• [32] Fast Triangle Core Decomposition for Mining Large Graphs
  • Ryan Rossi

  • [43] Finding Better Topics: Features, Priors and Constraints
  • Xiaona Wu, Jia Zeng, Jianfeng Yan, Xiaosheng Liu

  • [46] Extensions to Quantile Regression Forests for Very High Dimensional Data
  • Nguyen Thanh Tung, Joshua Zhexue Huang, Imran Khan, Mark Junjie Li, Graham Williams

  • [51] Deferentially Private Tagging Recommendation based on Topic Model
  • Tianqing Zhu, Gang Li, Wanlei Zhou, Ping Xiong, Cao Yuan

  • [69] Positional Translation Language Model for Ad-hoc Information Retrieval
  • Xinhui Tu

  • [72] Constrained Least Squares Regression for Semi-Supervised Learning
  • Bo Liu, Jia Li, Jian Yu, Liping Jing

  • [73] Rare Category Detection on O(dN) Time Complexity
  • Zhenguang Liu, Hao Huang, Qinming He, Kevin Chiew, Lianhang Ma

  • [80] A Selectively Re-train Approach Based on Clustering To Classify Concept-drifting Data Streams with Skewed Distribution
  • Dandan Zhang

  • [82] Gaussian Processes Autoencoder for Dimensionality Reduction
  • Xinwei Jiang, Junbin Gao, Xia Hong, Zhihua Cai

  • [85] NLPMM: a Next Location Predictor with Markov Modeling
  • Meng Chen, Yang Liu, Xiaohui Yu

  • [95] MultiAspectSpotting: Spotting Anomalous Behavior within Count Data using Tensor
  • Koji Maruhashi, Nobuhiro Yugami

  • [115] Supervised Nonlinear Factorizations Excel In Semi-supervised Regression
  • Josif Grabocka, Erind Bedalli, Lars Schmidt-Thieme

  • [118] Intervention-Driven Predictive Framework for Modeling Healthcare Data
  • Santu Rana, Sunil Gupta, Dinh Phung, Svetha Venkatesh

  • [119] Shifting Hypergraphs by Probabilistic Voting
  • Yang Wang, Lin Wu

  • [122] CTROF: A Collaborative Tweet Ranking Framework for Online Personalized Recommendation
  • Kaisong Song, Daling Wang, Shi Feng, wen Qu, Ge Yu, Yifei Zhang

  • [123] Two-Phase Layered Learning Recommendation via Category Structure
  • Ji Ke, Shen Hong

  • [130] Crime Forecasting Using Spatio-Temporal Pattern with Ensemble Learning
  • Chung-Hsien Yu, Wei Ding, Melissa Morabito

  • [147] Visualization of PICO Elements for Information Needs Clarification and Query Refinement
  • Wan-Tze Vong

  • [148] Inferring Strange Behavior from Connectivity Pattern in Social Networks
  • Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, Shiqiang Yang

  • [164] Mining Biomedical Literature and Ontologies for Drug Repositioning Discovery
  • Chih-Ping Wei, Kuei-An Chen, Lien-Chin Chen

  • [178] Semi-supervised Feature Analysis for Multimedia Annotation by Mining Label Correlation
  • Xiaojun Chang, Haoquan Shen, Sen Wang, Jiajun Liu, Xue Li

  • [190] Inferring Metapopulation Based Disease Transmission Networks
  • Xiaofei YANG, Jiming Liu, Kwok Wai CHEUNG

  • [196] Dynamic Circle Recommendation: A Probabilistic Model
  • Fan-Kai Chou, Wen-Chih Peng, meng-Fen Chiang

  • [200] Mining Contrast Subspaces
  • Lei Duan, Guanting Tang, Jian Pei, James Bailey, Guozhu Dong, Akiko Campbell, Changjie Tang

  • [208] Com2: Fast Automatic Discovery of Temporal (’Comet’) Communities
  • Miguel Araujo, Spiros Papadimitriou, Stephan Gunnemann, Christos Faloutsos, Prithwish Basu, Ananthram Swami, Evangelos Papalexakis, Danai Koutra

  • [222] Machine Learning Approaches for Interactive Verification
  • Yu-Cheng Chou, Hsuan-Tien Lin

  • [229] Matrix Factorization Without User Data Retention
  • David Vallet, Arik Friedman, Shlomo Berkovsky

  • [231] Super Graph Classification
  • Ting Guo, Xingquan Zhu

  • [234] Outlier Detection based on Leave-one-out Density using Binary Decision Diagrams
  • Takuro Kutsuna, Akihiro Yamamoto

  • [240] Forward Classification on Data Streams
  • Peng Wang, Wenyu Zang, Peng Zhang

  • [241] A Content-based Matrix Factorization Model for Recipe Recommendation
  • Chia-Jen Lin, Tsung-Ting Kuo, Shou-De Lin

  • [249] MalSpot: Multi^2 Malicious Network Behavior Patterns Analysis
  • Ching-Hao Mao, Chung-Jung Wu, Kuo-Chen Lee, Evangelos Papalexakis, Christos Faloutsos

  • [254] Improving iForest with relative mass
  • Sunil Aryal, Kai Ming Ting, Jonathan Wells, Takashi Washio

  • [259] Privacy-Preserving Collaborative Anomaly Detection for Participatory Sensing
  • Sarah Erfani, Yee Wei Law, Sutharshan Rajasegarar, Shanika Karunasekera, Christopher Leckie, Marimuthu Palaniswam

  • [265] An Integrated Model for User Attribute Discovery: A Case Study on Political Affiliation Identification
  • Swapna Gottipati, Minghui Qiu, Yang Liu, Feida Zhu, Jing Jiang

  • [280] For User-driven Software Evolution: Requirements Elicitation Derived from Mining Online Reviews
  • Wei Jiang, Li Zhang, Philip Lew

  • [301] Balanced Seed Selection for Budgeted Influence Maximization in Social Networks
  • Shuo Han, Fuzhen Zhuang, Qing He, Zhongzhi Shi

  • [343] A Graph Matching Method for Historical Census Household Linkage
  • Zhichun Fu, Peter Christen, Jun Zhou

  • [344] Efficiently and Fast Learning A Fine-grained Stochastic Blockmodel From Large Networks
  • Xuehua Zhao, Bo Yang, Hechang Chen

  • [387] An Unsupervised Analysis of Web Page Semantic Structures by Hierarchical Bayesian Modeling
  • Minoru Yoshida, Kazuyuki Matsumoto, Kenji Kita, Hiroshi Nakagawa

  • [10] Recurring and Novel Class Detection in Concept-Drifting Data Streams using Class-Based Ensemble
  • Mohammad Islam

  • [11] Brownian Bridge Model for High Resolution Location Predictions
  • Miao Lin, Wen-Jing Hsu

  • [12] Domain Transfer via Multiple Sources Regularization
  • Shaofeng Hu, Jiangtao Ren, Changshui Zhang, Chaogui Zhang

  • [18] Persistent Community Detection in Dynamic Social Networks
  • Siyuan Liu, Shuhui Wang, Ramayya Krishnan

  • [34] A Graphical Model for Collective Behavior Learning Using Minority Games
  • Farhan Khawar, Zengchang Qin

  • [36] An iterative fusion approach to graph-based semi-supervised learning from multiple views
  • Yang Wang, Jian Pei, Xuemin Lin, Qing Zhang

  • [42] Privacy Preserving Publication of Locations Based on Delaunay Triangulation
  • Jun Luo, Jinfei Liu, Li Xiong

  • [45] Determine optimal number of cluster with an elitist evolutionary approach
  • Lydia Boudjeloud-Assala, Ta Minh Thuy

  • [50] Detecting and Analyzing Influenza Epidemics with Social Media in China
  • Fang Zhang, Jun Luo, Chao Li, Xin Wang

  • [62] Highly Scalable Attribute Selection for AODE
  • Shenglei Chen, Ana Martinez, Geoffrey Webb

  • [74] Net-Ray: Visualizing and Mining Web-Scale Graphs
  • U Kang, Jay-Yoon Lee, Danai Koutra, Christos Faloutsos

  • [77] Influence Propagation: Patterns, Model and a Case Study
  • Yibin Lin, Agha Ali Raza, Jay-Yoon Lee, Danai Koutra, Roni Rosenfeld, Christos Faloutsos

  • [78] Ranking Tweets with Local and Global Consistency Using Rich Features
  • Zhankun Huang, Shenghua Liu, Pan Du, Xue-Qi Cheng

  • [87] Inferring Attitude in Online Social Networks Based On Quadratic Correlation
  • Cong Wang, Andrei Bulatov

  • [89] Learning from Crowds under Experts’ Supervision
  • Qingyang Hu, Qinming He, Hao Huang, Kevin Chiew, Zhenguang Liu

  • [92] Balancing the Analysis of Frequent Patterns
  • Arnaud Giacometti, Dominique Li, Arnaud Soulet

  • [98] Visual Analysis of Uncertainty in Trajectories
  • Lu Lu, Nan Cao, Siyuan Liu, Huamin Qu, Lionel Ni, Xiaoru Yuan

  • [104] Analyzing Location Predictability on Location-Based Social Networks
  • Defu Lian, Yin Zhu, Xing Xie, Enhong Chen

  • [112] Crowdordering
  • Toshiko Matsui, Yukino Baba, Toshihiro Kamishima, Hisashi Kashima

  • [121] Structure-aware Distance Measures for Comparing Clusterings in Graphs
  • Jeffrey Chan, Xuan Vinh Nguyen, Wei Liu, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Jian Pei

  • [128] Hash-based Stream LDA: Topic Modeling in Social Streams
  • Anton Slutsky, Xiaohua Hu, Yuan An

  • [136] Multi-Instance Learning from Positive and Unlabeled Bags
  • Jia Wu, Xingquan Zhu, Chengqi Zhang

  • [140] A New Evaluation Function for Entropy-based Feature Selection from Incomplete Data
  • Wenhao Shu, Shen Hong

  • [166] Detecting Changes in Rare Patterns from Data Streams
  • David Tse Jung Huang, Yun Sing Koh, Gillian Dobbie, Russel Pears

  • [174] Subtopic Mining via Modifier Graph Clustering
  • Haitao Yu, Fuji Ren

  • [177] Extracting Diverse-Frequent Patterns with Unbalanced Concept Hierarchy
  • Kumara Swamy Mittapally, P. Reddy, Somya Srivatsava

  • [183] A Robust Classifier for Imbalanced Datasets
  • Sori Kang, Kotagiri Ramamohanarao

  • [188] A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining
  • Changyu Dong, Liqun Chen

  • [202] Shingled Graph Disassembly: Finding the Undecideable Path
  • Richard Wartell, Yan Zhou, Kevin Hamlen, Murat Kantarcioglu

  • [204] Efficiently Depth-First Minimal Pattern Mining
  • Arnaud Soulet, Francois Rioult

  • [205] Mining Diversified Shared Decision Tree Sets for Discovering Cross Domain Similarities
  • Guozhu Dong, Qian Han

  • [213] Semi-supervised clustering on heterogeneous information networks
  • Chen Luo, Wei Pang, Zhe Wang

  • [215] Fast Vertical Mining of Sequential Patterns Using Co-occurrence Information
  • Philippe Fournier-Viger, Antonio Gomariz, Manuel Campos, Rincy Thomas

  • [237] Noise-Tolerant Approximate Blocking for Dynamic Real-time Entity Resolution
  • Huizhi Liang, Peter Christen

  • [255] Signed-Error Conformal Regression
  • Henrik Linusson, Ulf Johansson, Tuve Lofstrom

  • [261] Automatic Fake Followers Detection in Chinese Micro-blogging System
  • Yi Shen, Jianjun Yu

  • [271] Data Augmented Maximum Margin Matrix Factorization for Flickr Group Recommendation
  • Liang Chen, Yilun Wang, Lichuan Ji, Jian Wu

  • [277] A Relevance Weighted Ensemble Model for Anomaly Detection in Switching Data Streams
  • Mahsa Salehi, Christopher Leckie, Masud Moshtaghi, Tharshan Vaithianathan

  • [285] A Novel Framework to Improve siRNA Efficacy Prediction
  • Bui Thang

  • [290] Activity Recognition Using a Few Label Samples
  • Heidar Davoudi, Xiaoli Li, Minh Nhut Nguyen, Shonali Krishnaswamy

  • [294] Characterizing Temporal Anomalies in Evolving Networks
  • Ranga Suri, Narasimha Murty, Athithan G

  • [295] Mining Correlation Patterns among Appliances in Smart Home Environment
  • Yi-Cheng Chen, Chien-Chih Chen, Wen-Chih Peng, Wang-Chien Lee

  • [298] Overlapping Communities for Identifying Misbehavior in Network Communications
  • Farnaz Moradi, Tomas Olovsson, Philippas Tsigas

  • [305] Beyond Poisson: Modeling Inter-Arrival Times of Requests in a Datacenter
  • Da-Cheng Juan, Lei Li, Huan-Kai Peng, Diana Marculescu, Christos Faloutsos

  • [310] Mining GPS Data for Trajectory Recommendation
  • Peifeng Yin, Mao Ye, Wang-Chien Lee, Zhenhui Li

  • [314] Two sides of a coin: Separating Personal Communication and Public Dissemination Accounts in Twitter
  • Peifeng Yin, Nilam Ram, Wang-Chien Lee, Conrad Tucker, Shashank Khandelwal, Marcel Salathe

  • [315] Fault-tolerant Concept Detection in Information Networks
  • Tobias Koetter, Stephan Gunnemann, Christos Faloutsos, Michael Berthold

  • [334] A Framework for Large-Scale Train Trip Record Analysis and Its Application to Passengers' Flow Prediction after Train Accidents
  • Daisaku Yokoyama, Masahiko Itoh, Masashi Toyoda, Yoshimitsu Tomita, Satoshi Kawamura, Masaru Kitsuregawa

  • [335] Finding Well-Clusterable Subspaces for High Dimensional Data A Numerical One-Dimension Approach
  • Chuanren Liu, Tianming Hu, Yong Ge, Hui Xiong

  • [347] Inducing controlled error over variable length ranked lists
  • Laurence Park, Glenn Stone

  • [348] Patent Evaluation Based on Technological Trajectory Revealed in Relevant Prior Patents
  • Sooyoung Oh, Zhen Lei, Wang-Chien Lee, John Yen

  • [354] Topic Modeling using Collapsed Typed Dependency Relations
  • Elnaz Delpisheh, Aijun An

  • [357] Self-Training Temporal Dynamic Collaborative Filtering
  • Cheng Luo, Xiongcai Cai, Nipa Chowdhury

  • [360] ReadBehavior: Reading Probabilities Modeling of Tweets via the User's Retweeting Behaviors
  • Jianguang Du, Dandan Song, Lejian Liao, Xin Li, Li Liu, Guoqiang Li

  • [364] Constrained-hLDA for Topic Discovery in Chinese Microblogs
  • Wei Wang, Hua Xu

  • [369] SLIM++: Higher-Order Slparse Linear Method for Top-N Recommender Systems
  • Evangelia Christakopoulou, George Karypis

  • [378] Latent Features Based Prediction on New Users’ Tastes
  • Hung-Yu Kao, Ming-Chu Chen

  • [388] Collective Matrix Factorization of Predictors, Neighborhood and Targets for Semi-Supervised Classification
  • Lucas Drumond, Lars Schmidt-Thieme

  • [395] Programmatic buying bidding strategies with win rate and winning price estimation in real time mobile advertising
  • Xiang Li, Devin Guan

  • [401] Document Clustering with an Augmented Nonnegative Matrix Factorization Model
  • Zunyan Xiong, Yizhou Zang, Xingpeng Jiang, Xiaohua Hu