callback( { "result":{ "query":":facetid:toc:\"db/journals/kbs/kbs99.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.82" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"17", "@dc":"17", "@oc":"17", "@id":"43472976", "text":":facetid:toc:db/journals/kbs/kbs99.bht" } }, "hits":{ "@total":"17", "@computed":"17", "@sent":"17", "@first":"0", "hit":[{ "@score":"1", "@id":"3151301", "info":{"authors":{"author":[{"@pid":"01/4732","text":"U. Rajendra Acharya"},{"@pid":"49/6628","text":"Hamido Fujita"},{"@pid":"162/3179","text":"K. Vidya Sudarshan"},{"@pid":"177/6978","text":"Shu Lih Oh"},{"@pid":"177/6966","text":"Muhammad Adam"},{"@pid":"150/1777","text":"Joel E. W. Koh"},{"@pid":"234/1753","text":"Jen Hong Tan"},{"@pid":"62/4318","text":"Dhanjoo N. Ghista"},{"@pid":"68/7380","text":"Roshan Joy Martis"},{"@pid":"45/7325","text":"Chua Kuang Chua"},{"@pid":"05/10596","text":"Chua Kok Poo"},{"@pid":"05/9164","text":"Ru San Tan"}]},"title":"Automated detection and localization of myocardial infarction using electrocardiogram: a comparative study of different leads.","venue":"Knowl. Based Syst.","volume":"99","pages":"146-156","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/AcharyaFSOAKTGM16","doi":"10.1016/J.KNOSYS.2016.01.040","ee":"https://doi.org/10.1016/j.knosys.2016.01.040","url":"https://dblp.org/rec/journals/kbs/AcharyaFSOAKTGM16"}, "url":"URL#3151301" }, { "@score":"1", "@id":"3151323", "info":{"authors":{"author":[{"@pid":"15/8288","text":"Seung H. Baek"},{"@pid":"00/6502","text":"Dong Ho Park"},{"@pid":"10/5449","text":"Hamparsum Bozdogan"}]},"title":"Hybrid kernel density estimation for discriminant analysis with information complexity and genetic algorithm.","venue":"Knowl. Based Syst.","volume":"99","pages":"79-91","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/BaekPB16","doi":"10.1016/J.KNOSYS.2016.01.046","ee":"https://doi.org/10.1016/j.knosys.2016.01.046","url":"https://dblp.org/rec/journals/kbs/BaekPB16"}, "url":"URL#3151323" }, { "@score":"1", "@id":"3151324", "info":{"authors":{"author":[{"@pid":"82/5085","text":"Essa Basaeed"},{"@pid":"77/5591","text":"Harish Bhaskar"},{"@pid":"36/3944","text":"Mohammed E. Al-Mualla"}]},"title":"Supervised remote sensing image segmentation using boosted convolutional neural networks.","venue":"Knowl. Based Syst.","volume":"99","pages":"19-27","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/BasaeedBA16","doi":"10.1016/J.KNOSYS.2016.01.028","ee":"https://doi.org/10.1016/j.knosys.2016.01.028","url":"https://dblp.org/rec/journals/kbs/BasaeedBA16"}, "url":"URL#3151324" }, { "@score":"1", "@id":"3151363", "info":{"authors":{"author":[{"@pid":"124/9492","text":"Mingjing Du"},{"@pid":"63/6200","text":"Shifei Ding"},{"@pid":"124/8377","text":"Hongjie Jia"}]},"title":"Study on density peaks clustering based on k-nearest neighbors and principal component analysis.","venue":"Knowl. Based Syst.","volume":"99","pages":"135-145","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/DuDJ16","doi":"10.1016/J.KNOSYS.2016.02.001","ee":"https://doi.org/10.1016/j.knosys.2016.02.001","url":"https://dblp.org/rec/journals/kbs/DuDJ16"}, "url":"URL#3151363" }, { "@score":"1", "@id":"3151415", "info":{"authors":{"author":[{"@pid":"177/6976","text":"Jiro Iwanaga"},{"@pid":"37/4418","text":"Naoki Nishimura"},{"@pid":"136/6175","text":"Noriyoshi Sukegawa"},{"@pid":"18/2626","text":"Yuichi Takano"}]},"title":"Estimating product-choice probabilities from recency and frequency of page views.","venue":"Knowl. Based Syst.","volume":"99","pages":"157-167","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/IwanagaNST16","doi":"10.1016/J.KNOSYS.2016.02.006","ee":"https://doi.org/10.1016/j.knosys.2016.02.006","url":"https://dblp.org/rec/journals/kbs/IwanagaNST16"}, "url":"URL#3151415" }, { "@score":"1", "@id":"3151441", "info":{"authors":{"author":[{"@pid":"177/6963","text":"Sirisup Laohakiat"},{"@pid":"12/6019","text":"Suphakant Phimoltares"},{"@pid":"18/6886","text":"Chidchanok Lursinsap"}]},"title":"Hyper-cylindrical micro-clustering for streaming data with unscheduled data removals.","venue":"Knowl. Based Syst.","volume":"99","pages":"183-200","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/LaohakiatPL16","doi":"10.1016/J.KNOSYS.2016.02.004","ee":"https://doi.org/10.1016/j.knosys.2016.02.004","url":"https://dblp.org/rec/journals/kbs/LaohakiatPL16"}, "url":"URL#3151441" }, { "@score":"1", "@id":"3151456", "info":{"authors":{"author":[{"@pid":"16/6465-3","text":"Cheng Li 0003"},{"@pid":"57/6712","text":"Santu Rana"},{"@pid":"71/5859","text":"Dinh Q. Phung"},{"@pid":"81/1984","text":"Svetha Venkatesh"}]},"title":"Hierarchical Bayesian nonparametric models for knowledge discovery from electronic medical records.","venue":"Knowl. Based Syst.","volume":"99","pages":"168-182","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/LiRPV16","doi":"10.1016/J.KNOSYS.2016.02.005","ee":"https://doi.org/10.1016/j.knosys.2016.02.005","url":"https://dblp.org/rec/journals/kbs/LiRPV16"}, "url":"URL#3151456" }, { "@score":"1", "@id":"3151476", "info":{"authors":{"author":[{"@pid":"51/3710","text":"Yang Liu"},{"@pid":"00/4365-2","text":"Matthew Rowe 0002"},{"@pid":"70/6766","text":"William Holderbaum"},{"@pid":"71/9395","text":"Ben Potter"}]},"title":"A novel battery network modelling using constraint differential evolution algorithm optimisation.","venue":"Knowl. Based Syst.","volume":"99","pages":"10-18","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/LiuRHP16","doi":"10.1016/J.KNOSYS.2016.01.019","ee":"https://doi.org/10.1016/j.knosys.2016.01.019","url":"https://dblp.org/rec/journals/kbs/LiuRHP16"}, "url":"URL#3151476" }, { "@score":"1", "@id":"3151496", "info":{"authors":{"author":[{"@pid":"98/10657-1","text":"Chuan Luo 0001"},{"@pid":"47/3003","text":"Tianrui Li 0001"},{"@pid":"63/1807-1","text":"Zhang Yi 0001"},{"@pid":"49/6628","text":"Hamido Fujita"}]},"title":"Matrix approach to decision-theoretic rough sets for evolving data.","venue":"Knowl. Based Syst.","volume":"99","pages":"123-134","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/LuoL0F16","doi":"10.1016/J.KNOSYS.2016.01.042","ee":"https://doi.org/10.1016/j.knosys.2016.01.042","url":"https://dblp.org/rec/journals/kbs/LuoL0F16"}, "url":"URL#3151496" }, { "@score":"1", "@id":"3151546", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"33/3675-1","text":"Ping Chen 0001"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-document summarization using closed patterns.","venue":"Knowl. Based Syst.","volume":"99","pages":"28-38","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/QiangC0XW16","doi":"10.1016/J.KNOSYS.2016.01.030","ee":"https://doi.org/10.1016/j.knosys.2016.01.030","url":"https://dblp.org/rec/journals/kbs/QiangC0XW16"}, "url":"URL#3151546" }, { "@score":"1", "@id":"3151551", "info":{"authors":{"author":[{"@pid":"177/6965","text":"Ruisi Ren"},{"@pid":"34/6751","text":"Ling Wei"}]},"title":"The attribute reductions of three-way concept lattices.","venue":"Knowl. Based Syst.","volume":"99","pages":"92-102","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/RenW16","doi":"10.1016/J.KNOSYS.2016.01.045","ee":"https://doi.org/10.1016/j.knosys.2016.01.045","url":"https://dblp.org/rec/journals/kbs/RenW16"}, "url":"URL#3151551" }, { "@score":"1", "@id":"3151552", "info":{"authors":{"author":[{"@pid":"44/1423","text":"Aihong Ren"},{"@pid":"29/3814-3","text":"Yuping Wang 0003"},{"@pid":"124/3750","text":"Xingsi Xue"}]},"title":"Interactive programming approach for solving the fully fuzzy bilevel linear programming problem.","venue":"Knowl. Based Syst.","volume":"99","pages":"103-111","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/RenWX16","doi":"10.1016/J.KNOSYS.2016.01.044","ee":"https://doi.org/10.1016/j.knosys.2016.01.044","url":"https://dblp.org/rec/journals/kbs/RenWX16"}, "url":"URL#3151552" }, { "@score":"1", "@id":"3151631", "info":{"authors":{"author":[{"@pid":"05/2216","text":"Yejun Xu"},{"@pid":"09/3666","text":"Lei Chen"},{"@pid":"59/7501","text":"Rosa M. Rodríguez 0001"},{"@pid":"04/0","text":"Francisco Herrera"},{"@pid":"58/1340","text":"Huimin Wang"}]},"title":"Deriving the priority weights from incomplete hesitant fuzzy preference relations in group decision making.","venue":"Knowl. Based Syst.","volume":"99","pages":"71-78","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/XuCRHW16","doi":"10.1016/J.KNOSYS.2016.01.047","ee":"https://doi.org/10.1016/j.knosys.2016.01.047","url":"https://dblp.org/rec/journals/kbs/XuCRHW16"}, "url":"URL#3151631" }, { "@score":"1", "@id":"3151648", "info":{"authors":{"author":[{"@pid":"62/105","text":"Guangshun Yao"},{"@pid":"41/1624","text":"Yongsheng Ding"},{"@pid":"33/5184","text":"Lihong Ren"},{"@pid":"51/2737","text":"Kuangrong Hao"},{"@pid":"09/3666-64","text":"Lei Chen 0064"}]},"title":"An immune system-inspired rescheduling algorithm for workflow in Cloud systems.","venue":"Knowl. Based Syst.","volume":"99","pages":"39-50","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/YaoDRHC16","doi":"10.1016/J.KNOSYS.2016.01.037","ee":"https://doi.org/10.1016/j.knosys.2016.01.037","url":"https://dblp.org/rec/journals/kbs/YaoDRHC16"}, "url":"URL#3151648" }, { "@score":"1", "@id":"3151650", "info":{"authors":{"author":[{"@pid":"58/5423-3","text":"Jun Yin 0003"},{"@pid":"95/959","text":"Weiming Zeng"},{"@pid":"36/4168-1","text":"Lai Wei 0001"}]},"title":"Optimal feature extraction methods for classification methods and their applications to biometric recognition.","venue":"Knowl. Based Syst.","volume":"99","pages":"112-122","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/YinZW16","doi":"10.1016/J.KNOSYS.2016.01.043","ee":"https://doi.org/10.1016/j.knosys.2016.01.043","url":"https://dblp.org/rec/journals/kbs/YinZW16"}, "url":"URL#3151650" }, { "@score":"1", "@id":"3151674", "info":{"authors":{"author":[{"@pid":"03/7795","text":"Liyong Zhang"},{"@pid":"98/6613-5","text":"Wei Lu 0005"},{"@pid":"65/622-1","text":"Xiaodong Liu 0001"},{"@pid":"p/WitoldPedrycz","text":"Witold Pedrycz"},{"@pid":"69/4204","text":"Chongquan Zhong"}]},"title":"Fuzzy C-Means clustering of incomplete data based on probabilistic information granules of missing values.","venue":"Knowl. Based Syst.","volume":"99","pages":"51-70","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/ZhangLLPZ16","doi":"10.1016/J.KNOSYS.2016.01.048","ee":"https://doi.org/10.1016/j.knosys.2016.01.048","url":"https://dblp.org/rec/journals/kbs/ZhangLLPZ16"}, "url":"URL#3151674" }, { "@score":"1", "@id":"3151684", "info":{"authors":{"author":[{"@pid":"34/6923","text":"Jifu Zhang"},{"@pid":"96/1958","text":"Xiaolong Yu"},{"@pid":"50/4239","text":"Yonghong Li"},{"@pid":"90/1622","text":"Sulan Zhang"},{"@pid":"176/1092","text":"Yaling Xun"},{"@pid":"q/XiaoQin","text":"Xiao Qin 0001"}]},"title":"A relevant subspace based contextual outlier mining algorithm.","venue":"Knowl. Based Syst.","volume":"99","pages":"1-9","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/ZhangYLZXQ16","doi":"10.1016/J.KNOSYS.2016.01.013","ee":"https://doi.org/10.1016/j.knosys.2016.01.013","url":"https://dblp.org/rec/journals/kbs/ZhangYLZXQ16"}, "url":"URL#3151684" } ] } } } )