(1) Papers accepted by main conference
Long Presentation Papers
Minimizing Expected Loss for Risk-Avoiding Reinforcement Learning | |
Jung-Jung Yeh, Tsung-Ting Kuo, William Chen and Shou-De Lin | |
Learning Sparse and Scale-free Networks | |
Melih Aslan, Xuewen Chen and Hong Cheng | |
Active Learning for Text Classification Using the LSI Subspace Signature Model | |
Weizhong Zhu and Robert B. Allen | |
A Semisupervised Associative Classification Method for POS Tagging | |
Pratibha Rani, Vikram Pudi and Dipti Sharma | |
Optimizing Specificity under Perfect Sensitivity for Medical Data Classification | |
Cho-Yi Hsiao, Hung-Yi Lo, Tu-Chun Yin and Shou-De Lin | |
Interactive Correlation Clustering | |
Floris Geerts and Reuben Ndindi | |
Rough Possibilistic Meta-Clustering of Retail Datasets | |
Asma Ammar, Zied Elouedi and Pawan Lingras | |
Community detection in social networks: the power of ensemble methods | |
Rushed Kanawati | |
Learning a Proximity Measure to Complete a Community | |
Maximilien Danisch, Jean-Loup Guillaume and Benedicte Le Grand | |
Sentiment Detection and Visualization of Chinese Micro-blog | |
Zhitao Wang, Zhiwen Yu, Liming Chen and Bin Guo | |
A Confidence-based Entity Resolution Approach with Incomplete Information | |
Qi Gu, Yan Zhang, Jian Cao and Guandong Xu | |
Social Influence-Aware Reverse Nearest Neighbor Search | |
Hui-Ju Hung, De-Nian Yang and Wang-Chien Lee | |
Influence Maximization in a Social Network in the Presence of Multiple Influences and Acceptances | |
Jun-Li Lu, Ling-Yin Wei and Mi-Yen Yeh | |
Efficient Analysis of Node Influence Based on SIR Model over Huge Complex Networks | |
Masahiro Kimura, Kazumi Saito, Kouzou Ohara and Hiroshi Motoda | |
Probabilistic Category-based Location Recommendation Utilizing Temporal Influence and Geographical Influence | |
Dequan Zhou and Xin Wang | |
Human Behaviour Analysis Using Multimodal Emotion Recognition | |
Prashant Jha and Rammohana Reddy Guddeti | |
Semi-randomized Hashing for Large Scale Data Retrieval | |
Haichuan Yang, Xiao Bai, Jun Zhou, Peng Ren, Jian Cheng and Lu Bai | |
A Token Authentication Solution for Hadoop Based on Kerberos Pre-Authentication | |
Kai Zheng and Weihua Jiang | |
Exploring Technological Trends for Patent Evaluation | |
Shuting Wang, Wang-Chien Lee, Zhen Lei, Xianliang Zhang and Yu-Hsuan Kuo | |
Similarity Analysis of Service Descriptions for Efficient Web Service Discovery | |
Sowmya Kamath S and Ananthanarayana V.S | |
Detecting Hidden Propagation Structure and Its Application to Analyzing Phishing | |
Yang Liu and Mingyan Liu | |
A Model-Selection Framework for Concept-Drifting Data Streams | |
Bo-Heng Chen and Kun-Ta Chuang | |
Short Presentation Papers
Pseudo Labels for Imbalanced Multi-Label Learning | |
Wenrong Zeng, Xuewen Chen and Hong Cheng | |
Proactive Learning with Multiple Class-Sensitive Labelers | |
Seungwhan Moon and Jaime Carbonell | |
Itemset Approximation Using Constrained Binary Matrix Factorization | |
Seyed Hamid Mirisaee, Eric Gaussier and Alexandre Termier | |
Critical Class Sensitive Active Learning Method for Classification of Remote Sensing Imagery | |
Lian-Zhi Huo, Zheng Zhang and Liang Tang | |
Appliance and State Recognition using Hidden Markov Models | |
Antonio Ridi, Christophe Gisler and Jean Hennebert | |
Content Specific Coverage Patterns for Banner Advertisement Placement | |
Venkata Trinath Atmakuri, Gowtham Srinivas Parupalli and Krishna Reddy Polepalli | |
Matrix Completion Based on Feature Vector and Function Approximation | |
Shiwei Ye, Yuan Sun and Yi Sun | |
RAKHYA’S Method: A Case Based Approach to Solve n-Queens Problem | |
Sourabh Rakhya and Saurabh Singh | |
Inferring Potential Users in Mobile Social Networks | |
Tsung-Hao Hsu, Chien-Cheng Chen, Meng-Fen Chiang, Kuo-Wei Hsu and Wen-Chih Peng | |
Overlapping Community Detection in Social Network Based on Microblog User Model | |
Yajun Gu, Bofeng Zhang, Guobing Zou, Mingqing Huang and Keyuan Jiang | |
Information Diffusion among Users on Facebook Fan Pages over Time: Its Impact on Movie Box Office | |
Wan-Hsin Tang, Mi-Yen Yeh and Anthony J.T. Lee | |
Diversification in News Recommendation for Privacy Concerned Users | |
Maunendra Sankar Desarkar and Neha Shinde | |
Recommending Funding Collaborators with Scholar Social Networks | |
Juan Zhao, Kejun Dong and Jianjun Yu | |
An Incremental Scheme for Large-scale Social-based Recommender Systems | |
Chia-Ling Hsiao, Zih-Syuan Wang and Wei-Guang Teng | |
Crowdsourced Data Analytics: A Case Study of Predictive Modeling Competition | |
Yukino Baba, Nozomi Nori, Shigeru Saito and Hisashi Kashima | |
Large-Scale Factorization of Type-Constrained Multi-Relational Data | |
Denis Krompass, Maximilian Nickel and Volker Tresp | |
Diversified Ranking on Graphs from the Influence Maximization Viewpoint | |
Li-Yen Kuo and Ming-Syan Chen | |
Mining influence in evolving entities: A study on stock market | |
Chang Liao, Yanfei Huang, Xibin Shi and Xin Jin | |
An Accuracy Enhancement Algorithm for Fingerprinting Method | |
Yuntian Brian Bai, Mani Williams, Falin Wu, Allison Kealy and Kefei Zhang | |
Exploiting Mobility for Location Promotion in Location-based Social Networks | |
Wen-Yuan Zhu, Wen-Chih Peng and Ling-Jyh Chen | |
The Purpose of Motion: Learning Activities from Individual Mobility Networks | |
Salvatore Rinzivillo, Lorenzo Gabrielli, Mirco Nanni, Luca Pappalardo, Fosca Giannotti and Dino Pedreschi | |
On Selecting Feature-Value Pairs on Smart Phones for Activity Inferences | |
Gunarto Sindoro Njoo, Yu-Hsiang Peng, Wen-Chih Peng and Kuo-Wei Hsu | |
Storage Efficient Graph Search by Composite Dynamic-and-Static Indexing of a Single Network | |
Yan Xie and Philip Yu | |
An Improved Dynamic Adaptive Multi-tree Search Anti-collision Algorithm Based on RFID | |
Min Shao, Xiao-Fang Jin and Li-Biao Jin | |
Indexing and Retrieval of Human Motion Data Based on a Growing Self-Organizing Map | |
Da-Cheng Yu and Wei-Guang Teng | |
Investigating Sample Selection Bias in the Relevance Feedback Algorithm of the Vector Space Model for Information Retrieval | |
Massimo Melucci | |
Hadoop based Deep Packet Inspection System for Traffic Analysis of E-Business Websites | |
Jiangtao Luo, Yan Liang, Wei Gao and Junchao Yang | |
A Data Reusing Strategy Based On Hive | |
Heng Xie, Mei Wang and Jiajin Le | |
Dehazing algorithm’s high performance and parallel computing for GF-1 satellite images | |
Changmiao Hu, Xiaojun Shan and Zheng Zhang | |
General In-Situ Matrix Transposition Algorithm for Massively Parallel Environments | |
Marcin Gorawski and Michal Lorek | |
A Way For Accelerating The DNA Sequence Reconstruction Problem By CUDA | |
Yukun Zhong, Jianbiao Lin, Che Nian, Chen Tao and Baoqiu Wang | |
A New Pre-Pushing VoD Scheme in Hierarchical Network Environment | |
Fei Long and Xingjun Wang | |
Account Level Demand Estimation and Intelligence Framework | |
Pranjal Mallick, Vikash Kumar Sharma, Parikshit Bhinde and Mutha Reddy Mandapati | |
Modelling and Simulation for “Event Driven-Time Driven-Parameters Changes” Paradigm with Applications | |
Ahmed Rabie Ginidi and Hassen Taher Dorrah | |
Exploring New Privacy Approaches in a Scalable Classification Framework | |
M Saravanan, Mohamed Thoufeeq, S Akshaya and V.L Jayasre Manchari | |
Usage Signatures Analysis – An Alternative Method for Preventing Fraud in e-Commerce Applications | |
Gabriel Mota, Joana Fernandes and Orlando Belo | |
A Probabilistic Condensed Representation of Data for Stream Mining | |
Michael Geilke, Andreas Karwath and Stefan Kramer | |
Incrementally Mining Temporal Patterns in Interval-based Databases | |
Yi-Cheng Chen, Julia Tzu-Ya Weng, Jun-Zhe Wang, Chien-Li Chou, Jiun-Long Huang and Suh-Yin Lee. | |
(2) Papers accepted by special sessions
Special Session: Statistical and Mathematical Tools for Data Mining – SMTDM
Efficient Learning of General Bayesian Network Classifier by Local and Adaptive Search | |
Sein Minn, Shunkai Fu and Michel C. Desmarais | |
A Naive Bayesian Classifier in Categorical Uncertain Data Streams | |
Jiaqi Ge, Yuni Xia and Jian Wang | |
A New Set of Random Forests with Varying Dynamic Data Reduction and Voting Techniques | |
Hussein Mohsen, Hasan Kurban, Mark Jenne and Mehmet Dalkilic | |
A Probability Product Kernel for Text Classification | |
Hai Cao and Mingmin Chi | |
Centroid Training to Achieve Effective Text Classification | |
Libiao Zhang, Yuefeng Li, Yue Xu, Dian Tjondronegoro and Chao Sun | |
Representing Sentence with Unfolding Recursive Autoencoders and Dynamic Average Pooling | |
Yin Hang, Zhang Chunhong, Zhu Yunkai and Ji Yang | |
A Novel Context-based Implicit Feature Extracting Method | |
Li Sun, Sheng Li, Jiyun Li and Jutao Lv | |
Local Feature Based Dynamic Time Warping | |
Zheng Zhang, Liang Tang and Ping Tang | |
Mobile User Stability Prediction with Random Forest Model | |
Danqin Wang and Xiaolong Zhang | |
Beyond Association Rule Mining: Exceptional Relationships | |
J. M. Luna, Mykola Pechenizkiy and Sebastián Ventura | |
Detecting Stock Market Manipulation Using Supervised Learning Algorithms | |
Koosha Golmohammadi, Osmar Zaiane and David Diaz | |
Recommending Missing Citations for Newly Granted Patents | |
Sooyoung Oh, Zhen Lei, Wang-Chien Lee and John Yen | |
Special Session: Warehousing and Intelligent Analysis of Complex Network Big Data – WIACNBD
FCA for Common Interest Communities discovering | |
Soumaya Guesmi, Chiraz Trabelsi and Chiraz Latiri | |
Diversification Recommendation of Popular Articles in Micro-blog Scenario | |
Jianxing Zheng, Bofeng Zhang, Guobing Zou and Xiaodong Yue | |
Analysis of Circadian Rhythms from Online Communities of Individuals with Affective Disorders | |
Bo Dao, Thin Nguyen, Dinh Phung and Svetha Venkatesh | |
Link Prediction and Threads in Email Networks | |
Qinna Wang | |
Mining Approximate Multi-Relational Patterns | |
Eirini Spyropoulou and Tijl De Bie | |
A Detecting Community Method in Complex Networks with Fuzzy Clustering | |
Xiao Feng Wang, Gong Shen Liu and Jian Hua Li | |
Neural Network-Based Approaches for Predicting Query Response Times | |
Elif Ezgi Yusufoglu, Murat Ayyildiz and Ensar Gul | |
User Preference Space Partition and Product Filters for Reverse Top-k Queries | |
Zong-Hua Yang and Hung-Yu Kao | |
Finding Top-k Semantically Related Terms in Relational Keyword Search | |
Xiangfu Meng and Jingyu Shao | |
Design Process for Big Data Warehouses | |
Francesco Di Tria, Ezio Lefons and Filippo Tangorra | |
A Broking Mechanism Based on Service Adaptive Using MROSP Algorithm | |
Ashish Tiwari, Mehul Mahrishi and Vipin Sharma | |
23-bit Metaknowledge Template Towards Big Data Knowledge Discovery and Management | |
Nima Bari, Roman Vichr, Kamran Kowsari and Simon Berkovich | |
Special Session: Environmental and Geo-spatial Data Analytics – EGSDA
Tseng and Zhi-Hua Zhou. Location Semantics Prediction for Living Analytics by Mining Smartphone Data | |
Chi-Min Huang, Jia-Ching Ying, Vincent S | |
Management of Complex Data Objects in Ship Designing Process | |
Ruihan Bao and Hongming Cai | |
Mean Shift-based Target Tracking for Moving Spherical Object in Video | |
Bozhao Li | |
SAR Target Recognition Based on Deep Learning | |
Sizhe Chen and Haipeng Wang | |
Mining Sequential Rules with Formal Semantics | |
Liqiang Geng and Xin Wang | |
Mining Frequent Time Interval-based Event with Duration Patterns from Temporal Database | |
Kuan-Ying Chen, Bijay Jaysawal, Jen-Wei Huang and Yong-Bin Wu | |
Special Session: Bioinformatics, Biomedical, Health & Medical Analytics – BHMA
Measurement of Data Quality in Health Unit Web Sites – Towards a Model | |
Patrícia Leite Brandão and Álvaro Rocha | |
Sharing Sensitive Medical Data Sets for Research Purposes – A Case Study | |
Kalpana Singh, Jia Rong and Lynn Batten | |
Mobile-based Food Classification for Type-2 Diabetes Using Nutrient and Textual Features | |
Yan Luo, Charles Ling and Shuang Ao | |
Solving Longest Overlap Region Problem for Noncoding DNA Sequence with GPU | |
Yukun Zhong, Jianbiao Lin, Chen Tao, Baoqiu Wang and Che Nian | |
Investigation of SEE on a 32-bit Microprocessor Based on SPARC V8 Architecture by Laser Test | |
Chunqing Yu, Long Fan, Suge Yue, Maoxin Chen and Shougang Du | |
Individualized Arrhythmia Detection with ECG Signals from Wearable Devices | |
Thanh Binh Nguyen, Wei Luo, Terry Caelli, Svetha Venkatesh and Dinh Phung | |
Special Session: Exploratory Computing – EC
Exploratory Computing: A Draft Manifesto | |
Nicoletta Di Blas, Mirjana Mazuran, Paolo Paolini, Elisa Quintarelli and Letizia Tanca | |
Exploratory Portals. The Need for a New Generation | |
Paolo Paolini and Nicoletta Di Blas | |
Exploring Emotions over Time within the Blogosphere | |
Patrick Hennig, Philipp Berger, Lukas Pirl, Lukas Schulze and Christoph Meinel | |
StatsReduce in the Cloud for Approximate Analytics | |
Michel De Rougemont | |
An Implementation of the Efficient Huge Amount of Pseudo-random Unique Numbers Generator and the Acceleration Analysis of Parallelization | |
Yun-Te Lin, Yung-Hsiang Huang, Yu-Jung Cheng, Yi-Hao Hsiao, Fang-Pang Lin, Jih-Sheng Chang and Shengwen Wang | |
Toward Robust Classification Using the Open Directory Project | |
Jongwoo Ha, Jung-Hyun Lee, Won-Jun Jang, Yong-Ku Lee and Sangkeun Lee | |