Publicaciones en las que colabora con Iñigo Perona Balda (11)

2013

  1. An extensive comparative study of cluster validity indices

    Pattern Recognition, Vol. 46, Núm. 1, pp. 243-256

  2. Web usage and content mining to extract knowledge for modelling the users of the Bidasoa Turismo website and to adapt it

    Expert Systems with Applications, Vol. 40, Núm. 18, pp. 7478-7491

2012

  1. Adaptation of the user navigation scheme using clustering and frequent pattern mining techiques for profiling

    KDIR 2012 - Proceedings of the International Conference on Knowledge Discovery and Information Retrieval

  2. Enhancing a web usage mining based tourismwebsite adaptation with content information

    KDIR 2012 - Proceedings of the International Conference on Knowledge Discovery and Information Retrieval

  3. Web usage mining for automatic link generation

    Proc. of the 10th Int. Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems, MSVVEIS 2012 and 1st Int. Workshop on , WEBI 2012,in Conj. with ICEIS 2012

2010

  1. Consolidated trees versus bagging when explanation is required

    Computing (Vienna/New York), Vol. 89, Núm. 3-4, pp. 113-145

  2. Obtaining optimal class distribution for decision trees: Comparative analysis of CTC and C4.5

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  3. SEP/COP: An efficient method to find the best partition in hierarchical clustering based on a new cluster validity index

    Pattern Recognition, Vol. 43, Núm. 10, pp. 3364-3373

2009

  1. SIHC: A stable incremental hierarchical clustering algorithm

    ICEIS 2009 - 11th International Conference on Enterprise Information Systems, Proceedings

2008

  1. Evaluation of Malware clustering based on its dynamic behaviour

    Conferences in Research and Practice in Information Technology Series, Vol. 87, pp. 163-170

  2. Service-independent payload analysis to improve intrusion detection in network traffic

    Conferences in Research and Practice in Information Technology Series, Vol. 87, pp. 171-178