Sciweavers

IDA
2009
Springer
13 years 8 months ago
Trajectory Voting and Classification Based on Spatiotemporal Similarity in Moving Object Databases
We propose a method for trajectory classification based on trajectory voting in Moving Object Databases (MOD). Trajectory voting is performed based on local trajectory similarity. ...
Costas Panagiotakis, Nikos Pelekis, Ioannis Kopana...
IDA
2009
Springer
13 years 8 months ago
Isotonic Classification Trees
Abstract. We propose a new algorithm for learning isotonic classification trees. It relabels non-monotone leaf nodes by performing the isotonic regression on the collection of leaf...
Rémon van de Kamp, Ad Feelders, Nicola Bari...
IDA
2009
Springer
13 years 8 months ago
Ontology-Driven KDD Process Composition
Abstract. One of the most interesting challenges in Knowledge Discovery in Databases (KDD) eld is giving support to users in the composition of tools for forming a valid and useful...
Claudia Diamantini, Domenico Potena, Emanuele Stor...
IDA
2009
Springer
13 years 8 months ago
Context-Based Distance Learning for Categorical Data Clustering
Abstract. Clustering data described by categorical attributes is a challenging task in data mining applications. Unlike numerical attributes, it is difficult to define a distance b...
Dino Ienco, Ruggero G. Pensa, Rosa Meo
IDA
2009
Springer
13 years 8 months ago
Spike Detection and Sorting: Combining Algebraic Differentiations with ICA
A new method for action potentials detection is proposed. The method is based on a numerical differentiation, as recently introduced from operational calculus. We show that it has ...
Zoran Tiganj, Mamadou Mboup
IDA
2009
Springer
13 years 8 months ago
Hierarchical Extraction of Independent Subspaces of Unknown Dimensions
Abstract. Independent Subspace Analysis (ISA) is an extension of Independent Component Analysis (ICA) that aims to linearly transform a random vector such as to render groups of it...
Peter Gruber, Harold W. Gutch, Fabian J. Theis
IDA
2009
Springer
13 years 8 months ago
Source Separation of Phase-Locked Subspaces
We present a two-stage algorithm to perform blind source separation of sources organized in subspaces, where sources in different subspaces have zero phase synchrony and sources in...
Miguel Almeida, Ricardo Vigário
IDA
2009
Springer
13 years 8 months ago
Exploiting Data Missingness in Bayesian Network Modeling
Sergio Rodrigues de Morais, Alex Aussem
IDA
2009
Springer
13 years 8 months ago
Efficient Vertical Mining of Frequent Closures and Generators
Abstract. The effective construction of many association rule bases requires the computation of both frequent closed and frequent generator itemsets (FCIs/FGs). However, only few m...
Laszlo Szathmary, Petko Valtchev, Amedeo Napoli, R...