UM

Browse/Search Results:  1-4 of 4 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
A Critical Review of Security Threats in Cloud Computing Conference paper
Proceedings - 2015 3rd International Symposium on Computational and Business Intelligence, ISCBI 2015, Bali, Indonesia, 7-9 Dec. 2015
Authors:  Mahroosh Irfan;  Muhammad Usman;  Yan Zhuang;  Simon Fong
Favorite | View/Download:12/0 | TC[WOS]:4 TC[Scopus]:10 | Submit date:2019/02/13
Cloud Computing  Cloud Security  Deployment Models  Service Models  Threats  
On Learning Software Effort Estimation Conference paper
Proceedings - 2015 3rd International Symposium on Computational and Business Intelligence, ISCBI 2015, Bali, Indonesia, 7-9 Dec. 2015
Authors:  Sidra Tariq;  Muhammad Usman;  Raymond Wong;  Yan Zhuang;  Simon Fong
Favorite | View/Download:10/0 | TC[WOS]:7 TC[Scopus]:5 | Submit date:2019/02/13
Attribute Selection  Effort Estimation  Machine Learning Techniques  Pre-processin  Weka  
Data mining and automatic OLAP schema generation Conference paper
2010 5th International Conference on Digital Information Management, ICDIM 2010, Thunder Bay, ON, Canada, 5-8 July 2010
Authors:  Usman, Muhammad;  Asghar, Sohail;  Fong, Simon
Favorite | View/Download:10/0 | TC[WOS]:0 TC[Scopus]:6 | Submit date:2018/11/06
A Conceptual Model for Combining Enhanced OLAP and Data Mining Systems Conference paper
NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC, Seoul, South Korea, 25-27 Aug. 2009
Authors:  Muhammad Usman;  Dr. Sohail Asghar;  Simon Fong
Favorite | View/Download:9/0 | TC[WOS]:0 TC[Scopus]:11 | Submit date:2019/02/13
Data Mining  Enhanced Olap  Performance Enhancement  Visualization Techniques