2010 | ||
---|---|---|
167 | Yong Li, Ke Wang, Da-ke Chen: Multispectral and Panchromatic Images Fusion by Adaptive PCNN. MMM 2010: 120-129 | |
166 | Wei Cheng, Ke Wang, Xiuying Zhang: Implementation of a COM-based decision-tree model with VBA in ArcGIS. Expert Syst. Appl. 37(1): 12-17 (2010) | |
2009 | ||
165 | Yabo Xu, Ke Wang, Guoliang Yang, Ada Wai-Chee Fu: Online anonymity for personalized web services. CIKM 2009: 1497-1500 | |
164 | Qingzhu Wang, Ke Wang, Donghong An, Bo Chen, Miao Liu, Yingying Ying: Extracting the Coronary Artery in Angiographic Image Based on a Trous Wavelet of Rotary Gaussian with Adaptive Space Coefficient. CIS (1) 2009: 160-164 | |
163 | Chao Chen, Ke Wang, Yiqi Dai: A Novel Architecture for Enterprise Network Security. CIS (1) 2009: 537-541 | |
162 | Chao Chen, Ke Wang, Shuren Liao, Qiuyan Zhang, Yiqi Dai: A Novel Server-Based Application Execution Architecture. CSE (2) 2009: 678-683 | |
161 | Noman Mohammed, Benjamin C. M. Fung, Ke Wang, Patrick C. K. Hung: Privacy-preserving data mashup. EDBT 2009: 228-239 | |
160 | Jun Tang, Ke Wang, Xiaojuan Zhao: A Novel Constraint Handling Technique for Complex Portfolio Selection. FSKD (2) 2009: 156-160 | |
159 | Ke Wang, Yabo Xu, Ada Wai-Chee Fu, Raymond Chi-Wing Wong: FF-Anonymity: When Quasi-identifiers Are Missing. ICDE 2009: 1136-1139 | |
158 | Rhonda Chaytor, Ke Wang, Patricia Brantingham: Fine-Grain Perturbation for Privacy Preserving Data Publishing. ICDM 2009: 740-745 | |
157 | Shu Wang, Ke Wang: Quasi-neutral Limit of the Drift-Diffusion Models for Semiconductors with PN-Junctions. ICNC (3) 2009: 542-546 | |
156 | Xiao Nian Tang, Ke Wang, Gui Jun Nian, Dan Wang, Na Ni: Analysis and Realization of Data Hiding in Single Layer of BOR Multiwavelet Domain. IPCV 2009: 337-342 | |
155 | Binjie Xiao, Ke Wang, Weiqun Shu: A Framework for Software Performance Simulation Using Binary to C Translation. PACCS 2009: 602-605 | |
154 | Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang: On Mining Rating Dependencies in Online Collaborative Rating Networks. PAKDD 2009: 1054-1061 | |
153 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei: Anonymization-based attacks in privacy-preserving data publishing. ACM Trans. Database Syst. 34(2): (2009) | |
152 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, Ke Wang, Yabo Xu: Preserving Individual Privacy in Serial Data Publishing CoRR abs/0903.0682: (2009) | |
151 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Philip S. Yu: Can the Utility of Anonymized Data be used for Privacy Breaches? CoRR abs/0905.1755: (2009) | |
150 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Jian Pei, Philip S. Yu: Anonymization with Worst-Case Distribution-Based Background Knowledge CoRR abs/0909.1127: (2009) | |
149 | Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Patrick C. K. Hung: Privacy-preserving data publishing for cluster analysis. Data Knowl. Eng. 68(6): 552-575 (2009) | |
148 | Raymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang: Online Skyline Analysis with Dynamic Preferences on Nominal Attributes. IEEE Trans. Knowl. Data Eng. 21(1): 35-49 (2009) | |
147 | Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang: (alpha, k)-anonymous data publishing. J. Intell. Inf. Syst. 33(2): 209-234 (2009) | |
146 | Xinghuo Zeng, Jian Pei, Ke Wang, Jinyan Li: PADS: a simple yet effective pattern-aware dynamic search method for fast maximal frequent pattern mining. Knowl. Inf. Syst. 20(3): 375-391 (2009) | |
2008 | ||
145 | Wei Cheng, Ke Wang, Xiuying Zhang: A COM-Based Decision Tree Model Implemented in ArcGIS: A Case Study for Assessment of Soil Pollution in Fuyang, Zhejiang, China. CSSE (4) 2008: 190-193 | |
144 | Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei: Anonymity for continuous data publishing. EDBT 2008: 264-275 | |
143 | Xinghuo Zeng, Matthew J. Nesbitt, Jian Pei, Ke Wang, Ismael A. Vergara, Nansheng Chen: OrthoCluster: a new tool for mining synteny blocks and applications in comparative genomics. EDBT 2008: 656-667 | |
142 | Yabo Xu, Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei: Publishing Sensitive Transactions for Itemset Utility. ICDM 2008: 1109-1114 | |
141 | Ke Wang, James Nga-Kwok Liu, Weimin Ma: A Study on the Reliability of Case-Based Reasoning Systems. ICDM Workshops 2008: 60-68 | |
140 | Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi: A framework for privacy-preserving cluster analysis. ISI 2008: 46-51 | |
139 | Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Philip S. Yu: Anonymizing transaction databases for publication. KDD 2008: 767-775 | |
138 | Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Bias and Controversy in Evaluation Systems. IEEE Trans. Knowl. Data Eng. 20(11): 1490-1504 (2008) | |
137 | Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu: Computing Join Aggregates Over Private Tables. IJDWM 4(4): 22-41 (2008) | |
136 | Weimin Ma, Shao-Hua Tang, Ke Wang: Competitive Analysis for the Most Reliable Path Problem with Online and Fuzzy Uncertainties. IJPRAI 22(1): 195-206 (2008) | |
135 | Mohammed J. Zaki, Ke Wang: Special Issue on the Best Papers of SDM'08. Statistical Analysis and Data Mining 1(3): 109-110 (2008) | |
2007 | ||
134 | Weimin Ma, Ting Gao, Ke Wang: On the On-Line k -Taxi Problem with Limited Look Ahead. COCOA 2007: 72-80 | |
133 | Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu: Computing Join Aggregates over Private Tables. DaWaK 2007: 78-88 | |
132 | Weimin Ma, Ke Wang: On the On-Line Weighted k-Taxi Problem. ESCAPE 2007: 152-162 | |
131 | Ke Wang, Wei Wang, Yan Zhuang: Appearance-Based Map Learning for Mobile Robot by Using Generalized Regression Neural Network. ISNN (1) 2007: 834-842 | |
130 | Raymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang: Mining favorable facets. KDD 2007: 804-813 | |
129 | Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Summarizing Review Scores of "Unequal" Reviewers. SDM 2007 | |
128 | Jian Pei, Jian Xu, Zhibin Wang, Wei Wang, Ke Wang: Maintaining K-Anonymity against Incremental Updates. SSDBM 2007: 5 | |
127 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei: Minimality Attack in Privacy Preserving Data Publishing. VLDB 2007: 543-554 | |
126 | Yabo Xu, Ke Wang, Benyu Zhang, Zheng Chen: Privacy-enhancing personalized web search. WWW 2007: 591-600 | |
125 | Ling Bai, Ke Wang: A diffusive single-species model with periodic coefficients and its optimal harvesting policy. Applied Mathematics and Computation 187(2): 873-882 (2007) | |
124 | Tao Jiang, Ah-Hwee Tan, Ke Wang: Mining Generalized Associations of Semantic Relations from Textual Web Content. IEEE Trans. Knowl. Data Eng. 19(2): 164-179 (2007) | |
123 | Benjamin C. M. Fung, Ke Wang, Philip S. Yu: Anonymizing Classification Data for Privacy Preservation. IEEE Trans. Knowl. Data Eng. 19(5): 711-725 (2007) | |
122 | Ke Wang, Chuanhua You: A note on identifying generalized diagonally dominant matrices. Int. J. Comput. Math. 84(12): 1863-1870 (2007) | |
121 | Ke Wang, Benjamin C. M. Fung, Philip S. Yu: Handicapping attacker's confidence: an alternative to k -anonymization. Knowl. Inf. Syst. 11(3): 345-368 (2007) | |
120 | Moonjung Cho, Jian Pei, Ke Wang: Answering ad hoc aggregate queries from data streams using prefix aggregate trees. Knowl. Inf. Syst. 12(3): 301-329 (2007) | |
2006 | ||
119 | Ke Wang, Yabo Xu, Rong She, Philip S. Yu: Classification Spanning Private Databases. AAAI 2006 | |
118 | Huiqiang Wang, Gaofei Wang, Ying Lan, Ke Wang, Daxin Liu: A New Automatic Intrusion Response Taxonomy and Its Application. APWeb Workshops 2006: 999-1003 | |
117 | Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Rong She, Jian Pei: Classification spanning correlated data streams. CIKM 2006: 132-141 | |
116 | Ke Wang, Yuelong Jiang, Alexander Tuzhilin: Mining Actionable Patterns by Role Models. ICDE 2006: 16 | |
115 | Yi-Ting Lai, Ke Wang, Daymond Ling, Hua Shi, Jason Zhang: Direct Marketing When There Are Voluntary Buyers. ICDM 2006: 922-927 | |
114 | Ke Wang, James N. K. Liu, Weimin Ma: Mining the Most Reliable Association Rules with Composite Items. ICDM Workshops 2006: 749-754 | |
113 | Zhao Xu, Ke Wang, Xiao-hua Qiao: Digital Audio Watermarking Algorithm Based on Quantizing Coefficients. IIH-MSP 2006: 41-46 | |
112 | Zhao Xu, Ke Wang, Xiao-hua Qiao: A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis. IIH-MSP 2006: 59-62 | |
111 | Weimin Ma, Ke Wang: On the On-Line k-Truck Problem with Benefit Maximization. ISAAC 2006: 660-669 | |
110 | Ke Wang, Benjamin C. M. Fung: Anonymizing sequential releases. KDD 2006: 414-423 | |
109 | Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Bias and controversy: beyond the statistical deviation. KDD 2006: 625-630 | |
108 | Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang: (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. KDD 2006: 754-759 | |
107 | Ke Wang, Janak J. Parekh, Salvatore J. Stolfo: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. RAID 2006: 226-248 | |
106 | Niels Provos, Joe McClain, Ke Wang: Search worms. WORM 2006: 1-8 | |
105 | Ke Wang, Weiwei Yang, Yiying Tong, Mathieu Desbrun, Peter Schröder: Edge subdivision schemes and the construction of smooth vector fields. ACM Trans. Graph. 25(3): 1041-1048 (2006) | |
104 | Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang: Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006) | |
103 | Bing Zheng, Ke Wang: On accelerate overrelaxation methods for rank deficient linear systems. Applied Mathematics and Computation 173(2): 951-959 (2006) | |
102 | Ke Wang, Bing Zheng: Symmetric successive overrelaxation methods for fuzzy linear systems. Applied Mathematics and Computation 175(2): 891-901 (2006) | |
101 | Bing Zheng, Ke Wang: General fuzzy linear systems. Applied Mathematics and Computation 181(2): 1276-1286 (2006) | |
100 | Ke Wang, Bing Zheng: Inconsistent fuzzy linear systems. Applied Mathematics and Computation 181(2): 973-981 (2006) | |
99 | Bing Zheng, Ke Wang: Comments on "Symmetric successive overrelaxation methods for rank deficient linear systems": [Applied Mathematics and Computation 173 (2006) 404-420]. Applied Mathematics and Computation 182(2): 1709-1713 (2006) | |
98 | Jian Pei, Haixun Wang, Jian Liu, Ke Wang, Jianyong Wang, Philip S. Yu: Discovering Frequent Closed Partial Orders from Strings. IEEE Trans. Knowl. Data Eng. 18(11): 1467-1481 (2006) | |
97 | Irene Pekerskaya, Jian Pei, Ke Wang: Mining changing regions from access-constrained snapshots: a cluster-embedded decision tree approach. J. Intell. Inf. Syst. 27(3): 215-242 (2006) | |
2005 | ||
96 | Benjamin C. M. Fung, Ke Wang, Philip S. Yu: Top-Down Specialization for Information and Privacy Preservation. ICDE 2005: 205-216 | |
95 | Ke Wang, Benjamin C. M. Fung, Philip S. Yu: Template-Based Privacy Preservation in Classification Problems. ICDM 2005: 466-473 | |
94 | Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang: Privacy-Preserving Frequent Pattern Mining across Private Databases. ICDM 2005: 613-616 | |
93 | Yuelong Jiang, Ke Wang, Alexander Tuzhilin, Ada Wai-Chee Fu: Mining Patterns That Respond to Actions. ICDM 2005: 669-672 | |
92 | Jian Pei, Jian Liu, Haixun Wang, Ke Wang, Philip S. Yu, Jianyong Wang: Efficiently Mining Frequent Closed Partial Orders. ICDM 2005: 753-756 | |
91 | Ke Wang, Benjamin C. M. Fung, Guozhu Dong: Integrating Private Databases for Data Analysis. ISI 2005: 171-182 | |
90 | Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang: Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28 | |
89 | Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo: Anomalous Payload-Based Worm Detection and Signature Generation. RAID 2005: 227-246 | |
88 | Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo: FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101 | |
87 | Ke Wang, Yabo Xu, Philip S. Yu, Rong She: Building Decision Trees on Records Linked through Key References. SDM 2005 | |
86 | Rong She, Ke Wang, Yabo Xu, Philip S. Yu: Pushing Feature Selection Ahead Of Join. SDM 2005 | |
85 | Douglas A. Bodner, Ke Wang, Sheng Xu: Advanced decision logic in simulation of material flow processing networks. Winter Simulation Conference 2005: 1359-1366 | |
84 | Ke Wang, Sheng Xu, Leon F. McGinnis: Time management in distributed factory simulation, a case study using HLA. Winter Simulation Conference 2005: 1781-1786 | |
83 | Bing Zheng, Ke Wang: Symmetric successive overrelaxation methods for solving the rank deficient linear least squares problem. Applied Mathematics and Computation 169(2): 1305-1323 (2005) | |
82 | Fengying Wei, Ke Wang: Uniform persistence of asymptotically periodic multispecies competition predator-prey systems with Holling III type functional response. Applied Mathematics and Computation 170(2): 994-998 (2005) | |
81 | Ling Bai, Ke Wang: Gilpin-Ayala model with spatial diffusion and its optimal harvesting policy. Applied Mathematics and Computation 171(1): 531-546 (2005) | |
80 | Ke Wang, Senqiang Zhou, Qiang Yang, Jack Man Shun Yeung: Mining Customer Value: From Association Rules to Direct Marketing. Data Min. Knowl. Discov. 11(1): 57-79 (2005) | |
79 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang: Data Mining for Inventory Item Selection with Cross-Selling Considerations. Data Min. Knowl. Discov. 11(1): 81-112 (2005) | |
78 | Senqiang Zhou, Ke Wang: Localization Site Prediction for Membrane Proteins by Integrating Rule and SVM Classification. IEEE Trans. Knowl. Data Eng. 17(12): 1694-1705 (2005) | |
77 | Ke Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han: Divide-and-Approximate: A Novel Constraint Push Strategy for Iceberg Cube Mining. IEEE Trans. Knowl. Data Eng. 17(3): 354-368 (2005) | |
2004 | ||
76 | Ke Wang, Yabo Xu, Jeffrey Xu Yu: Scalable sequential pattern mining for biological sequences. CIKM 2004: 178-187 | |
75 | Rui Kuang, Eugene Ie, Ke Wang, Kai Wang, Mahira Siddiqi, Yoav Freund, Christina S. Leslie: Profile-Based String Kernels for Remote Homology Detection and Motif Extraction. CSB 2004: 152-160 | |
74 | Ke Wang, Philip S. Yu, Sourav Chakraborty: Bottom-Up Generalization: A Data Mining Solution to Privacy Protection. ICDM 2004: 249-256 | |
73 | Li-bao Zhang, Ke Wang: Efficient Lossy to Lossless Medical Image Compression Using Integer Wavelet Transform and Multiple Subband Decomposition. MIAR 2004: 86-93 | |
72 | Li-bao Zhang, Ke Wang: New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications. NPC 2004: 513-516 | |
71 | Ke Wang, Salvatore J. Stolfo: Anomalous Payload-Based Network Intrusion Detection. RAID 2004: 203-222 | |
70 | Jing Wang, Ke Wang: Optimal control of harvesting for single population. Applied Mathematics and Computation 156(1): 235-247 (2004) | |
69 | Qiang Yang, Ian Tian Yi Li, Ke Wang: Building Association-Rule Based Sequential Classifiers for Web-Document Prediction. Data Min. Knowl. Discov. 8(3): 253-273 (2004) | |
68 | Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang, Wei Zou: Mining Constrained Gradients in Large Databases. IEEE Trans. Knowl. Data Eng. 16(8): 922-938 (2004) | |
2003 | ||
67 | Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern: EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290- | |
66 | Ke Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han: Pushing Aggregate Constraints by Divide-and-Approximate. ICDE 2003: 291-302 | |
65 | Ke Wang, Senqiang Zhou, Jack Man Shun Yeung, Qiang Yang: Mining Customer Value: From Association Rules to Direct Marketing. ICDE 2003: 738-740 | |
64 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang: MPIS: Maximal-Profit Item Selection with Cross-Selling Considerations. ICDM 2003: 371-378 | |
63 | Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: Behavior Profiling of Email. ISI 2003: 74-90 | |
62 | Ke Wang, Yuelong Jiang, Laks V. S. Lakshmanan: Mining unexpected rules by pushing user dynamics. KDD 2003: 246-255 | |
61 | Rong She, Fei Chen, Ke Wang, Martin Ester, Jennifer L. Gardy, Fiona S. L. Brinkman: Frequent-subsequence-based prediction of outer membrane proteins. KDD 2003: 436-445 | |
60 | Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81 | |
59 | Benjamin C. M. Fung, Ke Wang, Martin Ester: Hierarchical Document Clustering using Frequent Itemsets. SDM 2003 | |
58 | Ke Wang, Senqiang Zhou, Ada Wai-Chee Fu, Jeffrey Xu Yu: Mining Changes of Classification by Correspondence Tracing. SDM 2003 | |
57 | Chang-Jian Zhao, Lokenath Debnath, Ke Wang: Positive periodic solutions of a delayed model in population. Appl. Math. Lett. 16(4): 561-565 (2003) | |
56 | Qiang Yang, Tianyiian Li, Ke Wang: Web-Log Cleaning for Constructing Sequential Classifiers. Applied Artificial Intelligence 17(5-6): 431-441 (2003) | |
55 | Ke Wang, Yu He, Jiawei Han: Pushing Support Constraints Into Association Rules Mining. IEEE Trans. Knowl. Data Eng. 15(3): 642-658 (2003) | |
54 | Jennifer L. Gardy, Cory Spencer, Ke Wang, Martin Ester, Gábor E. Tusnády, István Simon, Sujun Hua, Katalin de Fays, Christophe G. Lambert, Kenta Nakai, Fiona S. L. Brinkman: PSORT-B: improving protein subcellular localization prediction for Gram-negative bacteria. Nucleic Acids Research 31(13): 3613-3617 (2003) | |
2002 | ||
53 | Ke Wang, Senqiang Zhou, Jiawei Han: Profit Mining: From Patterns to Actions. EDBT 2002: 70-87 | |
52 | Eric Ka Ka Ng, Ada Wai-Chee Fu, Ke Wang: Mining Association Rules from Stars. ICDM 2002: 322-329 | |
51 | Junqiang Liu, Yunhe Pan, Ke Wang, Jiawei Han: Mining frequent item sets by opportunistic projection. KDD 2002: 229-238 | |
50 | Ke Wang, Ming-Yen Thomas Su: Item selection by "hub-authority" profit ranking. KDD 2002: 652-657 | |
49 | Ke Wang, Liu Tang, Jiawei Han, Junqiang Liu: Top Down FP-Growth for Association Rule Mining. PAKDD 2002: 334-340 | |
48 | Emin Gün Sirer, Ke Wang: An access control language for web services. SACMAT 2002: 23-30 | |
47 | Gao Cong, Lan Yi, Bing Liu, Ke Wang: Discovering Frequent Substructures from Hierarchical Semi-structured Data. SDM 2002 | |
46 | Jiawei Han, Jianyong Wang, Guozhu Dong, Jian Pei, Ke Wang: CubeExplorer: online exploration of data cubes. SIGMOD Conference 2002: 626 | |
2001 | ||
45 | Helen Pinto, Jiawei Han, Jian Pei, Ke Wang, Qiming Chen, Umeshwar Dayal: Multi-Dimensional Sequential Pattern Mining. CIKM 2001: 81-88 | |
44 | Ke Wang, Yu He, David Wai-Lok Cheung, Francis Y. L. Chin: Mining Confident Rules Without Support Requirement. CIKM 2001: 89-96 | |
43 | Sonny Han Seng Chee, Jiawei Han, Ke Wang: RecTree: An Efficient Collaborative Filtering Method. DaWaK 2001: 141-151 | |
42 | Ke Wang, Yu He: User-Defined Association Mining. PAKDD 2001: 387-399 | |
41 | Jiawei Han, Jian Pei, Guozhu Dong, Ke Wang: Efficient Computation of Iceberg Cubes with Complex Measures. SIGMOD Conference 2001: 1-12 | |
40 | Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang: Mining Multi-Dimensional Constrained Gradients in Data Cubes. VLDB 2001: 321-330 | |
39 | Ian Tian Yi Li, Qiang Yang, Ke Wang: Classification Pruning for Web-request Prediction. WWW Posters 2001 | |
2000 | ||
38 | Ke Wang, Senqiang Zhou, Yu He: Growing decision trees on support-less association rules. KDD 2000: 265-269 | |
37 | Ke Wang, Yu He, Jiawei Han: Mining Frequent Itemsets Using Support Constraints. VLDB 2000: 43-52 | |
36 | Weining Zhang, Ke Wang: An Efficient Evaluation of a Fuzzy Equi-Join Using Fuzzy Equality Indicators. IEEE Trans. Knowl. Data Eng. 12(2): 225-237 (2000) | |
35 | Ke Wang, Huiqing Liu: Discovering Structural Association of Semistructured Data. IEEE Trans. Knowl. Data Eng. 12(3): 353-371 (2000) | |
1999 | ||
34 | Ke Wang, Chu Xu, Bing Liu: Clustering Transactions Using Large Items. CIKM 1999: 483-490 | |
33 | Ke Wang, Beng Chin Ooi, Sam Yuan Sung: P-Tree: A B-Tree Index for Lists. DASFAA 1999: 221-228 | |
32 | Bing Liu, Wynne Hsu, Ke Wang, Shu Chen: Visually Aided Exploration of Interesting Association Rules. PAKDD 1999: 380-389 | |
31 | Ke Wang, Senqiang Zhou, Shiang Chen Liew: Building Hierarchical Classifiers Using Class Proximity. VLDB 1999: 363-374 | |
1998 | ||
30 | Ke Wang, Soon Hock William Tay, Bing Liu: Interestingness-Based Interval Merger for Numeric Association Rules. KDD 1998: 121-128 | |
29 | Bing Liu, Ke Wang, Lai-Fun Mun, Xin-Zhi Qi: Using Decision Tree Induction for Discovering Holes in Data. PRICAI 1998: 182-193 | |
28 | Ke Wang, Bing Liu: Concurrent Discretization of Multiple Attributes. PRICAI 1998: 250-259 | |
27 | Ke Wang, Huiqing Liu: Discovering Typical Structures of Documents: A Road Map Approach. SIGIR 1998: 146-154 | |
26 | Wang Chiew Tan, Ke Wang, Limsoon Wong: A Graphical Interface to Genome Multidatabases. J. Database Manag. 9(1): 24-32 (1998) | |
1997 | ||
25 | Ke Wang: Mining Association Patterns from Nested Databases. DMKD 1997: 0- | |
24 | Ke Wang, Han Chong Goh: Minimum Splits Based Discretization for Continuous Features. IJCAI (2) 1997: 942-951 | |
23 | Ke Wang, Huiqing Liu: Schema Discovery for Semistructured Data. KDD 1997: 271-274 | |
22 | Ke Wang, Suman Sundaresh: Selecting Features by Vertical Compactness of Data. KDD 1997: 275-278 | |
21 | Ke Wang, Weining Zhang, Siu-Cheung Chau: Weakly Independent Database Schemes. Acta Inf. 34(1): 1-22 (1997) | |
20 | Ke Wang: Discovering Patterns from Large and Dynamic Sequential Data. J. Intell. Inf. Syst. 9(1): 33-56 (1997) | |
1996 | ||
19 | Wang Chiew Tan, Ke Wang, Limsoon Wong: QUICK: Graphical User Interface to Multiple Databases. DEXA Workshop 1996: 404-409 | |
1995 | ||
18 | Ke Wang: Some Positive Results for Boundedness of Multiple Recursive Rules. ICDT 1995: 383-396 | |
17 | Weining Zhang, Ke Wang, Siu-Cheung Chau: Data Partition and Parallel Evaluation of Datalog Programs. IEEE Trans. Knowl. Data Eng. 7(1): 163-176 (1995) | |
16 | Ke Wang, Weining Zhang, Siu-Cheung Chau: Decomposition of Magic Rewriting. J. ACM 42(2): 329-381 (1995) | |
1994 | ||
15 | Ke Wang, Li-Yan Yuan: First-Order Logic Characterization of Program Properties. IEEE Trans. Knowl. Data Eng. 6(4): 518-533 (1994) | |
1993 | ||
14 | Ke Wang, Weining Zhang, Siu-Cheung Chau: Minimize Linear Mutual Recursion by Rule Unfolding. ICCI 1993: 98-102 | |
13 | Héctor J. Hernández, Ke Wang: On the Boundedness of Constant-Time-Maintainable Database Schemes. SIAM J. Comput. 22(1): 29-45 (1993) | |
1992 | ||
12 | Ke Wang, Li-Yan Yuan: Enforce Constraints in Archival Databases. ICCI 1992: 397-400 | |
11 | Ke Wang, Marc H. Graham: Constant-Time Maintainability: A Generalization of Independence. ACM Trans. Database Syst. 17(2): 201-246 (1992) | |
10 | Ke Wang, Li-Yan Yuan: Preservation of Integrity Constraints in Definite DATALOG Programs. Inf. Process. Lett. 44(4): 185-193 (1992) | |
9 | Ke Wang: On Characterizing Boundedness of Database Schemes with Bounded Dependencies. Theor. Comput. Sci. 100(2): 347-364 (1992) | |
1991 | ||
8 | Ke Wang, Li-Yan Yuan: Incremental Database Design Revisited. ICCI 1991: 219-230 | |
7 | Ke Wang, Li-Yan Yuan: First-Order Logic Reducible Programs. ICDE 1991: 746-755 | |
6 | Weining Zhang, Ke Wang, Siu-Cheung Chau: Data partition: A Practical Parallel Evaluation of Datalog Programs. PDIS 1991: 98-105 | |
1990 | ||
5 | Ke Wang: Polynomial Time Designs toward Both BCNF and Efficient Data Manipulation. SIGMOD Conference 1990: 74-83 | |
4 | Marc H. Graham, Ke Wang: On the Equivalence of an Egd to a Set of Fd's J. ACM 37(3): 474-490 (1990) | |
1989 | ||
3 | Ke Wang: Can Constant-time Maintainability Be More Practical? PODS 1989: 120-127 | |
1986 | ||
2 | Marc H. Graham, Ke Wang: Constant Time Maintenance or The Triumph of the fd. PODS 1986: 202-216 | |
1984 | ||
1 | In-Shek Hsu, Irving S. Reed, Trieu-Kien Truong, Ke Wang, Chiunn-Shyong Ye, Leslie J. Deutsch: The VLSI Implementation of a Reed-Solomon Encoder Using Berlekamp's Bit-Serial Multiplier Algorithm. IEEE Trans. Computers 33(10): 906-911 (1984) |