default search action
Fedja Hadzic
- > Home > Persons > Fedja Hadzic
Publications
- 2012
- [j6]Henry Tan, Fedja Hadzic, Tharam S. Dillon:
Mining Induced/Embedded Subtrees using the Level of Embedding Constraint. Fundam. Informaticae 119(2): 187-231 (2012) - 2011
- [j5]Izwan Nizal Mohd Shaharanee, Fedja Hadzic, Tharam S. Dillon:
Interestingness measures for association rules based on statistical validity. Knowl. Based Syst. 24(3): 386-392 (2011) - 2010
- [b1]Fedja Hadzic, Henry Tan, Tharam S. Dillon:
Mining of Data with Complex Structures. Studies in Computational Intelligence 333, Springer 2010, ISBN 978-3-642-17556-5, pp. 1-326 [contents] - [j4]Maja Hadzic, Fedja Hadzic, Tharam S. Dillon:
Mining of patient data: towards better treatment strategies for depression. Int. J. Funct. Informatics Pers. Medicine 3(2): 122-143 (2010) - [j3]Fedja Hadzic, Henry Tan, Tharam S. Dillon:
Model guided algorithm for mining unordered embedded subtrees. Web Intell. Agent Syst. 8(4): 413-430 (2010) - [c20]Qi H. Pan, Fedja Hadzic, Tharam S. Dillon:
Discovering Concept Mappings by Similarity Propagation among Substructures. IDEAL 2010: 324-333 - [c19]Izwan Nizal Mohd Shaharanee, Fedja Hadzic, Tharam S. Dillon:
A Statistical Interestingness Measures for XML Based Association Rules. PRICAI 2010: 194-205 - 2009
- [c18]Izwan Nizal Mohd Shaharanee, Fedja Hadzic, Tharam S. Dillon:
Interestingness of Association Rules Using Symmetrical Tau and Logistic Regression. Australasian Conference on Artificial Intelligence 2009: 422-431 - 2008
- [j2]Henry Tan, Fedja Hadzic, Tharam S. Dillon, Elizabeth Chang:
State of the art of data mining of tree structured information. Comput. Syst. Sci. Eng. 23(4) (2008) - [j1]Henry Tan, Fedja Hadzic, Tharam S. Dillon, Elizabeth Chang, Ling Feng:
Tree model guided candidate generation for mining frequent subtrees from XML documents. ACM Trans. Knowl. Discov. Data 2(2): 9:1-9:43 (2008) - [c17]Fedja Hadzic, Tharam S. Dillon:
Rule Optimizing Technique Motivated by Human Concept Formation. BIOSIGNALS (2) 2008: 31-36 - [c16]Maja Hadzic, Fedja Hadzic, Tharam S. Dillon:
Mining of Health Information from Ontologies. HEALTHINF (2) 2008: 155-160 - [c15]Fedja Hadzic, Tharam S. Dillon:
Human-Like Rule Optimization for Continuous Domains. BIOSTEC (Selected Papers) 2008: 330-343 - [c14]Maja Hadzic, Russel D'Souza, Fedja Hadzic, Tharam S. Dillon:
Thinking PubMed: an Innovative System for Mental Health Domain. CBMS 2008: 330-335 - [c13]Fedja Hadzic, Henry Tan, Tharam S. Dillon:
Mining Unordered Distance-Constrained Embedded Subtrees. Discovery Science 2008: 272-283 - [c12]Maja Hadzic, Fedja Hadzic, Tharam S. Dillon:
Tree Mining in Mental Health Domain. HICSS 2008: 230 - [c11]Fedja Hadzic, Tharam S. Dillon, Elizabeth Chang:
Knowledge Analysis with Tree Patterns. HICSS 2008: 369 - [c10]Fedja Hadzic, Tharam S. Dillon:
Using Competitive Learning between Symbolic Rules as a Knowledge Learning Method. IFIP AI 2008: 351-360 - [c9]Qi H. Pan, Fedja Hadzic, Tharam S. Dillon:
Conjoint Data Mining of Structured and Semi-structured Data. SKG 2008: 87-94 - [c8]Fedja Hadzic, Henry Tan, Tharam S. Dillon:
U3 - Mning Unordered Embedded Subtrees Using TMG Candidate Generation. Web Intelligence 2008: 285-292 - 2007
- [c7]Fedja Hadzic, Henry Tan, Tharam S. Dillon:
UNI3 - efficient algorithm for mining unordered induced subtrees using TMG candidate generation. CIDM 2007: 568-575 - [c6]Fedja Hadzic, Tharam S. Dillon, Elizabeth Chang:
Tree Mining Application to Matching of Heterogeneous Knowledge Representations. GrC 2007: 351-357 - [c5]Fedja Hadzic, Tharam S. Dillon:
CSOM for Mixed Data Types. ISNN (2) 2007: 965-978 - [c4]Fedja Hadzic, Tharam S. Dillon:
Application of Tree Mining to Matching of Knowledge Structures of Decision Tree Type. OTM Workshops (2) 2007: 1319-1328 - 2006
- [c3]Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabeth Chang:
Razor: mining distance-constrained embedded subtrees. ICDM Workshops 2006: 8-13 - [c2]Fedja Hadzic, Tharam S. Dillon, Amandeep S. Sidhu, Elizabeth Chang, Henry Tan:
Mining Substructures in Protein Data. ICDM Workshops 2006: 213-217 - [c1]Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabeth Chang, Ling Feng:
IMB3-Miner: Mining Induced/Embedded Subtrees by Constraining the Level of Embedding. PAKDD 2006: 450-461
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint