Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Optimized and frequent subgraphs: How are they related? Journal article
IEEE Access, 2018,Volume: 6,Page: 37237-37249
Authors:  Rehman S.U.;  Asghar S.;  Fong S.J.
Favorite | View/Download:8/0 | TC[WOS]:0 TC[Scopus]:3 | Submit date:2019/02/13
Data mining  frequent subgraph patterns  graph pattern mining  optimized graph patterns  social network analysis  
An efficient ranking scheme for frequent subgraph patterns Conference paper
ACM International Conference Proceeding Series
Authors:  Rehman S.U.;  Asghar S.;  Fong S.
Favorite | View/Download:6/0 | TC[WOS]:0 TC[Scopus]:1 | Submit date:2019/02/13
Apriori-based FSM  Frequent subgraphs  Graph mining  Pattern-growth based FSM  
A comprehensive study of finding copy-and-paste clones from program source codes Conference paper
Journal of Emerging Technologies in Web Intelligence
Authors:  Khan K.;  Bhutto S.Z.A.;  Rehman S.U.;  Aziz K.;  Fong S.
Favorite | View/Download:4/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
A model for implementing security at application level in service oriented architecture Conference paper
Journal of Emerging Technologies in Web Intelligence
Authors:  Nabi S.;  Rehman S.U.;  Fong S.;  Aziz K.
Favorite | View/Download:6/0 | TC[WOS]:0 TC[Scopus]:1 | Submit date:2019/02/13
Application Level Security in SOA  Service Oriented Architecture (SOA)  Service Oriented Computing (SOC)  Service Oriented Software (SOS)  SOA security policy  Web Services Architecture (WSA)