


default search action
15th AusDM 2017: Melbourne, VIC, Australia
- Yee Ling Boo, David Stirling, Lianhua Chi, Lin Liu, Kok-Leong Ong, Graham Williams:

Data Mining - 15th Australasian Conference, AusDM 2017, Melbourne, VIC, Australia, August 19-20, 2017, Revised Selected Papers. Communications in Computer and Information Science 845, Springer 2018, ISBN 978-981-13-0291-6
Clustering and Classification
- Jinyan Li, Simon Fong

, Shimin Hu, Raymond K. Wong, Sabah Mohammed
:
Similarity Majority Under-Sampling Technique for Easing Imbalanced Classification Problem. 3-23 - Zaheer Babar, Md Zahidul Islam

, Sameen Mansha:
Rank Forest: Systematic Attribute Sub-spacing in Decision Forest. 24-37 - Malika Bendechache

, Nhien-An Le-Khac
, M. Tahar Kechadi
:
Performance Evaluation of a Distributed Clustering Approach for Spatial Datasets. 38-56 - Soheila Gheisari, Daniel R. Catchpoole, Amanda Charlton, Paul J. Kennedy

:
Patched Completed Local Binary Pattern is an Effective Method for Neuroblastoma Histological Image Classification. 57-71 - Iqbal H. Sarker

, Muhammad Ashad Kabir
, Alan Colman
, Jun Han:
An Improved Naive Bayes Classifier-Based Noise Detection Technique for Classifying User Phone Call Behavior. 72-85
Big Data
- Hien Duy Nguyen

:
A Two-Sample Kolmogorov-Smirnov-Like Test for Big Data. 89-106 - Yuhang Zhang, Tania Churchill, Kee Siong Ng:

Exploiting Redundancy, Recurrency and Parallelism: How to Link Millions of Addresses with Ten Lines of Code in Ten Minutes. 107-122
Time Series
- Irvan Bastian Arief Ang

, Flora D. Salim
, Margaret Hamilton
:
SD-HOC: Seasonal Decomposition Algorithm for Mining Lagged Time Series. 125-143 - Keith Johnson

, Wei Liu
:
An Incremental Anytime Algorithm for Mining T-Patterns from Event Streams. 144-157
Outlier Detection and Applications
- Musa Mammadov

, Rob Muspratt, Julien Ugon
:
Detection of Outlier Behaviour Amongst Health/Medical Providers Servicing TAC Clients. 161-172 - Yuantian Miao, Lei Pan

, Sutharshan Rajasegarar
, Jun Zhang, Christopher Leckie
, Yang Xiang:
Distributed Detection of Zero-Day Network Traffic Flows. 173-191 - Mohiuddin Ahmed

, Abu S. S. M. Barkat Ullah
:
False Data Injection Attacks in Healthcare. 192-202 - Md. Shahidul Islam, Russel Pears, Boris Bacic:

Identifying Precursors to Frequency Fluctuation Events in Electrical Power Generation Data. 203-219
Social Media and Applications
- Hamid Dimyati

, Ramdisa Agasi
:
Collaborative Filtering in an Offline Setting Case Study: Indonesia Retail Business. 223-232 - Bandar Alghamdi

, Yue Xu
, Jason Watson
:
Malicious Behaviour Analysis on Twitter Through the Lens of User Interest. 233-249 - Alireza Moayedikia, Kok-Leong Ong, Yee Ling Boo

, William Yeoh
:
Meta-Heuristic Multi-objective Community Detection Based on Users' Attributes. 250-264 - Sattar Seifollahi, Massimo Piccardi

, Ehsan Zare Borzeshi:
A Semi-supervised Hidden Markov Topic Model Based on Prior Knowledge. 265-276

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














