| 2010 | ||
|---|---|---|
| 167 | Yong Li, Ke Wang, Da-ke Chen: Multispectral and Panchromatic Images Fusion by Adaptive PCNN. MMM 2010: 120-129 | |
| 166 | Wei Cheng, Ke Wang, Xiuying Zhang: Implementation of a COM-based decision-tree model with VBA in ArcGIS. Expert Syst. Appl. 37(1): 12-17 (2010) | |
| 2009 | ||
| 165 | Yabo Xu, Ke Wang, Guoliang Yang, Ada Wai-Chee Fu: Online anonymity for personalized web services. CIKM 2009: 1497-1500 | |
| 164 | Qingzhu Wang, Ke Wang, Donghong An, Bo Chen, Miao Liu, Yingying Ying: Extracting the Coronary Artery in Angiographic Image Based on a Trous Wavelet of Rotary Gaussian with Adaptive Space Coefficient. CIS (1) 2009: 160-164 | |
| 163 | Chao Chen, Ke Wang, Yiqi Dai: A Novel Architecture for Enterprise Network Security. CIS (1) 2009: 537-541 | |
| 162 | Chao Chen, Ke Wang, Shuren Liao, Qiuyan Zhang, Yiqi Dai: A Novel Server-Based Application Execution Architecture. CSE (2) 2009: 678-683 | |
| 161 | Noman Mohammed, Benjamin C. M. Fung, Ke Wang, Patrick C. K. Hung: Privacy-preserving data mashup. EDBT 2009: 228-239 | |
| 160 | Jun Tang, Ke Wang, Xiaojuan Zhao: A Novel Constraint Handling Technique for Complex Portfolio Selection. FSKD (2) 2009: 156-160 | |
| 159 | Ke Wang, Yabo Xu, Ada Wai-Chee Fu, Raymond Chi-Wing Wong: FF-Anonymity: When Quasi-identifiers Are Missing. ICDE 2009: 1136-1139 | |
| 158 | Rhonda Chaytor, Ke Wang, Patricia Brantingham: Fine-Grain Perturbation for Privacy Preserving Data Publishing. ICDM 2009: 740-745 | |
| 157 | Shu Wang, Ke Wang: Quasi-neutral Limit of the Drift-Diffusion Models for Semiconductors with PN-Junctions. ICNC (3) 2009: 542-546 | |
| 156 | Xiao Nian Tang, Ke Wang, Gui Jun Nian, Dan Wang, Na Ni: Analysis and Realization of Data Hiding in Single Layer of BOR Multiwavelet Domain. IPCV 2009: 337-342 | |
| 155 | Binjie Xiao, Ke Wang, Weiqun Shu: A Framework for Software Performance Simulation Using Binary to C Translation. PACCS 2009: 602-605 | |
| 154 | Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang: On Mining Rating Dependencies in Online Collaborative Rating Networks. PAKDD 2009: 1054-1061 | |
| 153 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei: Anonymization-based attacks in privacy-preserving data publishing. ACM Trans. Database Syst. 34(2): (2009) | |
| 152 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, Ke Wang, Yabo Xu: Preserving Individual Privacy in Serial Data Publishing CoRR abs/0903.0682: (2009) | |
| 151 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Philip S. Yu: Can the Utility of Anonymized Data be used for Privacy Breaches? CoRR abs/0905.1755: (2009) | |
| 150 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Jian Pei, Philip S. Yu: Anonymization with Worst-Case Distribution-Based Background Knowledge CoRR abs/0909.1127: (2009) | |
| 149 | Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Patrick C. K. Hung: Privacy-preserving data publishing for cluster analysis. Data Knowl. Eng. 68(6): 552-575 (2009) | |
| 148 | Raymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang: Online Skyline Analysis with Dynamic Preferences on Nominal Attributes. IEEE Trans. Knowl. Data Eng. 21(1): 35-49 (2009) | |
| 147 | Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang: (alpha, k)-anonymous data publishing. J. Intell. Inf. Syst. 33(2): 209-234 (2009) | |
| 146 | Xinghuo Zeng, Jian Pei, Ke Wang, Jinyan Li: PADS: a simple yet effective pattern-aware dynamic search method for fast maximal frequent pattern mining. Knowl. Inf. Syst. 20(3): 375-391 (2009) | |
| 2008 | ||
| 145 | Wei Cheng, Ke Wang, Xiuying Zhang: A COM-Based Decision Tree Model Implemented in ArcGIS: A Case Study for Assessment of Soil Pollution in Fuyang, Zhejiang, China. CSSE (4) 2008: 190-193 | |
| 144 | Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei: Anonymity for continuous data publishing. EDBT 2008: 264-275 | |
| 143 | Xinghuo Zeng, Matthew J. Nesbitt, Jian Pei, Ke Wang, Ismael A. Vergara, Nansheng Chen: OrthoCluster: a new tool for mining synteny blocks and applications in comparative genomics. EDBT 2008: 656-667 | |
| 142 | Yabo Xu, Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei: Publishing Sensitive Transactions for Itemset Utility. ICDM 2008: 1109-1114 | |
| 141 | Ke Wang, James Nga-Kwok Liu, Weimin Ma: A Study on the Reliability of Case-Based Reasoning Systems. ICDM Workshops 2008: 60-68 | |
| 140 | Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi: A framework for privacy-preserving cluster analysis. ISI 2008: 46-51 | |
| 139 | Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Philip S. Yu: Anonymizing transaction databases for publication. KDD 2008: 767-775 | |
| 138 | Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Bias and Controversy in Evaluation Systems. IEEE Trans. Knowl. Data Eng. 20(11): 1490-1504 (2008) | |
| 137 | Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu: Computing Join Aggregates Over Private Tables. IJDWM 4(4): 22-41 (2008) | |
| 136 | Weimin Ma, Shao-Hua Tang, Ke Wang: Competitive Analysis for the Most Reliable Path Problem with Online and Fuzzy Uncertainties. IJPRAI 22(1): 195-206 (2008) | |
| 135 | Mohammed J. Zaki, Ke Wang: Special Issue on the Best Papers of SDM'08. Statistical Analysis and Data Mining 1(3): 109-110 (2008) | |
| 2007 | ||
| 134 | Weimin Ma, Ting Gao, Ke Wang: On the On-Line k -Taxi Problem with Limited Look Ahead. COCOA 2007: 72-80 | |
| 133 | Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu: Computing Join Aggregates over Private Tables. DaWaK 2007: 78-88 | |
| 132 | Weimin Ma, Ke Wang: On the On-Line Weighted k-Taxi Problem. ESCAPE 2007: 152-162 | |
| 131 | Ke Wang, Wei Wang, Yan Zhuang: Appearance-Based Map Learning for Mobile Robot by Using Generalized Regression Neural Network. ISNN (1) 2007: 834-842 | |
| 130 | Raymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang: Mining favorable facets. KDD 2007: 804-813 | |
| 129 | Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Summarizing Review Scores of "Unequal" Reviewers. SDM 2007 | |
| 128 | Jian Pei, Jian Xu, Zhibin Wang, Wei Wang, Ke Wang: Maintaining K-Anonymity against Incremental Updates. SSDBM 2007: 5 | |
| 127 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei: Minimality Attack in Privacy Preserving Data Publishing. VLDB 2007: 543-554 | |
| 126 | Yabo Xu, Ke Wang, Benyu Zhang, Zheng Chen: Privacy-enhancing personalized web search. WWW 2007: 591-600 | |
| 125 | Ling Bai, Ke Wang: A diffusive single-species model with periodic coefficients and its optimal harvesting policy. Applied Mathematics and Computation 187(2): 873-882 (2007) | |
| 124 | Tao Jiang, Ah-Hwee Tan, Ke Wang: Mining Generalized Associations of Semantic Relations from Textual Web Content. IEEE Trans. Knowl. Data Eng. 19(2): 164-179 (2007) | |
| 123 | Benjamin C. M. Fung, Ke Wang, Philip S. Yu: Anonymizing Classification Data for Privacy Preservation. IEEE Trans. Knowl. Data Eng. 19(5): 711-725 (2007) | |
| 122 | Ke Wang, Chuanhua You: A note on identifying generalized diagonally dominant matrices. Int. J. Comput. Math. 84(12): 1863-1870 (2007) | |
| 121 | Ke Wang, Benjamin C. M. Fung, Philip S. Yu: Handicapping attacker's confidence: an alternative to k -anonymization. Knowl. Inf. Syst. 11(3): 345-368 (2007) | |
| 120 | Moonjung Cho, Jian Pei, Ke Wang: Answering ad hoc aggregate queries from data streams using prefix aggregate trees. Knowl. Inf. Syst. 12(3): 301-329 (2007) | |
| 2006 | ||
| 119 | Ke Wang, Yabo Xu, Rong She, Philip S. Yu: Classification Spanning Private Databases. AAAI 2006 | |
| 118 | Huiqiang Wang, Gaofei Wang, Ying Lan, Ke Wang, Daxin Liu: A New Automatic Intrusion Response Taxonomy and Its Application. APWeb Workshops 2006: 999-1003 | |
| 117 | Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Rong She, Jian Pei: Classification spanning correlated data streams. CIKM 2006: 132-141 | |
| 116 | Ke Wang, Yuelong Jiang, Alexander Tuzhilin: Mining Actionable Patterns by Role Models. ICDE 2006: 16 | |
| 115 | Yi-Ting Lai, Ke Wang, Daymond Ling, Hua Shi, Jason Zhang: Direct Marketing When There Are Voluntary Buyers. ICDM 2006: 922-927 | |
| 114 | Ke Wang, James N. K. Liu, Weimin Ma: Mining the Most Reliable Association Rules with Composite Items. ICDM Workshops 2006: 749-754 | |
| 113 | Zhao Xu, Ke Wang, Xiao-hua Qiao: Digital Audio Watermarking Algorithm Based on Quantizing Coefficients. IIH-MSP 2006: 41-46 | |
| 112 | Zhao Xu, Ke Wang, Xiao-hua Qiao: A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis. IIH-MSP 2006: 59-62 | |
| 111 | Weimin Ma, Ke Wang: On the On-Line k-Truck Problem with Benefit Maximization. ISAAC 2006: 660-669 | |
| 110 | Ke Wang, Benjamin C. M. Fung: Anonymizing sequential releases. KDD 2006: 414-423 | |
| 109 | Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Bias and controversy: beyond the statistical deviation. KDD 2006: 625-630 | |
| 108 | Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang: (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. KDD 2006: 754-759 | |
| 107 | Ke Wang, Janak J. Parekh, Salvatore J. Stolfo: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. RAID 2006: 226-248 | |
| 106 | Niels Provos, Joe McClain, Ke Wang: Search worms. WORM 2006: 1-8 | |
| 105 | Ke Wang, Weiwei Yang, Yiying Tong, Mathieu Desbrun, Peter Schröder: Edge subdivision schemes and the construction of smooth vector fields. ACM Trans. Graph. 25(3): 1041-1048 (2006) | |
| 104 | Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang: Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006) | |
| 103 | Bing Zheng, Ke Wang: On accelerate overrelaxation methods for rank deficient linear systems. Applied Mathematics and Computation 173(2): 951-959 (2006) | |
| 102 | Ke Wang, Bing Zheng: Symmetric successive overrelaxation methods for fuzzy linear systems. Applied Mathematics and Computation 175(2): 891-901 (2006) | |
| 101 | Bing Zheng, Ke Wang: General fuzzy linear systems. Applied Mathematics and Computation 181(2): 1276-1286 (2006) | |
| 100 | Ke Wang, Bing Zheng: Inconsistent fuzzy linear systems. Applied Mathematics and Computation 181(2): 973-981 (2006) | |
| 99 | Bing Zheng, Ke Wang: Comments on "Symmetric successive overrelaxation methods for rank deficient linear systems": [Applied Mathematics and Computation 173 (2006) 404-420]. Applied Mathematics and Computation 182(2): 1709-1713 (2006) | |
| 98 | Jian Pei, Haixun Wang, Jian Liu, Ke Wang, Jianyong Wang, Philip S. Yu: Discovering Frequent Closed Partial Orders from Strings. IEEE Trans. Knowl. Data Eng. 18(11): 1467-1481 (2006) | |
| 97 | Irene Pekerskaya, Jian Pei, Ke Wang: Mining changing regions from access-constrained snapshots: a cluster-embedded decision tree approach. J. Intell. Inf. Syst. 27(3): 215-242 (2006) | |
| 2005 | ||
| 96 | Benjamin C. M. Fung, Ke Wang, Philip S. Yu: Top-Down Specialization for Information and Privacy Preservation. ICDE 2005: 205-216 | |
| 95 | Ke Wang, Benjamin C. M. Fung, Philip S. Yu: Template-Based Privacy Preservation in Classification Problems. ICDM 2005: 466-473 | |
| 94 | Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang: Privacy-Preserving Frequent Pattern Mining across Private Databases. ICDM 2005: 613-616 | |
| 93 | Yuelong Jiang, Ke Wang, Alexander Tuzhilin, Ada Wai-Chee Fu: Mining Patterns That Respond to Actions. ICDM 2005: 669-672 | |
| 92 | Jian Pei, Jian Liu, Haixun Wang, Ke Wang, Philip S. Yu, Jianyong Wang: Efficiently Mining Frequent Closed Partial Orders. ICDM 2005: 753-756 | |
| 91 | Ke Wang, Benjamin C. M. Fung, Guozhu Dong: Integrating Private Databases for Data Analysis. ISI 2005: 171-182 | |
| 90 | Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang: Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28 | |
| 89 | Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo: Anomalous Payload-Based Worm Detection and Signature Generation. RAID 2005: 227-246 | |
| 88 | Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo: FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101 | |
| 87 | Ke Wang, Yabo Xu, Philip S. Yu, Rong She: Building Decision Trees on Records Linked through Key References. SDM 2005 | |
| 86 | Rong She, Ke Wang, Yabo Xu, Philip S. Yu: Pushing Feature Selection Ahead Of Join. SDM 2005 | |
| 85 | Douglas A. Bodner, Ke Wang, Sheng Xu: Advanced decision logic in simulation of material flow processing networks. Winter Simulation Conference 2005: 1359-1366 | |
| 84 | Ke Wang, Sheng Xu, Leon F. McGinnis: Time management in distributed factory simulation, a case study using HLA. Winter Simulation Conference 2005: 1781-1786 | |
| 83 | Bing Zheng, Ke Wang: Symmetric successive overrelaxation methods for solving the rank deficient linear least squares problem. Applied Mathematics and Computation 169(2): 1305-1323 (2005) | |
| 82 | Fengying Wei, Ke Wang: Uniform persistence of asymptotically periodic multispecies competition predator-prey systems with Holling III type functional response. Applied Mathematics and Computation 170(2): 994-998 (2005) | |
| 81 | Ling Bai, Ke Wang: Gilpin-Ayala model with spatial diffusion and its optimal harvesting policy. Applied Mathematics and Computation 171(1): 531-546 (2005) | |
| 80 | Ke Wang, Senqiang Zhou, Qiang Yang, Jack Man Shun Yeung: Mining Customer Value: From Association Rules to Direct Marketing. Data Min. Knowl. Discov. 11(1): 57-79 (2005) | |
| 79 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang: Data Mining for Inventory Item Selection with Cross-Selling Considerations. Data Min. Knowl. Discov. 11(1): 81-112 (2005) | |
| 78 | Senqiang Zhou, Ke Wang: Localization Site Prediction for Membrane Proteins by Integrating Rule and SVM Classification. IEEE Trans. Knowl. Data Eng. 17(12): 1694-1705 (2005) | |
| 77 | Ke Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han: Divide-and-Approximate: A Novel Constraint Push Strategy for Iceberg Cube Mining. IEEE Trans. Knowl. Data Eng. 17(3): 354-368 (2005) | |
| 2004 | ||
| 76 | Ke Wang, Yabo Xu, Jeffrey Xu Yu: Scalable sequential pattern mining for biological sequences. CIKM 2004: 178-187 | |
| 75 | Rui Kuang, Eugene Ie, Ke Wang, Kai Wang, Mahira Siddiqi, Yoav Freund, Christina S. Leslie: Profile-Based String Kernels for Remote Homology Detection and Motif Extraction. CSB 2004: 152-160 | |
| 74 | Ke Wang, Philip S. Yu, Sourav Chakraborty: Bottom-Up Generalization: A Data Mining Solution to Privacy Protection. ICDM 2004: 249-256 | |
| 73 | Li-bao Zhang, Ke Wang: Efficient Lossy to Lossless Medical Image Compression Using Integer Wavelet Transform and Multiple Subband Decomposition. MIAR 2004: 86-93 | |
| 72 | Li-bao Zhang, Ke Wang: New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications. NPC 2004: 513-516 | |
| 71 | Ke Wang, Salvatore J. Stolfo: Anomalous Payload-Based Network Intrusion Detection. RAID 2004: 203-222 | |
| 70 | Jing Wang, Ke Wang: Optimal control of harvesting for single population. Applied Mathematics and Computation 156(1): 235-247 (2004) | |
| 69 | Qiang Yang, Ian Tian Yi Li, Ke Wang: Building Association-Rule Based Sequential Classifiers for Web-Document Prediction. Data Min. Knowl. Discov. 8(3): 253-273 (2004) | |
| 68 | Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang, Wei Zou: Mining Constrained Gradients in Large Databases. IEEE Trans. Knowl. Data Eng. 16(8): 922-938 (2004) | |
| 2003 | ||
| 67 | Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern: EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290- | |
| 66 | Ke Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han: Pushing Aggregate Constraints by Divide-and-Approximate. ICDE 2003: 291-302 | |
| 65 | Ke Wang, Senqiang Zhou, Jack Man Shun Yeung, Qiang Yang: Mining Customer Value: From Association Rules to Direct Marketing. ICDE 2003: 738-740 | |
| 64 | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang: MPIS: Maximal-Profit Item Selection with Cross-Selling Considerations. ICDM 2003: 371-378 | |
| 63 | Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: Behavior Profiling of Email. ISI 2003: 74-90 | |
| 62 | Ke Wang, Yuelong Jiang, Laks V. S. Lakshmanan: Mining unexpected rules by pushing user dynamics. KDD 2003: 246-255 | |
| 61 | Rong She, Fei Chen, Ke Wang, Martin Ester, Jennifer L. Gardy, Fiona S. L. Brinkman: Frequent-subsequence-based prediction of outer membrane proteins. KDD 2003: 436-445 | |
| 60 | Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81 | |
| 59 | Benjamin C. M. Fung, Ke Wang, Martin Ester: Hierarchical Document Clustering using Frequent Itemsets. SDM 2003 | |
| 58 | Ke Wang, Senqiang Zhou, Ada Wai-Chee Fu, Jeffrey Xu Yu: Mining Changes of Classification by Correspondence Tracing. SDM 2003 | |
| 57 | Chang-Jian Zhao, Lokenath Debnath, Ke Wang: Positive periodic solutions of a delayed model in population. Appl. Math. Lett. 16(4): 561-565 (2003) | |
| 56 | Qiang Yang, Tianyiian Li, Ke Wang: Web-Log Cleaning for Constructing Sequential Classifiers. Applied Artificial Intelligence 17(5-6): 431-441 (2003) | |
| 55 | Ke Wang, Yu He, Jiawei Han: Pushing Support Constraints Into Association Rules Mining. IEEE Trans. Knowl. Data Eng. 15(3): 642-658 (2003) | |
| 54 | Jennifer L. Gardy, Cory Spencer, Ke Wang, Martin Ester, Gábor E. Tusnády, István Simon, Sujun Hua, Katalin de Fays, Christophe G. Lambert, Kenta Nakai, Fiona S. L. Brinkman: PSORT-B: improving protein subcellular localization prediction for Gram-negative bacteria. Nucleic Acids Research 31(13): 3613-3617 (2003) | |
| 2002 | ||
| 53 | Ke Wang, Senqiang Zhou, Jiawei Han: Profit Mining: From Patterns to Actions. EDBT 2002: 70-87 | |
| 52 | Eric Ka Ka Ng, Ada Wai-Chee Fu, Ke Wang: Mining Association Rules from Stars. ICDM 2002: 322-329 | |
| 51 | Junqiang Liu, Yunhe Pan, Ke Wang, Jiawei Han: Mining frequent item sets by opportunistic projection. KDD 2002: 229-238 | |
| 50 | Ke Wang, Ming-Yen Thomas Su: Item selection by "hub-authority" profit ranking. KDD 2002: 652-657 | |
| 49 | Ke Wang, Liu Tang, Jiawei Han, Junqiang Liu: Top Down FP-Growth for Association Rule Mining. PAKDD 2002: 334-340 | |
| 48 | Emin Gün Sirer, Ke Wang: An access control language for web services. SACMAT 2002: 23-30 | |
| 47 | Gao Cong, Lan Yi, Bing Liu, Ke Wang: Discovering Frequent Substructures from Hierarchical Semi-structured Data. SDM 2002 | |
| 46 | Jiawei Han, Jianyong Wang, Guozhu Dong, Jian Pei, Ke Wang: CubeExplorer: online exploration of data cubes. SIGMOD Conference 2002: 626 | |
| 2001 | ||
| 45 | Helen Pinto, Jiawei Han, Jian Pei, Ke Wang, Qiming Chen, Umeshwar Dayal: Multi-Dimensional Sequential Pattern Mining. CIKM 2001: 81-88 | |
| 44 | Ke Wang, Yu He, David Wai-Lok Cheung, Francis Y. L. Chin: Mining Confident Rules Without Support Requirement. CIKM 2001: 89-96 | |
| 43 | Sonny Han Seng Chee, Jiawei Han, Ke Wang: RecTree: An Efficient Collaborative Filtering Method. DaWaK 2001: 141-151 | |
| 42 | Ke Wang, Yu He: User-Defined Association Mining. PAKDD 2001: 387-399 | |
| 41 | Jiawei Han, Jian Pei, Guozhu Dong, Ke Wang: Efficient Computation of Iceberg Cubes with Complex Measures. SIGMOD Conference 2001: 1-12 | |
| 40 | Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang: Mining Multi-Dimensional Constrained Gradients in Data Cubes. VLDB 2001: 321-330 | |
| 39 | Ian Tian Yi Li, Qiang Yang, Ke Wang: Classification Pruning for Web-request Prediction. WWW Posters 2001 | |
| 2000 | ||
| 38 | Ke Wang, Senqiang Zhou, Yu He: Growing decision trees on support-less association rules. KDD 2000: 265-269 | |
| 37 | Ke Wang, Yu He, Jiawei Han: Mining Frequent Itemsets Using Support Constraints. VLDB 2000: 43-52 | |
| 36 | Weining Zhang, Ke Wang: An Efficient Evaluation of a Fuzzy Equi-Join Using Fuzzy Equality Indicators. IEEE Trans. Knowl. Data Eng. 12(2): 225-237 (2000) | |
| 35 | Ke Wang, Huiqing Liu: Discovering Structural Association of Semistructured Data. IEEE Trans. Knowl. Data Eng. 12(3): 353-371 (2000) | |
| 1999 | ||
| 34 | Ke Wang, Chu Xu, Bing Liu: Clustering Transactions Using Large Items. CIKM 1999: 483-490 | |
| 33 | Ke Wang, Beng Chin Ooi, Sam Yuan Sung: P-Tree: A B-Tree Index for Lists. DASFAA 1999: 221-228 | |
| 32 | Bing Liu, Wynne Hsu, Ke Wang, Shu Chen: Visually Aided Exploration of Interesting Association Rules. PAKDD 1999: 380-389 | |
| 31 | Ke Wang, Senqiang Zhou, Shiang Chen Liew: Building Hierarchical Classifiers Using Class Proximity. VLDB 1999: 363-374 | |
| 1998 | ||
| 30 | Ke Wang, Soon Hock William Tay, Bing Liu: Interestingness-Based Interval Merger for Numeric Association Rules. KDD 1998: 121-128 | |
| 29 | Bing Liu, Ke Wang, Lai-Fun Mun, Xin-Zhi Qi: Using Decision Tree Induction for Discovering Holes in Data. PRICAI 1998: 182-193 | |
| 28 | Ke Wang, Bing Liu: Concurrent Discretization of Multiple Attributes. PRICAI 1998: 250-259 | |
| 27 | Ke Wang, Huiqing Liu: Discovering Typical Structures of Documents: A Road Map Approach. SIGIR 1998: 146-154 | |
| 26 | Wang Chiew Tan, Ke Wang, Limsoon Wong: A Graphical Interface to Genome Multidatabases. J. Database Manag. 9(1): 24-32 (1998) | |
| 1997 | ||
| 25 | Ke Wang: Mining Association Patterns from Nested Databases. DMKD 1997: 0- | |
| 24 | Ke Wang, Han Chong Goh: Minimum Splits Based Discretization for Continuous Features. IJCAI (2) 1997: 942-951 | |
| 23 | Ke Wang, Huiqing Liu: Schema Discovery for Semistructured Data. KDD 1997: 271-274 | |
| 22 | Ke Wang, Suman Sundaresh: Selecting Features by Vertical Compactness of Data. KDD 1997: 275-278 | |
| 21 | Ke Wang, Weining Zhang, Siu-Cheung Chau: Weakly Independent Database Schemes. Acta Inf. 34(1): 1-22 (1997) | |
| 20 | Ke Wang: Discovering Patterns from Large and Dynamic Sequential Data. J. Intell. Inf. Syst. 9(1): 33-56 (1997) | |
| 1996 | ||
| 19 | Wang Chiew Tan, Ke Wang, Limsoon Wong: QUICK: Graphical User Interface to Multiple Databases. DEXA Workshop 1996: 404-409 | |
| 1995 | ||
| 18 | Ke Wang: Some Positive Results for Boundedness of Multiple Recursive Rules. ICDT 1995: 383-396 | |
| 17 | Weining Zhang, Ke Wang, Siu-Cheung Chau: Data Partition and Parallel Evaluation of Datalog Programs. IEEE Trans. Knowl. Data Eng. 7(1): 163-176 (1995) | |
| 16 | Ke Wang, Weining Zhang, Siu-Cheung Chau: Decomposition of Magic Rewriting. J. ACM 42(2): 329-381 (1995) | |
| 1994 | ||
| 15 | Ke Wang, Li-Yan Yuan: First-Order Logic Characterization of Program Properties. IEEE Trans. Knowl. Data Eng. 6(4): 518-533 (1994) | |
| 1993 | ||
| 14 | Ke Wang, Weining Zhang, Siu-Cheung Chau: Minimize Linear Mutual Recursion by Rule Unfolding. ICCI 1993: 98-102 | |
| 13 | Héctor J. Hernández, Ke Wang: On the Boundedness of Constant-Time-Maintainable Database Schemes. SIAM J. Comput. 22(1): 29-45 (1993) | |
| 1992 | ||
| 12 | Ke Wang, Li-Yan Yuan: Enforce Constraints in Archival Databases. ICCI 1992: 397-400 | |
| 11 | Ke Wang, Marc H. Graham: Constant-Time Maintainability: A Generalization of Independence. ACM Trans. Database Syst. 17(2): 201-246 (1992) | |
| 10 | Ke Wang, Li-Yan Yuan: Preservation of Integrity Constraints in Definite DATALOG Programs. Inf. Process. Lett. 44(4): 185-193 (1992) | |
| 9 | Ke Wang: On Characterizing Boundedness of Database Schemes with Bounded Dependencies. Theor. Comput. Sci. 100(2): 347-364 (1992) | |
| 1991 | ||
| 8 | Ke Wang, Li-Yan Yuan: Incremental Database Design Revisited. ICCI 1991: 219-230 | |
| 7 | Ke Wang, Li-Yan Yuan: First-Order Logic Reducible Programs. ICDE 1991: 746-755 | |
| 6 | Weining Zhang, Ke Wang, Siu-Cheung Chau: Data partition: A Practical Parallel Evaluation of Datalog Programs. PDIS 1991: 98-105 | |
| 1990 | ||
| 5 | Ke Wang: Polynomial Time Designs toward Both BCNF and Efficient Data Manipulation. SIGMOD Conference 1990: 74-83 | |
| 4 | Marc H. Graham, Ke Wang: On the Equivalence of an Egd to a Set of Fd's J. ACM 37(3): 474-490 (1990) | |
| 1989 | ||
| 3 | Ke Wang: Can Constant-time Maintainability Be More Practical? PODS 1989: 120-127 | |
| 1986 | ||
| 2 | Marc H. Graham, Ke Wang: Constant Time Maintenance or The Triumph of the fd. PODS 1986: 202-216 | |
| 1984 | ||
| 1 | In-Shek Hsu, Irving S. Reed, Trieu-Kien Truong, Ke Wang, Chiunn-Shyong Ye, Leslie J. Deutsch: The VLSI Implementation of a Reed-Solomon Encoder Using Berlekamp's Bit-Serial Multiplier Algorithm. IEEE Trans. Computers 33(10): 906-911 (1984) | |