1. Adversarial Classification - Computer Science & Engineering
  2. A Survey and Comparative Analysis of Data ... - Semantic Scholar
  3. Comparative Study of Selected Data Mining Algorithms Used For ...
  4. Text Mining with Information Extraction - UT Computer Science
  5. Collaborative Filtering with Temporal Dynamics - CiteSeerX
  6. Data Mining - icdst
  7. A Study of Data Mining Tools in Knowledge Discovery Process
  8. A Survey on Transfer Learning - CiteSeerX
  9. Social Influence Analysis in Large-scale Networks
  10. A Tutorial on Support Vector Machines for Pattern Recognition
  11. A Study on Autism Spectrum Disorders using - International Journal ...
  12. Data Mining in E-Commerce: A CRM Platform - Semantic Scholar
  13. Web Usage Mining - UNED
  14. Crowdsourcing for Search and Data Mining (CSDM 2011)
  15. A new algorithm for extracting a small ... - Semantic Scholar
  16. An Empirical Evaluation of Density-Based Clustering Techniques
  17. Sequential Modeling and Structural Anomaly Analytics in Industrial ...
  18. Optimization of Association Rule Mining Apriori - CiteSeerX
  19. Sampling Methods for Random Subspace Domain Adaptation
  20. Introduction to stream: An Extensible Framework for Data Stream ...
  21. Applying Association Rules Mining Algorithms for Traffic Accidents ...
  22. Improving DDM Performance By Combining Distributed Data Mining ...
  23. Clustering by a genetic algorithm with biased mutation ... - DiVA portal
  24. A Comparison of String Distance Metrics for Name-Matching Tasks
  25. PEGASUS: A Peta-Scale Graph Mining System - Carnegie Mellon ...
  26. Hybrid Fuzzy Data Clustering Algorithm Using Different ... - CiteSeerX
  27. The Future of Computer Science - Semantic Scholar
  28. Untitled - International Journal of Advanced Engineering and Nano ...
  29. K-ANONYMITY: The History of an IDEA - International Journal of Soft ...
  30. Human-Centric Justification of Machine Learning Predictions - IJCAI
  31. A Sentimental Education: Sentiment Analysis Using Subjectivity ...
  32. Survey of Multi Relational Classification (MRC) - International ...
  33. Metropolis Algorithms for Representative Subgraph Sampling
  34. A Review of Anomaly based IntrusionDetection Systems
  35. Ontology-based Document Mining System for IT Support Service
  36. k-Anonymization Revisited - CiteSeerX
  37. Neighborhood Formation and Anomaly Detection in Bipartite Graphs
  38. Data Clustering: 50 Years Beyond K-Means - Semantic Scholar
  39. Semi-supervised Graph Clustering: A Kernel Approach
  40. Eye-Tracking Analysis of User Behavior in WWW Search - Cornell ...
  41. IjISME - icdst
  42. Duplicity Detection System for Digital Documents - International ...
  43. Sentiment Analysis Using Collaborated Opinion Mining
  44. Using Naïve Bayes Classifier to Accelerate ... - Semantic Scholar
  45. Detecting Phishing Websites Using Associative - Academic Hosting ...
  46. How Computational Statistics Became the Backbone of Modern ...
  47. Assessing the Quality of Unstructured Data: An ... - Semantic Scholar
  48. Adomavicius and Tuzhilin
  49. Big Data Tutorial (pdf)
  50. EVOLVING INSIDER THREAT DETECTION USING - UT Dallas
  51. DATA INTENSIVE QUERY PROCESSING FOR - UT Dallas
  52. A Survey & Current Research Challenges in Meta ... - CiteSeerX
  53. Support Vector Machines - Nanyang Technological University
  54. TRENDS IN AN INTERNATIONAL INDUSTRIAL ... - Semantic Scholar
  55. Scalable Multi-threaded Community Detection in Social Networks
  56. Identifying Rare Diseases from Behavioural Data: A Machine ...
  57. PRIVACY-PRESERVING SOCIAL NETWORK ANALYSIS by ...
  58. The Partial Weighted Set Cover Problem with Applications to Outlier ...
  59. Frontiers in Massive Data Analysis - Department of Statistics
  60. Groupthink and Peer Pressure - INET TU-Berlin
  61. Context-aware Search for Personal Information Management ... - Wisc
  62. Segmenting Customers from Population to - NYU
  63. Scalable Rule-Based Gene Expression Data - CiteSeerX
  64. Robust Preprocessing and Random Forests Technique for Network ...
  65. Parallel Community Detection for Massive Graphs - Georgia Tech ...
  66. 2278 - 3075 Website - International Journal of Innovative ...
  67. International Journal of Innovative Technology and Exploring ...
  68. Transitive Closure and Metric Inequality of Weighted Graphs ...
  69. Theory and Application of Conditional Random Sampling - CiteSeerX
  70. Learning Explainable User Sentiment and Preferences - Infoscience
  71. ADATPM: Analysis and Design of Author's Trait Processing Module ...
  72. Single pass clustering for large data sets
  73. Presentation Abstracts - Protégé - Stanford University
  74. Link Prediction using Supervised Learning - Computer Science
  75. Supervised k-Means Clustering - Cornell Computer Science
  76. Nonnegative Matrix Approximation - Semantic Scholar
  77. Untitled - icdst
  78. InfoMagnets: Making Sense of Corpus Data - Social Security Online
  79. Dynamic Social Community Detection and its Applications - UF CISE
  80. Parallel Clustered Low-rank Approximation of Graphs and Its ...
  81. Handbook of Data Visualization - Idir BOUIFLOU - Free
  82. Behavior-Based Segmentation of Demonstrated Tasks
  83. Towards A Unified View of Service-Oriented Web - UT Dallas
  84. An Examination of Practical Granger Causality Inference
  85. Optimizing Search Engines using Clickthrough Data - CiteSeerX
  86. Minimisation de l'influence négative dans les ... - Semantic Scholar
  87. International Journal of Innovative Technology and Exploring ...
  88. CiteSeerX Related Publications - C. Lee Giles
  89. International Journal of Innovative Technology and Exploring ...
  90. Untitled - ICDST.org pdf depository
  91. Technology and Engineering International Journal of Recent ... - icdst
  92. Untitled - ICDST.org pdf depository
  93. here - icdst
  94. A Model of Computation for MapReduce - Stanford CS Theory
  95. Handbook of Astronomical Data Analysis - MR Software
  96. International Journal of International Journal of - icdst
  97. Listing All Maximal Cliques in Sparse Graphs in Near-optimal Time
  98. Deployed Security Games for Patrol Planning - CS UTEP
  99. here - icdst
  100. Theory and Applications of b-Bit Minwise Hashing - Fodava

All rights reserved for ICDST 2017-2019