Your selections:
Languages recognized by two-sided automata of graphs
- Miller, Mirka, Kelarev, Andrei, Sokratova, Olga
A description of incidence rings of group automata
- Kelarev, Andrei, Passman, D.S.
An algorithm for BCH codes extended with finite state automata
Experimental investigation of clasification algorithms for ITS dataset
- Yearwood, John, Kang, Byeongho, Kelarev, Andrei
A formula for multiple classifiers in data mining based on Brandt semigroups
- Kelarev, Andrei, Yearwood, John, Mammadov, Musa
A polynomial ring construction for the classification of data
- Kelarev, Andrei, Yearwood, John, Vamplew, Peter
An algorithm for the optimization of multiple classifers in data mining based on graphs
- Kelarev, Andrei, Ryan, Joe, Yearwood, John
Applying clustering and ensemble clustering approaches to phishing profiling
- Webb, Dean, Yearwood, John, Vamplew, Peter, Ma, Liping, Ofoghi, Bahadorreza, Kelarev, Andrei
Cayley graphs as classifiers for data mining : The influence of asymmetries
- Kelarev, Andrei, Ryan, Joe, Yearwood, John
Constructing stochastic mixture policies for episodic multiobjective reinforcement learning tasks
- Vamplew, Peter, Dazeley, Richard, Barker, Ewan, Kelarev, Andrei
Experimental investigation of three machine learning algorithms for ITS dataset
- Yearwood, John, Kang, Byeongho, Kelarev, Andrei
Optimization methods and the k-committees algorithm for clustering of sequence data
- Yearwood, John, Bagirov, Adil, Kelarev, Andrei
Optimization of multiple classifiers in data mining based on string rewriting systems
- Dazeley, Richard, Kelarev, Andrei, Yearwood, John, Mammadov, Musa
Rees matrix constructions for clustering of data
- Kelarev, Andrei, Watters, Paul, Yearwood, John
An application of consensus clustering for DDoS attacks detection
- Zi, Lifang, Yearwood, John, Kelarev, Andrei
Consensus clustering and supervised classification for profiling phishing emails in internet commerce security
- Dazeley, Richard, Yearwood, John, Kang, Byeongho, Kelarev, Andrei
Internet security applications of Grobner-Shirvov bases
- Kelarev, Andrei, Yearwood, John, Watters, Paul
Internet security applications of the Munn rings
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Abawajy, Jemal, Pan, L.
A Grobner-Shirshov Algorithm for Applications in Internet Security
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Ma, Liping, Abawajy, Jemal, Pan, L.
An application of novel clustering technique for information security
- Beliakov, Gleb, Yearwood, John, Kelarev, Andrei
Are you sure you would like to clear your session, including search history and login status?