›› 2009, Vol. 24 ›› Issue (6): 1018-1027.

Special Issue: Data Management and Data Mining

• Special Section on International Partnership Programs Supported by CAS • Previous Articles     Next Articles

Ubiquitous Mining with Interactive Data Mining Agents

Xin-Dong Wu1,2 (吴信东), Senior Member, IEEE, Xing-Quan Zhu3 (朱兴全), Member, ACM, IEEE, Qi-Jun Chen2 (陈琪君), and Fei-Yue Wang4 (王飞跃), Member, ACM, Fellow, IEEE   

  1. 1School of Computer Science and Information Engineering, Hefei University of Technology, Hefei 230009, China
    2Department of Computer Science, University of Vermont, Burlington, VT 05405, U.S.A.
    3Faculty of Engineering and Information Technology, University of Technology, Sydney, NSW 2007, Australia
    4Institute of Automation, Chinese Academy of Sciences, Beijing 100190, China
  • Received:2009-02-27 Revised:2009-07-09 Online:2009-11-05 Published:2009-11-05
  • About author:
    Xin-Dong Wu is a professor and the chair of the Computer Science Department at the University of Vermont, USA. He holds a Ph.D. degree in artificial intelligence from the University of Edinburgh, Britain. His research interests include data mining, knowledge-based systems, and Web information exploration. He has published over 180 refereed papers in these areas in various journals and conferences, including IEEE TKDE, TPAMI, ACM TOIS, DMKD, KAIS, IJCAI, AAAI, ICML, KDD, ICDM, and WWW, as well as 23 books and conference proceedings. His research has been supported by the U.S. National Science Foundation (NSF), the U.S. Department of Defense (DOD), the National Natural Science Foundation of China (NSFC), and the Chinese Academy of Sciences, as well as industrial companies including U.S. West Advanced Technologies and Empact Solutions. Prof. Wu is the founder and current steering committee chair of the IEEE International Conference on Data Mining (ICDM), the founder and current editor-in-chief of Knowledge And Information Systems (KAIS, by Springer), the founding chair (2002~2006) of the IEEE Computer Society Technical Committee on Intelligent Informatics (TCII), and a series editor of the Springer Book Series on Advanced Information and Knowledge Processing (AI&KP). He was the editor-in-chief of the IEEE Transactions on Knowledge and Data Engineering (TKDE, by the IEEE Computer Society) between January 1, 2005 and December 31, 2008, and served program committee chair for ICDM'03 (the 2003 IEEE International Conference on Data Mining) and as program committee co-chair for KDD-07 (the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining). Prof. Wu is the 2004 ACM SIGKDD Service Award winner, the 2006 IEEE ICDM Outstanding Service Award winner, and 2005 chair professor in the Changjiang (or Yangtze River) Scholars Program at the Hefei University of Technology appointed by the Ministry of Education of China. He has been an invited/keynote speaker at numerous international conferences including IEEE GrC 2009, IDEAL 2009, JCKBSE 2008, HAIS 2008, NSF-NGDM'07, PAKDD-07, IEEE EDOC'06, IEEE ICTAI'04, IEEE/WIC/ACM WI'04/IAT'04, SEKE 2002, and PADD-97.
    Xing-Quan Zhu received his Ph.D. degree in computer science from Fudan University, China, in 2001. He is currently an associate professor of the Faculty of Engineering and Information Technology, University of Technology, Sydney (UTS), Australia. Before joining UTS, he was a tenure track Assistant professor in the Department of Computer Science & Engineering, Florida Atlantic University, USA (2006~2009), a research assistant professor in the Department of Computer Science, University of Vermont, USA (2002~2006), and a postdoctoral associate in the Department of Computer Science, Purdue University, USA (2001~2002). Dr. Zhu's research mainly focuses on data mining, machine learning, and multimedia systems. Since 2000, he has published more than 90 refereed journal and conference proceedings papers in these areas. He is an associate editor of the IEEE Transactions on Knowledge and Data Engineering.
    Qi-Jun Chen received her Master's degree in computer science from the University of Vermont, USA. She is currently a database administrator of the West Virginia University. Her research interests include inductive learning from large databases.
  • Supported by:

    This research has been supported by the National Basic Research 973 Program of China under Grant No. 2009CB326203, the National Natural Science Foundation of China under Grant Nos. 60828005 and 60674109, and the Chinese Academy of Sciences under International Partnership Grant No. 2F05N01.

Due to the increasing availability and sophistication of data recording techniques, multiple information sources and distributed computing are becoming the important trends of modern information systems. Many applications such as security informatics and social computing require a ubiquitous data analysis platform so that decisions can be made rapidly under distributed and dynamic system environments. Although data mining has now been popularly used to achieve such goals, building a data mining system is, however, a nontrivial task, which may require a complete understanding on numerous data mining techniques as well as solid programming skills. Employing agent techniques for data analysis thus becomes increasingly important, especially for users not familiar with engineering and computational sciences, to implement an effective ubiquitous mining platform. Such data mining agents should, in practice, be intelligent, complete, and compact. In this paper, we present an interactive data mining agent --- OIDM (online interactive data mining), which provides three categories (classification, association analysis, and clustering) of data mining tools, and interacts with the user to facilitate the mining process. The interactive mining is accomplished through interviewing the user about the data mining task to gain efficient and intelligent data mining control. OIDM can help users find appropriate mining algorithms, refine and compare the mining process, and finally achieve the best mining results. Such interactive data mining agent techniques provide alternative solutions to rapidly deploy data mining techniques to broader areas of data intelligence and knowledge informatics.

[1] Wu X. Knowledge Acquisition from Databases. Ablex Publishing Corp., 1995.
[2] Fayyad U M, Piatetsky-Shapiro G, Smyth P, Uthurusamy R (eds.) Advances in Knowledge Discovery and Data Mining. 1996, AAAI Press, pp.1–34.
[3] Zhu X, Davidson I. Knowledge Discovery and Data Mining: Challenges and Realities. IGI Global, 2007.
[4] Wang F, Carley K, Zeng D, Mao W. Social computing: From ??The single agent based OIDM system is currently available at http://www.cs.uvm.edu:9180/DMT/index.html. social informatics to social intelligence. IEEE Intelligent Systems, 2007, 22(2): 1541–1672.
[5] Chen H, Wang F, Zeng D. Intelligence and security informatics for homeland security: Information, communication, and transportation. IEEE Trans. Intelligent Transportation Systems, 2004, 5(4): 329–341.
[6] Chen H. Intelligence and Security Informatics for International Security: Information Sharing and Data Mining. Springer, 2006.
[7] Chen H, Reid E, Sinai J, Sike A, Ganor B. Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security. Springer, 2008.
[8] Xu K, Munoz-Avila H. CaBMA: A case-based reasoning system for capturing, refining, and reusing project plans. Knowledge and Information Systems, 2008, 15(2): 215–232.
[9] Zhuang Y, Fong S, Shi M. Knowledge-empowered automated negotiation system for E-commerce. Knowledge and Information Systems, 2008, 17(2): 167–191.
[10] Quinlan J R. C4.5: Programs for machine learning. Machine Learning, 1994, 16(3): 235–240.
[11] Clark P, Niblett T. The CN2 induction algorithm. Machine Learning, 1989, 3(4): 261–283.
[12] Wu X, Yu P, Piatetsky-Shapiro G, Cercone N, Lin T, Kotagiri R, Wah B. Data mining: How research meets practical development. Knowledge and Information Systems, 2003, 5(2): 248–261.
[13] Petrie C. Agent-based engineering, the Web, and intelligence. IEEE Expert: Intelligent Systems and Their Applications, 1996, 11(6): 24–29.
[14] Zhong N, Ohsuga S, Liu C, Kakemoto Y, Zhang X. On meta levels of an organized society of KDD agents. In Proc. the 1st European Symposium on Principles of Data Mining and Knowledge Discovery, Trondheim, Norway, June 24–27, 1997, pp.367–375.
[15] Ong K, Zhang Z, Ng W, Lim E, Agents and stream data mining: A new perspective. IEEE Intelligent Systems, May/June 2005, 20(3): 60–67.
[16] Klusch M, Lodi S, Moro G. The role of agents in distributed data mining: Issues and benefits. In Proc. IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), Beijing, China, Oct. 13–17, 2003, p.211.
[17] Hand D. Decomposing statistical question. Journal of the Royal Statistical Society, Series A, 1994, 157: 317–356.
[18] Craw S. CONSULTANT: Providing advice for the machine learning toolbox. In Proc. the BCS Expert Systems Conference, Cambridge, UK, 1992, pp.5–23.
[19] Verdenius F. Applications of inductive learning techniques: A survey in the Netherlands. AI Communications, 1997, 10(1): 3–20.
[20] White S, Sleeman D D. Providing advice on the acquisition and reuse of knowledge bases in problem solving. In Knowledge Acquisition Workshop, Singapore, Nov. 22–23, 1998.
[21] Motoda H. Active mining, a spiral model of knowledge discovery. Invited talk of the 2002 IEEE International Conference on Data Mining, Maebashi City, Japan, Dec. 9–12, 2002.
[22] Ware M, Frank E, Holmes G, Hall M, Written I. Interactive machine learning: Letting users build classifiers. International Journal of Human Computer Studies, 2001, 55(3): 281–292.
[23] Hellerstein J, Avnur R, Chou A, Hidber C, Olston C, Raman V, Roth T, Haas P. Interactive data analysis: The control project. IEEE Computer, 1999, 32(8): 51–59.
[24] Micacchi C, Cohen R. A framework for simulating real-time multi-agent systems. Knowledge and Information Systems, 2008, 17(2): 135–166.
[25] Nguyen N, Katarzyniak R. Action and social interactions in multi-agent systems. Knowledge and Information Systems, 2009, 18(2): 133–136.
[26] Resconi G, Kovalerchuk B. Agents’ model of uncertainty. Knowledge and Information Systems, 2009, 18(2): 213–229.
[27] Newman D, Hettich S, Blake C, Merz C. UCI repository of machine learning. Irrine, CA: University of California, Department of Information and Computer Science, 1998.
[28] Zhang K, Fan W. Forecasting skewed biased stochastic Ozone days: Analyses, solutions, and beyond. Knowledge and Information Systems, 2008, 14(3): 299–326.
[29] Heijst V, Terpstra G, Wielinga P, Shadbolt N. Using generalised directive models in knowledge acquisition. In Proc. EKAW1992, Heidelberg and Kaiserslautern, Germany, May 18–22, 1992, pp.112–132.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Li Renwei;. Soundness and Completeness of Kung s Reasoning Procedure[J]. , 1988, 3(1): 7 -15 .
[2] Feng Yulin;. Hierarchical Protocol Analysis by Temporal Logic[J]. , 1988, 3(1): 56 -69 .
[3] Zhou Chaochen; Liu Xinxin;. Denote CSP with Temporal Formulas[J]. , 1990, 5(1): 17 -23 .
[4] Zhang Yin; Xu Zhuoqun;. Concurrent Manipulation of Expanded AVL Trees[J]. , 1998, 13(4): 325 -336 .
[5] Jian-Min Pang, Paul Callaghan, and Zhao-Hui Luo. LFTOP: An LF-Based Approach to Domain-Specific Reasoning[J]. , 2005, 20(4): 526 -535 .
[6] Weisong Shi , Sharun Santhosh, and Hanping Lufei. Secure Application-Aware Service Differentiation in Public Area Wireless Networks[J]. , 2005, 20(5): 676 -688 .
[7] Jun-Hao Zheng, Lei Deng, Peng Zhang, and Don Xie. An Efficient VLSI Architecture for Motion Compensation of AVS HDTV Decoder[J]. , 2006, 21(3): 370 -377 .
[8] Swapan Bhattacharya and Ananya Kanjilal. Code Based Analysis for Object-Oriented Systems[J]. , 2006, 21(6): 965 -972 .
[9] Yi-Wei Jiang and Yong He. Semi-Online Algorithms for Scheduling with Machine Cost[J]. , 2006, 21(6): 984 -988 .
[10] Ozgur Sinanoglu. Low Cost Scan Test by Test Correlation Utilization[J]. , 2007, 22(5): 681 -694 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved