Lior Rokach

According to our database1, Lior Rokach
  • authored at least 228 papers between 2001 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Ensemble learning: A survey.
Wiley Interdisc. Rew.: Data Mining and Knowledge Discovery, 2018

Personal price aware multi-seller recommender system: Evidence from eBay.
Knowl.-Based Syst., 2018

FSCOAL - Parallel simultaneous fuzzy co-clustering and learning.
Int. J. Intell. Syst., 2018

Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
CoRR, 2018

Taxonomy of mobile users' security awareness.
Computers & Security, 2018

Identifying Informational vs. Conversational Questions on Community Question Answering Archives.
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 2018

Predict Demographic Information Using Word2vec on Spatial Trajectories.
Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization, 2018

Utilizing Sequences of Touch Gestures for User Verification on Mobile Devices.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Evaluation of a Design Method for Graph Database.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2018

2017
Wikiometrics: a Wikipedia based ranking system.
World Wide Web, 2017

Anomaly detection for smartphone data streams.
Pervasive and Mobile Computing, 2017

Personal-discount sensitivity prediction for mobile coupon conversion optimization.
JASIST, 2017

Modeling Graph Database Schema.
IT Professional, 2017

Fast-CBUS: A fast clustering-based undersampling method for addressing the class imbalance problem.
Neurocomputing, 2017

Ensembles of classifiers based on dimensionality reduction.
Intell. Data Anal., 2017

A hybrid approach for improving unsupervised fault detection for robotic systems.
Expert Syst. Appl., 2017

Predicting Relevance Scores for Triples from Type-Like Relations using Neural Embedding - The Cabbage Triple Scorer at WSDM Cup 2017.
CoRR, 2017

Sampling High Throughput Data for Anomaly Detection of Data-Base Activity.
CoRR, 2017

Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.
CoRR, 2017

MindDesktop: a general purpose brain computer interface.
CoRR, 2017

Inferring Contextual Preferences Using Deep Auto-Encoding.
Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, 2017

User Verification on Mobile Devices Using Sequences of Touch Gestures.
Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, 2017

Scholarly Digital Libraries as a Platform for Malware Distribution.
Proceedings of the A Systems Approach to Cyber Security, 2017

Session-Based Recommendations Using Item Embedding.
Proceedings of the 22nd International Conference on Intelligent User Interfaces, 2017

User Feedback Analysis for Mobile Malware Detection.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Anytime Algorithms for Recommendation Service Providers.
ACM TIST, 2016

Behavioral Study of Users When Interacting with Active Honeytokens.
ACM Trans. Inf. Syst. Secur., 2016

Mobile security and privacy: Advances, challenges and future research directions.
Pervasive and Mobile Computing, 2016

Towards latent context-aware recommendation systems.
Knowl.-Based Syst., 2016

Utilizing transfer learning for in-domain collaborative filtering.
Knowl.-Based Syst., 2016

Recommender systems for product bundling.
Knowl.-Based Syst., 2016

ALDROID: efficient update of Android anti-virus software using designated active learning methods.
Knowl. Inf. Syst., 2016

Leveraging metadata to recommend keywords for academic papers.
JASIST, 2016

XML-AD: Detecting anomalous patterns in XML documents.
Inf. Sci., 2016

Decision forest: Twenty years of research.
Information Fusion, 2016

Matching entities across online social networks.
Neurocomputing, 2016

Reducing preference elicitation in group decision making.
Expert Syst. Appl., 2016

SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods.
Expert Syst. Appl., 2016

An ensemble method for top-N recommendations from the SVD.
Expert Syst. Appl., 2016

Virtual Breathalyzer.
CoRR, 2016

Language Models with GloVe Word Embeddings.
CoRR, 2016

Wikiometrics: A Wikipedia Based Ranking System.
CoRR, 2016

Unsupervised Commonsense Knowledge Enrichment for Domain-Specific Sentiment Analysis.
Cognitive Computation, 2016

Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis.
Proceedings of the 2016 IEEE International Conference on Software Science, 2016

Deep Auto-Encoding for Context-Aware Inference of Preferred Items' Categories.
Proceedings of the Poster Track of the 10th ACM Conference on Recommender Systems (RecSys 2016), 2016

RecSys'16 Workshop on Deep Learning for Recommender Systems (DLRS).
Proceedings of the 10th ACM Conference on Recommender Systems, 2016

CyberRank: Knowledge Elicitation for Risk Assessment of Database Security.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

Scalable attack propagation model and algorithms for honeypot systems.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

Publishing Differentially Private Medical Events Data.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
Recommender Systems: Introduction and Challenges.
Proceedings of the Recommender Systems Handbook, 2015

A classifier to determine which Wikipedia biographies will be accepted.
JASIST, 2015

Fast and space-efficient shapelets-based time-series classification.
Intell. Data Anal., 2015

Local-shapelets for fast classification of spectrographic measurements.
Expert Syst. Appl., 2015

The Importance of Pronouns to Sentiment Analysis: Online Cancer Survivor Network Case Study.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015

In-House Solution for the RecSys Challenge 2015.
Proceedings of the 2015 International ACM Recommender Systems Challenge, 2015

"Please, Not Now!": A Model for Timing Recommendations.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015

RecSys Challenge 2015 and the YOOCHOOSE Dataset.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015

Recommender Systems for Product Bundling.
Proceedings of the Poster Proceedings of the 9th ACM Conference on Recommender Systems, 2015

pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Theoretical Categorization of Query Performance Predictors.
Proceedings of the 2015 International Conference on The Theory of Information Retrieval, 2015

Fast Item-Based Collaborative Filtering.
Proceedings of the ICAART 2015, 2015

Unknown malware detection using network traffic classification.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Data Mining with Decision Trees - Theory and Applications. 2nd Edition
Series in Machine Perception and Artificial Intelligence 81, WorldScientific, ISBN: 978-981-4590-09-9, 2014

Proactive Data Mining with Decision Trees
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-1-4939-0539-3, 2014

Adapted Features and Instance Selection for Improving Co-training.
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014

Survival Analysis of Automobile Components Using Mutually Exclusive Forests.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2014

OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage.
IEEE Trans. Knowl. Data Eng., 2014

ConfDTree: A Statistical Method for Improving Decision Trees.
J. Comput. Sci. Technol., 2014

Reaching a joint decision with minimal elicitation of voter preferences.
Inf. Sci., 2014

Ensemble methods for multi-label classification.
Expert Syst. Appl., 2014

Novel active learning methods for enhanced PC malware detection in windows OS.
Expert Syst. Appl., 2014

Matching Entities Across Online Social Networks.
CoRR, 2014

Reaction to New Security Threat Class.
CoRR, 2014

Mobile malware detection through analysis of deviations in application network behavior.
Computers & Security, 2014

Wikipedia-based query performance prediction.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014

Preference elicitation for narrowing the recommended list for groups.
Proceedings of the Eighth ACM Conference on Recommender Systems, 2014

Contexto: lessons learned from mobile context inference.
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, 2014

Preference Elicitation for Group Decisions.
Proceedings of the Group Decision and Negotiation. A Process-Oriented View, 2014

Dependency Tree-Based Rules for Concept-Level Aspect-Based Sentiment Analysis.
Proceedings of the Semantic Web Evaluation Challenge, 2014

Unsupervised Fine-Grained Sentiment Analysis System Using Lexicons and Concepts.
Proceedings of the Semantic Web Evaluation Challenge, 2014

Methodology for Connecting Nouns to Their Modifying Adjectives.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2014

A hybrid approach for fault detection in autonomous physical agents.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

2013
Facebook single and cross domain data for recommendation systems.
User Model. User-Adapt. Interact., 2013

Optimizing Data Misuse Detection.
TKDD, 2013

Computationally efficient link prediction in a variety of social networks.
ACM TIST, 2013

Exploiting label dependencies for improved sample complexity.
Machine Learning, 2013

Investigating confidence displays for top-N recommendations.
JASIST, 2013

Parsimonious citer-based measures: The artificial intelligence domain as a case study.
JASIST, 2013

The CASH algorithm-cost-sensitive attribute selection using histograms.
Inf. Sci., 2013

Guest editorial: Special issue on data mining for information security.
Inf. Sci., 2013

A GIS-based decision support system for hotel room rate estimation and temporal price prediction: The hotel brokers' context.
Decision Support Systems, 2013

Ensembles of Classifiers based on Dimensionality Reduction
CoRR, 2013

Transfer Learning for Content-Based Recommender Systems using Tree Matching
CoRR, 2013

Ensemble Methods for Multi-label Classification.
CoRR, 2013

Highlighting items as means of adaptive assistance.
Behaviour & IT, 2013

Improving Sentiment Analysis in an Online Cancer Survivor Community Using Dynamic Sentiment Lexicon.
Proceedings of the 2013 International Conference on Social Intelligence and Technology, 2013

Entity Matching in Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Recommending insurance riders.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Using geospatial metadata to boost collaborative filtering.
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013

Leveraging the citation graph to recommend keywords.
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013

Ensemble of Feature Chains for Anomaly Detection.
Proceedings of the Multiple Classifier Systems, 11th International Workshop, 2013

Improving Simple Collaborative Filtering Models Using Ensemble Methods.
Proceedings of the Multiple Classifier Systems, 11th International Workshop, 2013

A figure search engine architecture for a chemistry digital library.
Proceedings of the 13th ACM/IEEE-CS Joint Conference on Digital Libraries, 2013

Machine-Learning-Based Circuit Synthesis.
Proceedings of the IJCAI 2013, 2013

Linking Motif Sequences with Tale Types by Machine Learning.
Proceedings of the 2013 Workshop on Computational Models of Narrative, 2013

Combining one-class classifiers via meta learning.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2013 international workshop on computational scientometrics: theory and applications.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

A fast and scalable method for threat detection in large-scale DNS logs.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

IP2User - Identifying the Username of an IP Address in Network-Related Events.
Proceedings of the IEEE International Congress on Big Data, 2013

Sensor fault detection and diagnosis for autonomous systems.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Transfer Learning for Content-Based Recommender Systems Using Tree Matching.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

2012
A Survey of Data Leakage Detection and Prevention Solutions.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-2053-8, 2012

User Authentication Based on Representative Users.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012

Initial Profile Generation in Recommender Systems Using Pairwise Comparison.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012

Attribute-Driven Hidden Markov Model Trees for Intention Prediction.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012

M-Score: A Misuseability Weight Measure.
IEEE Trans. Dependable Sec. Comput., 2012

Detecting unknown computer worm activity via support vector machines and active learning.
Pattern Anal. Appl., 2012

Mal-ID: Automatic Malware Detection Using Common Segment Analysis and Meta-Features.
Journal of Machine Learning Research, 2012

Automatic discovery of the root causes for quality drift in high dimensionality manufacturing processes.
J. Intelligent Manufacturing, 2012

Applying the Publication Power Approach to Artificial Intelligence Journals.
JASIST, 2012

Limiting disclosure of sensitive data in sequential releases of databases.
Inf. Sci., 2012

User identity verification via mouse dynamics.
Inf. Sci., 2012

k-anonymised reducts.
IJGCRSIS, 2012

Social Network Based Search for Experts
CoRR, 2012

Using Wikipedia to Boost SVD Recommender Systems
CoRR, 2012

Boosting Simple Collaborative Filtering Models Using Ensemble Methods
CoRR, 2012

Fast Randomized Model Generation for Shapelet-Based Time Series Classification
CoRR, 2012

Securing Your Transactions: Detecting Anomalous Patterns In XML Documents
CoRR, 2012

Detection of Deviations in Mobile Applications Network Behavior
CoRR, 2012

Diffusion Ensemble Classifiers.
Proceedings of the IJCCI 2012 - Proceedings of the 4th International Joint Conference on Computational Intelligence, Barcelona, Spain, 5, 2012

ConfDTree: Improving Decision Trees Using Confidence Intervals.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

An Exploration of Research Directions in Machine Ensemble Theory and Applications.
Proceedings of the 20th European Symposium on Artificial Neural Networks, 2012

Introducing diversity among the models of multi-label classification ensemble.
Proceedings of the 20th European Symposium on Artificial Neural Networks, 2012

TALMUD: transfer learning for multiple domains.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Recommending citations: translating papers into references.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Predicting Student Exam's Scores by Analyzing Social Network Data.
Proceedings of the Active Media Technology - 8th International Conference, 2012

2011
Introduction to Recommender Systems Handbook.
Proceedings of the Recommender Systems Handbook, 2011

Who is going to win the next Association for the Advancement of Artificial Intelligence Fellowship Award? Evaluating researchers by mining bibliographic data.
JASIST, 2011

Combining One-Class Classifiers via Meta-Learning
CoRR, 2011

Link Prediction in Social Networks Using Computationally Efficient Topological Features.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Using Wikipedia to boost collaborative filtering techniques.
Proceedings of the 2011 ACM Conference on Recommender Systems, 2011

Recommenders benchmark framework.
Proceedings of the 2011 ACM Conference on Recommender Systems, 2011

Eliciting domain expert misuseability conceptions.
Proceedings of the 6th International Conference on Knowledge Capture (K-CAP 2011), 2011

Dynamic Sensitivity-Based Access Control.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

HoneyGen: An automated honeytokens generator.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Recommenders Benchmark Framework.
Proceedings of the 11th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS 2011), 2011

MindDesktop - Computer Accessibility for Severely Handicapped.
Proceedings of the ICEIS 2011, 2011

Developing a Price Management Decision Support System for Hotel Brokers using Free and Open Source Tools.
Proceedings of the ICEIS 2011, 2011

Meta-learning for Selecting a Multi-label Classification Algorithm.
Proceedings of the Data Mining Workshops (ICDMW), 2011

Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Data Mining using Decomposition Methods.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Classification Trees.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Supervised Learning.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Ensemble Methods in Supervised Learning.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Using Fuzzy Logic in Data Mining.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

A survey of Clustering Algorithms.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Introduction to Knowledge Discovery and Data Mining.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Auto-Sign: an automatic signature generator for high-speed malware filtering devices.
Journal in Computer Virology, 2010

Efficient Multidimensional Suppression for K-Anonymity.
IEEE Trans. Knowl. Data Eng., 2010

Privacy-preserving data mining: A feature set partitioning approach.
Inf. Sci., 2010

Ensemble-based classifiers.
Artif. Intell. Rev., 2010

Analyzing Group Communication for Preventing Accidental Data Leakage via Email.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010

Iterative voting under uncertainty for group recommender systems.
Proceedings of the 2010 ACM Conference on Recommender Systems, 2010

Cost-Sensitive Detection of Malicious Applications in Mobile Devices.
Proceedings of the Mobile Computing, Applications, and Services, 2010

A Decision Tree Based Recommender System.
Proceedings of the 10th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS), 2010

GEO-SPADE - A Generic Google Earth-based Framework for Analyzing and Exploring Spatio-temporal Data.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 5, HCI, Funchal, Madeira, Portugal, June 8, 2010

Developing Analytical GIS Applications with GEO-SPADE: Three Success Case Studies.
Proceedings of the Enterprise Information Systems - 12th International Conference, 2010

k-Anonymized Reducts.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

Continuous Verification Using Keystroke Dynamics.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

A Novel Approach to Mining Travel Sequences Using Collections of Geotagged Photos.
Proceedings of the Geospatial Thinking, 2010

2009
Pattern Classification Using Ensemble Methods
Series in Machine Perception and Artificial Intelligence 75, WorldScientific, ISBN: 978-981-4468-31-2, 2009

Data Mining for Improving Manufacturing Processes.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

A Survey of Feature Selection Techniques.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Incorporating Fuzzy Logic in Data Mining Tasks.
Proceedings of the Encyclopedia of Artificial Intelligence (3 Volumes), 2009

Troika - An improved stacking schema for classification tasks.
Inf. Sci., 2009

Taxonomy for characterizing ensemble methods in classification tasks: A review and annotated bibliography.
Computational Statistics & Data Analysis, 2009

Collective-agreement-based pruning of ensembles.
Computational Statistics & Data Analysis, 2009

Improving malware detection by applying multi-inducer ensemble.
Computational Statistics & Data Analysis, 2009

Active learning using pessimistic expectation estimators.
Control and Cybernetics, 2009

Ensemble methods for improving the performance of neighborhood-based collaborative filtering.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009

Identity theft, computers and behavioral biometrics.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Random Projection Ensemble Classifiers.
Proceedings of the Enterprise Information Systems, 11th International Conference, 2009

An Overview of IDS Using Anomaly Detection.
Proceedings of the Database Technologies: Concepts, 2009

2008
The Role of Fuzzy Sets in Data Mining.
Proceedings of the Soft Computing for Knowledge Discovery and Data Mining, 2008

Introduction to Soft Computing for Knowledge Discovery and Data Mining.
Proceedings of the Soft Computing for Knowledge Discovery and Data Mining, 2008

Genetic algorithm-based feature set partitioning for classification problems.
Pattern Recognition, 2008

Mining manufacturing databases to discover the effect of operation sequence on the product quality.
J. Intelligent Manufacturing, 2008

Negation recognition in medical narrative reports.
Inf. Retr., 2008

Mining manufacturing data using genetic algorithm-based feature set decomposition.
IJISTA, 2008

An evolutionary algorithm for constructing a decision forest: Combining the classification of disjoints decision trees.
Int. J. Intell. Syst., 2008

Pessimistic cost-sensitive active learning of decision trees for profit maximizing targeting campaigns.
Data Min. Knowl. Discov., 2008

Detection of unknown computer worms based on behavioral classification of the host.
Computational Statistics & Data Analysis, 2008

kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity.
Proceedings of the Protecting Persons While Protecting the People, 2008

Anytime AHP Method for Preferences Elicitation in Stereotype-Based Recommender System.
Proceedings of the ICEIS 2008, 2008

2007
Data Mining with Decision Trees - Theory and Applications
Series in Machine Perception and Artificial Intelligence 69, WorldScientific, ISBN: 978-981-4474-18-4, 2007

Decision-tree instance-space decomposition with grouped gain-ratio.
Inf. Sci., 2007

A Methodology for Improving the Performance of Non-Ranker Feature Selection Filters.
IJPRAI, 2007

Establishing User Profiles in the MediaScout Recommender System.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

Recommender System from Personal Social Networks.
Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007

2006
A Decision Tree Framework for Semi-Automatic Extraction of Product Attributes from the Web.
Proceedings of the Advances in Web Intelligence and Data Mining, 2006

Feature Selection by Combining Multiple Methods.
Proceedings of the Advances in Web Intelligence and Data Mining, 2006

A Decision-Tree Framework for Instance-space Decomposition.
Proceedings of the Advances in Web Intelligence and Data Mining, 2006

Classifier evaluation under limited resources.
Pattern Recognition Letters, 2006

Decomposition methodology for classification tasks: a meta decomposer framework.
Pattern Anal. Appl., 2006

Data Mining for Improving the Quality of Manufacturing: A Feature Set Decomposition Approach.
J. Intelligent Manufacturing, 2006

Selective Voting - Getting More for Less in Sensor Fusion.
IJPRAI, 2006

Automatic Discovery of Regular Expression Patterns Representing Negated Findings in Medical Narrative Reports.
Proceedings of the Next Generation Information Technologies and Systems, 2006

Automatic Identification of Negated Concepts in Narrative Clinical Reports.
Proceedings of the ICEIS 2006, 2006

Cascaded Data Mining Methods for Text Understanding, with medical case study.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

2005
Decomposition Methodology for Knowledge Discovery and Data Mining - Theory and Applications
Series in Machine Perception and Artificial Intelligence 61, WorldScientific, ISBN: 978-981-256-079-7, 2005

Top-down induction of decision trees classifiers - a survey.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2005

Improving Supervised Learning by Sample Decomposition.
International Journal of Computational Intelligence and Applications, 2005

Feature set decomposition for decision trees.
Intell. Data Anal., 2005

Decomposition methodology for classification tasks.
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005

Clustering Methods.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

Decision Trees.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

Ensemble Methods for Classifiers.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

Decomposition Methodology for Knowledge Discovery and Data Mining.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

Introduction to Supervised Methods.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

Introduction to Knowledge Discovery in Databases.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

2004
Context-Sensitive Medical Information Retrieval.
Proceedings of the MEDINFO 2004, 2004

Information Retrieval System for Medical Narrative Reports.
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004

2003
Space Decomposition in Data Mining: A Clustering Approach.
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003

2002
Improving Supervised Learning by Feature Decomposition.
Proceedings of the Foundations of Information and Knowledge Systems, 2002

2001
Theory and Applications of Attribute Decomposition.
Proceedings of the 2001 IEEE International Conference on Data Mining, 29 November, 2001


  Loading...