UM

Browse/Search Results:  1-2 of 2 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
A Critical Review of Security Threats in Cloud Computing Conference paper
Proceedings - 2015 3rd International Symposium on Computational and Business Intelligence, ISCBI 2015, Bali, Indonesia, 7-9 Dec. 2015
Authors:  Mahroosh Irfan;  Muhammad Usman;  Yan Zhuang;  Simon Fong
Favorite | View/Download:12/0 | TC[WOS]:4 TC[Scopus]:10 | Submit date:2019/02/13
Cloud Computing  Cloud Security  Deployment Models  Service Models  Threats  
On Learning Software Effort Estimation Conference paper
Proceedings - 2015 3rd International Symposium on Computational and Business Intelligence, ISCBI 2015, Bali, Indonesia, 7-9 Dec. 2015
Authors:  Sidra Tariq;  Muhammad Usman;  Raymond Wong;  Yan Zhuang;  Simon Fong
Favorite | View/Download:10/0 | TC[WOS]:7 TC[Scopus]:5 | Submit date:2019/02/13
Attribute Selection  Effort Estimation  Machine Learning Techniques  Pre-processin  Weka