

Author: Hido Shohei
Publisher: Springer Publishing Company
ISSN: 0219-1377
Source: Knowledge and Information Systems, Vol.26, Iss.2, 2011-02, pp. : 309-336
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










A Survey of Outlier Detection Methodologies
Artificial Intelligence Review, Vol. 22, Iss. 2, 2004-10 ,pp. :