Author:
Zhang Qingyu,Segall Richard S.
Reference43 articles.
1. AAAI (2002), American Association for Artificial Intelligence (AAAI) Spring Symposium on Information Refinement and Revision for Decision Making: Modeling for Diagnostics, Prognostics, and Prediction, Software and Data, retrieved from http: // www.cs.rpi.edu/∼goebel/ss02/software-and-data.html .
2. Ceccato, M., M. Marin, K. Mens, L. Moonen, et al., (2006), Applying and combining three different aspect Mining Techniques, Software Quality Journal. 14(3), 209-214.
3. Chang, J. and Lee, W. (2006), Finding frequent itemsets over online data streams, Information and Software Technology. 48(7), 606-619.
4. Chou, C., Sinha, A. and Zhao, H. (2008), A text mining approach to Internet abuse detection, Information Systems and eBusiness Management. 6(4), 419-440.
5. Curry, C., Grossman, R., Locke, D., Vejcik, S., and Bugajski, J. (2007), Detecting changes in large data sets of payment card data: A case study, KDD’07, August 12-15, San Jose, CA.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献