Software developers have long known that project success requires a robust understanding of both technical and social linkages. However, research has largely considered these inde...
Anita Sarma, Larry Maccherone, Patrick Wagstrom, J...
Most commonly used inductive rule learning algorithms employ a hill-climbing search, whereas local pattern discovery algorithms employ exhaustive search. In this paper, we evaluat...
Bayesian subspace analysis (BSA) has been successfully applied in data mining and pattern recognition. However, due to the use of probabilistic measure of similarity, it often need...
A lot of work has been done on extracting the model of web user behavior. Most of them target server-side logs that cannot track user behavior outside of the server. Recently, a no...
Shingo Otsuka, Masashi Toyoda, Jun Hirai, Masaru K...
Objective: Knowledge acquisition and maintenance in medical domains with a large application domain ontology is a difficult task. To reduce knowledge elicitation costs, semiautoma...