2009-03-04

ScienceDirect-139 articles found for: INTELLIGENT AGENT and PATTERN MINING AND LIMIT-TO(pubyr, "2009")

1. You are entitled to access the full text of this document
UWB-based sensor networks for localization in mining environments
Ad Hoc Networks, Volume 7, Issue 5, July 2009, Pages 987-1000
Abdellah Chehri, Paul Fortier, Pierre Martin Tardif
2. You are entitled to access the full text of this document
Intelligent system for identification and replacement of faulty sensor measurements in Thermal Power Plants (IPPAMAS: Part 1)
Expert Systems with Applications, Volume 36, Issue 5, July 2009, Pages 8750-8757
Christina Athanasopoulou, Vasilis Chatziathanasiou
3. You are entitled to access the full text of this document
Personalized E-learning system with self-regulated learning assisted mechanisms for promoting learning performance
Expert Systems with Applications, Volume 36, Issue 5, July 2009, Pages 8816-8829
Chih-Ming Chen
4. You are entitled to access the full text of this document
Supplier selection: A hybrid model using DEA, decision tree and neural network
Expert Systems with Applications, Volume 36, Issue 5, July 2009, Pages 9105-9112
Desheng Wu
5. You are entitled to access the full text of this document
An ontological Proxy Agent with prediction, CBR, and RBR techniques for fast query processing
Expert Systems with Applications, Volume 36, Issue 5, July 2009, Pages 9358-9370
Sheng-Yuan Yang, Chun-Liang Hsu
6. You are entitled to access the full text of this document
Development of a model-based netsourcing decision support system using a five-stage methodology
European Journal of Operational Research, Volume 195, Issue 3, 16 June 2009, Pages 653-661
Claudia Loebbecke, Claudio Huyskens
7. You are entitled to access the full text of this document
A decision support for identifying crucial knowledge requiring capitalizing operation
European Journal of Operational Research, Volume 195, Issue 3, 16 June 2009, Pages 889-904
Inès Saad, Salem Chakhar
8. You are entitled to access the full text of this document
Quantitative models for direct marketing: A review from systems perspective
European Journal of Operational Research, Volume 195, Issue 1, 16 May 2009, Pages 1-16
Indranil Bose, Xi Chen
9. You are entitled to access the full text of this document
Context-aware system for proactive personalized service based on context history
Expert Systems with Applications, Volume 36, Issue 4, May 2009, Pages 7448-7457
Jongyi Hong, Eui-Ho Suh, Junyoung Kim, SuYeon Kim
10. You are entitled to access the full text of this document
An integrated infrastructure for monitoring and evaluating agent-based systems
Expert Systems with Applications, Volume 36, Issue 4, May 2009, Pages 7630-7643
Christos Dimou, Andreas L. Symeonidis, Pericles A. Mitkas
11. You are entitled to access the full text of this document
A new sentence similarity measure and sentence based extractive technique for automatic text summarization
Expert Systems with Applications, Volume 36, Issue 4, May 2009, Pages 7764-7772
Ramiz M. Aliguliyev
12. You are entitled to access the full text of this document
Clustering of document collection – A weighting approach
Expert Systems with Applications, Volume 36, Issue 4, May 2009, Pages 7904-7916
Ramiz M. Aliguliyev
13. You are entitled to access the full text of this document
Induction machine fault detection using clone selection programming
Expert Systems with Applications, Volume 36, Issue 4, May 2009, Pages 8000-8012
Zhaohui Gan, Ming-Bo Zhao, Tommy W.S. Chow
14. You are entitled to access the full text of this document
Forecasting the probability of finding oil slicks using a CBR system
Expert Systems with Applications, Volume 36, Issue 4, May 2009, Pages 8239-8246
Aitor Mata, Juan Manuel Corchado
15. You are entitled to access the full text of this document
An efficient signature-based strategy for supporting inexact filtering in information filtering systems
Expert Systems with Applications, Volume 36, Issue 4, May 2009, Pages 8431-8442
Ye-In Chang, Lee-Wen Huang, Jun-Hong Shen, Yi-Siang Wang
16. You are entitled to access the full text of this document
Workflows and e-Science: An overview of workflow system features and capabilities
Future Generation Computer Systems, Volume 25, Issue 5, May 2009, Pages 528-540
Ewa Deelman, Dennis Gannon, Matthew Shields, Ian Taylor
17. You are entitled to access the full text of this document
Atomicity and provenance support for pipelined scientific workflows
Future Generation Computer Systems, Volume 25, Issue 5, May 2009, Pages 568-576
Liqiang Wang, Shiyong Lu, Xubo Fei, Artem Chebotko, H. Victoria Bryant, Jeffrey L. Ram
18. You are entitled to access the full text of this document
Reducing query overhead through route learning in unstructured peer-to-peer network
Journal of Network and Computer Applications, Volume 32, Issue 3, May 2009, Pages 550-567
Selim Ciraci, İbrahim Körpeogˇlu, Özgür Ulusoy
19. You are entitled to access the full text of this document
Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation
Journal of Network and Computer Applications, Volume 32, Issue 3, May 2009, Pages 721-732
Li Feng, Wei Wang, Lina Zhu, Yi Zhang
20. You are entitled to access the full text of this document
A generalized adaptive ensemble generation and aggregation approach for multiple classifier systems
Pattern Recognition, Volume 42, Issue 5, May 2009, Pages 629-644
Lei Chen, Mohamed S. Kamel
21. You are entitled to access the full text of this document
Editorial
Telematics and Informatics, Volume 26, Issue 2, May 2009, Pages 125-126
Jan Servaes
22. You are entitled to access the full text of this document
An active product state tracking architecture in logistics sensor networks
Computers in Industry, Volume 60, Issue 3, April 2009, Pages 149-160
Sang Hoon Woo, Ja Young Choi, Choonjong Kwak, Chang Ouk Kim
23. You are entitled to access the full text of this document
Intelligent products: From lifecycle data acquisition to enabling product-related services
Computers in Industry, Volume 60, Issue 3, April 2009, Pages 184-194
Xiaoyu Yang, Philip Moore, Seng Kwong Chong
24. You are entitled to access the full text of this document
Modeling and analysis of project team formation factors in a project-oriented virtual organization (ProVO)
Expert Systems with Applications, Volume 36, Issue 3, Part 2, April 2009, Pages 5775-5783
Hyeongon Wi, Jungtae Mun, Seungjin Oh, Mooyoung Jung
25. You are entitled to access the full text of this document
Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks
Expert Systems with Applications, Volume 36, Issue 3, Part 1, April 2009, Pages 4321-4330
Chih-Hung Wu
26. You are entitled to access the full text of this document
Surveying stock market forecasting techniques – Part II: Soft computing methods
Expert Systems with Applications, Volume 36, Issue 3, Part 2, April 2009, Pages 5932-5941
George S. Atsalakis, Kimon P. Valavanis
27. You are entitled to access the full text of this document
Information extraction from syllabi for academic e-Advising
Expert Systems with Applications, Volume 36, Issue 3, Part 1, April 2009, Pages 4508-4516
Yevgen Biletskiy, J. Anthony Brown, Girish Ranganathan
28. You are entitled to access the full text of this document
A transaction pattern analysis system based on neural network
Expert Systems with Applications, Volume 36, Issue 3, Part 2, April 2009, Pages 6091-6099
Tzu-Chuen Lu, Kun-Yi Wu
29. You are entitled to access the full text of this document
Inmamusys: Intelligent multiagent music system
Expert Systems with Applications, Volume 36, Issue 3, Part 1, April 2009, Pages 4574-4580
Miguel Delgado, Waldo Fajardo, Miguel Molina-Solana
30. You are entitled to access the full text of this document
A synthetical approach for blog recommendation: Combining trust, social relation, and semantic analysis
Expert Systems with Applications, Volume 36, Issue 3, Part 2, April 2009, Pages 6536-6547
Yung-Ming Li, Ching-Wen Chen
31. You are entitled to access the full text of this document
Creating meaningful data from web logs for improving the impressiveness of a website by using path analysis method
Expert Systems with Applications, Volume 36, Issue 3, Part 2, April 2009, Pages 6635-6644
Resul Das, Ibrahim Turkoglu
32. You are entitled to access the full text of this document
Development and performance evaluation of FLANN based model for forecasting of stock markets
Expert Systems with Applications, Volume 36, Issue 3, Part 2, April 2009, Pages 6800-6808
Ritanjali Majhi, G. Panda, G. Sahoo
33. You are entitled to access the full text of this document
Benchmarking main activation functions in fuzzy cognitive maps
Expert Systems with Applications, Volume 36, Issue 3, Part 1, April 2009, Pages 5221-5229
Salvador Bueno, Jose L. Salmeron
34. You are entitled to access the full text of this document
Text feature selection using ant colony optimization
Expert Systems with Applications, Volume 36, Issue 3, Part 2, April 2009, Pages 6843-6853
Mehdi Hosseinzadeh Aghdam, Nasser Ghasem-Aghaee, Mohammad Ehsan Basiri
35. You are entitled to access the full text of this document
A self-generating fuzzy system with ant and particle swarm cooperative optimization
Expert Systems with Applications, Volume 36, Issue 3, Part 1, April 2009, Pages 5362-5370
Chia-Feng Juang, Chi-Yen Wang
36. You are entitled to access the full text of this document
The research on the critical success factors of knowledge management and classification framework project in the Executive Yuan of Taiwan Government
Expert Systems with Applications, Volume 36, Issue 3, Part 1, April 2009, Pages 5376-5386
Mong-Yuan Chang, Yu-Chung Hung, David C. Yen, Paul T.Y. Tseng
37. You are entitled to access the full text of this document
An ontology and peer-to-peer based data and service unified discovery system
Expert Systems with Applications, Volume 36, Issue 3, Part 1, April 2009, Pages 5436-5444
Ying Zhang, Youli Qu, Houkuan Huang, Dong Yang, Hongke Zhang
38. You are entitled to access the full text of this document
An attentive self-organizing neural model for text mining
Expert Systems with Applications, Volume 36, Issue 3, Part 2, April 2009, Pages 7064-7071
Chihli Hung, Yu-Liang Chi, Tsang-Yao Chen
39. You are entitled to access the full text of this document
Development of an adaptive learning case recommendation approach for problem-based e-learning on mathematics teaching for students with mild disabilities
Expert Systems with Applications, Volume 36, Issue 3, Part 1, April 2009, Pages 5456-5468
Hui-Chuan Chu, Tsung-Yi Chen, Chia-Jou Lin, Min-Ju Liao, Yuh-Min Chen
40. You are entitled to access the full text of this document
The generic genetic algorithm incorporates with rough set theory – An application of the web services composition
Expert Systems with Applications, Volume 36, Issue 3, Part 1, April 2009, Pages 5549-5556
Wen-Yau Liang, Chun-Che Huang
41. You are entitled to access the full text of this document
Using case-based reasoning for the design of controls for internet-based information systems
Expert Systems with Applications, Volume 36, Issue 3, Part 1, April 2009, Pages 5582-5591
Sangjae Lee, Kyoung-jae Kim
42. You are entitled to access the full text of this document
Planning of educational training courses by data mining: Using China Motor Corporation as an example
Expert Systems with Applications, Volume 36, Issue 3, Part 2, April 2009, Pages 7199-7209
Chiao-Tzu Huang, Wen-Tsann Lin, Shen-Tsu Wang, Wen-Shan Wang
43. You are entitled to access the full text of this document
Operating rules classification system of water supply reservoir based on Learning Classifier System
Expert Systems with Applications, Volume 36, Issue 3, Part 1, April 2009, Pages 5654-5659
Xiao-Lin Wang, Zheng-Jie Yin, Yi-Bing Lv, Si-Fu Li
44. You are entitled to access the full text of this document
Retrieving video features for language acquisition
Expert Systems with Applications, Volume 36, Issue 3, Part 1, April 2009, Pages 5673-5683
Yu-Lin Jeng, Kun-Te Wang, Yueh-Min Huang
45. You are entitled to access the full text of this document
Webservices oriented data mining in knowledge architecture
Future Generation Computer Systems, Volume 25, Issue 4, April 2009, Pages 436-443
Richard Olejnik, Teodor-Florin Fortiş, Bernard Toursel
46. You are entitled to access the full text of this document
Arts and humanities e-science—Current practices and future challenges
Future Generation Computer Systems, Volume 25, Issue 4, April 2009, Pages 474-480
Tobias Blanke, Mark Hedges, Stuart Dunn
47. You are entitled to access the full text of this document
A software engineering approach to ontology building
Information Systems, Volume 34, Issue 2, April 2009, Pages 258-275
Antonio De Nicola, Michele Missikoff, Roberto Navigli
48. You are entitled to access the full text of this document
A semi-automatic usage-based method for improving hyperlink descriptions in menus
International Journal of Human-Computer Studies, Volume 67, Issue 4, April 2009, Pages 366-381
Vera Hollink, Maarten van Someren, Bob J. Wielinga
49. You are entitled to access the full text of this document
Feature fusion for basic behavior unit segmentation from video sequences
Robotics and Autonomous Systems, Volume 57, Issue 3, 31 March 2009, Pages 239-248
Xinwei Xue, Thomas C. Henderson
50. You are entitled to access the full text of this document
Technical diagnostic of a fleet of vehicles using rough set theory
European Journal of Operational Research, Volume 193, Issue 3, 16 March 2009, Pages 891-903
Piotr Sawicki, Jacek Żak
51. You are entitled to access the full text of this document
Agent mobility architecture based on IEEE-FIPA standards
Computer Communications, Volume 32, Issue 4, 4 March 2009, Pages 712-729
J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles, B. Overeinder, J. Borrell
52. You are entitled to access the full text of this document
Editorial Board
Applied Soft Computing, Volume 9, Issue 2, March 2009, Page CO2
53. You are entitled to access the full text of this document
The stable and precise motion control for multiple mobile robots
Applied Soft Computing, Volume 9, Issue 2, March 2009, Pages 477-487
Dayal Ramakrushna Parhi, Saroj Kumar Pradhan, Anup Kumar Panda, Rabindra Kumar Behera
54. You are entitled to access the full text of this document
Online hybrid traffic classifier for Peer-to-Peer systems based on network processors
Applied Soft Computing, Volume 9, Issue 2, March 2009, Pages 685-694
Zhenxiang Chen, Bo Yang, Yuehui Chen, Ajith Abraham, Crina Grosan, Lizhi Peng
55. You are entitled to access the full text of this document
The genetic algorithm for breast tumor diagnosis—The case of DNA viruses
Applied Soft Computing, Volume 9, Issue 2, March 2009, Pages 703-710
Ming-Hseng Tseng, Hung-Chang Liao
56. You are entitled to access the full text of this document
Granular Rough Theory: A representation semantics oriented theory of roughness
Applied Soft Computing, Volume 9, Issue 2, March 2009, Pages 786-805
Bo Chen, Ming Sun, Mingtian Zhou
57. You are entitled to access the full text of this document
SHOMAS: Intelligent guidance and suggestions in shopping centres
Applied Soft Computing, Volume 9, Issue 2, March 2009, Pages 851-862
Javier Bajo, Juan M. Corchado, Yanira De Paz, Juan F. De Paz, Sara Rodríguez, Quintín Martín, Ajith Abraham
58. You are entitled to access the full text of this document
Knowledge and intelligent computing system in medicine
Computers in Biology and Medicine, Volume 39, Issue 3, March 2009, Pages 215-230
Babita Pandey, R.B. Mishra
59. You are entitled to access the full text of this document
Automatic Hidden-Web Table Interpretation, Conceptualization, and Semantic Annotation
Data & Knowledge Engineering, In Press, Accepted Manuscript, Available online 1 March 2009
Cui Tao, David W. Embley
60. You are entitled to access the full text of this document
Application of data mining techniques in customer relationship management: A literature review and classification
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 2592-2602
E.W.T. Ngai, Li Xiu, D.C.K. Chau
61. You are entitled to access the full text of this document
Modeling and implementing an agent-based environmental health impact decision support system
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 2603-2614
Marina V. Sokolova, Antonio Fernández-Caballero
62. You are entitled to access the full text of this document
Developing argumentation processing agents for computer-supported collaborative learning
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 2615-2624
Chenn-Jung Huang, Hong-Xin Chen, Chun-Hua Chen
63. You are entitled to access the full text of this document
Effects of feature construction on classification performance: An empirical study in bank failure prediction
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 2633-2644
Huimin Zhao, Atish P. Sinha, Wei Ge
64. You are entitled to access the full text of this document
Flexible least squares for temporal data mining and statistical arbitrage
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 2819-2830
Giovanni Montana, Kostas Triantafyllopoulos, Theodoros Tsagaris
65. You are entitled to access the full text of this document
Dynamically exploring internal mechanism of stock market by fuzzy-based support vector machines with high dimension input space and genetic algorithm
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 1240-1248
Deng-Yiv Chiu, Ping-Jie Chen
66. You are entitled to access the full text of this document
Building an expert travel agent as a software agent
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 1291-1299
Silvia Schiaffino, Analía Amandi
67. You are entitled to access the full text of this document
A multi-agent system to construct production orders by employing an expert system and a neural network
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 2937-2946
Omar López-Ortega, Israel Villar-Medina
68. You are entitled to access the full text of this document
Web-based CBR system applied to early cost budgeting for pavement maintenance project
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 2947-2960
Jui-Sheng Chou
69. You are entitled to access the full text of this document
Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 1493-1504
Shijia Gao, Dongming Xu
70. You are entitled to access the full text of this document
Rule extraction from trained adaptive neural networks using artificial immune systems
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 1513-1522
Humar Kahramanli, Novruz Allahverdi
71. You are entitled to access the full text of this document
An expert system using rough sets theory for aided conceptual design of ship's engine room automation
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 3223-3233
Xin-Yu Shao, Xue-Zheng Chu, Hao-Bo Qiu, Liang Gao, Jun Yan
72. You are entitled to access the full text of this document
Evolutionary algorithms for subgroup discovery in e-learning: A practical application using Moodle data
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 1632-1644
C. Romero, P. González, S. Ventura, M.J. del Jesus, F. Herrera
73. You are entitled to access the full text of this document
Mining uncertain data with multiobjective genetic fuzzy systems to be applied in consumer behaviour modelling
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 1645-1659
Jorge Casillas, Francisco J. Martínez-López
74. You are entitled to access the full text of this document
A Markov-based collaborative pricing system for information goods bundling
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 1660-1674
Wei-Lun Chang, Soe-Tsyr Yuan
75. You are entitled to access the full text of this document
On the making of service recommendations: An action theory based on utility, reputation, and risk attitude
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 3293-3301
Dickson K.W. Chiu, Ho-Fung Leung, Ka-Man Lam
76. You are entitled to access the full text of this document
Programming Robosoccer agents by modeling human behavior
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 1850-1859
Ricardo Aler, Jose M. Valls, David Camacho, Alberto Lopez
77. You are entitled to access the full text of this document
Concept lattices for visualizing and generating user profiles for context-aware service recommendations
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 1893-1902
Ohbyung Kwon, Jihoon Kim
78. You are entitled to access the full text of this document
Inducing a marketing strategy for a new pet insurance company using decision trees
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 1914-1921
Alan S. Abrahams, Adrian B. Becker, Daniel Sabido, Rosskyn D'Souza, George Makriyiannis, Michal Krasnodebski
79. You are entitled to access the full text of this document
Individual and group behavior-based customer profile model for personalized product recommendation
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 1932-1939
You-Jin Park, Kun-Nyeong Chang
80. You are entitled to access the full text of this document
Automatic extraction of new words based on Google News corpora for supporting lexicon-based Chinese word segmentation systems
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 3641-3651
Chin-Ming Hong, Chih-Ming Chen, Chao-Yang Chiu
81. You are entitled to access the full text of this document
Social grid platform for collaborative online learning on blogosphere: A case study of eLearning@BlogGrid
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 2177-2186
Jason J. Jung
82. You are entitled to access the full text of this document
Evolving and clustering fuzzy decision tree for financial time series data forecasting
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 3761-3773
Robert K. Lai, Chin-Yuan Fan, Wei-Hsiu Huang, Pei-Chann Chang
83. You are entitled to access the full text of this document
Supporting teachers in collaborative student modeling: A framework and an implementation
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 2260-2265
Elena Gaudioso, Miguel Montero, Luis Talavera, Felix Hernandez-del-Olmo
84. You are entitled to access the full text of this document
SXRS: An XLink-based Recommender System using Semantic Web technologies
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 3795-3804
I-Ching Hsu
85. You are entitled to access the full text of this document
A semantic-based approach to content abstraction and annotation for content management
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 2360-2376
Hui-Chuan Chu, Ming-Yen Chen, Yuh-Min Chen
86. You are entitled to access the full text of this document
Towards open decision support systems based on semantic focused crawling
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 3914-3922
Jason J. Jung
87. You are entitled to access the full text of this document
A practical extension of web usage mining with intentional browsing data toward usage
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 3937-3945
Yu-Hui Tao, Tzung-Pei Hong, Wen-Yang Lin, Wen-Yuan Chiu
88. You are entitled to access the full text of this document
VODKA: Variant objects discovering knowledge acquisition
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 2433-2450
Shian-Shyong Tseng, Shun-Chieh Lin
89. You are entitled to access the full text of this document
Clone selection programming and its application to symbolic regression
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 3996-4005
Zhaohui Gan, Tommy W.S. Chow, W.N. Chau
90. You are entitled to access the full text of this document
Constructing marketing decision support systems using data diffusion technology: A case study of gas station diversification
Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 2525-2533
Der-Chiang Li, Yao-San Lin, Yu-Cheng Huang
91. You are entitled to access the full text of this document
Developing of an ontological interface agent with template-based linguistic processing technique for FAQ services
Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 4049-4060
Sheng-Yuan Yang
92. You are entitled to access the full text of this document
Inferring comprehensible business/ICT alignment rules
Information & Management, Volume 46, Issue 2, March 2009, Pages 116-124
Bjorn Cumps, David Martens, Manu De Backer, Raf Haesen, Stijn Viaene, Guido Dedene, Bart Baesens, Monique Snoeck
93. You are entitled to access the full text of this document
Concept unification of terms in different languages via web mining for Information Retrieval
Information Processing & Management, Volume 45, Issue 2, March 2009, Pages 246-262
Qing Li, Yuanzhu Peter Chen, Sung-Hyon Myaeng, Yun Jin, Bo-Yeong Kang
94. You are entitled to access the full text of this document
Contextualized query sampling to discover semantic resource descriptions on the web
Information Processing & Management, Volume 45, Issue 2, March 2009, Pages 280-287
Jason J. Jung
95. You are entitled to access the full text of this document
Toward data mining engineering: A software engineering approach
Information Systems, Volume 34, Issue 1, March 2009, Pages 87-107
Oscar Marbán, Javier Segovia, Ernestina Menasalvas, Covadonga Fernández-Baizán
96. You are entitled to access the full text of this document
Evaluating and selecting software packages: A review
Information and Software Technology, Volume 51, Issue 3, March 2009, Pages 555-563
Anil S. Jadhav, Rajendra M. Sonar
97. You are entitled to access the full text of this document
Distributed agents model for intrusion detection based on AIS
Knowledge-Based Systems, Volume 22, Issue 2, March 2009, Pages 115-119
Jin Yang, XiaoJie Liu, Tao Li, Gang Liang, SunJun Liu
98. You are entitled to access the full text of this document
Web robot detection: A probabilistic reasoning approach
Computer Networks, Volume 53, Issue 3, 27 February 2009, Pages 265-278
Athena Stassopoulou, Marios D. Dikaiakos
99. You are entitled to access the full text of this document
Knowledge distribution via shared context between Blog-based knowledge management systems: a case study of collaborative tagging
Expert Systems with Applications, In Press, Accepted Manuscript, Available online 27 February 2009
Jason J. Jung
100. You are entitled to access the full text of this document
A Survey on Sentiment Detection of Reviews
Expert Systems with Applications, In Press, Accepted Manuscript, Available online 26 February 2009
Huifeng Tang, Songbo Tan, Xueqi Cheng
*
101. You are entitled to access the full text of this document
Swarm optimized organizing map (Swom): A swarm intelligence based optimization of self organizing map
Expert Systems with Applications, In Press, Accepted Manuscript, Available online 26 February 2009
Akın Özçift, Mehmet Kaya, Arif Gülten, Mustafa Karabulut
102. You are entitled to access the full text of this document
Ant colony and particle swarm optimization for financial classification problems
Expert Systems with Applications, In Press, Accepted Manuscript, Available online 26 February 2009
Yannis Marinakis, Magdalene Marinaki, Michael doumpos, Constantin Zopounidis
103. You are entitled to access the full text of this document
Generating complex ontology instances from documents
Journal of Algorithms, In Press, Accepted Manuscript, Available online 26 February 2009
Roxana Danger, Rafael Berlanga
104. You are entitled to access the full text of this document
A case-based approach for coordinated action selection in robot soccer
Artificial Intelligence, In Press, Accepted Manuscript, Available online 25 February 2009
Raquel Ros, Josep Lluís Arcos, Ramon Lopez de Mantaras, Manuela Veloso
105. You are entitled to access the full text of this document
Adaptive multicarrier communications and networks
Computer Communications, Volume 32, Issue 3, 25 February 2009, Pages 453-455
Hsiao Hwa Chen, Symeon Papavassiliou, Lingyang Song, Yan Zhang
106. You are entitled to access the full text of this document
Exploitation of semantic relationships and hierarchical data structures to support a user in his annotation and browsing activities in folksonomies
Information Systems, In Press, Accepted Manuscript, Available online 25 February 2009
Pasquale De Meo, Giovanni Quattrone, Domenico Ursino
107. You are entitled to access the full text of this document
Reusing Ontologies on the Semantic Web: A Feasibility Study
Data & Knowledge Engineering, In Press, Accepted Manuscript, Available online 21 February 2009
Elena Simperl
108. You are entitled to access the full text of this document
Ontologies and the Brain: Using Spreading Activation through Ontologies to Support Personal Interaction
Cognitive Systems Research, In Press, Accepted Manuscript, Available online 20 February 2009
Akrivi Katifori, Costas Vassilakis, Alan Dix
109. You are entitled to access the full text of this document
Automatic generation of semantically enriched web pages by a text mining approach
Expert Systems with Applications, In Press, Accepted Manuscript, Available online 20 February 2009
Hsin-Chang Yang
110. You are entitled to access the full text of this document
A Review of Machine Learning Approaches to Spam Filtering
Expert Systems with Applications, In Press, Accepted Manuscript, Available online 20 February 2009
Thiago S. Guzella, Walmir M. Caminhas
111. You are entitled to access the full text of this document
A new discrete particle swarm optimization approach for the single-machine total weighted tardiness scheduling problem with sequence-dependent setup times
European Journal of Operational Research, Volume 193, Issue 1, 16 February 2009, Pages 73-85
Davide Anghinolfi, Massimo Paolucci
112. You are entitled to access the full text of this document
Reasoning with rough description logics: An approximate concepts approach
Information Sciences, Volume 179, Issue 5, 15 February 2009, Pages 600-612
Yuncheng Jiang, Ju Wang, Suqin Tang, Bao Xiao
113. You are entitled to access the full text of this document
Automatic Nonverbal Analysis of Social Interaction in Small Groups: a Review
Image and Vision Computing, In Press, Accepted Manuscript, Available online 14 February 2009
Daniel Gatica-Perez
114. You are entitled to access the full text of this document
Empirical distributional semantics: Methods and biomedical applications
Journal of Biomedical Informatics, In Press, Uncorrected Proof, Available online 14 February 2009
Trevor Cohen, Dominic Widdows
115. You are entitled to access the full text of this document
A probabilistic method for keyword retrieval in handwritten document images
Pattern Recognition, In Press, Accepted Manuscript, Available online 14 February 2009
Huaigu Cao, Anurag Bhardwaj, Venu Govindaraju
116. You are entitled to access the full text of this document
Intrusion detection alarms reduction using root cause analysis and clustering
Computer Communications, Volume 32, Issue 2, 12 February 2009, Pages 419-430
Safaa O. Al-Mamory, Hongli Zhang
117. You are entitled to access the full text of this document
Induction of multiclass multifeature split decision trees from distributed data
Pattern Recognition, In Press, Accepted Manuscript, Available online 12 February 2009
Jie Ouyang, Nilesh Patel, Ishwar Sethi
118. You are entitled to access the full text of this document
An integrated platform of collaborative project management and silicon intellectual property management for IC design industry
Information Sciences, In Press, Uncorrected Proof, Available online 10 February 2009
David W. Hsiao, Amy J.C. Trappey, Lin Ma, Pei-Shun Ho
119. You are entitled to access the full text of this document
Financial time-series analysis with rough sets
Applied Soft Computing, In Press, Corrected Proof, Available online 7 February 2009
JingTao Yao, Joseph P. Herbert
120. You are entitled to access the full text of this document
Multiple coordinated views for searching and navigating Web content repositories
Information Sciences, In Press, Uncorrected Proof, Available online 7 February 2009
Alexander Hubmann-Haidvogel, Arno Scharl, Albert Weichselbraun
121. You are entitled to access the full text of this document
Secure Web Services Using Two-way Authentication and Three-party Key Establishment for Service Delivery
Journal of Systems Architecture, In Press, Accepted Manuscript, Available online 7 February 2009
Song Han, Tharam Dillon, Elizabeth Chang, Biming Tian
122. You are entitled to access the full text of this document
Linguistic modelling and information coarsening based on prototype theory and label semantics
International Journal of Approximate Reasoning, In Press, Uncorrected Proof, Available online 6 February 2009
Yongchuan Tang, Jonathan Lawry
123. You are entitled to access the full text of this document
A novel method for personalized music recommendation
Expert Systems with Applications, In Press, Uncorrected Proof, Available online 5 February 2009
Cheng-Che Lu, Vincent S. Tseng
124. You are entitled to access the full text of this document
Credit card fraud detection: A fusion approach using Dempster–Shafer theory and Bayesian learning
Information Fusion, In Press, Corrected Proof, Available online 4 February 2009
Suvasini Panigrahi, Amlan Kundu, Shamik Sural, A.K. Majumdar
125. You are entitled to access the full text of this document
Investigating technical trading strategy via an multi-objective evolutionary platform
Expert Systems with Applications, In Press, Corrected Proof, Available online 3 February 2009
S.C. Chiam, K.C. Tan, A. Al Mamun
126. You are entitled to access the full text of this document
Multi-criterion Pareto based particle swarm optimized polynomial neural network for classification: A review and state-of-the-art
Computer Science Review, Volume 3, Issue 1, February 2009, Pages 19-40
S. Dehuri, S.-B. Cho
127. You are entitled to access the full text of this document
Anomaly-based network intrusion detection: Techniques, systems and challenges
Computers & Security, Volume 28, Issues 1-2, February-March 2009, Pages 18-28
P. García-Teodoro, J. Díaz-Verdejo, G. Maciá-Fernández, E. Vázquez
128. You are entitled to access the full text of this document
The intentional relationship of representation between the constructs of a language and reality
Data & Knowledge Engineering, Volume 68, Issue 2, February 2009, Pages 173-191
José M. Cañete-Valdeón, Francisco J. Galán, Miguel Toro
129. You are entitled to access the full text of this document
Decision support for determining veracity via linguistic-based cues
Decision Support Systems, Volume 46, Issue 3, February 2009, Pages 695-703
Christie M. Fuller, David P. Biros, Rick L. Wilson
130. You are entitled to access the full text of this document
Adaptive conceding strategies for automated trading agents in dynamic, open markets
Decision Support Systems, Volume 46, Issue 3, February 2009, Pages 704-716
Fenghui Ren, Minjie Zhang, Kwang Mong Sim
131. You are entitled to access the full text of this document
A novel approach for classifying customer complaints through graphs similarities in argumentative dialogues
Decision Support Systems, Volume 46, Issue 3, February 2009, Pages 717-729
Boris A. Galitsky, María P. González, Carlos I. Chesñevar
132. You are entitled to access the full text of this document
The search for knowledge, contexts, and Case-Based Reasoning
Engineering Applications of Artificial Intelligence, Volume 22, Issue 1, February 2009, Pages 3-9
Michael M. Richter
133. You are entitled to access the full text of this document
Automatic semantic indexing of medical images using a web ontology language for case-based image retrieval
Engineering Applications of Artificial Intelligence, Volume 22, Issue 1, February 2009, Pages 18-25
Gowri Allampalli-Nagaraj, Isabelle Bichindaritz
134. You are entitled to access the full text of this document
Rule extraction by fuzzy modeling algorithm for fuzzy logic control of cisatracurium as a neuromuscular block
Engineering Applications of Artificial Intelligence, Volume 22, Issue 1, February 2009, Pages 129-140
Chen-Tse Chuang, Shou-Zen Fan, Jiann-Shing Shieh
135. You are entitled to access the full text of this document
A fuzzy cognitive map approach for effect-based operations: An illustrative case
Information Sciences, Volume 179, Issue 4, 1 February 2009, Pages 382-403
Dilek Yaman, Seçkin Polat
136. You are entitled to access the full text of this document
Semantic information integration and question answering based on pervasive agent ontology
Expert Systems with Applications, In Press, Corrected Proof, Available online 31 January 2009
Qing-lin Guo, Ming Zhang
137. You are entitled to access the full text of this document
A blog article recommendation generating mechanism using an SBACPSO algorithm
Expert Systems with Applications, In Press, Uncorrected Proof, Available online 31 January 2009
Tien-Chi Huang, Shu-Chen Cheng, Yueh-Min Huang
138. You are entitled to access the full text of this document
Supporting agile supply chains using a service-oriented shop floor
Engineering Applications of Artificial Intelligence, In Press, Corrected Proof, Available online 30 January 2009
Luis Ribeiro, Jose Barata, Armando Colombo
139. You are entitled to access the full text of this document
A review of ant algorithms
Expert Systems with Applications, In Press, Uncorrected Proof, Available online 29 January 2009
R.J. Mullen, D. Monekosso, S. Barman, P. Remagnino
140. You are entitled to access the full text of this document
Extracting rules for classification problems: AIS based approach
Expert Systems with Applications, In Press, Uncorrected Proof, Available online 29 January 2009
Humar Kahramanli, Novruz Allahverdi
141. You are entitled to access the full text of this document
PROMETHEE: A comprehensive literature review on methodologies and applications
European Journal of Operational Research, In Press, Corrected Proof, Available online 22 January 2009
Majid Behzadian, R.B. Kazemzadeh, A. Albadvi, M. Aghdasi
142. You are entitled to access the full text of this document
OntoPortal: An ontology-supported portal architecture with linguistically enhanced and focused crawler technologies
Expert Systems with Applications, In Press, Uncorrected Proof, Available online 22 January 2009
Sheng-Yuan Yang
143. You are entitled to access the full text of this document
Using phrases as features in email classification
Journal of Systems and Software, In Press, Corrected Proof, Available online 22 January 2009
Matthew Chang, Chung Keung Poon
144. You are entitled to access the full text of this document
Trends in the development of communication networks: Cognitive networks
Computer Networks, In Press, Corrected Proof, Available online 20 January 2009
Carolina Fortuna, Mihael Mohorcic
145. You are entitled to access the full text of this document
Collected by Didier DUBOIS, Henri PRADE and Salvatore SESSA
Fuzzy Sets and Systems, Volume 160, Issue 2, 16 January 2009, Pages 280-290
146. You are entitled to access the full text of this document
Electronic promotion to new customers using mkNN learning
Information Sciences, Volume 179, Issue 3, 16 January 2009, Pages 248-266
Faria Nassiri-Mofakham, Mohammad Ali Nematbakhsh, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee
147. You are entitled to access the full text of this document
Mechanistic modeling of swarms
Computer Methods in Applied Mechanics and Engineering, In Press, Corrected Proof, Available online 14 January 2009
T.I. Zohdi
148. You are entitled to access the full text of this document
Building an automatic e-tendering system on the Semantic Web
Decision Support Systems, In Press, Corrected Proof, Available online 12 January 2009
Timon C. Du
149. You are entitled to access the full text of this document
The application of SOM as a decision support tool to identify AACSB peer schools
Decision Support Systems, In Press, Corrected Proof, Available online 12 January 2009
Melody Y. Kiang, Dorothy M. Fisher, Jeng-Chung Victor Chen, Steven A. Fisher, Robert T. Chi
150. You are entitled to access the full text of this document
Implementation of intelligent systems, enabling integration of SMEs to high-value supply chain networks
Engineering Applications of Artificial Intelligence, In Press, Corrected Proof, Available online 9 January 2009
Richard Barton, Andrew Thomas
151. You are entitled to access the full text of this document
EMADS: An extendible multi-agent data miner
Knowledge-Based Systems, In Press, Corrected Proof, Available online 9 January 2009
Kamal Ali Albashiri, Frans Coenen, Paul Leng
152. You are entitled to access the full text of this document
Principal–agent learning
Decision Support Systems, In Press, Corrected Proof, Available online 8 January 2009
Fidan Boylu, Haldun Aytug, Gary J. Koehler
153. You are entitled to access the full text of this document
A closed-form reduction of multi-class cost-sensitive learning to weighted multi-class learning
Pattern Recognition, In Press, Corrected Proof, Available online 6 January 2009
Fen Xia, Yan-wu Yang, Liang Zhou, Fuxin Li, Min Cai, Daniel D. Zeng
154. You are entitled to access the full text of this document
Advanced Information Retrieval
Electronic Notes in Theoretical Computer Science, Volume 225, 2 January 2009, Pages 303-317
Fuji Ren, David B. Bracewell
155. You are entitled to access the full text of this document
IFC Editorial Board
Applied Soft Computing, Volume 9, Issue 1, January 2009, Page CO2
156. You are entitled to access the full text of this document
Finding groups in data: Cluster analysis with ants
Applied Soft Computing, Volume 9, Issue 1, January 2009, Pages 61-70
Urszula Boryczka
157. You are entitled to access the full text of this document
Privacy, trust and policy-making: Challenges and responses
Computer Law & Security Report, Volume 25, Issue 1, 2009, Pages 69-83
David Wright, Serge Gutwirth, Michael Friedewald, Paul De Hert, Marc Langheinrich, Anna Moscibroda
158. You are entitled to access the full text of this document
Development in the application of ICT in condition monitoring and maintenance
Computers in Industry, Volume 60, Issue 1, January 2009, Pages 1-20
Jaime Campos
159. You are entitled to access the full text of this document
An unsupervised method for joint information extraction and feature mining across different Web sites
Data & Knowledge Engineering, Volume 68, Issue 1, January 2009, Pages 107-125
Tak-Lam Wong, Wai Lam
160. You are entitled to access the full text of this document
Using domain-specific knowledge in generalization error bounds for support vector machine learning
Decision Support Systems, Volume 46, Issue 2, January 2009, Pages 481-491
Enes Eryarsoy, Gary J. Koehler, Haldun Aytug
161. You are entitled to access the full text of this document
An application of agent-based simulation to knowledge sharing
Decision Support Systems, Volume 46, Issue 2, January 2009, Pages 532-541
Jing Wang, Kholekile Gwebu, Murali Shanker, Marvin D. Troutt
162. You are entitled to access the full text of this document
Hybrid approach using case-based reasoning and rule-based reasoning for domain independent clinical decision support in ICU
Expert Systems with Applications, Volume 36, Issue 1, January 2009, Pages 65-71
K. Ashwin Kumar, Yashwardhan Singh, Sudip Sanyal
163. You are entitled to access the full text of this document
Dynamic packaging in e-retailing with stochastic demand over finite horizons: A Q-learning approach
Expert Systems with Applications, Volume 36, Issue 1, January 2009, Pages 472-480
Yan Cheng
164. You are entitled to access the full text of this document
Dynamic question generation system for web-based testing using particle swarm optimization
Expert Systems with Applications, Volume 36, Issue 1, January 2009, Pages 616-624
Shu-Chen Cheng, Yen-Ting Lin, Yueh-Min Huang
165. You are entitled to access the full text of this document
Ontology-based fuzzy support agent for ship steering control
Expert Systems with Applications, Volume 36, Issue 1, January 2009, Pages 755-765
Ki-Yeol Seo, Gyei-Kark Park, Chang-Shing Lee, Mei-Hui Wang
166. You are entitled to access the full text of this document
VCNI – Applying value theory to contextual needs identification in proactive elderly care
Expert Systems with Applications, Volume 36, Issue 1, January 2009, Pages 778-791
Soe-Tsyr Yuan, I-Chien Lin
167. You are entitled to access the full text of this document
Design and development of agent-based procurement system to enhance business intelligence
Expert Systems with Applications, Volume 36, Issue 1, January 2009, Pages 877-884
C.K.M. Lee, H.C.W. Lau, G.T.S. Ho, William Ho
168. You are entitled to access the full text of this document
Representation, similarity measures and aggregation methods using fuzzy sets for content-based recommender systems
Fuzzy Sets and Systems, Volume 160, Issue 1, 1 January 2009, Pages 76-94
Azene Zenebe, Anthony F. Norcio
169. You are entitled to access the full text of this document
An integrated approach to high-level information fusion
Information Fusion, Volume 10, Issue 1, January 2009, Pages 25-50
Katia Sycara, Robin Glinton, Bin Yu, Joseph Giampapa, Sean Owens, Michael Lewis, LTC Charles Grindle
170. You are entitled to access the full text of this document
Ontological approach to development of computing with words based systems
International Journal of Approximate Reasoning, Volume 50, Issue 1, January 2009, Pages 72-91
Marek Reformat, Cuong Ly
171. You are entitled to access the full text of this document
A GP-adaptive web ranking discovery framework based on combinative content and context features
Journal of Informetrics, Volume 3, Issue 1, January 2009, Pages 78-89
Amir Hosein Keyhanipour, Maryam Piroozmand, Kambiz Badie