


default search action
WI-IAT 2015: Singapore
- IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, WI-IAT 2015, Singapore, December 6-9, 2015 - Volume III. IEEE Computer Society 2015

The Third International Workshop on Data Oriented Constructive Mining and the Seventh International Workshop on Emergent Intelligence Networked Agents (DOCMAS/WEIN)
- Fujio Toriumi

, Takafumi Nakanishi
, Mitsuteru Tashiro, Kiyotaka Eguchi:
Analysis of User Behavior on Private Chat System. 1-4 - Makoto Koshinda, Michimasa Inaba, Kenichi Takahashi:

Machine-Learned Ranking Based Non-Task-Oriented Dialogue Agent Using Twitter Data. 5-8 - Hui Zhang, Qiyun Zhao, Hao Wang, Chen Zhang, Fanjiang Xu:

Mining Opinion Words and Targets from Online Reviews in a Hybrid Framework. 9-12 - Siyu Lu, Meng Zhao, Hui Zhang, Chen Zhang, Wei Wang, Hao Wang:

GenderPredictor: A Method to Predict Gender of Customers from E-commerce Website. 13-16 - Yoji Kiyota

, Yasuyuki Nirei, Kosuke Shinoda, Satoshi Kurihara, Hirohiko Suwa
:
Mining User Experience through Crowdsourcing: A Property Search Behavior Corpus Derived from Microblogging Timelines. 17-21 - Itsuki Noda, Nobuyasu Ito, Kiyoshi Izumi

, Tomohisa Yamashita, Hideki Mizuta, Tomio Kamada
, Yohsuke Murase, Sachiko Yoshihama, Hiromitsu Hattori:
Roadmap for Multiagent Social Simulation on HPC. 22-25 - Michele Ruta

, Floriano Scioscia
, Saverio Ieva, Danilo De Filippis, Eugenio Di Sciascio:
Indoor/Outdoor Mobile Navigation via Knowledge-Based POI Discovery in Augmented Reality. 26-30 - Masanori Takano

, Kazuya Wada, Ichiro Fukuda:
How Do Newcomers Blend into a Group?: Study on a Social Network Game. 31-35
International Workshop on Complex Methods for Data and Web Mining (CMDWM)
- Yongna Yuan, Li Na, Minjun Shi:

A Multi-regional CGE Model and Its Application in Low Carbon Policy Simulation in China. 36-39 - Ruizhi Zhou, Lingfeng Niu, Zhiquan Qi:

Smoothing Trust Region for Digital Image Restoration. 40-43 - Wen Long

, Huiwen Wang:
Prediction of Sequential Static Input-Output Table. 44-47 - Martin Häusl

, Johannes Forster, Daniel Kailer:
An Approach to Identify SPAM Tweets Based on Metadata. 48-51 - Zhuofan Yang, Yong Shi:

Analysis on Marketing Ability and Financial Performance in Internet Company. 52-55 - Bo Wang, Zhensong Chen, Zhiquan Qi:

Linear Twin SVM for Learning from Label Proportions. 56-59 - Jingjing Tang

, Yingjie Tian
:
f-Fractional Bit Minwise Hashing for Large-Scale Learning. 60-63 - Philipp Berger, Patrick Hennig, Martin Schönberg, Christoph Meinel:

Blog, Forum or Newspaper? Web Genre Detection Using SVMs. 64-68 - Markus Zeindl, Christian Facchi

:
WOC: A New Weighted Ordinal Classification. 69-74 - Shu-Yu Lin, Man-Fong Cheng, Ray-I Chang

, Chao Lung Ting, Yu-Chun Wang, Jan-Ming Ho:
A Content-Based Knowledge and Data Intensive System for Archaeological Motif Recognition. 76-79
The Fourth International Workshop on Web Personalization, Recommender Systems and Social Media (WPRSM)
- Pascal Bissig, Philipp Brandes, Roger Wattenhofer, Roman Willi:

Spoilers Ahead - Personalized Web Filtering. 80-83 - Ce Cheng, Jiajin Huang, Ning Zhong:

Unifying Geographical Influence in Recommender Systems via Matrix Factorization. 84-87 - WeePheng Goh, Xiaohui Tao

, Ji Zhang, Jianming Yong
:
A Study of Drug Interaction for Personalised Decision Support in Dental Clinics. 88-91 - Vladimir Gorodetsky, Olga Tushkanova

:
Data-Driven Semantic Concept Analysis for User Profile Learning in 3G Recommender Systems. 92-97 - Khaled Albishre

, Mubarak Albathan
, Yuefeng Li:
Effective 20 Newsgroups Dataset Cleaning. 98-101 - Raid Lafta

, Ji Zhang, Xiaohui Tao
, Yan Li
, Vincent S. Tseng:
An Intelligent Recommender System Based on Short-Term Risk Prediction for Heart Disease Patients. 102-105 - Ishan Verma, Lipika Dey:

Contextually Intelligent Recommendation of Documents from User-Subscribed Channels. 106-109
The International Workshop on Knowledge Management of Web Social Media (KMWSM)
- Ching-Pi Chuang:

Effects of Audience Characteristics and Sources of Information on Perceived Credibility of Web Information. 110-113 - Yutong Wu

, Yang Gao, Yuefeng Li, Yue Xu
, Meihua Chen:
Mining Topical Relevant Patterns for Multi-document Summarization. 114-117 - Wei Huang, Jialian Tang:

Explore the Development of WeChat Payment from User Behavior. 118-121 - Sukjin You

, Wei Huang, Xiangming Mu:
Using Event Identification Algorithm (EIA) to Improve Microblog Retrieval Effectiveness. 122-125 - Esther David, Rina Azoulay:

It Does Matter Who I sell to and Whom I Buy From: Weighted Bilateral VCG. 126-129 - Badrinath Jayakumar, Rajshekhar Sunderraman:

Handling Inconsistent Closed Predicates: A Paraconsistent Approach. 130-134 - Andrea Chiancone

, Valentina Franzoni
, Yuanxi Li
, Krassimir Markov
, Alfredo Milani
:
Leveraging Zero Tail in Neighbourhood for Link Prediction. 135-139
The Sixth International Workshop on Intelligent E-government and Emergency Management (EGOVEM)
- Ning Wang, Xiaoshan Xie, Hui Li, Xuehua Wang, Xuezhi Qin:

Survey of Application and Research on Government Cloud Computing In China. 140-143 - Yanzhang Wang, Lei Zhang:

Research on Scenario Deduction of Unconventional Emergency Based on Knowledge-Unit. 144-147 - HuaiMing Li, WenHui Chai:

Research of Resources Allocation Model in Emergency Decision of Incidents. 148-151 - Xuelong Chen

, Yali Wang:
A Knowledge Element Based Model Integration Method for Emergency Management. 152-155 - Lin Sun, Yanzhang Wang:

Multidimensional Intelligence Presentation Based on Knowledge Element Fusion. 156-159 - Xin Ye, Yanxin Cui, Sihao Liu, Wenyuan Zhou:

Study on the Collaborative Pattern among Agents of Emergency DSS for the Response of Unconventional Emergency in China. 160-163 - Anton Ivaschenko, Ilya Syusin:

Orders Flows Forecasting by Intermediary Service Provider. 164-167
The Eighth International Workshop on Natural Language Processing on Ontology Engineering (NLPOE)
- Xia Yang, Peng Jin, Xingyuan Chen:

The Construction of a Kind of Chat Corpus in Chinese Word Segmentation. 168-172 - Zhaoyi Guo, Xingyuan Chen, Peng Jin, Si-Yuan Jing:

Chinese Spelling Errors Detection Based on CSLM. 173-176 - Zhimin Wang, Wei He, Pierangelo Lacasella:

Quantitative Study of Preposition Based on Large-Scale Corpus. 177-180 - Lulu Wang, Meng Wang, Na Tian:

Towards a Word Similarity Analysis of Chinese Noun Compounds. 181-183 - Qi Su

, Pengyuan Liu
:
A Psycho-Lexical Approach to the Assessment of Information Quality on Wikipedia. 184-187 - Xiaopeng Bai, Bin Li:

Comparing Argument Structure in Chinese Verb Taxonomy and Chinese Propbank. 188-190 - Ge Xu, Likun Qiu:

Extracting Food Names from Food Reviews. 191-194 - Xiaodie Zhang, Shiyong Kang, Baorong He:

Semantic Structures of Chinese Disyllable New Words. 195-198 - Hung-Min Hsu, Ray-I Chang

, Yu-Jung Chang, Shu-Yu Lin, You-Jyun Wang, Jan-Ming Ho:
Subject-Keyphrase Extraction Based on Definition-Use Chain. 199-202
The International Workshop on Ensemble of Anomaly Detection Algorithms (EADA)
- Rudy Cahyadi Hario Pribadi, Junaidillah Fadlil:

Video Anomaly Detection using Selective Spatio-Temporal Interest Points and Convolutional Sparse Coding. 203-206 - Alvin Chiang, Yi-Ren Yeh:

Anomaly Detection Ensembles: In Defense of the Average. 207-210 - Komang Oka Saputra, Wei-Chung Teng, Yi-Hao Chu:

A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time. 211-214 - Jim Q. Chen:

On Contextual Binding and Its Application in Cyber Deception Detection. 215-218 - Rafael França Lima, Adriano César Machado Pereira

:
A Fraud Detection Model Based on Feature Selection and Undersampling Applied to Web Payment Systems. 219-222
WI-IAT 2015 Poster Papers
- Xinjia Yu, Chunyan Miao

, Cyril Leung, Charles Thomas Salmon:
Modelling Composite Emotions in Affective Agents. 223-224 - Artur Freitas, Rafael H. Bordini, Felipe Meneguzzi, Renata Vieira

:
Towards Integrating Ontologies in Multi-agent Programming Platforms. 225-226 - Roberto Yus, Eduardo Mena:

Cooperative Network of Mobile Agents to Remotely Process User Information Requests. 227-228 - Soumyava Das, Akshay Soni, Ashok Venkatesan, Debora Donato:

Organic vs. Sponsored Content: From Ads to Native Ads. 229-230 - Petr Musílek, Pavel Krömer

, Tomás Barton:
E-BACH: Entropy-Based Clustering Hierarchy for Wireless Sensor Networks. 231-232 - Yinghui Pan, Yingke Chen, Jing Tang, Yifeng Zeng:

Interactive Dynamic Influence Diagrams for Relational Agents. 233-234
WI-IAT 2015 Demo Papers
- Han Lin, Jinghua Hou, Han Yu

, Zhiqi Shen, Chunyan Miao
:
An Agent-Based Game Platform for Exercising People's Prospective Memory. 235-236 - Zhengxiang Pan, Chunyan Miao

, Benny Toh Hsiang Tan
, Han Yu
, Cyril Leung:
Agent Augmented Inter-Generational Crowdsourcing. 237-238 - Lei Liu:

Contextual Topic Model Based Image Recommendation System. 239-240 - Di Wang, Budhitama Subagdja, Yilin Kang, Ah-Hwee Tan

:
Silver Assistants for Aging-in-Place. 241-242 - Di Wang, Ah-Hwee Tan

:
MyLife: An Online Personal Memory Album. 243-244 - Gan Keng Hoon

, Gan Kian Min, Oscar Wong, Ooi Bong Pin, Chan Ying Sheng:
Classifly: Classification of Experts by Their Expertise on the Fly. 245-246 - Antoine Boutet, Frédérique Laforest, Stéphane Frénot, Damien Reimert:

MYSTREAM: An in Browser Personalization Service to Follow Events from Twitter. 247-248 - Sara Shafiee

, Katrín Kristjánsdóttir, Lars Hvam
:
Alignment of Configuration and Documentation for Highly Engineered Complex Product Configuration Systems: A Demonstration from a Case Study. 249-250 - Muhammad Atif Qureshi

, Arjumand Younus
, Josephine Griffith, Colm O'Riordan, Gabriella Pasi
, Youssef Meguebli:
NewsOpinionSummarizer: A Visualization and Predictive System for Opinion Pieces in Online News. 251-252

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














