Cambridge University Press, Cambridge, 2008.
-
M. Markou, and S. Singh. Novelty detection: a review, part 1: statistical approaches. Signal Processing, 83(12), pp. 2481–2497, 2003.
-
G. J. McLachian. Discriminant analysis and statistical pattern recognition. Wiler Interscience, 2004.
-
M. Markou, and S. Singh. Novelty detection: A review, part 2: neural network-based approaches. Signal Processing, 83(12), pp. 2481–2497, 2003.
-
M. Mehta, R. Agrawal, and J. Rissanen. SLIQ: A fast scalable classifier for data mining, EDBT Conference, pp. 18–32, 1996.
-
P. Melville, M. Saar-Tsechansky, F. Provost, and R. Mooney. An expected utility approach to active feature-value acquisition. IEEE ICDM Conference, 2005.
-
A. K. Menon, and C. Elkan. Link prediction via matrix factorization. Machine Learn-ing and Knowledge Discovery in Databases, pp. 437–452, 2011.
-
B. Messmer, and H. Bunke. A new algorithm for error-tolerant subgraph isomprohism detection. IEEE Transactions on Pattern Mining and Machine Intelligence, 20(5),
-
493–504, 1998.
-
A. Meyerson, and R. Williams. On the complexity of optimal k-anonymization. ACM PODS Conference, pp. 223–228, 2004.
-
R. Michalski, I. Mozetic, J. Hong, and N. Lavrac. The multi-purpose incremental learning system AQ15 and its testing application to three medical domains. Proceed-ings of the AAAI, pp. 1–41, 1986.
-
C. Michael, and A. Ghosh. Two state-based approaches to program-based anomaly detection. Computer Security Applications Conference, pp. 21, 2000.
-
H. Miller, and J. Han. Geographic data mining and knowledge discovery. CRC Press, 2009.
-
T. M. Mitchell. Machine learning. McGraw Hill International Edition, 1997.
-
B. Mobasher. Web usage mining and personalization. Practical Handbook of Internet Computing, ed. Munindar Singh, pp, 264–265, CRC Press, 2005.
-
D. Montgomery, E. Peck, and G. Vining. Introduction to linear regression analysis.
John Wiley and Sons, 2012.
-
C. H. Mooney, and J. F. Roddick. Sequential pattern mining: approaches and algo-rithms. ACM Computing Surveys (CSUR), 45(2), 2013.
-
B. Moret. Decision trees and diagrams. ACM Computing Surveys (CSUR), 14(4),
-
593–623, 1982.
-
A. Mueen, E. Keogh, Q. Zhu, S. Cash, and M. Westover. Exact discovery of time series motifs. SDM Conference, pp. 473–484, 2009.
-
A. Mueen, and E. Keogh. Online discovery and maintenance of time series motifs. ACM KDD Conference, pp. 1089–1098, 2010.
-
E. Muller, M. Schiffer, and T. Seidl. Statistical selection of relevant subspace projec-tions for outlier ranking. ICDE Conference, pp, 434–445, 2011.
-
E. Muller, I. Assent, P. Iglesias, Y. Mulle, and K. Bohm. Outlier analysis via subspace analysis in multiple views of the data. IEEE ICDM Conference, pp. 529–538, 2012.
-
S. K. Murthy. Automatic construction of decision trees from data: A multi-disciplinary survey. Data Mining and Knowledge Discovery, 2(4), pp. 345–389, 1998.
-
S. Nabar, K. Kenthapadi, N. Mishra, and R. Motwani. A survey of query auditing techniques for data privacy. Privacy-Preserving Data Mining: Models and Algorithms, Springer, pp. 415–431, 2008.
-
D. Nadeau, and S. Sekine. A survey of named entity recognition and classification.
Dostları ilə paylaş: |