Found: 10
Select item for more details and to access through your institution.
A weighted voting framework for classifiers ensembles.
- Published in:
- Knowledge & Information Systems, 2014, v. 38, n. 2, p. 259, doi. 10.1007/s10115-012-0586-6
- By:
- Publication type:
- Article
Exploiting rich user information for one-class collaborative filtering.
- Published in:
- Knowledge & Information Systems, 2014, v. 38, n. 2, p. 277, doi. 10.1007/s10115-012-0583-9
- By:
- Publication type:
- Article
Models of distributed data clustering in peer-to-peer environments.
- Published in:
- Knowledge & Information Systems, 2014, v. 38, n. 2, p. 303, doi. 10.1007/s10115-012-0585-7
- By:
- Publication type:
- Article
Clustering semantically heterogeneous distributed aggregate databases.
- Published in:
- Knowledge & Information Systems, 2014, v. 38, n. 2, p. 331, doi. 10.1007/s10115-012-0588-4
- By:
- Publication type:
- Article
Exploiting semantic annotations for open information extraction: an experience in the biomedical domain.
- Published in:
- Knowledge & Information Systems, 2014, v. 38, n. 2, p. 365, doi. 10.1007/s10115-012-0590-x
- By:
- Publication type:
- Article
On the adaptability of G3PARM to the extraction of rare association rules.
- Published in:
- Knowledge & Information Systems, 2014, v. 38, n. 2, p. 391, doi. 10.1007/s10115-012-0591-9
- By:
- Publication type:
- Article
Estimating feature ratings through an effective review selection approach.
- Published in:
- Knowledge & Information Systems, 2014, v. 38, n. 2, p. 419, doi. 10.1007/s10115-012-0495-8
- By:
- Publication type:
- Article
Composition pattern oriented tag extraction from short documents using a structural learning method.
- Published in:
- Knowledge & Information Systems, 2014, v. 38, n. 2, p. 447, doi. 10.1007/s10115-012-0594-6
- By:
- Publication type:
- Article
Expansion and decentralized search in complex networks.
- Published in:
- Knowledge & Information Systems, 2014, v. 38, n. 2, p. 469, doi. 10.1007/s10115-012-0596-4
- By:
- Publication type:
- Article
Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony.
- Published in:
- Knowledge & Information Systems, 2014, v. 38, n. 2, p. 491, doi. 10.1007/s10115-012-0595-5
- By:
- Publication type:
- Article