The 3rd International Workshop on Intelligent Data Analysis and Management, 1st Edition

  • Published By:
  • ISBN-10: 9400772939
  • ISBN-13: 9789400772939
  • DDC: 005.74068
  • Grade Level Range: College Freshman - College Senior
  • 132 Pages | eBook
  • Original Copyright 2013 | Published/Released June 2014
  • This publication's content originally published in print form: 2013

  • Price:  Sign in for price



These papers on Intelligent Data Analysis and Management (IDAM) examine issues related to the research and applications of Artificial Intelligence techniques in data analysis and management across a variety of disciplines. The papers derive from the 2013 IDAM conference in Kaohsiung ,Taiwan. It is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies, etc. The techniques studied include (but are not limited to): data visualization, data pre-processing, data engineering, database mining techniques, tools and applications, evolutionary algorithms, machine learning, neural nets, fuzzy logic, statistical pattern recognition, knowledge filtering, and post-processing, etc.

Table of Contents

Front Cover.
Other Frontmatter.
Title Page.
Copyright Page.
1: An Information Quality (InfoQ) Framework for Ex-Ante and Ex-Post Evaluation of Empirical Studies.
2: Memory-Aware Mining of Indirect Associations Over Data Streams.
3: Graph-Based Batch Mode Active Learning.
4: One Pass Outlier Detection for Streaming Categorical Data.
5: Measuring of QoE for Cloud Applications.
6: Mining Weighted Partial Periodic Patterns.
7: Edge Selection for Degree Anonymization on K Shortest Paths.
8: K-Neighborhood Shortest Path Privacy in the Cloud.
9: The Framework of Information Processing Network for Supply Chain Innovation in Big Data Era.
10: Website Navigation Recommendation Based on Reinforcement Learning Technique.
11: An Approach for Hate Groups Detection in Facebook.
12: Toward Crowdsourcing Data Mining.
13: Wireless Security Analysis Using WarDrive Investigation in Kaohsiung Areas.
14: Guanxi Buying in the Social Media Environment.
15: Introspection of Unauthorized Sharing on Social Networking Sites.