×
验证码:
换一张
Forgotten Password?
Stay signed in
×
Log In By Account
English
|
Traditional Chinese
|
Simplified Chinese
Log In By Account
Register
ALL
ORCID
Title
Creator
Date Issued
Subject Area
Keyword
Document Type
Source Publication
Date Accessioned
Indexed By
Publisher
Funding Project
MOST Discipline Catalogue
Study Hall
Image search
Paste the image URL
Home
Collections
Authors
DocType
Subjects
K-Map
Evaluation
K-Integration
Study Hall
News
Search in the results
Collection
Authors
Document Type
Conference... [3]
Journal ar... [1]
Date Issued
2018 [2]
2014 [2]
Language
英語 [4]
Source Publication
Journal of... [2]
ACM Intern... [1]
IEEE Acces... [1]
Funding Project
Indexed By
Funding Organization
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-4 of 4
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
Submit date Ascending
Submit date Descending
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Optimized and frequent subgraphs: How are they related?
Journal article
IEEE Access, 2018,Volume: 6,Page: 37237-37249
Authors:
Rehman S.U.
;
Asghar S.
;
Fong S.J.
Favorite
  |  
View/Download:2/0
  |  
Submit date:2019/02/13
Data mining
frequent subgraph patterns
graph pattern mining
optimized graph patterns
social network analysis
An efficient ranking scheme for frequent subgraph patterns
Conference paper
ACM International Conference Proceeding Series
Authors:
Rehman S.U.
;
Asghar S.
;
Fong S.
Favorite
  |  
View/Download:1/0
  |  
Submit date:2019/02/13
Apriori-based FSM
Frequent subgraphs
Graph mining
Pattern-growth based FSM
A comprehensive study of finding copy-and-paste clones from program source codes
Conference paper
Journal of Emerging Technologies in Web Intelligence
Authors:
Khan K.
;
Bhutto S.Z.A.
;
Rehman S.U.
;
Aziz K.
;
Fong S.
Favorite
  |  
View/Download:1/0
  |  
Submit date:2019/02/13
A model for implementing security at application level in service oriented architecture
Conference paper
Journal of Emerging Technologies in Web Intelligence
Authors:
Nabi S.
;
Rehman S.U.
;
Fong S.
;
Aziz K.
Favorite
  |  
View/Download:1/0
  |  
Submit date:2019/02/13
Application Level Security in SOA
Service Oriented Architecture (SOA)
Service Oriented Computing (SOC)
Service Oriented Software (SOS)
SOA security policy
Web Services Architecture (WSA)