By Topic

Knowledge and Data Engineering, IEEE Transactions on

Issue 7 • Date July 2008

Filter Results

Displaying Results 1 - 17 of 17
  • [Front cover]

    Publication Year: 2008 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (133 KB)  
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2008 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • Editorial: TKDE Editorial Board Changes

    Publication Year: 2008 , Page(s): 865 - 867
    Save to Project icon | Request Permissions | PDF file iconPDF (219 KB)  
    Freely Available from IEEE
  • A Niching Memetic Algorithm for Simultaneous Clustering and Feature Selection

    Publication Year: 2008 , Page(s): 868 - 879
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2798 KB) |  | HTML iconHTML  

    Clustering is inherently a difficult task, and is made even more difficult when the selection of relevant features is also an issue. In this paper we propose an approach for simultaneous clustering and feature selection using a niching memetic algorithm. Our approach (which we call NMA_CFS) makes feature selection an integral part of the global clustering search procedure and attempts to overcome ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cluster Kernels: Resource-Aware Kernel Density Estimators over Streaming Data

    Publication Year: 2008 , Page(s): 880 - 893
    Cited by:  Papers (7)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1310 KB) |  | HTML iconHTML  

    A variety of real-world applications heavily relies on an adequate analysis of transient data streams. Due to the rigid processing requirements of data streams, common analysis techniques as known from data mining are not directly applicable. A fundamental building block of many data mining and analysis approaches is density estimation. It provides a well-defined estimation of a continuous data di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ranked Reverse Nearest Neighbor Search

    Publication Year: 2008 , Page(s): 894 - 910
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (5126 KB) |  | HTML iconHTML  

    Given a set of data points P and a query point q in a multidimensional space, reverse nearest neighbor (RNN) query finds data points in P whose nearest neighbors are q. Reverse k-nearest neighbor (RkNN) query (where k ges 1) generalizes RNN query to find data points whose kNNs include q. For RkNN query semantics, q is said to have influence to all those answer data points. The degree of q's influe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simultaneous Pattern and Data Clustering for Pattern Cluster Analysis

    Publication Year: 2008 , Page(s): 911 - 923
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2745 KB) |  | HTML iconHTML  

    In data mining and knowledge discovery, pattern discovery extracts previously unknown regularities in the data and is a useful tool for categorical data analysis. However, the number of patterns discovered is often overwhelming. It is difficult and time-consuming to 1) interpret the discovered patterns and 2) use them to further analyze the data set. To overcome these problems, this paper proposes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing and Managing Role-Based Access Control Policies

    Publication Year: 2008 , Page(s): 924 - 939
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1864 KB) |  | HTML iconHTML  

    Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to various domains such as health care industry, digital government, and financial service institutes requiring that different security requirements must be fulfilled. Authorisation constraints can help the policy architect ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Data Warehouses with Web Data: A Survey

    Publication Year: 2008 , Page(s): 940 - 955
    Cited by:  Papers (20)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1778 KB) |  | HTML iconHTML  

    This paper surveys the most relevant research on combining Data Warehouse (DW) and Web data. It studies the XML technologies that are currently being used to integrate, store, query and retrieve web data, and their application to DWs. The paper reviews different DW distributed architectures and the use of XML languages as an integration tool in these systems. It also introduces the problem of deal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaotic Time Series Prediction Using a Neuro-Fuzzy System with Time-Delay Coordinates

    Publication Year: 2008 , Page(s): 956 - 964
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3096 KB) |  | HTML iconHTML  

    This paper presents an investigation into the use of the delay coordinate embedding technique in the multi-input- multioutput-adaptive-network-based fuzzy inference system (MANFIS) for chaotic time series prediction. The inputs to the MANFIS are embedded-phase-space (EPS) vectors preprocessed from the time series under test, while the output time series is extracted from the output EPS vectors fro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Molecular Verification of Rule-Based Systems Based on DNA Computation

    Publication Year: 2008 , Page(s): 965 - 975
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3858 KB) |  | HTML iconHTML  

    Various graphic techniques have been developed to analyze structural errors in rule-based systems that utilize inference (propositional) logic rules. Four typical errors in rule-based systems are: redundancy (numerous rule sets resulting in the same conclusion); circularity (a rule leading back to itself); incompleteness (deadends or a rule set conclusion leading to unreachable goals); and inconsi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Meshing Streaming Updates with Persistent Data in an Active Data Warehouse

    Publication Year: 2008 , Page(s): 976 - 991
    Cited by:  Papers (19)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2541 KB) |  | HTML iconHTML  

    Active data warehousing has emerged as an alternative to conventional warehousing practices in order to meet the high demand of applications for up-to-date information. In a nutshell, an active warehouse is refreshed online and thus achieves a higher consistency between the stored information and the latest data updates. The need for online warehouse refreshment introduces several challenges in th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Streaming Time Series Summarization Using User-Defined Amnesic Functions

    Publication Year: 2008 , Page(s): 992 - 1006
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2285 KB) |  | HTML iconHTML  

    The past decade has seen a wealth of research on time series representations. The vast majority of research has concentrated on representations that are calculated in batch mode and represent each value with approximately equal fidelity. However, the increasing deployment of mobile devices and real time sensors has brought home the need for representations that can be incrementally updated, and ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Build Your Career in Computing [advertisement]

    Publication Year: 2008 , Page(s): 1007
    Save to Project icon | Request Permissions | PDF file iconPDF (84 KB)  
    Freely Available from IEEE
  • Join the IEEE Computer Society today! [advertisement]

    Publication Year: 2008 , Page(s): 1008
    Save to Project icon | Request Permissions | PDF file iconPDF (63 KB)  
    Freely Available from IEEE
  • TKDE Information for authors

    Publication Year: 2008 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2008 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (133 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Transactions on Knowledge and Data Engineering (TKDE) informs researchers, developers, managers, strategic planners, users, and others interested in state-of-the-art and state-of-the-practice activities in the knowledge and data engineering area.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Jian Pei
Simon Fraser University

Associate Editor-in-Chief
Xuemin Lin
University of New South Wales

Associate Editor-in-Chief
Lei Chen
Hong Kong University of Science and Technology