|
| | | | |
Building Hierarchical Classifiers Using Class Proximity
P-Tree: A B-Tree Index for Lists
Note: Links lead to the DBLP on the Web.
Ke Wang
29
Ke Wang,
Beng Chin Ooi
,
Sam Yuan Sung
: P-Tree: A B-Tree Index for Lists.
DASFAA 1999
: 221-228
28
Bing Liu
,
Wynne Hsu
, Ke Wang,
Shu Chen
: Visually Aided Exploration of Interesting Association Rules.
PAKDD 1999
: 380-389
27
Ke Wang,
Senqiang Zhou
,
Shiang Chen Liew
: Building Hierarchical Classifiers Using Class Proximity.
VLDB 1999
: 363-374
26
Ke Wang,
Soon Hock William Tay
,
Bing Liu
: Interestingness-Based Interval Merger for Numeric Association Rules.
KDD 1998
: 121-128
25
Bing Liu
, Ke Wang,
Lai-Fun Mun
,
Xin-Zhi Qi
: Using Decision Tree Induction for Discovering Holes in Data.
PRICAI 1998
: 182-193
24
Ke Wang,
Bing Liu
: Concurrent Discretization of Multiple Attributes.
PRICAI 1998
: 250-259
23
Ke Wang,
Huiqing Liu
: Discovering Typical Structures of Documents: A Road Map Approach.
SIGIR 1998
: 146-154
22
Ke Wang: Mining Association Patterns from Nested Databases.
DMKD 1997
: 0-
21
Ke Wang,
Han Chong Goh
: Minimum Splits Based Discretization for Continuous Features.
IJCAI (2) 1997
: 942-951
20
Ke Wang,
Huiqing Liu
: Schema Discovery for Semistructured Data.
KDD 1997
: 271-274
19
Ke Wang,
Suman Sundaresh
: Selecting Features by Vertical Compactness of Data.
KDD 1997
: 275-278
18
Ke Wang,
Weining Zhang
,
Siu-Cheung Chau
: Weakly Independent Database Schemes.
Acta Informatica 34
(1): 1-22 (1997)
17
Ke Wang: Discovering Patterns from Large and Dynamic Sequential Data.
JIIS 9
(1): 33-56 (1997)
16
Wang Chiew Tan
, Ke Wang,
Limsoon Wong
: QUICK: Graphical User Interface to Multiple Databases.
DEXA Workshop 1996
: 404-409
15
Ke Wang: Some Positive Results for Boundedness of Multiple Recursive Rules.
ICDT 1995
: 383-396
14
Ke Wang,
Weining Zhang
,
Siu-Cheung Chau
: Decomposition of Magic Rewriting.
JACM 42
(2): 329-381 (1995)
13
Weining Zhang
, Ke Wang,
Siu-Cheung Chau
: Data Partition and Parallel Evaluation of Datalog Programs.
TKDE 7
(1): 163-176 (1995)
12
Ke Wang,
Li-Yan Yuan
: First-Order Logic Characterization of Program Properties.
TKDE 6
(4): 518-533 (1994)
11
Héctor J. Hernández
, Ke Wang: On the Boundedness of Constant-Time-Maintainable Database Schemes.
SIAM J. Comput. 22
(1): 29-45 (1993)
10
Ke Wang,
Li-Yan Yuan
: Preservation of Integrity Constraints in Definite DATALOG Programs.
IPL 44
(4): 185-193 (1992)
9
Ke Wang: On Characterizing Boundedness of Database Schemes with Bounded Dependencies.
TCS 100
(2): 347-364 (1992)
8
Ke Wang,
Marc H. Graham
: Constant-Time Maintainability: A Generalization of Independence.
TODS 17
(2): 201-246 (1992)
7
Ke Wang,
Li-Yan Yuan
: First-Order Logic Reducible Programs.
ICDE 1991
: 746-755
6
Weining Zhang
, Ke Wang,
Siu-Cheung Chau
: Data partition: A Practical Parallel Evaluation of Datalog Programs.
PDIS 1991
: 98-105
5
Ke Wang: Polynomial Time Designs toward Both BCNF and Efficient Data Manipulation.
SIGMOD Conference 1990
: 74-83
4
Marc H. Graham
, Ke Wang: On the Equivalence of an Egd to a Set of Fd's.
JACM 37
(3): 474-490 (1990)
3
Ke Wang: Can Constant-time Maintainability Be More Practical?
PODS 1989
: 120-127
2
Marc H. Graham
, Ke Wang: Constant Time Maintenance or The Triumph of the fd.
PODS 1986
: 202-216
1
In-Shek Hsu
,
Irving S. Reed
,
T. K. Truong
, Ke Wang,
Chiunn-Shyong Ye
,
Leslie J. Deutsch
: The VLSI Implementation of a Reed-Solomon Encoder Using Berlekamp's Bit-Serial Multiplier Algorithm.
IEEE Transactions on Computers 33
(10): 906-911 (1984)
Copyright(C) 2000 ACM | | | | | | |