By Topic

IEEE Transactions on Knowledge and Data Engineering

Issue 10 • Date Oct. 2008

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Competitor Mining with the Web

    Publication Year: 2008, Page(s):1297 - 1310
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4308 KB) | HTML iconHTML

    This paper is concerned with the problem of mining competitors from the Web automatically. Nowadays the fierce competition in the market necessitates every company not only to know which companies are its primary competitors, but also in which fields the company's rivals compete with itself and what its competitors' strength is in a specific competitive domain. The task of competitor mining that w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kernel Uncorrelated and Regularized Discriminant Analysis: A Theoretical and Computational Study

    Publication Year: 2008, Page(s):1311 - 1321
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2029 KB) | HTML iconHTML

    Linear and kernel discriminant analyses are popular approaches for supervised dimensionality reduction. Uncorrelated and regularized discriminant analyses have been proposed to overcome the singularity problem encountered by classical discriminant analysis. In this paper, we study the properties of kernel uncorrelated and regularized discriminant analyses, called KUDA and KRDA, respectively. In pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mixed-Drove Spatiotemporal Co-Occurrence Pattern Mining

    Publication Year: 2008, Page(s):1322 - 1335
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3663 KB) | HTML iconHTML

    Mixed-drove spatio-temporal co-occurrence patterns (MDCOPs) represent subsets of two or more different object-types whose instances are often located in spatial and temporal proximity. Discovering MDCOPs is an important problem with many applications such as identifying tactics in battlefields, games, and predator-prey interactions. However, mining MDCOPs is computationally very expensive because ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rotational Linear Discriminant Analysis Technique for Dimensionality Reduction

    Publication Year: 2008, Page(s):1336 - 1347
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3218 KB) | HTML iconHTML

    The linear discriminant analysis (LDA) technique is very popular in pattern recognition for dimensionality reduction. It is a supervised learning technique that finds a linear transformation such that the overlap between the classes is minimum for the projected feature vectors in the reduced feature space. This overlap, if present, adversely affects the classification performance. In this paper, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Discrete Basis Problem

    Publication Year: 2008, Page(s):1348 - 1362
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1811 KB) | HTML iconHTML

    Matrix decomposition methods represent a data matrix as a product of two factor matrices: one containing basis vectors that represent meaningful concepts in the data, and another describing how the observed data can be expressed as combinations of the basis vectors. Decomposition methods have been studied extensively, but many methods return real-valued matrices. Interpreting real-valued factor ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DiSC: Benchmarking Secure Chip DBMS

    Publication Year: 2008, Page(s):1363 - 1377
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2009 KB) | HTML iconHTML

    Secure chips, e.g. present in smart cards, USB dongles, i-buttons, are now ubiquitous in applications with strong security requirements. And they require embedded data management techniques. However, secure chips have severe hardware constraints which make traditional database techniques irrelevant. The main problem faced by secure chip DBMS designers is to be able to assess various design choices... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random Walks to Identify Anomalous Free-Form Spatial Scan Windows

    Publication Year: 2008, Page(s):1378 - 1392
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1088 KB) | HTML iconHTML

    Often, it is required to identify anomalous windows over a spatial region that reflect unusual rate of occurrence of a specific event of interest. A spatial scan statistic-based approach essentially considers a scan window and computes the statistic of a parameter(s) of interest, and identifies anomalous windows by moving the scan window in the region. While this approach has been successfully emp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Schema Matching Using Interattribute Dependencies

    Publication Year: 2008, Page(s):1393 - 1407
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2969 KB) | HTML iconHTML

    Schema matching is one of the key challenges in information integration. It is a labor-intensive and time-consuming process. To alleviate the problem, many automated solutions have been proposed. Most of the existing solutions mainly rely upon textual similarity of the data to be matched. However, there exist instances of the schema matching problem for which they do not even apply. Such problem i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Managing Uncertain Spatial Information for Situational Awareness Applications

    Publication Year: 2008, Page(s):1408 - 1423
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2758 KB) | HTML iconHTML

    Situational awareness (SA) applications monitor the real world and the entities therein to support tasks such as rapid decision-making, reasoning, and analysis. Raw input about unfolding events may arrive from variety of sources in the form of sensor data, video streams, human observations, and so on, from which events of interest are extracted. Location is one of the most important attributes of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge Reuse Enhancement with Motional Visual Representation

    Publication Year: 2008, Page(s):1424 - 1439
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6166 KB) | HTML iconHTML

    The growing complexity of information and documents has made it difficult for knowledge receivers to understand digital contents, therefore, multiple knowledge representation schemes are required for enterprise knowledge services. Traditional schemes for explicit knowledge representation within enterprise and academic circles are primarily text-oriented and thus, a great deal of time and effort ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers for Special Issue on Domain-Driven Data Mining

    Publication Year: 2008, Page(s): 1440
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • TKDE Information for authors

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Transactions on Knowledge and Data Engineering (TKDE) informs researchers, developers, managers, strategic planners, users, and others interested in state-of-the-art and state-of-the-practice activities in the knowledge and data engineering area.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Jian Pei
Simon Fraser University

Associate Editor-in-Chief
Xuemin Lin
University of New South Wales

Associate Editor-in-Chief
Lei Chen
Hong Kong University of Science and Technology