Search results for: Houkuan Huang
Lecture Notes in Computer Science > Computational Intelligence and Security > Learning and Fuzzy Systems > 33-40
Lecture Notes in Computer Science > Intelligent Data Engineering and Automated Learning – IDEAL 2006 > Learning and Information Processing > 25-32
Lecture Notes in Computer Science > Machine Learning and Knowledge Discovery in Databases > Regular Papers > 491-505
Lecture Notes in Computer Science > Rough Sets and Knowledge Technology > Rough Set Foundations > 76-83
Lecture Notes in Computer Science > Computational Science – ICCS 2006 > Knowledge and Information Management in Computer Communication Systems (KIMCCS 2006) > 216-223
Lecture Notes in Computer Science > Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing > Data Mining, Machine Learning, and Pattern Recognition > 499-506
Lecture Notes in Computer Science > Rough Sets and Intelligent Systems Paradigms > Data and Text Mining > 526-533
Lecture Notes in Computer Science > Symbolic and Quantitative Approaches to Reasoning with Uncertainty > Markov Decision Processes > 841-849
Lecture Notes in Computer Science > Rough Sets and Knowledge Technology > Knowledge Representation and Reasoning > 427-434
Lecture Notes in Computer Science > MICAI 2005: Advances in Artificial Intelligence > Evolutionary Computation and Genetic Algorithms > 593-602
Lecture Notes in Computer Science > Advanced Data Mining and Applications > Novel Algorithms > 473-484
Lecture Notes in Computer Science > Advances in Neural Networks - ISNN 2004 > Part XI Other Applications > 707-712
Lecture Notes in Computer Science > Advances in Knowledge Discovery and Data Mining > Short Papers > 870-876
Lecture Notes in Computer Science > Symbolic and Quantitative Approaches to Reasoning with Uncertainty > Learning and Classification > 443-452
Lecture Notes in Computer Science > Knowledge-Based and Intelligent Information and Engineering Systems > Web Intelligence, Text and Multimedia Mining and Retrieval > 1-10
Lecture Notes in Computer Science > Advances in Neural Networks - ISNN 2006 > Information Security > 261-266