The Third International Conference on Advanced Data Mining and Applications (ADMA) organized in Harbin, China continued the tradition already established by the first two ADMA conferences in Wuhan in 2005 and Xi’an in 2006. One major goal of ADMA is to create a respectable identity in the data mining research com- nity. This feat has been partially achieved in a very short time despite the young age of the conference, thanks to the rigorous review process insisted upon, the outstanding list of internationally renowned keynote speakers and the excellent program each year. The impact of a conference is measured by the citations the conference papers receive. Some have used this measure to rank conferences. For example, the independent source cs-conference-ranking.org ranks ADMA (0.65) higher than PAKDD (0.64) and PKDD (0.62) as of June 2007, which are well established conferences in data mining. While the ranking itself is questionable because the exact procedure is not disclosed, it is nevertheless an encouraging indicator of recognition for a very young conference such as ADMA.
Author(s): Zhi-Hua Zhou (auth.), Reda Alhajj, Hong Gao, Xue Li, Jianzhong Li, Osmar R. Zaïane (eds.)
Series: Lecture Notes in Computer Science 4632 : Lecture Notes in Artificial Intelligence
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007
Language: English
Pages: 636
Tags: Database Management; Artificial Intelligence (incl. Robotics); Data Mining and Knowledge Discovery; Software Engineering; Computer Appl. in Administrative Data Processing; Information Systems Applications (incl. Internet)
Front Matter....Pages -
Mining Ambiguous Data with Multi-instance Multi-label Representation....Pages 1-1
DELAY : A Lazy Approach for Mining Frequent Patterns over High Speed Data Streams....Pages 2-14
Exploring Content and Linkage Structures for Searching Relevant Web Pages....Pages 15-22
CLBCRA-Approach for Combination of Content-Based and Link-Based Ranking in Web Search....Pages 23-34
Rough Sets in Hybrid Soft Computing Systems....Pages 35-44
Discovering Novel Multistage Attack Strategies....Pages 45-56
Privacy Preserving DBSCAN Algorithm for Clustering....Pages 57-68
A New Multi-level Algorithm Based on Particle Swarm Optimization for Bisecting Graph....Pages 69-80
A Supervised Subspace Learning Algorithm: Supervised Neighborhood Preserving Embedding....Pages 81-88
A k -Anonymity Clustering Method for Effective Data Privacy Preservation....Pages 89-99
LSSVM with Fuzzy Pre-processing Model Based Aero Engine Data Mining Technology....Pages 100-109
A Coding Hierarchy Computing Based Clustering Algorithm....Pages 110-121
Mining Both Positive and Negative Association Rules from Frequent and Infrequent Itemsets....Pages 122-133
Survey of Improving Naive Bayes for Classification....Pages 134-145
Privacy Preserving BIRCH Algorithm for Clustering over Arbitrarily Partitioned Databases....Pages 146-157
Unsupervised Outlier Detection in Sensor Networks Using Aggregation Tree....Pages 158-169
Separator: Sifting Hierarchical Heavy Hitters Accurately from Data Streams....Pages 170-182
Spatial Fuzzy Clustering Using Varying Coefficients....Pages 183-190
Collaborative Target Classification for Image Recognition in Wireless Sensor Networks....Pages 191-202
Dimensionality Reduction for Mass Spectrometry Data....Pages 203-213
The Study of Dynamic Aggregation of Relational Attributes on Relational Data Mining....Pages 214-226
Learning Optimal Kernel from Distance Metric in Twin Kernel Embedding for Dimensionality Reduction and Visualization of Fingerprints....Pages 227-238
Efficiently Monitoring Nearest Neighbors to a Moving Object....Pages 239-251
A Novel Text Classification Approach Based on Enhanced Association Rule....Pages 252-263
Applications of the Moving Average of n th -Order Difference Algorithm for Time Series Prediction....Pages 264-275
Inference of Gene Regulatory Network by Bayesian Network Using Metropolis-Hastings Algorithm....Pages 276-286
A Consensus Recommender for Web Users....Pages 287-299
Constructing Classification Rules Based on SVR and Its Derivative Characteristics....Pages 300-309
Hiding Sensitive Associative Classification Rule by Data Reduction....Pages 310-322
AOG-ags Algorithms and Applications....Pages 323-334
A Framework for Titled Document Categorization with Modified Multinomial Naivebayes Classifier....Pages 335-344
Prediction of Protein Subcellular Locations by Combining K-Local Hyperplane Distance Nearest Neighbor....Pages 345-351
A Similarity Retrieval Method in Brain Image Sequence Database....Pages 352-364
A Criterion for Learning the Data-Dependent Kernel for Classification....Pages 365-376
Topic Extraction with AGAPE....Pages 377-388
Clustering Massive Text Data Streams by Semantic Smoothing Model....Pages 389-400
GraSeq : A Novel Approximate Mining Approach of Sequential Patterns over Data Stream....Pages 401-411
A Novel Greedy Bayesian Network Structure Learning Algorithm for Limited Data....Pages 412-421
Optimum Neural Network Construction Via Linear Programming Minimum Sphere Set Covering....Pages 422-429
Retracted: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks....Pages 430-441
Prediction of Enzyme Class by Using Reactive Motifs Generated from Binding and Catalytic Sites....Pages 442-453
Bayesian Network Structure Ensemble Learning....Pages 454-465
Fusion of Palmprint and Iris for Personal Authentication....Pages 466-475
Enhanced Graph Based Genealogical Record Linkage....Pages 476-487
A Fuzzy Comprehensive Clustering Method....Pages 488-499
CACS: A Novel Classification Algorithm Based on Concept Similarity....Pages 500-507
Data Mining in Tourism Demand Analysis: A Retrospective Analysis....Pages 508-515
Chinese Patent Mining Based on Sememe Statistics and Key-Phrase Extraction....Pages 516-523
Classification of Business Travelers Using SVMs Combined with Kernel Principal Component Analysis....Pages 524-532
Research on the Traffic Matrix Based on Sampling Model....Pages 533-544
A Causal Analysis for the Expenditure Data of Business Travelers....Pages 545-552
A Visual and Interactive Data Exploration Method for Large Data Sets and Clustering....Pages 553-561
Explorative Data Mining on Stock Data – Experimental Results and Findings....Pages 562-569
Graph Structural Mining in Terrorist Networks....Pages 570-577
Characterizing Pseudobase and Predicting RNA Secondary Structure with Simple H-Type Pseudoknots Based on Dynamic Programming....Pages 578-585
Locally Discriminant Projection with Kernels for Feature Extraction....Pages 586-593
A GA-Based Feature Subset Selection and Parameter Optimization of Support Vector Machine for Content – Based Image Retrieval....Pages 594-604
E-Stream: Evolution-Based Technique for Stream Clustering....Pages 605-615
H-BayesClust: A New Hierarchical Clustering Based on Bayesian Networks....Pages 616-624
An Improved AdaBoost Algorithm Based on Adaptive Weight Adjusting....Pages 625-632
Retraction Note to: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks....Pages E1-E2
Back Matter....Pages -