UM
(Note: the search results are based on claimed items)

Browse/Search Results:  1-10 of 13 Help

Filters        
Selected(0)Clear Items/Page:    Sort:
A Critical Review of Security Threats in Cloud Computing Conference paper
Proceedings - 2015 3rd International Symposium on Computational and Business Intelligence, ISCBI 2015, Bali, Indonesia, 7-9 Dec. 2015
Authors:  Mahroosh Irfan;  Muhammad Usman;  Yan Zhuang;  Simon Fong
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
Cloud Computing  Cloud Security  Deployment Models  Service Models  Threats  
On Learning Software Effort Estimation Conference paper
Proceedings - 2015 3rd International Symposium on Computational and Business Intelligence, ISCBI 2015, Bali, Indonesia, 7-9 Dec. 2015
Authors:  Sidra Tariq;  Muhammad Usman;  Raymond Wong;  Yan Zhuang;  Simon Fong
Favorite  |  View/Download:3/0  |  Submit date:2019/02/13
Attribute Selection  Effort Estimation  Machine Learning Techniques  Pre-processin  Weka  
Bat Algorithm is Better Than Intermittent Search Strategy Journal article
Journal of Multiple-Valued Logic and Soft Computing, 2014,Volume: 22,Issue: 3,Page: 223-237
Authors:  Xin-She Yang;  Suash Deb;  Simon Fong
Favorite  |  View/Download:3/0  |  Submit date:2019/02/13
Bat algorithm: Recent advances Conference paper
CINTI 2014 - 15th IEEE International Symposium on Computational Intelligence and Informatics, Proceedings, Budapest, Hungary, 19-21 Nov. 2014
Authors:  Fister, Iztok;  Yang, Xin-She;  Fong, Simon;  Zhuang, Yan
Favorite  |  View/Download:2/0  |  Submit date:2018/11/06
A review of metaheuristics in robotics Journal article
Computers and Electrical Engineering, 2014,Volume: 43,Page: 278-291
Authors:  Simon Fong;  Suash Deb;  Ankit Chaudhary
Favorite  |  View/Download:3/0  |  Submit date:2018/10/30
Collaborative Robotics  Metaheuristics  Robotics  Survey  Swarm Intelligence  
Visualizing recent changes in Wikipedia Journal article
Science China Information Sciences, 2013,Volume: 56,Issue: 5,Page: 1-15
Authors:  BIUK-AGHAI Robert P.;  CHAN Roy Chi Kit;  SI Yain-Whar;  FONG Simon
Favorite  |  View/Download:6/0  |  Submit date:2019/02/13
Data Stream  Information Visualization  Recent Changes  Wiki  Wikipedia  
Graph Mining: A Survey of Graph Mining Techniques Conference paper
7th International Conference on Digital Information Management, ICDIM 2012, Macau, China, 22-24 Aug. 2012
Authors:  Saif Ur Rehman;  Asmat Ullah Khan;  Simon Fong
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
Data Mining  Frequent Graphs  Graph Mining  Sub Graphs  
Evaluation of semantic web services: Before and after applying in telecommunication Journal article
Journal of Emerging Technologies in Web Intelligence, 2011,Volume: 3,Issue: 2,Page: 120-135
Authors:  Aakif Nazeer Khan;  Sohail Asghar;  Simon Fong
Favorite  |  View/Download:3/0  |  Submit date:2019/02/13
Evaluation Of Sws  Goal Based Services Discovery  Semantic Application  Semantic Web Services  Services Discovery  Sws  Telecommunication Ontology  
Framework of integrated semantic web services and ontology development for telecommunication industry Journal article
Journal of Emerging Technologies in Web Intelligence, 2011,Volume: 3,Issue: 2,Page: 110-119
Authors:  Aakif Nazeer Khan;  Sohail Asghar;  Simon Fong
Favorite  |  View/Download:3/0  |  Submit date:2019/02/13
Goal Based Services Discovery  Semantic Application  Semantic Web Services  Services Discovery  Sws  Telecommunication Ontology  
The six technical gaps between intelligent applications and real-time data mining: A critical review Journal article
Journal of Emerging Technologies in Web Intelligence, 2011,Volume: 3,Issue: 2,Page: 63-73
Authors:  Simon Fong;  Hang Yang
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
Data Stream Mining  Intelligent Applications  Real-time Data Mining