default search action
Int. J. Business Intelligence and Data Mining, Volume 3
Volume 3, Number 1, 2008
- Quynh H. Nguyen, Victor J. Rayward-Smith:
Internal quality measures for clustering in metric spaces. 4-29 - Yannis Marinakis, Magdalene Marinaki, Nikolaos F. Matsatsinis:
A stochastic nature inspired metaheuristic for clustering analysis. 30-44 - Nikos Pelekis, Dimitrios K. Iakovidis, Evangelos E. Kotsifakos, Ioannis Kopanakis:
Fuzzy clustering of intuitionistic fuzzy data. 45-65 - Lokesh Kumar Sharma, Simon Scheider, Willy Kloesgen, Om Prakash Vyas:
Efficient clustering technique for regionalisation of a spatial database. 66-81 - Irene Ntoutsi, Nikos Mitsou, Gerasimos Marketos:
Traffic mining in a road-network: How does the traffic flow? 82-98 - Yan-Nei Law, Carlo Zaniolo:
Improving the accuracy of continuous aggregates and mining queries on data streams under load shedding. 99-117
Volume 3, Number 2, 2008
- Ameera Jadalla, Ashraf Elnagar:
PDE4Java: Plagiarism Detection Engine for Java source code: a clustering approach. 121-135 - Chun Kit See, Kuok-Shoong Daniel Wong, Wei Lee Woon:
Text plagiarism detection method based on path patterns. 136-146 - Darenna Syahida Suib, Mustafa Mat Deris:
An efficient hierarchical clustering model for grouping web transactions. 147-157 - Alex Tze Hiang Sim, Maria Indrawan, Bala Srinivasan:
The importance of negative associations and the discovery of association rule pairs. 158-176 - Thomas Neubauer, Johannes Heurix:
Multiobjective decision support for defining secure business processes: a case study. 177-195 - Paraskevas Orfanidis, David J. Russomanno:
Preprocessing enhancements to improve data mining algorithms. 196-211 - Shu-Chuan Chu, John F. Roddick, Jeng-Shyang Pan:
Improved search strategies and extensions to k-medoids-based clustering algorithms. 212-231
Volume 3, Number 3, 2008
- Christian Stingl, Daniel Slamanig:
Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks. 236-254 - Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
How to implement multidimensional security into OLAP tools. 255-276 - Yudistira Asnar, Paolo Giorgini, Paolo Ciancarini, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone:
An evaluation of business solutions in manufacturing enterprises. 305-329 - Vincenzo De Florio, Chris Blondia:
On the requirements of new software development. 330-349
Volume 3, Number 4, 2008
- Guanghui Yan, LiSong Liu, LinNa Du, XiaXia Yang, ZhiCheng Ma, Xiao-Min Zhang:
Multifractal-based cluster hierarchy optimisation algorithm. 353-374 - You Wan, Jiaogen Zhou:
KNFCOM-T: a k-nearest features-based co-location pattern mining algorithm for large spatial data sets by using T-trees. 375-389 - Amirhossein Manzourolajdad, Mohammad Saraee, Aghafakhr Mirlohi, Abolfazl Javan:
Genome-wide efficient attribute selection for purely epistatic models via Shannon entropy. 390-408 - Weihua Xu, Wenxiu Zhang:
Knowledge reduction and matrix computation in inconsistent ordered information systems. 409-425 - He Hu, Xiaoyong Du:
A semantic analysis of Chinese radicals. 426-436 - Meng Zhang, Jiaogen Zhou, Lihua Fu, Tingting He:
Hybrid wavelet model construction using orthogonal forward selection with boosting search. 437-450
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.