Your selections:
- Ofoghi, Bahadorreza, Yearwood, John, Liping, Ma
The processes of ICT diffusion in technology projects
- Jagodic, Jana, Courvisanos, Jerry, Yearwood, John
Unsupervised segmentation of Industrial Images using Markov Random Field Model
- Islam, Mofakharul, Yearwood, John, Vamplew, Peter
Weblogs for market research : Finding more relevant opinion documents using system fusion
- Osman, Deanna, Yearwood, John, Vamplew, Peter
Workload coverage through nonsmooth optimization
- Sukhorukova, Nadezda, Ugon, Julien, Yearwood, John
A new supervised term ranking method for text categorization
- Mammadov, Musa, Yearwood, John, Zhao, Lei
Adaptive clustering with feature ranking for DDoS attacks detection
- Zi, Lifang, Yearwood, John, Wu, Xin
An application of consensus clustering for DDoS attacks detection
- Zi, Lifang, Yearwood, John, Kelarev, Andrei
Automated opinion detection : Implications of the level of agreement between human raters
- Osman, Deanna, Yearwood, John, Vamplew, Peter
Cluster based rule discovery model for enhancement of government's tobacco control strategy
- Huda, Shamsul, Yearwood, John, Borland, Ron
Consensus clustering and supervised classification for profiling phishing emails in internet commerce security
- Dazeley, Richard, Yearwood, John, Kang, Byeongho, Kelarev, Andrei
Exploring novel features and decision rules to identify cardiovascular autonomic neuropathy using a hybrid of wrapper-filter based feature selection
- Huda, Shamsul, Jelinek, Herbert, Ray, Biplob, Stranieri, Andrew, Yearwood, John
From convex to nonconvex: A loss function analysis for binary classification
- Zhao, Lei, Mammadov, Musa, Yearwood, John
Hybrid wrapper-filter approaches for input feature selection using maximum relevance and Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA)
- Huda, Shamsul, Yearwood, John, Stranieri, Andrew
Internet security applications of Grobner-Shirvov bases
- Kelarev, Andrei, Yearwood, John, Watters, Paul
Internet security applications of the Munn rings
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Abawajy, Jemal, Pan, L.
Learning parse-free event-based features for textual entailment recognition
- Ofoghi, Bahadorreza, Yearwood, John
Profiling phishing emails based on hyperlink information
- Yearwood, John, Mammadov, Musa, Banerjee, Arunava
Smokers' characteristics and cluster based quitting rule discovery model for enhancement of government's tobacco control systems
- Huda, Shamsul, Yearwood, John, Borland, Ron
Are you sure you would like to clear your session, including search history and login status?