Your selections:
Analytics service oriented architecture for enterprise information systems
- Sun, Zhaohao, Strang, Kenneth, Yearwood, John
A technique for ranking friendship closeness in social networking services
- Sun, Zhaohao, Yearwood, John, Firmin, Sally
A novel approach to optimal pump scheduling in water distribution systems
- Bagirov, Adil, Barton, Andrew, Mala-Jetmarova, Helena, Al Nuaimat, Alia, Ahmed, S. T., Sultanova, Nargiz, Yearwood, John
- Kelarev, Andrei, Stranieri, Andrew, Abawajy, Jemal, Yearwood, John, Jelinek, Herbert
A reasoning framework for decision making in water allocation: a tree for water
- Graymore, Michelle, Mays, Heather, Stranieri, Andrew, Lehmann, La Vergne, McRae-Williams, Pamela, Thoms, Gavin, Yearwood, John
An application of novel clustering technique for information security
- Beliakov, Gleb, Yearwood, John, Kelarev, Andrei
Detection of child exploiting chatsfrom a mixed chat dataset as a text classification task
- Yearwood, John, Miah, Md Waliur Rahman, Kulkarni, Siddhivinayak
A new supervised term ranking method for text categorization
- Mammadov, Musa, Yearwood, John, Zhao, Lei
Consensus clustering and supervised classification for profiling phishing emails in internet commerce security
- Dazeley, Richard, Yearwood, John, Kang, Byeongho, Kelarev, Andrei
Exploring novel features and decision rules to identify cardiovascular autonomic neuropathy using a hybrid of wrapper-filter based feature selection
- Huda, Shamsul, Jelinek, Herbert, Ray, Biplob, Stranieri, Andrew, Yearwood, John
From convex to nonconvex: A loss function analysis for binary classification
- Zhao, Lei, Mammadov, Musa, Yearwood, John
Learning parse-free event-based features for textual entailment recognition
- Ofoghi, Bahadorreza, Yearwood, John
Profiling phishing emails based on hyperlink information
- Yearwood, John, Mammadov, Musa, Banerjee, Arunava
Smokers' characteristics and cluster based quitting rule discovery model for enhancement of government's tobacco control systems
- Huda, Shamsul, Yearwood, John, Borland, Ron
Understanding victims of identity theft: A grounded theory approach
- Turville, Kylie, Firmin, Sally, Yearwood, John, Miller, Charlynn
A classification algorithm that derives weighted sum scores for insight into disease
- Quinn, Anthony, Stranieri, Andrew, Yearwood, John, Hafen, Gaudenz
Applying clustering and ensemble clustering approaches to phishing profiling
- Webb, Dean, Yearwood, John, Vamplew, Peter, Ma, Liping, Ofoghi, Bahadorreza, Kelarev, Andrei
Can shallow semantic class information help answer passage retrieval?
- Ofoghi, Bahadorreza, Yearwood, John
Establishing phishing provenance using orthographic features
- Liping, Ma, Yearwood, John, Watters, Paul
Experimental investigation of three machine learning algorithms for ITS dataset
- Yearwood, John, Kang, Byeongho, Kelarev, Andrei
Are you sure you would like to clear your session, including search history and login status?