Volume 3,
Number 1,
2008
- Quynh H. Nguyen, Victor J. Rayward-Smith:
Internal quality measures for clustering in metric spaces.
4-29
- Yannis Marinakis, Magdalene Marinaki, Nikolaos F. Matsatsinis:
A stochastic nature inspired metaheuristic for clustering analysis.
30-44
- Nikos Pelekis, Dimitrios K. Iakovidis, Evangelos E. Kotsifakos, Ioannis Kopanakis:
Fuzzy clustering of intuitionistic fuzzy data.
45-65
- Lokesh Kumar Sharma, Simon Scheider, Willy Kloesgen, Om Prakash Vyas:
Efficient clustering technique for regionalisation of a spatial database.
66-81
- Irene Ntoutsi, Nikos Mitsou, Gerasimos Marketos:
Traffic mining in a road-network: How does the traffic flow?
82-98
- Yan-Nei Law, Carlo Zaniolo:
Improving the accuracy of continuous aggregates and mining queries on data streams under load shedding.
99-117
Volume 3,
Number 2,
2008
- Ameera Jadalla, Ashraf Elnagar:
PDE4Java: Plagiarism Detection Engine for Java source code: a clustering approach.
121-135
- Chun Kit See, Kuok-Shoong Wong, Wei Lee Woon:
Text plagiarism detection method based on path patterns.
136-146
- Darenna Syahida Suib, Mustafa Mat Deris:
An efficient hierarchical clustering model for grouping web transactions.
147-157
- Alex Tze Hiang Sim, Maria Indrawan, Bala Srinivasan:
The importance of negative associations and the discovery of association rule pairs.
158-176
- Thomas Neubauer, Johannes Heurix:
Multiobjective decision support for defining secure business processes: a case study.
177-195
- Paraskevas Orfanidis, David J. Russomanno:
Preprocessing enhancements to improve data mining algorithms.
196-211
- Shu-Chuan Chu, John F. Roddick, Jeng-Shyang Pan:
Improved search strategies and extensions to k-medoids-based clustering algorithms.
212-231
Volume 3,
Number 3,
2008
- Christian Stingl, Daniel Slamanig:
Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks.
236-254
- Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
How to implement multidimensional security into OLAP tools.
255-276
- Yudistira Asnar, Paolo Giorgini, Paolo Ciancarini, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone:
An evaluation of business solutions in manufacturing enterprises.
305-329
- Vincenzo De Florio, Chris Blondia:
On the requirements of new software development.
330-349
Volume 3,
Number 4,
2008
- GuangHui Yan, LiSong Liu, LinNa Du, XiaXia Yang, ZhiCheng Ma, Xiao-Min Zhang:
Multifractal-based cluster hierarchy optimisation algorithm.
353-374
- You Wan, Jiaogen Zhou:
KNFCOM-T: a k-nearest features-based co-location pattern mining algorithm for large spatial data sets by using T-trees.
375-389
- Amirhossein Manzourolajdad, Mohammad Saraee, Aghafakhr Mirlohi, Abolfazl Javan:
Genome-wide efficient attribute selection for purely epistatic models via Shannon entropy.
390-408
- Weihua Xu, Wenxiu Zhang:
Knowledge reduction and matrix computation in inconsistent ordered information systems.
409-425
- He Hu, Xiaoyong Du:
A semantic analysis of Chinese radicals.
426-436
- Meng Zhang, Jiaogen Zhou, Lihua Fu, Tingting He:
Hybrid wavelet model construction using orthogonal forward selection with boosting search.
437-450
Copyright © Mon Mar 15 04:02:00 2010
by Michael Ley (ley@uni-trier.de)