(1) Papers accepted by main conference
Long Presentation Papers
| Minimizing Expected Loss for Risk-Avoiding Reinforcement Learning | |
| Jung-Jung Yeh, Tsung-Ting Kuo, William Chen and Shou-De Lin | |
| Learning Sparse and Scale-free Networks | |
| Melih Aslan, Xuewen Chen and Hong Cheng | |
| Active Learning for Text Classification Using the LSI Subspace Signature Model | |
| Weizhong Zhu and Robert B. Allen | |
| A Semisupervised Associative Classification Method for POS Tagging | |
| Pratibha Rani, Vikram Pudi and Dipti Sharma | |
| Optimizing Specificity under Perfect Sensitivity for Medical Data Classification | |
| Cho-Yi Hsiao, Hung-Yi Lo, Tu-Chun Yin and Shou-De Lin | |
| Interactive Correlation Clustering | |
| Floris Geerts and Reuben Ndindi | |
| Rough Possibilistic Meta-Clustering of Retail Datasets | |
| Asma Ammar, Zied Elouedi and Pawan Lingras | |
| Community detection in social networks: the power of ensemble methods | |
| Rushed Kanawati | |
| Learning a Proximity Measure to Complete a Community | |
| Maximilien Danisch, Jean-Loup Guillaume and Benedicte Le Grand | |
| Sentiment Detection and Visualization of Chinese Micro-blog | |
| Zhitao Wang, Zhiwen Yu, Liming Chen and Bin Guo | |
| A Confidence-based Entity Resolution Approach with Incomplete Information | |
| Qi Gu, Yan Zhang, Jian Cao and Guandong Xu | |
| Social Influence-Aware Reverse Nearest Neighbor Search | |
| Hui-Ju Hung, De-Nian Yang and Wang-Chien Lee | |
| Influence Maximization in a Social Network in the Presence of Multiple Influences and Acceptances | |
| Jun-Li Lu, Ling-Yin Wei and Mi-Yen Yeh | |
| Efficient Analysis of Node Influence Based on SIR Model over Huge Complex Networks | |
| Masahiro Kimura, Kazumi Saito, Kouzou Ohara and Hiroshi Motoda | |
| Probabilistic Category-based Location Recommendation Utilizing Temporal Influence and Geographical Influence | |
| Dequan Zhou and Xin Wang | |
| Human Behaviour Analysis Using Multimodal Emotion Recognition | |
| Prashant Jha and Rammohana Reddy Guddeti | |
| Semi-randomized Hashing for Large Scale Data Retrieval | |
| Haichuan Yang, Xiao Bai, Jun Zhou, Peng Ren, Jian Cheng and Lu Bai | |
| A Token Authentication Solution for Hadoop Based on Kerberos Pre-Authentication | |
| Kai Zheng and Weihua Jiang | |
| Exploring Technological Trends for Patent Evaluation | |
| Shuting Wang, Wang-Chien Lee, Zhen Lei, Xianliang Zhang and Yu-Hsuan Kuo | |
| Similarity Analysis of Service Descriptions for Efficient Web Service Discovery | |
| Sowmya Kamath S and Ananthanarayana V.S | |
| Detecting Hidden Propagation Structure and Its Application to Analyzing Phishing | |
| Yang Liu and Mingyan Liu | |
| A Model-Selection Framework for Concept-Drifting Data Streams | |
| Bo-Heng Chen and Kun-Ta Chuang | |
Short Presentation Papers
| Pseudo Labels for Imbalanced Multi-Label Learning | |
| Wenrong Zeng, Xuewen Chen and Hong Cheng | |
| Proactive Learning with Multiple Class-Sensitive Labelers | |
| Seungwhan Moon and Jaime Carbonell | |
| Itemset Approximation Using Constrained Binary Matrix Factorization | |
| Seyed Hamid Mirisaee, Eric Gaussier and Alexandre Termier | |
| Critical Class Sensitive Active Learning Method for Classification of Remote Sensing Imagery | |
| Lian-Zhi Huo, Zheng Zhang and Liang Tang | |
| Appliance and State Recognition using Hidden Markov Models | |
| Antonio Ridi, Christophe Gisler and Jean Hennebert | |
| Content Specific Coverage Patterns for Banner Advertisement Placement | |
| Venkata Trinath Atmakuri, Gowtham Srinivas Parupalli and Krishna Reddy Polepalli | |
| Matrix Completion Based on Feature Vector and Function Approximation | |
| Shiwei Ye, Yuan Sun and Yi Sun | |
| RAKHYA’S Method: A Case Based Approach to Solve n-Queens Problem | |
| Sourabh Rakhya and Saurabh Singh | |
| Inferring Potential Users in Mobile Social Networks | |
| Tsung-Hao Hsu, Chien-Cheng Chen, Meng-Fen Chiang, Kuo-Wei Hsu and Wen-Chih Peng | |
| Overlapping Community Detection in Social Network Based on Microblog User Model | |
| Yajun Gu, Bofeng Zhang, Guobing Zou, Mingqing Huang and Keyuan Jiang | |
| Information Diffusion among Users on Facebook Fan Pages over Time: Its Impact on Movie Box Office | |
| Wan-Hsin Tang, Mi-Yen Yeh and Anthony J.T. Lee | |
| Diversification in News Recommendation for Privacy Concerned Users | |
| Maunendra Sankar Desarkar and Neha Shinde | |
| Recommending Funding Collaborators with Scholar Social Networks | |
| Juan Zhao, Kejun Dong and Jianjun Yu | |
| An Incremental Scheme for Large-scale Social-based Recommender Systems | |
| Chia-Ling Hsiao, Zih-Syuan Wang and Wei-Guang Teng | |
| Crowdsourced Data Analytics: A Case Study of Predictive Modeling Competition | |
| Yukino Baba, Nozomi Nori, Shigeru Saito and Hisashi Kashima | |
| Large-Scale Factorization of Type-Constrained Multi-Relational Data | |
| Denis Krompass, Maximilian Nickel and Volker Tresp | |
| Diversified Ranking on Graphs from the Influence Maximization Viewpoint | |
| Li-Yen Kuo and Ming-Syan Chen | |
| Mining influence in evolving entities: A study on stock market | |
| Chang Liao, Yanfei Huang, Xibin Shi and Xin Jin | |
| An Accuracy Enhancement Algorithm for Fingerprinting Method | |
| Yuntian Brian Bai, Mani Williams, Falin Wu, Allison Kealy and Kefei Zhang | |
| Exploiting Mobility for Location Promotion in Location-based Social Networks | |
| Wen-Yuan Zhu, Wen-Chih Peng and Ling-Jyh Chen | |
| The Purpose of Motion: Learning Activities from Individual Mobility Networks | |
| Salvatore Rinzivillo, Lorenzo Gabrielli, Mirco Nanni, Luca Pappalardo, Fosca Giannotti and Dino Pedreschi | |
| On Selecting Feature-Value Pairs on Smart Phones for Activity Inferences | |
| Gunarto Sindoro Njoo, Yu-Hsiang Peng, Wen-Chih Peng and Kuo-Wei Hsu | |
| Storage Efficient Graph Search by Composite Dynamic-and-Static Indexing of a Single Network | |
| Yan Xie and Philip Yu | |
| An Improved Dynamic Adaptive Multi-tree Search Anti-collision Algorithm Based on RFID | |
| Min Shao, Xiao-Fang Jin and Li-Biao Jin | |
| Indexing and Retrieval of Human Motion Data Based on a Growing Self-Organizing Map | |
| Da-Cheng Yu and Wei-Guang Teng | |
| Investigating Sample Selection Bias in the Relevance Feedback Algorithm of the Vector Space Model for Information Retrieval | |
| Massimo Melucci | |
| Hadoop based Deep Packet Inspection System for Traffic Analysis of E-Business Websites | |
| Jiangtao Luo, Yan Liang, Wei Gao and Junchao Yang | |
| A Data Reusing Strategy Based On Hive | |
| Heng Xie, Mei Wang and Jiajin Le | |
| Dehazing algorithm’s high performance and parallel computing for GF-1 satellite images | |
| Changmiao Hu, Xiaojun Shan and Zheng Zhang | |
| General In-Situ Matrix Transposition Algorithm for Massively Parallel Environments | |
| Marcin Gorawski and Michal Lorek | |
| A Way For Accelerating The DNA Sequence Reconstruction Problem By CUDA | |
| Yukun Zhong, Jianbiao Lin, Che Nian, Chen Tao and Baoqiu Wang | |
| A New Pre-Pushing VoD Scheme in Hierarchical Network Environment | |
| Fei Long and Xingjun Wang | |
| Account Level Demand Estimation and Intelligence Framework | |
| Pranjal Mallick, Vikash Kumar Sharma, Parikshit Bhinde and Mutha Reddy Mandapati | |
| Modelling and Simulation for “Event Driven-Time Driven-Parameters Changes” Paradigm with Applications | |
| Ahmed Rabie Ginidi and Hassen Taher Dorrah | |
| Exploring New Privacy Approaches in a Scalable Classification Framework | |
| M Saravanan, Mohamed Thoufeeq, S Akshaya and V.L Jayasre Manchari | |
| Usage Signatures Analysis – An Alternative Method for Preventing Fraud in e-Commerce Applications | |
| Gabriel Mota, Joana Fernandes and Orlando Belo | |
| A Probabilistic Condensed Representation of Data for Stream Mining | |
| Michael Geilke, Andreas Karwath and Stefan Kramer | |
| Incrementally Mining Temporal Patterns in Interval-based Databases | |
| Yi-Cheng Chen, Julia Tzu-Ya Weng, Jun-Zhe Wang, Chien-Li Chou, Jiun-Long Huang and Suh-Yin Lee. | |
(2) Papers accepted by special sessions
Special Session: Statistical and Mathematical Tools for Data Mining – SMTDM
| Efficient Learning of General Bayesian Network Classifier by Local and Adaptive Search | |
| Sein Minn, Shunkai Fu and Michel C. Desmarais | |
| A Naive Bayesian Classifier in Categorical Uncertain Data Streams | |
| Jiaqi Ge, Yuni Xia and Jian Wang | |
| A New Set of Random Forests with Varying Dynamic Data Reduction and Voting Techniques | |
| Hussein Mohsen, Hasan Kurban, Mark Jenne and Mehmet Dalkilic | |
| A Probability Product Kernel for Text Classification | |
| Hai Cao and Mingmin Chi | |
| Centroid Training to Achieve Effective Text Classification | |
| Libiao Zhang, Yuefeng Li, Yue Xu, Dian Tjondronegoro and Chao Sun | |
| Representing Sentence with Unfolding Recursive Autoencoders and Dynamic Average Pooling | |
| Yin Hang, Zhang Chunhong, Zhu Yunkai and Ji Yang | |
| A Novel Context-based Implicit Feature Extracting Method | |
| Li Sun, Sheng Li, Jiyun Li and Jutao Lv | |
| Local Feature Based Dynamic Time Warping | |
| Zheng Zhang, Liang Tang and Ping Tang | |
| Mobile User Stability Prediction with Random Forest Model | |
| Danqin Wang and Xiaolong Zhang | |
| Beyond Association Rule Mining: Exceptional Relationships | |
| J. M. Luna, Mykola Pechenizkiy and Sebastián Ventura | |
| Detecting Stock Market Manipulation Using Supervised Learning Algorithms | |
| Koosha Golmohammadi, Osmar Zaiane and David Diaz | |
| Recommending Missing Citations for Newly Granted Patents | |
| Sooyoung Oh, Zhen Lei, Wang-Chien Lee and John Yen | |
Special Session: Warehousing and Intelligent Analysis of Complex Network Big Data – WIACNBD
| FCA for Common Interest Communities discovering | |
| Soumaya Guesmi, Chiraz Trabelsi and Chiraz Latiri | |
| Diversification Recommendation of Popular Articles in Micro-blog Scenario | |
| Jianxing Zheng, Bofeng Zhang, Guobing Zou and Xiaodong Yue | |
| Analysis of Circadian Rhythms from Online Communities of Individuals with Affective Disorders | |
| Bo Dao, Thin Nguyen, Dinh Phung and Svetha Venkatesh | |
| Link Prediction and Threads in Email Networks | |
| Qinna Wang | |
| Mining Approximate Multi-Relational Patterns | |
| Eirini Spyropoulou and Tijl De Bie | |
| A Detecting Community Method in Complex Networks with Fuzzy Clustering | |
| Xiao Feng Wang, Gong Shen Liu and Jian Hua Li | |
| Neural Network-Based Approaches for Predicting Query Response Times | |
| Elif Ezgi Yusufoglu, Murat Ayyildiz and Ensar Gul | |
| User Preference Space Partition and Product Filters for Reverse Top-k Queries | |
| Zong-Hua Yang and Hung-Yu Kao | |
| Finding Top-k Semantically Related Terms in Relational Keyword Search | |
| Xiangfu Meng and Jingyu Shao | |
| Design Process for Big Data Warehouses | |
| Francesco Di Tria, Ezio Lefons and Filippo Tangorra | |
| A Broking Mechanism Based on Service Adaptive Using MROSP Algorithm | |
| Ashish Tiwari, Mehul Mahrishi and Vipin Sharma | |
| 23-bit Metaknowledge Template Towards Big Data Knowledge Discovery and Management | |
| Nima Bari, Roman Vichr, Kamran Kowsari and Simon Berkovich | |
Special Session: Environmental and Geo-spatial Data Analytics – EGSDA
| Tseng and Zhi-Hua Zhou. Location Semantics Prediction for Living Analytics by Mining Smartphone Data | |
| Chi-Min Huang, Jia-Ching Ying, Vincent S | |
| Management of Complex Data Objects in Ship Designing Process | |
| Ruihan Bao and Hongming Cai | |
| Mean Shift-based Target Tracking for Moving Spherical Object in Video | |
| Bozhao Li | |
| SAR Target Recognition Based on Deep Learning | |
| Sizhe Chen and Haipeng Wang | |
| Mining Sequential Rules with Formal Semantics | |
| Liqiang Geng and Xin Wang | |
| Mining Frequent Time Interval-based Event with Duration Patterns from Temporal Database | |
| Kuan-Ying Chen, Bijay Jaysawal, Jen-Wei Huang and Yong-Bin Wu | |
Special Session: Bioinformatics, Biomedical, Health & Medical Analytics – BHMA
| Measurement of Data Quality in Health Unit Web Sites – Towards a Model | |
| Patrícia Leite Brandão and Álvaro Rocha | |
| Sharing Sensitive Medical Data Sets for Research Purposes – A Case Study | |
| Kalpana Singh, Jia Rong and Lynn Batten | |
| Mobile-based Food Classification for Type-2 Diabetes Using Nutrient and Textual Features | |
| Yan Luo, Charles Ling and Shuang Ao | |
| Solving Longest Overlap Region Problem for Noncoding DNA Sequence with GPU | |
| Yukun Zhong, Jianbiao Lin, Chen Tao, Baoqiu Wang and Che Nian | |
| Investigation of SEE on a 32-bit Microprocessor Based on SPARC V8 Architecture by Laser Test | |
| Chunqing Yu, Long Fan, Suge Yue, Maoxin Chen and Shougang Du | |
| Individualized Arrhythmia Detection with ECG Signals from Wearable Devices | |
| Thanh Binh Nguyen, Wei Luo, Terry Caelli, Svetha Venkatesh and Dinh Phung | |
Special Session: Exploratory Computing – EC
| Exploratory Computing: A Draft Manifesto | |
| Nicoletta Di Blas, Mirjana Mazuran, Paolo Paolini, Elisa Quintarelli and Letizia Tanca | |
| Exploratory Portals. The Need for a New Generation | |
| Paolo Paolini and Nicoletta Di Blas | |
| Exploring Emotions over Time within the Blogosphere | |
| Patrick Hennig, Philipp Berger, Lukas Pirl, Lukas Schulze and Christoph Meinel | |
| StatsReduce in the Cloud for Approximate Analytics | |
| Michel De Rougemont | |
| An Implementation of the Efficient Huge Amount of Pseudo-random Unique Numbers Generator and the Acceleration Analysis of Parallelization | |
| Yun-Te Lin, Yung-Hsiang Huang, Yu-Jung Cheng, Yi-Hao Hsiao, Fang-Pang Lin, Jih-Sheng Chang and Shengwen Wang | |
| Toward Robust Classification Using the Open Directory Project | |
| Jongwoo Ha, Jung-Hyun Lee, Won-Jun Jang, Yong-Ku Lee and Sangkeun Lee | |