callback( { "result":{ "query":":facetid:toc:\"db/journals/ida/ida10.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"67.70" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"34", "@dc":"34", "@oc":"34", "@id":"43454053", "text":":facetid:toc:db/journals/ida/ida10.bht" } }, "hits":{ "@total":"34", "@computed":"34", "@sent":"34", "@first":"0", "hit":[{ "@score":"1", "@id":"5652637", "info":{"authors":{"author":[{"@pid":"44/3981","text":"Malik Agyemang"},{"@pid":"b/KenBarker1","text":"Ken Barker 0001"},{"@pid":"78/11148","text":"Reda Alhajj"}]},"title":"A comprehensive survey of numeric and symbolic outlier mining techniques.","venue":"Intell. Data Anal.","volume":"10","number":"6","pages":"521-538","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/AgyemangBA06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00266","url":"https://dblp.org/rec/journals/ida/AgyemangBA06"}, "url":"URL#5652637" }, { "@score":"1", "@id":"5652638", "info":{"authors":{"author":[{"@pid":"63/5512","text":"Annalisa Appice"},{"@pid":"56/6773","text":"Claudia d'Amato"},{"@pid":"68/6961","text":"Floriana Esposito"},{"@pid":"m/DonatoMalerba","text":"Donato Malerba"}]},"title":"Classification of symbolic objects: A lazy learning approach.","venue":"Intell. Data Anal.","volume":"10","number":"4","pages":"301-324","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/AppicedEM06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00252","url":"https://dblp.org/rec/journals/ida/AppicedEM06"}, "url":"URL#5652638" }, { "@score":"1", "@id":"5652639", "info":{"authors":{"author":[{"@pid":"52/803","text":"T. Babaie"},{"@pid":"79/6029","text":"R. Karimizandi"},{"@pid":"97/1478","text":"Caro Lucas"}]},"title":"Prediction of solar conditions by emotional learning.","venue":"Intell. Data Anal.","volume":"10","number":"6","pages":"583-597","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/BabaieKL06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00269","url":"https://dblp.org/rec/journals/ida/BabaieKL06"}, "url":"URL#5652639" }, { "@score":"1", "@id":"5652640", "info":{"authors":{"author":[{"@pid":"86/1676","text":"Matjaz Bevk"},{"@pid":"42/3099","text":"Igor Kononenko 0001"}]},"title":"Towards symbolic mining of images with association rules: Preliminary results on textures.","venue":"Intell. Data Anal.","volume":"10","number":"4","pages":"379-393","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/BevkK06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00256","url":"https://dblp.org/rec/journals/ida/BevkK06"}, "url":"URL#5652640" }, { "@score":"1", "@id":"5652641", "info":{"authors":{"author":[{"@pid":"54/1160","text":"Djamel Bouchaffra"},{"@pid":"87/5118","text":"Jun Tan"}]},"title":"Structural hidden Markov models: An application to handwritten numeral recognition.","venue":"Intell. Data Anal.","volume":"10","number":"1","pages":"67-79","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/BouchaffraT06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00236","url":"https://dblp.org/rec/journals/ida/BouchaffraT06"}, "url":"URL#5652641" }, { "@score":"1", "@id":"5652642", "info":{"authors":{"author":[{"@pid":"01/6920","text":"Paula Brito"},{"@pid":"49/6972","text":"Monique Noirhomme-Fraiture"}]},"title":"Symbolic and spatial data analysis: Mining complex data structures.","venue":"Intell. Data Anal.","volume":"10","number":"4","pages":"297-300","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/BritoN06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00251","url":"https://dblp.org/rec/journals/ida/BritoN06"}, "url":"URL#5652642" }, { "@score":"1", "@id":"5652643", "info":{"authors":{"author":[{"@pid":"40/4997","text":"Lijuan Cao"},{"@pid":"31/1354","text":"Lim Kian Guan"},{"@pid":"26/5830","text":"Zhang Jingqing"}]},"title":"Bond rating using support vector machine.","venue":"Intell. Data Anal.","volume":"10","number":"3","pages":"285-296","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/CaoGJ06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00250","url":"https://dblp.org/rec/journals/ida/CaoGJ06"}, "url":"URL#5652643" }, { "@score":"1", "@id":"5652644", "info":{"authors":{"author":[{"@pid":"24/4384","text":"Xinghua Fan"},{"@pid":"95/3291","text":"Maosong Sun"}]},"title":"Knowledge representation and reasoning based on entity and relation propagation diagram/tree.","venue":"Intell. Data Anal.","volume":"10","number":"1","pages":"81-102","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/FanS06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00237","url":"https://dblp.org/rec/journals/ida/FanS06"}, "url":"URL#5652644" }, { "@score":"1", "@id":"5652645", "info":{"authors":{"author":[{"@pid":"f/RonenFeldman","text":"Ronen Feldman"},{"@pid":"07/5233","text":"Binyamin Rosenfeld"},{"@pid":"14/3371","text":"Ronen Lazar"},{"@pid":"35/3874","text":"Joshua Livnat"},{"@pid":"67/5348","text":"Benjamin Segal"}]},"title":"Computerized retrieval and classification: An application to reasons for late filings with the securities and exchange commission.","venue":"Intell. Data Anal.","volume":"10","number":"2","pages":"183-195","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/FeldmanRLLS06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00243","url":"https://dblp.org/rec/journals/ida/FeldmanRLLS06"}, "url":"URL#5652645" }, { "@score":"1", "@id":"5652646", "info":{"authors":{"author":[{"@pid":"49/6192","text":"Sylvain Ferrandiz"},{"@pid":"94/5206","text":"Marc Boullé"}]},"title":"Supervised evaluation of Voronoi partitions.","venue":"Intell. Data Anal.","volume":"10","number":"3","pages":"269-283","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/FerrandizB06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00249","url":"https://dblp.org/rec/journals/ida/FerrandizB06"}, "url":"URL#5652646" }, { "@score":"1", "@id":"5652647", "info":{"authors":{"author":[{"@pid":"96/1131","text":"Douglas H. Fisher"},{"@pid":"51/6786","text":"Mary E. Edgerton"},{"@pid":"30/2702","text":"Zhihua Chen"},{"@pid":"69/120","text":"Lianhong Tang"},{"@pid":"60/921","text":"Lewis J. Frey"}]},"title":"Backward chaining rule induction.","venue":"Intell. Data Anal.","volume":"10","number":"5","pages":"397-417","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/FisherECTF06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00258","url":"https://dblp.org/rec/journals/ida/FisherECTF06"}, "url":"URL#5652647" }, { "@score":"1", "@id":"5652648", "info":{"authors":{"author":[{"@pid":"g/JGama","text":"João Gama 0001"},{"@pid":"69/6427","text":"Ricardo Fernandes"},{"@pid":"20/2773-3","text":"Ricardo Rocha 0003"}]},"title":"Decision trees for mining data streams.","venue":"Intell. Data Anal.","volume":"10","number":"1","pages":"23-45","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/GamaFR06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00234","url":"https://dblp.org/rec/journals/ida/GamaFR06"}, "url":"URL#5652648" }, { "@score":"1", "@id":"5652649", "info":{"authors":{"author":[{"@pid":"57/6913","text":"Marcin Gorawski"},{"@pid":"68/5432","text":"Rafal Malczok"}]},"title":"Materialized aR-Tree in Distributed Spatial Data Warehouse.","venue":"Intell. Data Anal.","volume":"10","number":"4","pages":"361-377","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/GorawskiM06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00255","url":"https://dblp.org/rec/journals/ida/GorawskiM06"}, "url":"URL#5652649" }, { "@score":"1", "@id":"5652650", "info":{"authors":{"author":[{"@pid":"h/EykeHullermeier","text":"Eyke Hüllermeier"},{"@pid":"79/1018","text":"Jürgen Beringer"}]},"title":"Learning from ambiguously labeled examples.","venue":"Intell. Data Anal.","volume":"10","number":"5","pages":"419-439","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/HullermeierB06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00259","url":"https://dblp.org/rec/journals/ida/HullermeierB06"}, "url":"URL#5652650" }, { "@score":"1", "@id":"5652651", "info":{"authors":{"author":[{"@pid":"37/3523","text":"Jason Van Hulse"},{"@pid":"k/TMKhoshgoftaar","text":"Taghi M. Khoshgoftaar"}]},"title":"Class noise detection using frequent itemsets.","venue":"Intell. Data Anal.","volume":"10","number":"6","pages":"487-507","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/HulseK06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00264","url":"https://dblp.org/rec/journals/ida/HulseK06"}, "url":"URL#5652651" }, { "@score":"1", "@id":"5652652", "info":{"authors":{"author":[{"@pid":"13/855","text":"Simon Jaillet"},{"@pid":"l/AnneLaurent","text":"Anne Laurent"},{"@pid":"t/MTeisseire","text":"Maguelonne Teisseire"}]},"title":"Sequential patterns for text categorization.","venue":"Intell. Data Anal.","volume":"10","number":"3","pages":"199-214","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/JailletLT06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00245","url":"https://dblp.org/rec/journals/ida/JailletLT06"}, "url":"URL#5652652" }, { "@score":"1", "@id":"5652653", "info":{"authors":{"author":[{"@pid":"74/1455","text":"Shri Kant"},{"@pid":"66/4624","text":"Shehroz S. Khan"}]},"title":"Analyzing a class of pseudo-random bit generator through inductive machine learning paradigm.","venue":"Intell. Data Anal.","volume":"10","number":"6","pages":"539-554","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/KantK06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00267","url":"https://dblp.org/rec/journals/ida/KantK06"}, "url":"URL#5652653" }, { "@score":"1", "@id":"5652654", "info":{"authors":{"author":[{"@pid":"k/TMKhoshgoftaar","text":"Taghi M. Khoshgoftaar"},{"@pid":"37/3523","text":"Jason Van Hulse"}]},"title":"Determining noisy instances relative to attributes of interest.","venue":"Intell. Data Anal.","volume":"10","number":"3","pages":"251-268","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/KhoshgoftaarH06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00248","url":"https://dblp.org/rec/journals/ida/KhoshgoftaarH06"}, "url":"URL#5652654" }, { "@score":"1", "@id":"5652655", "info":{"authors":{"author":[{"@pid":"k/JoostNKok","text":"Joost N. Kok"},{"@pid":"16/4533","text":"José María Peña Sánchez"},{"@pid":"s/ArnoSiebes","text":"Arno Siebes"}]},"title":"Introduction.","venue":"Intell. Data Anal.","volume":"10","number":"5","pages":"395","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/KokPS06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00257","url":"https://dblp.org/rec/journals/ida/KokPS06"}, "url":"URL#5652655" }, { "@score":"1", "@id":"5652656", "info":{"authors":{"author":[{"@pid":"51/2081","text":"Emin Erkan Korkmaz"},{"@pid":"81/1475","text":"Jun Du"},{"@pid":"78/11148","text":"Reda Alhajj"},{"@pid":"b/KenBarker1","text":"Ken Barker 0001"}]},"title":"Combining advantages of new chromosome representation scheme and multi-objective genetic algorithms for better clustering.","venue":"Intell. Data Anal.","volume":"10","number":"2","pages":"163-182","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/KorkmazDAB06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00242","url":"https://dblp.org/rec/journals/ida/KorkmazDAB06"}, "url":"URL#5652656" }, { "@score":"1", "@id":"5652657", "info":{"authors":{"author":[{"@pid":"34/2997","text":"Yu Li"},{"@pid":"88/2105","text":"Miroslav Kubat"}]},"title":"Searching for high-support itemsets in itemset trees.","venue":"Intell. Data Anal.","volume":"10","number":"2","pages":"105-120","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/LiK06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00239","url":"https://dblp.org/rec/journals/ida/LiK06"}, "url":"URL#5652657" }, { "@score":"1", "@id":"5652658", "info":{"authors":{"author":[{"@pid":"60/5461","text":"Chérif Mballo"},{"@pid":"d/EdwinDiday","text":"Edwin Diday"}]},"title":"The criterion of Kolmogorov-Smirnov for binary decision tree: Application to interval valued variables.","venue":"Intell. Data Anal.","volume":"10","number":"4","pages":"325-341","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/MballoD06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00253","url":"https://dblp.org/rec/journals/ida/MballoD06"}, "url":"URL#5652658" }, { "@score":"1", "@id":"5652659", "info":{"authors":{"author":[{"@pid":"43/3385","text":"Ulrich Möller"},{"@pid":"18/1240","text":"Dörte Radke"}]},"title":"Performance of data resampling methods for robust class discovery based on clustering.","venue":"Intell. Data Anal.","volume":"10","number":"2","pages":"139-162","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/MollerR06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00241","url":"https://dblp.org/rec/journals/ida/MollerR06"}, "url":"URL#5652659" }, { "@score":"1", "@id":"5652660", "info":{"authors":{"author":[{"@pid":"23/1886","text":"Ruggero G. Pensa"},{"@pid":"r/CRobardet","text":"Céline Robardet"},{"@pid":"b/JFBoulicaut","text":"Jean-François Boulicaut"}]},"title":"Supporting bi-cluster interpretation in 0/1 data by means of local patterns.","venue":"Intell. Data Anal.","volume":"10","number":"5","pages":"457-472","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/PensaRB06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00261","url":"https://dblp.org/rec/journals/ida/PensaRB06"}, "url":"URL#5652660" }, { "@score":"1", "@id":"5652661", "info":{"authors":{"author":[{"@pid":"20/2800","text":"Graeme Richards"},{"@pid":"20/116","text":"Karl J. Brazier"},{"@pid":"44/6297","text":"Wenjia Wang"}]},"title":"Feature salience definition and estimation and its use in feature subset selection.","venue":"Intell. Data Anal.","volume":"10","number":"1","pages":"3-21","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/RichardsBW06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00233","url":"https://dblp.org/rec/journals/ida/RichardsBW06"}, "url":"URL#5652661" }, { "@score":"1", "@id":"5652662", "info":{"authors":{"author":[{"@pid":"31/3471","text":"Niall Rooney"},{"@pid":"15/2345-2","text":"David W. Patterson"},{"@pid":"95/2351","text":"Chris D. Nugent"}]},"title":"Pruning extensions to stacking.","venue":"Intell. Data Anal.","volume":"10","number":"1","pages":"47-66","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/RooneyPN06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00235","url":"https://dblp.org/rec/journals/ida/RooneyPN06"}, "url":"URL#5652662" }, { "@score":"1", "@id":"5652663", "info":{"authors":{"author":[{"@pid":"88/3940","text":"José F. Sigut"},{"@pid":"38/5173","text":"José D. Piñeiro"},{"@pid":"72/6131","text":"José Ignacio Estévez Damas"},{"@pid":"83/4787","text":"Pedro A. Toledo"}]},"title":"A neural network approach to normality testing.","venue":"Intell. Data Anal.","volume":"10","number":"6","pages":"509-519","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/SigutPET06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00265","url":"https://dblp.org/rec/journals/ida/SigutPET06"}, "url":"URL#5652663" }, { "@score":"1", "@id":"5652664", "info":{"authors":{"author":[{"@pid":"24/4176","text":"K. G. Srinivasa 0001"},{"@pid":"s/KarthikSridharan","text":"Karthik Sridharan"},{"@pid":"87/762","text":"P. Deepa Shenoy"},{"@pid":"77/84","text":"K. R. Venugopal 0001"},{"@pid":"54/3051","text":"Lalit M. Patnaik"}]},"title":"A neural network based CBIR system using STI features and relevance feedback.","venue":"Intell. Data Anal.","volume":"10","number":"2","pages":"121-137","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/SrinivasaSSVP06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00240","url":"https://dblp.org/rec/journals/ida/SrinivasaSSVP06"}, "url":"URL#5652664" }, { "@score":"1", "@id":"5652665", "info":{"authors":{"author":[{"@pid":"58/2751","text":"Kathryn E. B. Thornton"},{"@pid":"00/2083","text":"Mark Carrington"},{"@pid":"74/3858","text":"Tim Burman"}]},"title":"A data mining based method for web site maintenance.","venue":"Intell. Data Anal.","volume":"10","number":"6","pages":"555-581","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/ThorntonCB06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00268","url":"https://dblp.org/rec/journals/ida/ThorntonCB06"}, "url":"URL#5652665" }, { "@score":"1", "@id":"5652666", "info":{"authors":{"author":[{"@pid":"46/6005","text":"William-Chandra Tjhi"},{"@pid":"56/1277-1","text":"Lihui Chen 0001"}]},"title":"Minimum sum-squared residue for fuzzy co-clustering.","venue":"Intell. Data Anal.","volume":"10","number":"3","pages":"237-249","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/TjhiC06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00247","url":"https://dblp.org/rec/journals/ida/TjhiC06"}, "url":"URL#5652666" }, { "@score":"1", "@id":"5652667", "info":{"authors":{"author":[{"@pid":"53/4404","text":"Allan Tucker"},{"@pid":"77/2538","text":"Peter A. C. 't Hoen"},{"@pid":"86/2258","text":"Veronica Vinciotti"},{"@pid":"l/XiaohuiLiu","text":"Xiaohui Liu 0001"}]},"title":"Temporal Bayesian classifiers for modelling muscular dystrophy expression data.","venue":"Intell. Data Anal.","volume":"10","number":"5","pages":"441-455","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/TuckerHVL06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00260","url":"https://dblp.org/rec/journals/ida/TuckerHVL06"}, "url":"URL#5652667" }, { "@score":"1", "@id":"5652668", "info":{"authors":{"author":{"@pid":"t/YannisTzitzikas","text":"Yannis Tzitzikas"}},"title":"An algebraic method for compressing symbolic data tables.","venue":"Intell. Data Anal.","volume":"10","number":"4","pages":"343-359","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/Tzitzikas06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00254","url":"https://dblp.org/rec/journals/ida/Tzitzikas06"}, "url":"URL#5652668" }, { "@score":"1", "@id":"5652669", "info":{"authors":{"author":[{"@pid":"50/3886","text":"Celine Vens"},{"@pid":"69/6136","text":"Hendrik Blockeel"}]},"title":"A simple regression based heuristic for learning model trees.","venue":"Intell. Data Anal.","volume":"10","number":"3","pages":"215-236","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/VensB06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00246","url":"https://dblp.org/rec/journals/ida/VensB06"}, "url":"URL#5652669" }, { "@score":"1", "@id":"5652670", "info":{"authors":{"author":[{"@pid":"92/6707","text":"Zhicheng Zhang"},{"@pid":"65/3721","text":"David J. Hand"}]},"title":"Detecting groups of anomalously similar objects in large data sets.","venue":"Intell. Data Anal.","volume":"10","number":"5","pages":"473-483","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ida/ZhangH06","ee":"http://content.iospress.com/articles/intelligent-data-analysis/ida00262","url":"https://dblp.org/rec/journals/ida/ZhangH06"}, "url":"URL#5652670" } ] } } } )