Conferences related to Data Mining

Back to Top

IGARSS 2015 - 2015 IEEE International Geoscience and Remote Sensing Symposium

The Geoscience and Remote Sensing Society (GRSS) seeks to advance science and technology in geoscience, remote sensing and related fields using conferences, education and other resources. Its fields of interest are the theory, concepts and techniques of science and engineering as they apply to the remote sensing of the earth, oceans, atmosphere, and space, as well as the processing, interpretation and dissemination of this information.


2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)

IEEE International Conference on Fuzzy Systems is the largest technical event in the field of fuzzy systems. In 2014, International Joint Conference on Neural Networks will be part of the 2104 IEEE World Congress on Computational Intelligence.

  • 2013 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)

    The conference will provide a platform for researchers and practitioners to deliberate / exchange ideas on a wide range topics in fuzzy systems and related areas including fuzzy measures, fuzzy control, fuzzy pattern recognition, data/text/web mining, information/text/image retrieval, knowledge discovery, reasoning, and applications of fuzzy theories in all areas

  • 2012 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)

    The annual FUZZ-IEEE is one of the leading events in the field of fuzzy systems.

  • 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)

    The FUZZ-IEEE 2011 will be held in Taipei, Taiwan. The conference will cover the whole range of research and applications in fuzzy systems and soft computing. In addition to regular oral and poster presentations, the conference will include a full program of tutorials, workshops, panel sessions, and keynote talks.

  • 2010 IEEE 18th International Conference on Fuzzy Systems (FUZZ-IEEE)

  • 2009 IEEE 17th International Conference on Fuzzy Systems (FUZZ-IEEE)

    Topics: Fuzzy logic/reasoning, Fuzzy mathematics, Fuzzy adaptive/control systems, Fuzzy system modeling and analysis, Fuzzy data mining/analysis, Fuzzy decision making, Fuzzy optimization/forecasting, Fuzzy pattern recognition and image/signal processing, Fuzzy information systems, Fuzzy system architecture/hardware, Fuzzy internet applications, Computing with words


2014 International Conference on Distributed Frameworks for Multimedia Applications (DFmA)

Papers are invited on all aspects of Advanced Computer Networks/Next Generation Internet or research areas aligned to it that include (but are not limited to) the following: Multimedia Communications and Systems, Networks/Internet & Communications, Internet Security and Monitoring, Grid and Cloud Computing.

  • 2010 International Conference on Distributed Frameworks for Multimedia Applications (DFmA)

    DFmA (Distributed Frameworks & Applications) formerly known as DFMA (Distributed Framework for Multimedia & Applications) is the series of annual Franco Malaysia Conference on Multimedia that has already initiated in 2005 by the University Franche- Comt and the Universiti Sains Malaysia (USM) to provide a forum for researchers in computer science from both countries and to promote interaction with researchers from other regions as well. DFmA is an international conference born from the collabora


2013 11th International Workshop on Content-Based Multimedia Indexing (CBMI)

The 11th International Content Based Multimedia Indexing Workshop is to bring together the various communities involved in all aspects of content-based multimedia indexing, retrieval, browsing and presentation.The conference will host invited keynote talks and regular, special and demo sessions with contributed research papers.

  • 2012 10th International Workshop on Content-Based Multimedia Indexing (CBMI)

    10th International CBMI Workshop aims at bringing together the various communities involved in all aspects of content-based multimedia indexing, retrieval, browsing and presentation. The scientific program of CBMI 2012 will include invited keynote talks and regular, special and demo sessions with contributed research papers.

  • 2011 9th International Workshop on Content-Based Multimedia Indexing (CBMI)

    CBMI 2011 aims at bringing together the various communities involved in the different aspects of content-based multimedia indexing, retrieval, browsing and presentation.

  • 2010 International Workshop on Content-Based Multimedia Indexing (CBMI)

    CBMI 2010 aims at bringing together the various communities involved in the different aspects of Content-Based Multimedia Indexing. submissions include, but are not limited to multimedia indexing and retrieval, matching and similarity search,construction of high level indices, multimedia content extraction, dentification and tracking of semantic regions in scenes, ...

  • 2009 International Workshop on Content-Based Multimedia Indexing (CBMI)

    CBMI 2009 aims at bringing together the research communities involved in the different aspects of content-based multimedia indexing, such as image analysis, computer vision, pattern recognition and information retrieval with current industrial trends and developments.

  • 2008 International Workshop on Content-Based Multimedia Indexing (CBMI)

    CBMI is the main international forum for the presentation and discussion of the latest technological advances, industrial needs and product developments in multimedia indexing, search, retrieval, navigation and browsing.

  • 2007 International Workshop on Content-Based Multimedia Indexing (CBMI)

    Multimedia indexing and retrieval (image, audio, video, text), Multimedia content extraction, Matching and similarity research, Construction of high level indices, Multi-modal and cross-modal indexing, Content-based search techniques, Multimedia data mining, Presentation tools, Meta-data compression and tranformation, Handling of very large scale multimedia database, Organization, summarization and browsing of multimedia documents, Applications, Evaluation and metrics


2013 16th International Conference on Information Fusion - (FUSION 2013)

Scope of the conference is to provide medium to discuss advances and applications of fusion methodologies. Conference will include contributions in the areas of fusion methodologies, theory and representation, algorithms and modelling and simulation.

  • 2012 15th International Conference on Information Fusion (FUSION)

    The objective of the conference is to provide a forum to discuss advances and applications of fusion methodologies. The conference will feature keynote speeches, special sessions, and tutorials on topics of current interest.

  • 2011 International Conference on Information Fusion (FUSION)

    This conference is dedicated to advancing the knowledge, theory, and applications of information fusion. Topics will include radar processing, artificial intelligence, target tracking, classification, sensor networks, and sensor management.

  • 2010 13th International Conference on Information Fusion - (FUSION 2010)

    This annual conference aims to bring together professionals from around the world to facilitate discussion on the recent advances and pertinent issues in fusion technologies. Key themes are Methodologies, Algorithmic Domains, Solution Paradigms, Sensor Specific Processing and Fusion, Modelling, Simulation and Evaluation and Application Domains.

  • 2009 12th International Conference on Information Fusion - (FUSION 2009)

    Overview -- The 12th International Conference on Information Fusion will be held in Seattle, Washington, at the Grand Hyatt Seattle Hotel. Authors are invited to submit papers describing advances and applications in information fusion, with submission of non-traditional topics encouraged. Conference Site -- Pacific Northwest is one of the most scenic parts of United States and Seattle is the home of some of the world's biggest technology companies such as Boeing and Microsoft. Seattle is easily accessible

  • 2008 11th International Conference on Information Fusion - (FUSION 2008)

    The conference exists to advance the understanding of information fusion methodologies, algorithms, technologies and applications.

  • 2007 10th International Conference on Information Fusion - (FUSION 2007)

    This conference is the annual conference of the International Society of Information Fusion (ISIF:www.isif.org). It is the forum of scientists and engineers involved in sensor fusion, data fusion, information fusion and knowledge management.

  • 2006 9th International Conference on Information Fusion - (FUSION 2006)


More Conferences

Periodicals related to Data Mining

Back to Top

Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...


Knowledge and Data Engineering, IEEE Transactions on

Artificial intelligence techniques, including speech, voice, graphics, images, and documents; knowledge and data engineering tools and techniques; parallel and distributed processing; real-time distributed processing; system architectures, integration, and modeling; database design, modeling, and management; query design, and implementation languages; distributed database control; statistical databases; algorithms for data and knowledge management; performance evaluation of algorithms and systems; data communications aspects; system ...


Systems, Man, and Cybernetics, Part B, IEEE Transactions on

The scope of the IEEE Transactions on Systems, Man and Cybernetics Part B: Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or between machines, humans, and organizations. The scope of Part B includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, ...


Transactions on Sustainable Energy

The IEEE Transactions on Sustainable Energy is a cross disciplinary and internationally archival journal aimed at disseminating results of research on sustainable energy that relates to, arises from, or deliberately influences energy generation, transmission, distribution and delivery. The journal will publish original research on theories and development on principles of sustainable energy technologies and systems.This journal will cover the following ...



Most published Xplore authors for Data Mining

Back to Top

Xplore Articles related to Data Mining

Back to Top

A Natural Language-Based Interface for Querying a Video Database

Onur Kucuktunc; Ugur Gudukbay; Ozgur Ulusoy IEEE MultiMedia, 2007

The authors developed a video database system called BilVideo that provides integrated support for spatiotemporal, semantic, and low-level feature queries. As a further development for this system, the authors present a natural language processing-based interface that lets users formulate queries in English and discuss the advantage of using such an interface


Local features in biomedical image clusters extracted with independent component analysis

C. Bauer; F. J. Theis; W. Baumler; E. W. Lang Neural Networks, 2003. Proceedings of the International Joint Conference on, 2003

A neural network model for the identification and classification of malign and benign skin lesions from ALA-induced fluorescence images is presented. A self- organizing feature map or generative topographic mapping is used to cluster images patches according to their inherent local features, which then can be extracted with ICA. These components are used to distinguish skin cancer from benign lesions ...


Deterministic MIMO channel order estimation based on canonical correlation analysis

Marta Arroyo; Javier Via; Ignacio Santamaria 2008 5th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2008

Channel order estimation is a critical step in blind channel identification/equalization algorithms. In this paper, a new criterion for channel order estimation of multiple-input multiple-output (MIMO) channels is presented. The proposed method relies on the reformulation of the blind equalization problemas a set of nested canonical correlation analysis (CCA) problems, whose solutions are given by a generalized eigenvalue (GEV) problem. ...


A Multi-Objective Genetic Algorithm for Discovering Non-Dominated Motifs in DNA Sequences

Mehmet KAYA 7th International Conference on Hybrid Intelligent Systems (HIS 2007), 2007

This paper presents a novel motif discovery algorithm based on multi-objective genetic algorithms to extract non-dominated motifs in DNA sequences. The main advantage of our approach is that a large number of tradeoff (non-dominated) motifs can be obtained by a single run with respect to conflicting objectives: similarity, motif length and support maximization. In this paper, the method extracts non-dominated ...


A CAVLC embedded method for Audio-Video Synchronization Coding based on H.264

Xiaoyin Qi; Mianshu Chen; Hexin Chen Multimedia Technology (ICMT), 2011 International Conference on, 2011

This paper proposes a new Audio-Video Synchronization Coding algorithm on the latest H.264/AVC video coding standard. The audio information is only embedded into the last non-zero and non-trailing coefficient during the CAVLC (Context Adaptive Variable Length Coding) process and can be extracted from the video stream at the receiver terminal without distortion. This method is efficient with low computational complexity. ...


More Xplore Articles

Educational Resources on Data Mining

Back to Top

eLearning

A Natural Language-Based Interface for Querying a Video Database

Onur Kucuktunc; Ugur Gudukbay; Ozgur Ulusoy IEEE MultiMedia, 2007

The authors developed a video database system called BilVideo that provides integrated support for spatiotemporal, semantic, and low-level feature queries. As a further development for this system, the authors present a natural language processing-based interface that lets users formulate queries in English and discuss the advantage of using such an interface


Local features in biomedical image clusters extracted with independent component analysis

C. Bauer; F. J. Theis; W. Baumler; E. W. Lang Neural Networks, 2003. Proceedings of the International Joint Conference on, 2003

A neural network model for the identification and classification of malign and benign skin lesions from ALA-induced fluorescence images is presented. A self- organizing feature map or generative topographic mapping is used to cluster images patches according to their inherent local features, which then can be extracted with ICA. These components are used to distinguish skin cancer from benign lesions ...


Deterministic MIMO channel order estimation based on canonical correlation analysis

Marta Arroyo; Javier Via; Ignacio Santamaria 2008 5th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2008

Channel order estimation is a critical step in blind channel identification/equalization algorithms. In this paper, a new criterion for channel order estimation of multiple-input multiple-output (MIMO) channels is presented. The proposed method relies on the reformulation of the blind equalization problemas a set of nested canonical correlation analysis (CCA) problems, whose solutions are given by a generalized eigenvalue (GEV) problem. ...


A Multi-Objective Genetic Algorithm for Discovering Non-Dominated Motifs in DNA Sequences

Mehmet KAYA 7th International Conference on Hybrid Intelligent Systems (HIS 2007), 2007

This paper presents a novel motif discovery algorithm based on multi-objective genetic algorithms to extract non-dominated motifs in DNA sequences. The main advantage of our approach is that a large number of tradeoff (non-dominated) motifs can be obtained by a single run with respect to conflicting objectives: similarity, motif length and support maximization. In this paper, the method extracts non-dominated ...


A CAVLC embedded method for Audio-Video Synchronization Coding based on H.264

Xiaoyin Qi; Mianshu Chen; Hexin Chen Multimedia Technology (ICMT), 2011 International Conference on, 2011

This paper proposes a new Audio-Video Synchronization Coding algorithm on the latest H.264/AVC video coding standard. The audio information is only embedded into the last non-zero and non-trailing coefficient during the CAVLC (Context Adaptive Variable Length Coding) process and can be extracted from the video stream at the receiver terminal without distortion. This method is efficient with low computational complexity. ...


More eLearning Resources

IEEE-USA E-Books

  • Looping

    Today almost every aspect of life for which data exists can be rendered as a network. Financial data, social networks, biological ecologies: all are visualized in links and nodes, lines connecting dots. A network visualization of a corporate infrastructure could look remarkably similar to that of a terrorist organization. In An Aesthesia of Networks, Anna Munster argues that this uniformity has flattened our experience of networks as active and relational processes and assemblages. She counters the "network anaesthesia" that results from this pervasive mimesis by reinserting the question of experience, or aesthesia, into networked culture and aesthetics. Rather than asking how humans experience computers and networks, Munster asks how networks experience -- what operations they perform and undergo to change and produce new forms of experience. Drawing on William James's radical empiricism, she asserts that networked experience is assembled first and foremost through relations, which make up its most immediately sensed and perceived aspect. Munster critically considers a range of contemporary artistic and cultural practices that engage with network technologies and techniques, including databases and data mining, the domination of search in online activity, and the proliferation of viral media through YouTube. These practices -- from artists who "undermine" data to musicians and VJs who use intranetworked audio and video software environments -- are concerned with the relationality at the core of today's network experience.

  • Index

    Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties. Topics covered include: Counter-terrorism modeling Quantitative and computational social science Signal processing and information management techniques Semantic Web and knowledge management technologies Information and intelligence sharing technologies Text/data processing and language translation technologies Social network analysis Legal standards for data mining Potential structures for enabling policies Technical system design to support policy Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a com prehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.

  • Index

    Genetic programming, a form of genetic algorithm that evolves programs and program-like executable structures, is a new paradigm for developing reliable, time- and cost-effective applications. The second volume of Advances in Genetic Programming highlights many of the most recent technical advances in this increasingly popular field. The twenty-three contributions are divided into four parts: Variations on the Genetic Programming Theme; Hierarchical, Recursive, and Pruning Genetic Programs; Analysis and Implementation Issues; and New Environments for Genetic Programming.The first part extends the core concepts of genetic programming through the addition of new evolutionary techniques -- adaptive and self-adaptive crossover methods, hill climbing operators, and the inclusion of introns into the representation.Creating more concise executable structures is a long-term research topic in genetic programming. The second part describes the field's most recent efforts, including the dynamic manipulation of automatically defined functions, evolving logic programs that generate recursive structures, and using minimum description length heuristics to determine when and how to prune evolving structures.The third part takes up the many implementation and analysis issues associated with evolving programs. Advanced applications of genetic programming to nontrivial real-world problems are described in the final part: remote sensing of pressure ridges in Arctic sea ice formations from satellite imagery, economic prediction through model evolution, the evolutionary development of stress and loading models for novel materials, and data mining of a large customer database to optimize responses to special offers.

  • About the Editors

    Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties. Topics covered include: Counter-terrorism modeling Quantitative and computational social science Signal processing and information management techniques Semantic Web and knowledge management technologies Information and intelligence sharing technologies Text/data processing and language translation technologies Social network analysis Legal standards for data mining Potential structures for enabling policies Technical system design to support policy Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a com prehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.

  • Introduction

    Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. InPrivacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.

  • Analysis and Implementation Issues in Genetic Programming

    Genetic programming, a form of genetic algorithm that evolves programs and program-like executable structures, is a new paradigm for developing reliable, time- and cost-effective applications. The second volume of Advances in Genetic Programming highlights many of the most recent technical advances in this increasingly popular field. The twenty-three contributions are divided into four parts: Variations on the Genetic Programming Theme; Hierarchical, Recursive, and Pruning Genetic Programs; Analysis and Implementation Issues; and New Environments for Genetic Programming.The first part extends the core concepts of genetic programming through the addition of new evolutionary techniques -- adaptive and self-adaptive crossover methods, hill climbing operators, and the inclusion of introns into the representation.Creating more concise executable structures is a long-term research topic in genetic programming. The second part describes the field's most recent efforts, including the dynamic manipulation of automatically defined functions, evolving logic programs that generate recursive structures, and using minimum description length heuristics to determine when and how to prune evolving structures.The third part takes up the many implementation and analysis issues associated with evolving programs. Advanced applications of genetic programming to nontrivial real-world problems are described in the final part: remote sensing of pressure ridges in Arctic sea ice formations from satellite imagery, economic prediction through model evolution, the evolutionary development of stress and loading models for novel materials, and data mining of a large customer database to optimize responses to special offers.

  • Analytical Platform for Customer Relationship Management

    This chapter describes two specific applications of the data-intensive architecture to customer relationship management (CRM) database analysis carried out by a team at Polish IT services firm Comarch SA. Readers are introduced to CRM analysis in the telecoms domain through a scene-setting discussion that assumes no prior knowledge. They are then taken through the process of analyzing customer data to predict whether and when customers may move to a new service provider - a phenomenon known as customer churn. An example in this chapter shows how data can be used to understand how best to offer existing customers complementary services. The chapter offers some thoughts on the effective exploitation of data-intensive methods for business intelligence in a production capacity, including considerations of problem scale. It summarizes the key findings from the author's classical experiments in CRM data mining.

  • Appendix: Random Variables

    This chapter contains sections titled: A.1 Review of Univariate Random Variables, A.2: Some Common Probability Distributions

  • Data Undermining: Data Relationality and Networked Experience

    This chapter contains sections titled: Databases and the cognitive labor of data management, Data as relation of relations, The perceptible and imperceptibility, A selective genealogy of data mining, Relational data aesthetics after the relational networking of data, Becoming imperceptible in an age of perceptibility, Becoming imperceptible in an age of imperceptibility

  • No title

    This book offers a comprehensive overview of the various concepts and research issues about blogs or weblogs. It introduces techniques and approaches, tools and applications, and evaluation methodologies with examples and case studies. Blogs allow people to express their thoughts, voice their opinions, and share their experiences and ideas. Blogs also facilitate interactions among individuals creating a network with unique characteristics. Through the interactions individuals experience a sense of community. We elaborate on approaches that extract communities and cluster blogs based on information of the bloggers. Open standards and low barrier to publication in Blogosphere have transformed information consumers to producers, generating an overwhelming amount of ever-increasing knowledge about the members, their environment and symbiosis. We elaborate on approaches that sift through humongous blog data sources to identify influential and trustworthy bloggers leveraging content and net ork information. Spam blogs or "splogs" are an increasing concern in Blogosphere and are discussed in detail with the approaches leveraging supervised machine learning algorithms and interaction patterns. We elaborate on data collection procedures, provide resources for blog data repositories, mention various visualization and analysis tools in Blogosphere, and explain conventional and novel evaluation methodologies, to help perform research in the Blogosphere. The book is supported by additional material, including lecture slides as well as the complete set of figures used in the book, and the reader is encouraged to visit the book website for the latest information. Table of Contents: Modeling Blogosphere / Blog Clustering and Community Discovery / Influence and Trust / Spam Filtering in Blogosphere / Data Collection and Evaluation



Standards related to Data Mining

Back to Top

No standards are currently tagged "Data Mining"