Database Reference
In-Depth Information
Lucas, H. (1993). Market expert surveillance
systems.
Communications of the ACM
,
36
, 27-34.
doi:10.1145/163298.163301
Ratsaby, J., & Venkatesh, S. S. (1995). Learning
from a mixture of labeled and unlabeled examples
with parametric side information. In
proceedings
of the Eighth Annual Conference on Computa-
tional Learning Theory,
(pp. 412-417).
Luo, C., Zhao, Y., Cao, L., Ou, Y., & Liu, L.
(2008). Outlier mining on multiple time series
data in stock market. In
Proc. of the Tenth Pacific
Rim International Conference on Artificial Intel-
ligence (PRICAI 08), 2008.
Schinasi, G. K., Drees, B., & Lee, W. (1999).
Managing global finance and risk.
Finance &
Development
,
36
(4), 38-41.
Meulbroek, L. K. (1992). An emrirical analysis
of illegal insider trading.
The Journal of Finance
,
47
, 1661-1699. doi:10.2307/2328992
Smith, C. R. (1995). Tracking the elusive insider.
Wall Street and Technology
,
12
, 48-50.
Smith, J. (1981).
The probability distribution of
market returns: a logistic hypothesis
. PhD dis-
sertation, University of Utah.
Minenna, M. (2003). Insider trading, abnormal
return and preferential information: Supervising
through a probabilistic model.
Journal of Bank-
ing & Finance
,
27
, 59-86. doi:10.1016/S0378-
4266(01)00209-6
Szockyj, E., & Geis, G. (2002). Insider trading pat-
tern and analysis.
Journal of Criminal Justice
,
30
,
273-286. doi:10.1016/S0047-2352(02)00129-0
Muller, P., & Insua, D. R. (1995). Issues in bayes-
ian analysis of neural network models.
Neural
Computation
,
10
, 571-592.
Timmis, J., Bentley, P., & Hart, E. (2003).
Artificial immune systems. In
Proceedings of
Second International Conference, ICARIS 2003
,
Edinburgh, UK.
Neville, J., Simsek, O., Jensen, D., Komoroske, J.,
Palmer, K., & Goldberg, H. (2005) Using relational
knowledge discovery to prevent securities fraud.
the eleventh ACM SIGKDD international confer-
ence on Knowledge discovery in data mining
, (pp.
449-458). New York: ACM Press
Utgoff, P. E. (1989). Incremental induction of
decision Trees.
Machine Learning
,
4
, 161-186.
doi:10.1023/A:1022699900025
Utgoff, P. E. (2004). Decision tree induction based
on efficient tree restructuring.
Journal of Machine
Learning,
5-44. Berlin: Springer.
O'Hara, M. (1997).
Market microstructure eheory
.
London: Blackwell Publishing.
Vlachos, M., Wu, K. L., Chen, S. K., & Yu, P.
S. (2008). Correlating burst events on streaming
stock market data. [Amsterdam: Kluwer Aca-
demic Publishers.].
Data Mining and Knowledge
Discovery
,
16
(1), 109-133. doi:10.1007/s10618-
007-0066-x
Palshikar, G. K., &Apte, M. M. (2008). Collusion
set detection using graph clustering.
Data Min-
ing and Knowledge Discovery
,
16
(2), 135-164.
doi:10.1007/s10618-007-0076-8
Qi, H., & Wang, J. (2004). A model for mining
outliers from complex data sets.
The 2004 ACM
symposium on Applied computing
, (pp. 595-599).
New York: ACM Press.
Wong, M. C. S., Cheung, Y. L., & Wu, L. (2000).
Insider trading in the Hong Kong stock market.
Financial Engineering and the Japanese Markets
,
7
(3), 275-288.
Quinlan, J. R. (1993).
C4.5: Programs for machine
learning
. San Francisco: Morgan Kaufmann.
Zhang. J. & Wang, J. (2003). An overview about
principal curves.
Chinese journal of computers,
2,
129-146.
Search WWH ::
Custom Search