Tags: data mining

Research Areas

  1. Data Mining

Refereed Publications

2015

  1. J. Gholap, V. P. Janeja, Y. Yesha, R. Chintalapati, H. Marwaha, and K. Modi, "Collaborative data mining for clinical trial analytics", InProceedings, IEEE International Conference on Big Data Bioinformatics and Biomedicine (BIBM), November 2015, 613 downloads.
  2. S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Parallelizing Natural Language Techniques for Knowledge Extraction from Cloud Service Level Agreements", InProceedings, 2015 IEEE International Conference on Big Data, October 2015, 736 downloads.

2012

  1. M. M. Rahman, "Mining social data to extract intellectual knowledge", Article, arXiv eprint , September 2012.
  2. M. M. Rahman, "Intellectual knowledge extraction from online social data", InProceedings, 2012 International Conference on Informatics, Electronics & Vision (ICIEV), May 2012.

2011

  1. D. Dalvi, "Clinical-Genomic Analysis for Disease Prediction", MastersThesis, University of Maryland, Baltimore County, July 2011, 917 downloads.

2010

  1. M. M. Rahman and e., "A more appropriate Protein Classification using Data Mining", Article, journal of theoretical and applied information technology, November 2010.

2007

  1. S. Dornbush and A. Joshi, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANETs", InProceedings, Vehicular Technology Conference, April 2007, 3499 downloads, 40 citations.

2006

  1. S. Dornbush, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's", MastersThesis, UMBC, August 2006, 2303 downloads.

2005

  1. T. Briggs and T. Oates, "Discovering Domain-Specific Composite Kernels", InProceedings, Proceedings of the Twentieth National Conference on Artificial Intelligence and the Seventeenth Annual Conference on Innovative Applications of Artificial intelligence, July 2005, 1477 downloads.

2003

  1. J. Undercofer and A. Joshi, "Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it", InBook, Next Generation Data Mining, December 2003, 2 citations.
  2. A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 2624 downloads, 4 citations.
  3. A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 51 citations.
  4. K. P. Joshi, A. Joshi, and Y. Yesha, "On Using a Warehouse to Analyze Web Logs", InCollection, Distributed and Parallel Databases, March 2003, 2378 downloads, 20 citations.

1999

  1. K. P. Joshi, A. Joshi, Y. Yesha, and R. Krishnapuram, "Warehousing and Mining Web Logs", InProceedings, Workshop on Web Information and Data Management, 1999 ACM Conference on Information and Knowledge Management (CIKM'99), November 1999, 3244 downloads, 60 citations.

Non-Refereed Publications

1997

  1. K. P. Joshi, "Analysis of Data Mining Algorithms", TechReport, UMBC, March 1997, 7575 downloads, 22 citations.