Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 146 matches
- 2009
- Deepak Agarwal, Bee-Chung Chen:
Regression-based latent factor models. KDD 2009: 19-28 - Charu C. Aggarwal, Yan Li, Jianyong Wang, Jing Wang:
Frequent pattern mining with uncertain data. KDD 2009: 29-38 - Amr Ahmed, Eric P. Xing, William W. Cohen, Robert F. Murphy:
Structured correspondence topic models for mining captioned figures in biological literature. KDD 2009: 39-48 - Anurag Ambekar, Charles B. Ward, Jahangir Mohammed, Swapna Male, Steven Skiena:
Name-ethnicity classification from open sources. KDD 2009: 49-58 - Shin Ando, Einoshin Suzuki:
Detection of unique temporal segments by information theoretic meta-clustering. KDD 2009: 59-68 - Mafruz Zaman Ashrafi, See-Kiong Ng:
Collusion-resistant anonymous data collection method. KDD 2009: 69-78 - Sitaram Asur, Srinivasan Parthasarathy:
A viewpoint-based approach for interaction graph analysis. KDD 2009: 79-88 - Josh Attenberg, Sandeep Pandey, Torsten Suel:
Modeling and predicting user behavior in sponsored search. KDD 2009: 1067-1076 - Lars Backstrom, Jon M. Kleinberg, Ravi Kumar:
Optimizing web traffic via the media scheduling problem. KDD 2009: 89-98 - Ron Bekkerman, Martin Scholz, Krishnamurthy Viswanathan:
Improving clustering stability with combinatorial MRFs. KDD 2009: 99-108 - Michele Berlingerio, Fabio Pinelli, Mirco Nanni, Fosca Giannotti:
Temporal mining for interactive workflow data analysis. KDD 2009: 109-118 - Thomas Bernecker, Hans-Peter Kriegel, Matthias Renz, Florian Verhein, Andreas Züfle:
Probabilistic frequent itemset mining in uncertain databases. KDD 2009: 119-128 - Alina Beygelzimer, John Langford:
The offset tree for learning with partial labels. KDD 2009: 129-138 - Indrajit Bhattacharya, Shantanu Godbole, Ajay Gupta, Ashish Verma, Jeff Achtermann, Kevin English:
Enabling analysts in managed services for CRM analytics. KDD 2009: 1077-1086 - Albert Bifet, Geoffrey Holmes, Bernhard Pfahringer, Richard Kirkby, Ricard Gavaldà:
New ensemble methods for evolving data streams. KDD 2009: 139-148 - Christian Böhm, Katrin Haegler, Nikola S. Müller, Claudia Plant:
CoCo: coding cost for parameter-free outlier detection. KDD 2009: 149-158 - Yingyi Bu, Lei Chen, Ada Wai-Chee Fu, Dawei Liu:
Efficient anomaly monitoring over moving object trajectory streams. KDD 2009: 159-168 - Jonathan D. Chang, Jordan L. Boyd-Graber, David M. Blei:
Connections between the lines: augmenting social networks with text. KDD 2009: 169-178 - Minmin Chen, Yixin Chen, Michael R. Brent, Aaron E. Tenney:
Constrained optimization for validation-guided conditional random field learning. KDD 2009: 189-198 - Bo Chen, Wai Lam, Ivor W. Tsang, Tak-Lam Wong:
Extracting discriminative concepts for domain adaptation in text mining. KDD 2009: 179-188 - Ye Chen, Dmitry Pavlov, John F. Canny:
Large-scale behavioral targeting. KDD 2009: 209-218 - Wei Chen, Yajun Wang, Siyu Yang:
Efficient influence maximization in social networks. KDD 2009: 199-208 - Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey III, Joseph A. Tucek, Alistair C. Veitch:
Applying syntactic similarity algorithms for enterprise information management. KDD 2009: 1087-1096 - Flavio Chierichetti, Ravi Kumar, Silvio Lattanzi, Michael Mitzenmacher, Alessandro Panconesi, Prabhakar Raghavan:
On compressing social networks. KDD 2009: 219-228 - Wei Chu, Seung-Taek Park, Todd Beaupre, Nitin Motgi, Amit Phadke, Seinjuti Chakraborty, Joe Zachariah:
A case study of behavior-driven conjoint analysis on Yahoo!: front page today module. KDD 2009: 1097-1104 - Thomas Crook, Brian Frasca, Ron Kohavi, Roger Longbotham:
Seven pitfalls to avoid when running controlled experiments on the web. KDD 2009: 1105-1114 - Srivatsava Daruru, Nena M. Marin, Matt Walker, Joydeep Ghosh:
Pervasive parallelism in data mining: dataflow solution to co-clustering large and sparse Netflix data. KDD 2009: 1115-1124 - Erick Delage:
Regret-based online ranking for a growing digital library. KDD 2009: 229-238 - Hongbo Deng, Michael R. Lyu, Irwin King:
A generalized Co-HITS algorithm and its application to bipartite graphs. KDD 2009: 239-248 - Meghana Deodhar, Joydeep Ghosh:
Mining for the most certain predictions from dyadic data. KDD 2009: 249-258
skipping 116 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-03 21:54 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint