31/891-1","text":"Peng Cui 0001"},{"@pid":"52/3194-1","text":"Fei Wang 0001"},{"@pid":"00/7208","text":"Chaoming Song"},{"@pid":"y/ShiqiangYang","text":"Shiqiang Yang"}]},"title":"Uncovering and predicting the dynamic process of information cascades with survival model.","venue":"Knowl. Inf. Syst.","volume":"50","number":"2","pages":"633-659","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/YuC0SY17","doi":"10.1007/S10115-016-0955-7","ee":"https://doi.org/10.1007/s10115-016-0955-7","url":"https://dblp.org/rec/journals/kais/YuC0SY17"}, "url":"URL#2816409" }, { "@score":"1", "@id":"2816411", "info":{"authors":{"author":[{"@pid":"22/2000","text":"M. H. Fazel Zarandi"},{"@pid":"193/6571","text":"F. Shabany Moghadam"}]},"title":"Fuzzy knowledge-based token-ordering policies for bullwhip effect management in supply chains.","venue":"Knowl. Inf. Syst.","volume":"50","number":"2","pages":"607-631","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/ZarandiM17","doi":"10.1007/S10115-016-0954-8","ee":"https://doi.org/10.1007/s10115-016-0954-8","url":"https://dblp.org/rec/journals/kais/ZarandiM17"}, "url":"URL#2816411" }, { "@score":"1", "@id":"2816413", "info":{"authors":{"author":[{"@pid":"01/784","text":"Rong Zhu"},{"@pid":"50/6683","text":"Zhaonian Zou"},{"@pid":"18/6870-1","text":"Jianzhong Li 0001"}]},"title":"Towards efficient top-k reliability search on uncertain graphs.","venue":"Knowl. Inf. Syst.","volume":"50","number":"3","pages":"723-750","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/ZhuZL17","doi":"10.1007/S10115-016-0961-9","ee":"https://doi.org/10.1007/s10115-016-0961-9","url":"https://dblp.org/rec/journals/kais/ZhuZL17"}, "url":"URL#2816413" }, { "@score":"1", "@id":"2816415", "info":{"authors":{"author":[{"@pid":"50/6683","text":"Zhaonian Zou"},{"@pid":"01/784","text":"Rong Zhu"}]},"title":"Truss decomposition of uncertain graphs.","venue":"Knowl. Inf. Syst.","volume":"50","number":"1","pages":"197-230","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kais/ZouZ17","doi":"10.1007/S10115-016-0943-Y","ee":"https://doi.org/10.1007/s10115-016-0943-y","url":"https://dblp.org/rec/journals/kais/ZouZ17"}, "url":"URL#2816415" } ] } } } )