![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > Data mining
This work presents a data visualization technique that combines graph-based topology representation and dimensionality reduction methods to visualize the intrinsic data structure in a low-dimensional vector space. The application of graphs in clustering and visualization has several advantages. A graph of important edges (where edges characterize relations and weights represent similarities or distances) provides a compact representation of the entire complex data set. This text describes clustering and visualization methods that are able to utilize information hidden in these graphs, based on the synergistic combination of clustering, graph-theory, neural networks, data visualization, dimensionality reduction, fuzzy methods, and topology learning. The work contains numerous examples to aid in the understanding and implementation of the proposed algorithms, supported by a MATLAB toolbox available at an associated website.
This book constitutes the refereed proceedings of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, in June 2013. The 47 revised full papers presented together with 29 short papers and 5 keynotes were carefully reviewed and selected from a total of 248 submissions. The papers are organized in topical sections on data mining; information integration and heterogeneous systems; big data; spatial and temporal databases; information extraction; new hardware and miscellaneous; query processing and optimization; social network and graphs; information retrieval; workflow systems and service computing; recommender systems; security, privacy, and trust; semantic Web and ontology.
This book constitutes the thoroughly refereed post-workshop proceedings of 5 workshops, held at the 10th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2011, in Taipei, Taiwan, May 2-6, 2011. The 37 revised full papers presented together with 1 invited paper were carefully reviewed and selected from numerous submissions. The papers are organized in sections on the workshops Agent-Based Modeling for Policy Engineering (AMPLE), Agent-Oriented Software Engineering (AOSE), Autonomous Robots and Multirobot Systems (ARMS), Data Oriented Constructive Mining and Multi-Agent Simulation, Massively Multi-Agent Systems: Models, Methods and Tools (DOCM(3)AS), and Infrastructures and Tools for Multiagent Systems (ITMAS).
This book constitutes the refereed proceedings of the 9th International Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics, CIBB 2012, held in Houston, TX, USA during in July 2012. The 16 revised full papers presented were carefully reviewed and selected from 23 submissions. The papers are organized in topical sections on relativistic heavy ions and DNA damage; image segmentation; proteomics; RNA and DNA sequence analysis; RNA, DNA, and SNP microarrays; semi-supervised/unsupervised cluster analysis.
The two-volume set LNCS 7649 + 7650 constitutes the refereed proceedings of the 11th International Semantic Web Conference, ISWC 2012, held in Boston, MA, USA, in November 2012. The International Semantic Web Conference is the premier forum for Semantic Web research, where cutting edge scientific results and technological innovations are presented, where problems and solutions are discussed, and where the future of this vision is being developed. It brings together specialists in fields such as artificial intelligence, databases, social networks, distributed computing, Web engineering, information systems, human-computer interaction, natural language processing, and the social sciences. Volume 1 contains a total of 41 papers which were presented in the research track. They were carefully reviewed and selected from 186 submissions. Volume 2 contains 17 papers from the in-use track which were accepted from 77 submissions. In addition, it presents 8 contributions to the evaluations and experiments track and 7 long papers and 8 short papers of the doctoral consortium.
Social Tagging Systems are web applications in which users upload resources (e.g., bookmarks, videos, photos, etc.) and annotate it with a list of freely chosen keywords called tags. This is a grassroots approach to organize a site and help users to find the resources they are interested in. Social tagging systems are open and inherently social; features that have been proven to encourage participation. However, with the large popularity of these systems and the increasing amount of user-contributed content, information overload rapidly becomes an issue. Recommender Systems are well known applications for increasing the level of relevant content over the "noise" that continuously grows as more and more content becomes available online. In social tagging systems, however, we face new challenges. While in classic recommender systems the mode of recommendation is basically the resource, in social tagging systems there are three possible modes of recommendation: users, resources, or tags. Therefore suitable methods that properly exploit the different dimensions of social tagging systems data are needed. In this book, we survey the most recent and state-of-the-art work about a whole new generation of recommender systems built to serve social tagging systems. The book is divided into self-contained chapters covering the background material on social tagging systems and recommender systems to the more advanced techniques like the ones based on tensor factorization and graph-based models.
This book constitutes the refereed proceedings of the 13th International Conference on Web-Age Information Management, WAIM 2012, held in Harbin, China in August 2012. The 32 revised full papers presented together with 10 short papers and three keynotes were carefully reviewed and selected from a total of 178 submissions. The papers are organized in topical sections on wireless sensor networks; data warehousing and data mining; query processing; spatial databases; similarity search and queries; XML and Web data; graph and uncertain data; distributed computing; data security and management; information extraction and integration; and social networks and modern Web services.
About two years ago, while attending yet another international standards meeting, a few of the meeting participants were discussing the utility and applicability of the standards we were designing. After all, if standards are not used, and used effectively, why are we spending all this time and money designing them? The ultimate test of the utility of computer standards is the number of implementations that are developed and the number of end-users that successfully use these within their own application. The number of implementations is related to the quality of a standard because vendors cannot produce correct implementations without clear, precise and unambiguous semantics within the standard. The number of users of implementations of the standards is an even greater measure of success of the standard because users will only purchase these implementations if they are useful for their applications. "How could we determine whether or not graphics standards are useful?" we asked ourselves. " Let's ask both implementors and users about the experiences they've had with our standards. Let them tell us about the successes and the problems as well. " Thus, an idea was born - the idea of a series of workshops, each one devoted to the usability of a different computer graphics standard. The only thing left to do in planning this workshop was to choose the appropriate standard to serve as the focus of the first workshop. There were only a few viable candidates.
Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for subsequent analysis, such as discovering or validating associations between clinical and genomic information. Anonymization of Electronic Medical Records to Support Clinical Analysis is intended for professionals as a reference guide for safeguarding the privacy and data integrity of sensitive medical records. Academics and other research scientists will also find the book invaluable.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2012, held in Vilamoura, Portugal, in February 2012. The 26 revised full papers presented together with one invited lecture were carefully reviewed and selected from a total of 522 submissions. The papers cover a wide range of topics and are organized in four general topical sections on biomedical electronics and devices; bioinformatics models, methods and algorithms; bio-inspired systems and signal processing; health informatics.
This book constitutes the refereed proceedings of the Second International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2012, held in Shanghai, China, in September 2012. The 60 full papers presented were carefully reviewed and selected from numerous submissions and present theories and methodologies as well as the emerging applications of intelligent computing in sustainable energy and environment.
The four-volume set LNCS 7333-7336 constitutes the refereed proceedings of the 12th International Conference on Computational Science and Its Applications, ICCSA 2012, held in Salvador de Bahia, Brazil, in June 2012. The four volumes contain papers presented in the following workshops: 7333 - advances in high performance algorithms and applications (AHPAA); bioinspired computing and applications (BIOCA); computational geometry and applicatons (CGA); chemistry and materials sciences and technologies (CMST); cities, technologies and planning (CTP); 7334 - econometrics and multidimensional evaluation in the urban environment (EMEUE); geographical analysis, urban modeling, spatial statistics (Geo-An-Mod); 7335 - optimization techniques and applications (OTA); mobile communications (MC); mobile-computing, sensind and actuation for cyber physical systems (MSA4CPS); remote sensing (RS); 7336 - software engineering processes and applications (SEPA); software quality (SQ); security and privacy in computational sciences (SPCS); soft computing and data engineering (SCDE). The topics of the fully refereed papers are structured according to the four major conference themes: 7333 - computational methods, algorithms and scientific application; 7334 - geometric modelling, graphics and visualization; 7335 - information systems and technologies; 7336 - high performance computing and networks.
This book constitutes the proceedings of the 5th International Conference on Knowledge Science, Engineering and Management, KSEM 2011, held in Irvine, CA, USA, in December 2011. The 34 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions.
ICMCCA 2012 is the first International Conference on Multimedia Processing, Communication and Computing Applications and the theme of the Conference is chosen as 'Multimedia Processing and its Applications'. Multimedia processing has been an active research area contributing in many frontiers of today's science and technology. This book presents peer-reviewed quality papers on multimedia processing, which covers a very broad area of science and technology. The prime objective of the book is to familiarize readers with the latest scientific developments that are taking place in various fields of multimedia processing and is widely used in many disciplines such as Medical Diagnosis, Digital Forensic, Object Recognition, Image and Video Analysis, Robotics, Military, Automotive Industries, Surveillance and Security, Quality Inspection, etc. The book will assist the research community to get the insight of the overlapping works which are being carried out across the globe at many medical hospitals and institutions, defense labs, forensic labs, academic institutions, IT companies and security & surveillance domains. It also discusses latest state-of-the-art research problems and techniques and helps to encourage, motivate and introduce the budding researchers to a larger domain of multimedia.
Multi-database mining has been recognized recently as an important and strategically essential area of research in data mining. In this book, we discuss various issues regarding the systematic and efficient development of multi-database mining applications. It explains how systematically one could prepare data warehouses at different branches. As appropriate multi-database mining technique is essential to develop better applications. Also, the efficiency of a multi-database mining application could be improved by processing more patterns in the application. A faster algorithm could also play an important role in developing a better application. Thus the efficiency of a multi-database mining application could be enhanced by choosing an appropriate multi-database mining model, an appropriate pattern synthesizing technique, a better pattern representation technique, and an efficient algorithm for solving the problem. This book illustrates each of these issues either in the context of a specific problem, or in general.
This two-volume set, consisting of LNCS 7816 and LNCS 7817, constitutes the thoroughly refereed proceedings of the 13th International Conference on Computer Linguistics and Intelligent Processing, CICLING 2013, held on Samos, Greece, in March 2013. The total of 91 contributions presented was carefully reviewed and selected for inclusion in the proceedings. The papers are organized in topical sections named: general techniques; lexical resources; morphology and tokenization; syntax and named entity recognition; word sense disambiguation and coreference resolution; semantics and discourse; sentiment, polarity, subjectivity, and opinion; machine translation and multilingualism; text mining, information extraction, and information retrieval; text summarization; stylometry and text simplification; and applications.
Data mining involves the non-trivial extraction of implicit, previously unknown, and potentially useful information from databases. Genetic Programming (GP) and Inductive Logic Programming (ILP) are two of the approaches for data mining. This book first sets the necessary backgrounds for the reader, including an overview of data mining, evolutionary algorithms and inductive logic programming. It then describes a framework, called GGP (Generic Genetic Programming), that integrates GP and ILP based on a formalism of logic grammars. The formalism is powerful enough to represent context- sensitive information and domain-dependent knowledge. This knowledge can be used to accelerate the learning speed and/or improve the quality of the knowledge induced. A grammar-based genetic programming system called LOGENPRO (The LOGic grammar based GENetic PROgramming system) is detailed and tested on many problems in data mining. It is found that LOGENPRO outperforms some ILP systems. We have also illustrated how to apply LOGENPRO to emulate Automatically Defined Functions (ADFs) to discover problem representation primitives automatically. By employing various knowledge about the problem being solved, LOGENPRO can find a solution much faster than ADFs and the computation required by LOGENPRO is much smaller than that of ADFs. Moreover, LOGENPRO can emulate the effects of Strongly Type Genetic Programming and ADFs simultaneously and effortlessly. Data Mining Using Grammar Based Genetic Programming and Applications is appropriate for researchers, practitioners and clinicians interested in genetic programming, data mining, and the extraction of data from databases.
This two-volume set, consisting of LNCS 7816 and LNCS 7817, constitutes the thoroughly refereed proceedings of the 13th International Conference on Computer Linguistics and Intelligent Processing, CICLING 2013, held on Samos, Greece, in March 2013. The total of 91 contributions presented was carefully reviewed and selected for inclusion in the proceedings. The papers are organized in topical sections named: general techniques; lexical resources; morphology and tokenization; syntax and named entity recognition; word sense disambiguation and coreference resolution; semantics and discourse; sentiment, polarity, subjectivity, and opinion; machine translation and multilingualism; text mining, information extraction, and information retrieval; text summarization; stylometry and text simplification; and applications.
Information systems are large repositories of factual and inferential knowledge intended to be queried and maintained by a wide variety of users with different backgrounds and work tasks. The community of potential information system users is growing rapidly with advances in hardware and software technology that permit computer/communications support for more and more application areas. Unfortunately, it is often felt that progress in user interface technology has not quite matched that of other areas. Technical solutions such as computer graphics, natural language processing, or man-machine-man communications in office systems are not enough by themselves. They should be complemented by system features that ensure cooperative behavior of the interfaces, thus reducing the training and usage effort required for successful interaction. In analogy to a human dialog partner, we call an interface cooperative if it does not just accept user requests passively or answer them literally, but actively attempts to understand the users' intentions and to help them solve their applica tion problems. This leads to the central question addressed by this book: What makes an information systems interface cooperative, and how do we provide capabilities leading to cooperative interfaces? Many answers are possible. A first aspect concerns the formulation and accep tance of user requests. Many researchers assume that such requests should be formulated in natural language."
This book constitutes the proceedings of the 6th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, SBP 2013, held in Washington, DC, USA in April 2013. The total of 57 contributions, which consists of papers and posters, included in this volume was carefully reviewed and selected from 137 submissions. This conference is strongly committed to multidisciplinarity, consistent with recent trends in computational social science and related fields. The topics covered are: behavioral science, health sciences, military science and information science. There are also many papers that provide methodological innovation as well as new domain-specific findings.
This volume proceedings contains revised selected papers from the 4th International Conference on Artificial Intelligence and Computational Intelligence, AICI 2012, held in Chengdu, China, in October 2012. The total of 163 high-quality papers presented were carefully reviewed and selected from 724 submissions. The papers are organized into topical sections on applications of artificial intelligence, applications of computational intelligence, data mining and knowledge discovery, evolution strategy, expert and decision support systems, fuzzy computation, information security, intelligent control, intelligent image processing, intelligent information fusion, intelligent signal processing, machine learning, neural computation, neural networks, particle swarm optimization, and pattern recognition.
This book constitutes the thoroughly refereed proceedings of the
PAKDD 2012 International Workshops: Third Workshop on Data Mining
for Healthcare Management (DMHM 2012), First Workshop on Geospatial
Information and Documents (GeoDoc 2012), First Workshop on
Multi-view data, High-dimensionality, External Knowledge: Striving
for a Unified Approach to Clustering (3Clust 2012), and the Second
Doctoral Symposium on Data Mining (DSDM 2012); held in conjunction
with the 16th Pacific-Asia Conference on Knowledge Discovery and
Data Mining (PAKDD 2012), in Kuala Lumpur, Malaysia, May/June 2012.
This book constitutes the refereed proceedings of the 8th International Workshop on Databases in Networked Information Systems, DNIS 2013, held in Aizu-Wakamatsu, Japan in March 2013. The 22 revised full papers presented were carefully reviewed and selected for inclusion in the book. The workshop generally puts the main focus on data semantics and infrastructure for information management and interchange. The papers are organized in topical sections on cloud-based database systems; information and knowledge management; information extraction from data resources; bio-medical information management; and networked information systems: infrastructure.
This book constitutes the thoroughly refereed post-proceedings of four workshops held as satellite events of the JSAI International Symposia on Artificial Intelligence 2011, in Takamatsu, Japan, in December 2011. The 25 revised full papers presented were carefully reviewed and selected from numerous papers. The papers are organized in four sections according to the four workshops: Logic and Engineering of Natural Language Semantics (LENLS), Juris-Informatics (JURISIN), Algorithms for Large-Scale Information Processing in Knowledge Discovery (ALSIP), and Multimodality in Multispace Interaction (MiMI).
This two-volume set LNAI 7523 and LNAI 7524 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: ECML PKDD 2012, held in Bristol, UK, in September 2012. The 105 revised research papers presented together with 5 invited talks were carefully reviewed and selected from 443 submissions. The final sections of the proceedings are devoted to Demo and Nectar papers. The Demo track includes 10 papers (from 19 submissions) and the Nectar track includes 4 papers (from 14 submissions). The papers grouped in topical sections on association rules and frequent patterns; Bayesian learning and graphical models; classification; dimensionality reduction, feature selection and extraction; distance-based methods and kernels; ensemble methods; graph and tree mining; large-scale, distributed and parallel mining and learning; multi-relational mining and learning; multi-task learning; natural language processing; online learning and data streams; privacy and security; rankings and recommendations; reinforcement learning and planning; rule mining and subgroup discovery; semi-supervised and transductive learning; sensor data; sequence and string mining; social network mining; spatial and geographical data mining; statistical methods and evaluation; time series and temporal data mining; and transfer learning. |
You may like...
Detection of Intrusions and Malware, and…
Juan Caballero, Urko Zurutuza, …
Paperback
R2,565
Discovery Miles 25 650
Advanced Image-Based Spam Detection and…
Sunita Vikrant Dhavale
Hardcover
R4,374
Discovery Miles 43 740
|