Database Reference
In-Depth Information
Lucas, H. (1993). Market expert surveillance
systems. Communications of the ACM , 36 , 27-34.
doi:10.1145/163298.163301
Ratsaby, J., & Venkatesh, S. S. (1995). Learning
from a mixture of labeled and unlabeled examples
with parametric side information. In proceedings
of the Eighth Annual Conference on Computa-
tional Learning Theory, (pp. 412-417).
Luo, C., Zhao, Y., Cao, L., Ou, Y., & Liu, L.
(2008). Outlier mining on multiple time series
data in stock market. In Proc. of the Tenth Pacific
Rim International Conference on Artificial Intel-
ligence (PRICAI 08), 2008.
Schinasi, G. K., Drees, B., & Lee, W. (1999).
Managing global finance and risk. Finance &
Development , 36 (4), 38-41.
Meulbroek, L. K. (1992). An emrirical analysis
of illegal insider trading. The Journal of Finance ,
47 , 1661-1699. doi:10.2307/2328992
Smith, C. R. (1995). Tracking the elusive insider.
Wall Street and Technology , 12 , 48-50.
Smith, J. (1981). The probability distribution of
market returns: a logistic hypothesis . PhD dis-
sertation, University of Utah.
Minenna, M. (2003). Insider trading, abnormal
return and preferential information: Supervising
through a probabilistic model. Journal of Bank-
ing & Finance , 27 , 59-86. doi:10.1016/S0378-
4266(01)00209-6
Szockyj, E., & Geis, G. (2002). Insider trading pat-
tern and analysis. Journal of Criminal Justice , 30 ,
273-286. doi:10.1016/S0047-2352(02)00129-0
Muller, P., & Insua, D. R. (1995). Issues in bayes-
ian analysis of neural network models. Neural
Computation , 10 , 571-592.
Timmis, J., Bentley, P., & Hart, E. (2003).
Artificial immune systems. In Proceedings of
Second International Conference, ICARIS 2003 ,
Edinburgh, UK.
Neville, J., Simsek, O., Jensen, D., Komoroske, J.,
Palmer, K., & Goldberg, H. (2005) Using relational
knowledge discovery to prevent securities fraud.
the eleventh ACM SIGKDD international confer-
ence on Knowledge discovery in data mining , (pp.
449-458). New York: ACM Press
Utgoff, P. E. (1989). Incremental induction of
decision Trees. Machine Learning , 4 , 161-186.
doi:10.1023/A:1022699900025
Utgoff, P. E. (2004). Decision tree induction based
on efficient tree restructuring. Journal of Machine
Learning, 5-44. Berlin: Springer.
O'Hara, M. (1997). Market microstructure eheory .
London: Blackwell Publishing.
Vlachos, M., Wu, K. L., Chen, S. K., & Yu, P.
S. (2008). Correlating burst events on streaming
stock market data. [Amsterdam: Kluwer Aca-
demic Publishers.]. Data Mining and Knowledge
Discovery , 16 (1), 109-133. doi:10.1007/s10618-
007-0066-x
Palshikar, G. K., &Apte, M. M. (2008). Collusion
set detection using graph clustering. Data Min-
ing and Knowledge Discovery , 16 (2), 135-164.
doi:10.1007/s10618-007-0076-8
Qi, H., & Wang, J. (2004). A model for mining
outliers from complex data sets. The 2004 ACM
symposium on Applied computing , (pp. 595-599).
New York: ACM Press.
Wong, M. C. S., Cheung, Y. L., & Wu, L. (2000).
Insider trading in the Hong Kong stock market.
Financial Engineering and the Japanese Markets ,
7 (3), 275-288.
Quinlan, J. R. (1993). C4.5: Programs for machine
learning . San Francisco: Morgan Kaufmann.
Zhang. J. & Wang, J. (2003). An overview about
principal curves. Chinese journal of computers,
2, 129-146.
Search WWH ::




Custom Search