


default search action
8. AusDM 2009: Melbourne, Australia
- Paul J. Kennedy, Kok-Leong Ong, Peter Christen:

Eighth Australasian Data Mining Conference, AusDM 2009, Melbourne, Australia, December 2009. CRPIT 101, Australian Computer Society 2009, ISBN 978-1-920682-82-8 - Kate Smith-Miles:

What Data Mining Can Discover From Your Face... No More Lying About Your Age! 3 - Jian Pei:

Towards Web Search Engine Scale Data Mining. 5 - Ross W. Gayler:

Credit Scoring and Data Mining. 7 - Sumanta Guha:

Efficiently Mining Frequent Subpaths. 11-16 - Md. Golam Kaosar, Zhuojia Xu, Xun Yi:

Distributed Association Rule Mining with Minimum Communication Overhead. 17-24 - John Yearwood, Dean Webb, Liping Ma, Peter Vamplew, Bahadorreza Ofoghi, Andrei V. Kelarev:

Applying Clustering and Ensemble Clustering Approaches to phishing Profiling. 25-34 - Yongli Ren, Yu-Hsn Liu, Jia Rong, Robert Dew:

Clustering Interval-valued Data Using an Overlapped Interval Divergence. 35-42 - Cheng G. Weng, Josiah Poon:

Reference Point Transformation for Visualisation. 43-54 - Ji Zhang, Qing Liu, Kai Xu:

FlowRecommender: A Workflow Recommendation Technique for Process Provenance. 55-62 - Zhigang Zheng, Yanchang Zhao, Ziye Zuo, Longbing Cao:

Negative-GSP: An Efficient Method for Mining Negative Sequential Patterns. 63-68 - Yun Sing Koh, Russel Pears:

Non-Redundant Rare Itemset Generation. 69-74 - Yu-Hsn Liu, Yongli Ren, Robert Dew:

Monetising User Generated Content Using Data Mining Techniques. 75-82 - Girish K. Palshikar, Shailesh Deshpande, Savita S. Bhat:

QUEST: Discovering Insights from Survey Responses. 83-92 - Yin Shan, D. Wayne Murray, Alison Sutinen:

Discovering inappropriate billings with local density based outlier detection method. 93-98 - Ekta Nankani, Simeon J. Simoff:

Predictive analytics that takes in account network relations: A case study of research data of a contemporary university. 99-108 - Takeshi Sato, Bing Quan Huang, Guillem Lefait, M. Tahar Kechadi, Brian Buckley:

Kernel-based Principal Components Analysis on Large Telecommunication Data. 109-116 - Ghazi Al-Naymat, Sanjay Chawla, Javid Taheri:

SparseDTW: A Novel Approach to Speed up Dynamic Time Warping. 117-128 - Hooman Homayounfard, Paul J. Kennedy:

HDAX: Historical Symbolic Modelling of Delay Time Series in a Communications Network. 129-138 - Andrey Kan, Jeffrey Chan, James Bailey, Christopher Leckie:

A Query Based Approach for Mining Evolving Graphs. 139-150 - Meng Xu, Michael Bain:

Mining Minimal Constrained Flow Cycles from Complex Transaction Data. 151-158 - Muzammil M. Baig, Jiuyong Li, Jixue Liu, Hua Wang:

Studying Genotype-Phenotype Attack on k-anonymised Medical and Genomic Data. 159-166 - Phillip Lock, Nicolas Le Mercier, Jiuyong Li, Markus Stumptner:

Building a Generic Graph-based Descriptor Set for use in Drug Discovery. 167-174 - Jorge J. Villalón, Rafael A. Calvo:

Single Document Semantic Spaces. 175-182 - Min Gan, Honghua Dai:

Efficient Mining of Top-k Breaker Emerging Subgraph Patterns from Graph Datasets. 183-192 - Saaid Baraty, Dan A. Simovici:

Edge Evaluation in Bayesian Network Structures. 193-200

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














