You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Over the course of the last twenty years, research in data mining has seen a substantial increase in interest, attracting original contributions from various disciplines including computer science, statistics, operations research, and information systems. Data mining supports a wide range of applications, from medical decision making, bioinformatics, web-usage mining, and text and image recognition to prominent business applications in corporate planning, direct marketing, and credit scoring. Research in information systems equally reflects this inter- and multidisciplinary approach, thereby advocating a series of papers at the intersection of data mining and information systems research. This special issue of Annals of Information Systems contains original papers and substantial extensions of selected papers from the 2007 and 2008 International Conference on Data Mining (DMIN’07 and DMIN’08, Las Vegas, NV) that have been rigorously peer-reviewed. The issue brings together topics on both information systems and data mining, and aims to give the reader a current snapshot of the contemporary research and state of the art practice in data mining.
Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.
A better development and implementation framework for credit risk scorecards Intelligent Credit Scoring presents a business-oriented process for the development and implementation of risk prediction scorecards. The credit scorecard is a powerful tool for measuring the risk of individual borrowers, gauging overall risk exposure and developing analytically driven, risk-adjusted strategies for existing customers. In the past 10 years, hundreds of banks worldwide have brought the process of developing credit scoring models in-house, while ‘credit scores' have become a frequent topic of conversation in many countries where bureau scores are used broadly. In the United States, the ‘FICO' and â...
This book constitutes the refereed proceedings of the Third International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2006, held in federation with the Second International Conference on Natural Computation ICNC 2006. The book presents 115 revised full papers and 50 revised short papers. Coverage includes neural computation, quantum computation, evolutionary computation, DNA computation, fuzzy computation, granular computation, artificial life, innovative applications to knowledge discovery, finance, operations research, and more.
The book presents the proceedings of two conferences: the 16th International Conference on Data Science (ICDATA 2020) and the 19th International Conference on Information & Knowledge Engineering (IKE 2020), which took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Papers cover all aspects of Data Science, Data Mining, Machine Learning, Artificial and Computational Intelligence (ICDATA) and Information Retrieval Systems, Information & Knowledge Engineering, Management and Cyber-Learning (IKE). Authors include academics, researchers, professionals, and students. Presents the proceedings of the 16th International Conference on Data Science (ICDATA 2020) and the 19th International Conference on Information & Knowledge Engineering (IKE 2020); Includes papers on topics from data mining to machine learning to informational retrieval systems; Authors include academics, researchers, professionals and students.
In this age of information overload, people use a variety of strategies to make choices about what to buy, how to spend their leisure time, and even whom to date. Recommender systems automate some of these strategies with the goal of providing affordable, personal, and high-quality recommendations. This book offers an overview of approaches to developing state-of-the-art recommender systems. The authors present current algorithmic approaches for generating personalized buying proposals, such as collaborative and content-based filtering, as well as more interactive and knowledge-based approaches. They also discuss how to measure the effectiveness of recommender systems and illustrate the methods with practical case studies. The final chapters cover emerging topics such as recommender systems in the social web and consumer buying behavior theory. Suitable for computer science researchers and students interested in getting an overview of the field, this book will also be useful for professionals looking for the right technology to build real-world recommender systems.
Metaheuristics support managers in decision-making with robust tools that provide high-quality solutions to important applications in business, engineering, economics, and science in reasonable time frames, but finding exact solutions in these applications still poses a real challenge. However, because of advances in the fields of mathematical optimization and metaheuristics, major efforts have been made on their interface regarding efficient hybridization. This edited book will provide a survey of the state of the art in this field by providing some invited reviews by well-known specialists as well as refereed papers from the second Matheuristics workshop to be held in Bertinoro, Italy, June 2008. Papers will explore mathematical programming techniques in metaheuristics frameworks, and especially focus on the latest developments in Mixed Integer Programming in solving real-world problems.
Data Mining Applications in Engineering and Medicine targets to help data miners who wish to apply different data mining techniques. Data mining generally covers areas of statistics, machine learning, data management and databases, pattern recognition, artificial intelligence, etc. In this book, most of the areas are covered by describing different applications. This is why you will find here why and how Data Mining can also be applied to the improvement of project management. Since Data Mining has been widely used in a medical field, this book contains different chapters reffering to some aspects and importance of its use in the mentioned field: Incorporating Domain Knowledge into Medical Image Mining, Data Mining Techniques in Pharmacovigilance, Electronic Documentation of Clinical Pharmacy Interventions in Hospitals etc. We hope that this book will inspire readers to pursue education and research in this emerging field.
Credit risk remains one of the major risks faced by most financial and credit institutions. It is deeply connected to the real economy due to the systemic nature of some banks, but also because well-managed lending facilities are key for wealth creation and technological innovation. This book is a collection of innovative papers in the field of credit risk management. Besides the probability of default (PD), the major driver of credit risk is the loss given default (LGD). In spite of its central importance, LGD modeling remains largely unexplored in the academic literature. This book proposes three contributions in the field. Ye & Bellotti exploit a large private dataset featuring non-perfor...
The papers in this volume comprise the refereed proceedings of the conference 'Artificial Intelligence in Theory and Practice' (IFIP AI 2006), which formed part of the 19th World Computer Congress of IFIP, the International Federation for Information Processing (WCC- 2006), in Santiago, Chile in August 2006. The conference is organised by the IFIP Technical Committee on Artificial Intelligence (Technical Committee 12) and its Working Group 12.5 (Artificial Intelligence Applications). All papers were reviewed by at least two members of our Programme Committee. The best papers were selected for the conference and are included in this volume. The international nature of IFIP is amply reflected ...