Lior Rokach
According to our database1, Lior Rokach
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Homepages:
-
at dl.acm.org
On csauthors.net:
Bibliography
2018
Taxonomy of mobile users' security awareness.
Computers & Security, 2018
Identifying Informational vs. Conversational Questions on Community Question Answering Archives.
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 2018
2017
Wikiometrics: a Wikipedia based ranking system.
World Wide Web, 2017
Anomaly detection for smartphone data streams.
Pervasive and Mobile Computing, 2017
Personal-discount sensitivity prediction for mobile coupon conversion optimization.
JASIST, 2017
Modeling Graph Database Schema.
IT Professional, 2017
Fast-CBUS: A fast clustering-based undersampling method for addressing the class imbalance problem.
Neurocomputing, 2017
Ensembles of classifiers based on dimensionality reduction.
Intell. Data Anal., 2017
A hybrid approach for improving unsupervised fault detection for robotic systems.
Expert Syst. Appl., 2017
Predicting Relevance Scores for Triples from Type-Like Relations using Neural Embedding - The Cabbage Triple Scorer at WSDM Cup 2017.
CoRR, 2017
Sampling High Throughput Data for Anomaly Detection of Data-Base Activity.
CoRR, 2017
Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.
CoRR, 2017
MindDesktop: a general purpose brain computer interface.
CoRR, 2017
Inferring Contextual Preferences Using Deep Auto-Encoding.
Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, 2017
User Verification on Mobile Devices Using Sequences of Touch Gestures.
Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, 2017
Scholarly Digital Libraries as a Platform for Malware Distribution.
Proceedings of the A Systems Approach to Cyber Security, 2017
Session-Based Recommendations Using Item Embedding.
Proceedings of the 22nd International Conference on Intelligent User Interfaces, 2017
User Feedback Analysis for Mobile Malware Detection.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
2016
Anytime Algorithms for Recommendation Service Providers.
ACM TIST, 2016
Behavioral Study of Users When Interacting with Active Honeytokens.
ACM Trans. Inf. Syst. Secur., 2016
Mobile security and privacy: Advances, challenges and future research directions.
Pervasive and Mobile Computing, 2016
Towards latent context-aware recommendation systems.
Knowl.-Based Syst., 2016
Utilizing transfer learning for in-domain collaborative filtering.
Knowl.-Based Syst., 2016
Recommender systems for product bundling.
Knowl.-Based Syst., 2016
ALDROID: efficient update of Android anti-virus software using designated active learning methods.
Knowl. Inf. Syst., 2016
Leveraging metadata to recommend keywords for academic papers.
JASIST, 2016
XML-AD: Detecting anomalous patterns in XML documents.
Inf. Sci., 2016
Decision forest: Twenty years of research.
Information Fusion, 2016
Matching entities across online social networks.
Neurocomputing, 2016
Reducing preference elicitation in group decision making.
Expert Syst. Appl., 2016
SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods.
Expert Syst. Appl., 2016
An ensemble method for top-N recommendations from the SVD.
Expert Syst. Appl., 2016
Virtual Breathalyzer.
CoRR, 2016
Language Models with GloVe Word Embeddings.
CoRR, 2016
Wikiometrics: A Wikipedia Based Ranking System.
CoRR, 2016
Unsupervised Commonsense Knowledge Enrichment for Domain-Specific Sentiment Analysis.
Cognitive Computation, 2016
Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis.
Proceedings of the 2016 IEEE International Conference on Software Science, 2016
Deep Auto-Encoding for Context-Aware Inference of Preferred Items' Categories.
Proceedings of the Poster Track of the 10th ACM Conference on Recommender Systems (RecSys 2016), 2016
RecSys'16 Workshop on Deep Learning for Recommender Systems (DLRS).
Proceedings of the 10th ACM Conference on Recommender Systems, 2016
CyberRank: Knowledge Elicitation for Risk Assessment of Database Security.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016
Scalable attack propagation model and algorithms for honeypot systems.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016
Publishing Differentially Private Medical Events Data.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016
2015
Recommender Systems: Introduction and Challenges.
Proceedings of the Recommender Systems Handbook, 2015
A classifier to determine which Wikipedia biographies will be accepted.
JASIST, 2015
Fast and space-efficient shapelets-based time-series classification.
Intell. Data Anal., 2015
Local-shapelets for fast classification of spectrographic measurements.
Expert Syst. Appl., 2015
The Importance of Pronouns to Sentiment Analysis: Online Cancer Survivor Network Case Study.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015
In-House Solution for the RecSys Challenge 2015.
Proceedings of the 2015 International ACM Recommender Systems Challenge, 2015
"Please, Not Now!": A Model for Timing Recommendations.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015
RecSys Challenge 2015 and the YOOCHOOSE Dataset.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015
Recommender Systems for Product Bundling.
Proceedings of the Poster Proceedings of the 9th ACM Conference on Recommender Systems, 2015
pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015
Theoretical Categorization of Query Performance Predictors.
Proceedings of the 2015 International Conference on The Theory of Information Retrieval, 2015
Fast Item-Based Collaborative Filtering.
Proceedings of the ICAART 2015, 2015
Unknown malware detection using network traffic classification.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Data Mining with Decision Trees - Theory and Applications. 2nd Edition
Series in Machine Perception and Artificial Intelligence 81, WorldScientific, ISBN: 978-981-4590-09-9, 2014
Proactive Data Mining with Decision Trees
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-1-4939-0539-3, 2014
Adapted Features and Instance Selection for Improving Co-training.
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014
Survival Analysis of Automobile Components Using Mutually Exclusive Forests.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2014
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage.
IEEE Trans. Knowl. Data Eng., 2014
ConfDTree: A Statistical Method for Improving Decision Trees.
J. Comput. Sci. Technol., 2014
Reaching a joint decision with minimal elicitation of voter preferences.
Inf. Sci., 2014
Ensemble methods for multi-label classification.
Expert Syst. Appl., 2014
Novel active learning methods for enhanced PC malware detection in windows OS.
Expert Syst. Appl., 2014
Matching Entities Across Online Social Networks.
CoRR, 2014
Reaction to New Security Threat Class.
CoRR, 2014
Mobile malware detection through analysis of deviations in application network behavior.
Computers & Security, 2014
Wikipedia-based query performance prediction.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014
Preference elicitation for narrowing the recommended list for groups.
Proceedings of the Eighth ACM Conference on Recommender Systems, 2014
Contexto: lessons learned from mobile context inference.
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, 2014
Preference Elicitation for Group Decisions.
Proceedings of the Group Decision and Negotiation. A Process-Oriented View, 2014
Dependency Tree-Based Rules for Concept-Level Aspect-Based Sentiment Analysis.
Proceedings of the Semantic Web Evaluation Challenge, 2014
Unsupervised Fine-Grained Sentiment Analysis System Using Lexicons and Concepts.
Proceedings of the Semantic Web Evaluation Challenge, 2014
Methodology for Connecting Nouns to Their Modifying Adjectives.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2014
A hybrid approach for fault detection in autonomous physical agents.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014
2013
Facebook single and cross domain data for recommendation systems.
User Model. User-Adapt. Interact., 2013
Optimizing Data Misuse Detection.
TKDD, 2013
Computationally efficient link prediction in a variety of social networks.
ACM TIST, 2013
Exploiting label dependencies for improved sample complexity.
Machine Learning, 2013
Investigating confidence displays for top-N recommendations.
JASIST, 2013
Parsimonious citer-based measures: The artificial intelligence domain as a case study.
JASIST, 2013
The CASH algorithm-cost-sensitive attribute selection using histograms.
Inf. Sci., 2013
Guest editorial: Special issue on data mining for information security.
Inf. Sci., 2013
A GIS-based decision support system for hotel room rate estimation and temporal price prediction: The hotel brokers' context.
Decision Support Systems, 2013
Ensembles of Classifiers based on Dimensionality Reduction
CoRR, 2013
Transfer Learning for Content-Based Recommender Systems using Tree Matching
CoRR, 2013
Ensemble Methods for Multi-label Classification.
CoRR, 2013
Highlighting items as means of adaptive assistance.
Behaviour & IT, 2013
Improving Sentiment Analysis in an Online Cancer Survivor Community Using Dynamic Sentiment Lexicon.
Proceedings of the 2013 International Conference on Social Intelligence and Technology, 2013
Entity Matching in Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013
Recommending insurance riders.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Using geospatial metadata to boost collaborative filtering.
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013
Leveraging the citation graph to recommend keywords.
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013
Ensemble of Feature Chains for Anomaly Detection.
Proceedings of the Multiple Classifier Systems, 11th International Workshop, 2013
Improving Simple Collaborative Filtering Models Using Ensemble Methods.
Proceedings of the Multiple Classifier Systems, 11th International Workshop, 2013
A figure search engine architecture for a chemistry digital library.
Proceedings of the 13th ACM/IEEE-CS Joint Conference on Digital Libraries, 2013
Machine-Learning-Based Circuit Synthesis.
Proceedings of the IJCAI 2013, 2013
Linking Motif Sequences with Tale Types by Machine Learning.
Proceedings of the 2013 Workshop on Computational Models of Narrative, 2013
Combining one-class classifiers via meta learning.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
2013 international workshop on computational scientometrics: theory and applications.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
A fast and scalable method for threat detection in large-scale DNS logs.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013
IP2User - Identifying the Username of an IP Address in Network-Related Events.
Proceedings of the IEEE International Congress on Big Data, 2013
Sensor fault detection and diagnosis for autonomous systems.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013
Transfer Learning for Content-Based Recommender Systems Using Tree Matching.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013
2012
A Survey of Data Leakage Detection and Prevention Solutions.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-2053-8, 2012
User Authentication Based on Representative Users.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012
Initial Profile Generation in Recommender Systems Using Pairwise Comparison.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012
Attribute-Driven Hidden Markov Model Trees for Intention Prediction.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012
M-Score: A Misuseability Weight Measure.
IEEE Trans. Dependable Sec. Comput., 2012
Detecting unknown computer worm activity via support vector machines and active learning.
Pattern Anal. Appl., 2012
Mal-ID: Automatic Malware Detection Using Common Segment Analysis and Meta-Features.
Journal of Machine Learning Research, 2012
Automatic discovery of the root causes for quality drift in high dimensionality manufacturing processes.
J. Intelligent Manufacturing, 2012
Applying the Publication Power Approach to Artificial Intelligence Journals.
JASIST, 2012
Limiting disclosure of sensitive data in sequential releases of databases.
Inf. Sci., 2012
User identity verification via mouse dynamics.
Inf. Sci., 2012
k-anonymised reducts.
IJGCRSIS, 2012
Social Network Based Search for Experts
CoRR, 2012
Using Wikipedia to Boost SVD Recommender Systems
CoRR, 2012
Boosting Simple Collaborative Filtering Models Using Ensemble Methods
CoRR, 2012
Fast Randomized Model Generation for Shapelet-Based Time Series Classification
CoRR, 2012
Securing Your Transactions: Detecting Anomalous Patterns In XML Documents
CoRR, 2012
Detection of Deviations in Mobile Applications Network Behavior
CoRR, 2012
Diffusion Ensemble Classifiers.
Proceedings of the IJCCI 2012 - Proceedings of the 4th International Joint Conference on Computational Intelligence, Barcelona, Spain, 5, 2012
ConfDTree: Improving Decision Trees Using Confidence Intervals.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
An Exploration of Research Directions in Machine Ensemble Theory and Applications.
Proceedings of the 20th European Symposium on Artificial Neural Networks, 2012
Introducing diversity among the models of multi-label classification ensemble.
Proceedings of the 20th European Symposium on Artificial Neural Networks, 2012
TALMUD: transfer learning for multiple domains.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
Recommending citations: translating papers into references.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
Predicting Student Exam's Scores by Analyzing Social Network Data.
Proceedings of the Active Media Technology - 8th International Conference, 2012
2011
Introduction to Recommender Systems Handbook.
Proceedings of the Recommender Systems Handbook, 2011
Who is going to win the next Association for the Advancement of Artificial Intelligence Fellowship Award? Evaluating researchers by mining bibliographic data.
JASIST, 2011
Combining One-Class Classifiers via Meta-Learning
CoRR, 2011
Link Prediction in Social Networks Using Computationally Efficient Topological Features.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Using Wikipedia to boost collaborative filtering techniques.
Proceedings of the 2011 ACM Conference on Recommender Systems, 2011
Recommenders benchmark framework.
Proceedings of the 2011 ACM Conference on Recommender Systems, 2011
Eliciting domain expert misuseability conceptions.
Proceedings of the 6th International Conference on Knowledge Capture (K-CAP 2011), 2011
Dynamic Sensitivity-Based Access Control.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
HoneyGen: An automated honeytokens generator.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Recommenders Benchmark Framework.
Proceedings of the 11th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS 2011), 2011
MindDesktop - Computer Accessibility for Severely Handicapped.
Proceedings of the ICEIS 2011, 2011
Developing a Price Management Decision Support System for Hotel Brokers using Free and Open Source Tools.
Proceedings of the ICEIS 2011, 2011
Meta-learning for Selecting a Multi-label Classification Algorithm.
Proceedings of the Data Mining Workshops (ICDMW), 2011
Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Data Mining using Decomposition Methods.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Classification Trees.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Supervised Learning.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Ensemble Methods in Supervised Learning.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Using Fuzzy Logic in Data Mining.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
A survey of Clustering Algorithms.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Introduction to Knowledge Discovery and Data Mining.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Auto-Sign: an automatic signature generator for high-speed malware filtering devices.
Journal in Computer Virology, 2010
Efficient Multidimensional Suppression for K-Anonymity.
IEEE Trans. Knowl. Data Eng., 2010
Privacy-preserving data mining: A feature set partitioning approach.
Inf. Sci., 2010
Ensemble-based classifiers.
Artif. Intell. Rev., 2010
Analyzing Group Communication for Preventing Accidental Data Leakage via Email.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010
Iterative voting under uncertainty for group recommender systems.
Proceedings of the 2010 ACM Conference on Recommender Systems, 2010
Cost-Sensitive Detection of Malicious Applications in Mobile Devices.
Proceedings of the Mobile Computing, Applications, and Services, 2010
A Decision Tree Based Recommender System.
Proceedings of the 10th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS), 2010
GEO-SPADE - A Generic Google Earth-based Framework for Analyzing and Exploring Spatio-temporal Data.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 5, HCI, Funchal, Madeira, Portugal, June 8, 2010
Developing Analytical GIS Applications with GEO-SPADE: Three Success Case Studies.
Proceedings of the Enterprise Information Systems - 12th International Conference, 2010
k-Anonymized Reducts.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010
Continuous Verification Using Keystroke Dynamics.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
A Novel Approach to Mining Travel Sequences Using Collections of Geotagged Photos.
Proceedings of the Geospatial Thinking, 2010
2009
Pattern Classification Using Ensemble Methods
Series in Machine Perception and Artificial Intelligence 75, WorldScientific, ISBN: 978-981-4468-31-2, 2009
Data Mining for Improving Manufacturing Processes.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009
A Survey of Feature Selection Techniques.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009
Incorporating Fuzzy Logic in Data Mining Tasks.
Proceedings of the Encyclopedia of Artificial Intelligence (3 Volumes), 2009
Troika - An improved stacking schema for classification tasks.
Inf. Sci., 2009
Taxonomy for characterizing ensemble methods in classification tasks: A review and annotated bibliography.
Computational Statistics & Data Analysis, 2009
Collective-agreement-based pruning of ensembles.
Computational Statistics & Data Analysis, 2009
Improving malware detection by applying multi-inducer ensemble.
Computational Statistics & Data Analysis, 2009
Active learning using pessimistic expectation estimators.
Control and Cybernetics, 2009
Ensemble methods for improving the performance of neighborhood-based collaborative filtering.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009
Identity theft, computers and behavioral biometrics.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Random Projection Ensemble Classifiers.
Proceedings of the Enterprise Information Systems, 11th International Conference, 2009
An Overview of IDS Using Anomaly Detection.
Proceedings of the Database Technologies: Concepts, 2009
2008
The Role of Fuzzy Sets in Data Mining.
Proceedings of the Soft Computing for Knowledge Discovery and Data Mining, 2008
Introduction to Soft Computing for Knowledge Discovery and Data Mining.
Proceedings of the Soft Computing for Knowledge Discovery and Data Mining, 2008
Genetic algorithm-based feature set partitioning for classification problems.
Pattern Recognition, 2008
Mining manufacturing databases to discover the effect of operation sequence on the product quality.
J. Intelligent Manufacturing, 2008
Negation recognition in medical narrative reports.
Inf. Retr., 2008
Mining manufacturing data using genetic algorithm-based feature set decomposition.
IJISTA, 2008
An evolutionary algorithm for constructing a decision forest: Combining the classification of disjoints decision trees.
Int. J. Intell. Syst., 2008
Pessimistic cost-sensitive active learning of decision trees for profit maximizing targeting campaigns.
Data Min. Knowl. Discov., 2008
Detection of unknown computer worms based on behavioral classification of the host.
Computational Statistics & Data Analysis, 2008
kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity.
Proceedings of the Protecting Persons While Protecting the People, 2008
Anytime AHP Method for Preferences Elicitation in Stereotype-Based Recommender System.
Proceedings of the ICEIS 2008, 2008
2007
Data Mining with Decision Trees - Theory and Applications
Series in Machine Perception and Artificial Intelligence 69, WorldScientific, ISBN: 978-981-4474-18-4, 2007
Decision-tree instance-space decomposition with grouped gain-ratio.
Inf. Sci., 2007
A Methodology for Improving the Performance of Non-Ranker Feature Selection Filters.
IJPRAI, 2007
Establishing User Profiles in the MediaScout Recommender System.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007
Recommender System from Personal Social Networks.
Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007
2006
A Decision Tree Framework for Semi-Automatic Extraction of Product Attributes from the Web.
Proceedings of the Advances in Web Intelligence and Data Mining, 2006
Feature Selection by Combining Multiple Methods.
Proceedings of the Advances in Web Intelligence and Data Mining, 2006
A Decision-Tree Framework for Instance-space Decomposition.
Proceedings of the Advances in Web Intelligence and Data Mining, 2006
Classifier evaluation under limited resources.
Pattern Recognition Letters, 2006
Decomposition methodology for classification tasks: a meta decomposer framework.
Pattern Anal. Appl., 2006
Data Mining for Improving the Quality of Manufacturing: A Feature Set Decomposition Approach.
J. Intelligent Manufacturing, 2006
Selective Voting - Getting More for Less in Sensor Fusion.
IJPRAI, 2006
Automatic Discovery of Regular Expression Patterns Representing Negated Findings in Medical Narrative Reports.
Proceedings of the Next Generation Information Technologies and Systems, 2006
Automatic Identification of Negated Concepts in Narrative Clinical Reports.
Proceedings of the ICEIS 2006, 2006
Cascaded Data Mining Methods for Text Understanding, with medical case study.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
2005
Decomposition Methodology for Knowledge Discovery and Data Mining - Theory and Applications
Series in Machine Perception and Artificial Intelligence 61, WorldScientific, ISBN: 978-981-256-079-7, 2005
Top-down induction of decision trees classifiers - a survey.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2005
Improving Supervised Learning by Sample Decomposition.
International Journal of Computational Intelligence and Applications, 2005
Feature set decomposition for decision trees.
Intell. Data Anal., 2005
Decomposition methodology for classification tasks.
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005
Clustering Methods.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
Decision Trees.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
Ensemble Methods for Classifiers.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
Decomposition Methodology for Knowledge Discovery and Data Mining.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
Introduction to Supervised Methods.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
Introduction to Knowledge Discovery in Databases.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
2004
Context-Sensitive Medical Information Retrieval.
Proceedings of the MEDINFO 2004, 2004
Information Retrieval System for Medical Narrative Reports.
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004
2003
Space Decomposition in Data Mining: A Clustering Approach.
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003
2002
Improving Supervised Learning by Feature Decomposition.
Proceedings of the Foundations of Information and Knowledge Systems, 2002
2001
Theory and Applications of Attribute Decomposition.
Proceedings of the 2001 IEEE International Conference on Data Mining, 29 November, 2001