Your selections:
On the limitations of scalarisation for multi-objective reinforcement learning of Pareto fronts
- Vamplew, Peter, Yearwood, John, Dazeley, Richard, Berry, Adam
Online group deliberation for the elicitation of shared values to underpin decision making
- Feldman, Yishai, Kraft, Donald, Kuflik, Tsvi, Afshar, Faezeh, Stranieri, Andrew, Yearwood, John
Opinion search in web logs
- Osman, Deanna, Yearwood, John
Optimal rees matrix constructions for analysis of data
- Kelarev, Andrei, Yearwood, John, Zi, Lifang
Optimization and matrix constructions for classification of data
- Kelarev, Andrei, Yearwood, John, Vamplew, Peter, Abawajy, Jemal, Chowdhury, Morshed
Optimization methods and the k-committees algorithm for clustering of sequence data
- Yearwood, John, Bagirov, Adil, Kelarev, Andrei
Optimization of classifiers for data mining based on combinatorial semigroups
- Kelarev, Andrei, Yearwood, John, Watters, Paul
Optimization of feed forward MLPs using the discrete gradient method
- Bagirov, Adil, Yearwood, John, Ghosh, Ranadhir
Optimization of matrix semirings for classification systems
- Gao, David, Kelarev, Andrei, Yearwood, John
Optimization of multiple classifiers in data mining based on string rewriting systems
- Dazeley, Richard, Kelarev, Andrei, Yearwood, John, Mammadov, Musa
Parallel selection of multi-category features for online handwritten character recognition
- Ghosh, Ranadhir, Ghosh, Moumita, Yearwood, John
Performance evaluation of multi-tier ensemble classifiers for phishing websites
- Abawajy, Jemal, Beliakov, Gleb, Kelarev, Andrei, Yearwood, John
Performance evaluation of multivariate non-normal process using metaheuristic approaches
- Ahmad, S., Abdollahian, Mali, Bhatti, M.I., Huda, Shamsul, Yearwood, John
Predicting Australian stock market index using neural networks exploiting dynamical swings and intermarket influences
- Pan, Heping, Tilakaratne, Chandima, Yearwood, John
- Pan, Heping, Tilakaratne, Chandima, Yearwood, John
Profiling phishing activity based on hyperlinks extracted from phishing emails
- Yearwood, John, Mammadov, Musa, Webb, Dean
Profiling phishing emails based on hyperlink information
- Yearwood, John, Mammadov, Musa, Banerjee, Arunava
- Islam, Mofakharul, Watters, Paul, Yearwood, John
Rees matrix constructions for clustering of data
- Kelarev, Andrei, Watters, Paul, Yearwood, John
- Mukherjee, Subhasis, Yearwood, John, Vamplew, Peter, Huda, Shamsul
Are you sure you would like to clear your session, including search history and login status?