Clustering-based diversity improvement in top-N recommendation Tevfik AytekinMahmut Özge Karakaya OriginalPaper 05 June 2013 Pages: 1 - 18
Cost-sensitive three-way email spam filtering Bing ZhouYiyu YaoJigang Luo OriginalPaper 09 June 2013 Pages: 19 - 45
Bayesian analysis of GUHA hypotheses Robert PichéMarko JärvenpääMilan Šimůnek OriginalPaper 23 June 2013 Pages: 47 - 73
Hierarchical directory mapping for category-constrained meta-search Jyh-Jong TsayChi-Hsiang Lin OriginalPaper 25 July 2013 Pages: 75 - 94
Content based image retrieval via a transductive model Songhao ZhuLiming ZouBaojie Fang OriginalPaper 07 July 2013 Pages: 95 - 109
Mining top-k frequent patterns over data streams sliding window Hui Chen OriginalPaper 18 July 2013 Pages: 111 - 131
Human perspective to anomaly detection for cybersecurity Song ChenVandana P. Janeja OriginalPaper 02 August 2013 Pages: 133 - 153
Dealing with trajectory streams by clustering and mathematical transforms Gianni CostaGiuseppe MancoElio Masciari OriginalPaper 26 July 2013 Pages: 155 - 177