Browsing Closed by Title

UTSePress Research/Manakin Repository

Search UTSePress Research


Advanced Search

Browse

My Account

Browsing Closed by Title

Sort by: Order: Results:

  • Henderson-Sellers, Brian (Sigs Publications Inc, 1999)
    Modeling languages alone are not enough to build software. Developers really need a full process and a technically focused development model-both discussed in detail here.
  • Fachrunnisa, Olivia; Hussain, Farookh (CRL Publishing, 2012)
    Trust is the foundation for the success of Digital Enterprise. However, in a trust-based relationship, trust has distinct life cycle phases. These phases are: building, maintenance and dissolution. A positive trust value ...
  • Parvin, S; Hussain, Farookh; Ali, Sana (IOS Press, 2012)
    Similar to wired communication, Mobile IP communication is susceptible to various kinds of attacks. Of these attacks, Denial of Service (DoS) attack is considered as a great threat to mobile IP communication. The number ...
  • Hussain, Omar; Chang, Elizabeth; Hussain, Farookh; Dillon, Tharam (Elsevier Science Bv, 2007)
    In digital business ecosystem architecture it is rational for the trusting agent to analyse the possible risk according to its demand before interacting with a probable trusted agent. Doing so would assist the trusting ...
  • Hug, Charlotte; Front, Agnes; Rieu, D.; Henderson-Sellers, Brian (Elsevier, 2009)
    Several process metamodels exist. Each of them presents a different viewpoint of the same information systems engineering process. However, there are no existing correspondences between them. We propose a method to build ...
  • Du, Ruo; Wu, Qiang; Yang, Jie; He, Sean (Elsevier BV, 2013)
    Multiple-instance learning (MIL) is a variation on supervised learning. Instead of receiving a set of labeled instances, the learner receives a set of bags that are labeled. Each bag contains many instances. The aim of MIL ...
  • Yang, Jie; Wu, Qiang; Du, Ruo; He, Xiangjian (Elsevier BV, 2013)
    Multiple-instance learning (MIL) is a variation on supervised learning. Instead of receiving a set of labeled instances, the learner receives a set of bags that are labeled. Each bag contains many instances. The aim of MIL ...
  • He, Dan; Zhu, Xingquan; Wu, Xindong (Wiley-Blackwell, 2011)
    The rapid increase of available DNA, protein, and other biological sequences has made the problem of discovering meaningful patterns from sequences an important task for Bioinformatics research. Among all types of patterns ...
  • Wen, Yuan; Chen, Zuliang; Liu, Jianxun; Chen, Jinjun (Wiley-Blackwell, 2013)
    The employment of batch processing in workflow is to model and schedule activity instances in multiple workflow cases of the same workflow type to optimize business processes execution dynamically. Although our previous ...
  • Dong, Gz; Li, Jinyan (Springer London Ltd, 2005)
    The mining of changes or differences or other comparative patterns from a pair of datasets is an interesting problem. This paper is focused on the mining of one type of comparative pattern called emerging patterns. Emerging ...
  • Zhang, Shichao; Chen, Feng; Wu, Xindong; Zhang, Chengqi; Wang, Ruili (Springer, 2012)
    Bridging rules take the antecedent and action from different conceptual clusters. They are distinguished from association rules (frequent itemsets) because (1) they can be generated by the infrequent itemsets that are ...
  • Zhang, Shichao; Chen, Qingfeng; Jin, Zhi; Wang, Ruili (Elsevier Science, 2009)
    A class-bridge rule is the rule whose antecedent and consequent belong to different conceptual classes. This kind of rules stands for the correlation between conceptual classes. The study on class-bridge rules can benefit ...
  • Zhang, Shichao; Zhang, Chengqi; Yu, Jeffrey (Taylor & Francis Inc, 2004)
  • Hsieh, Tsung-Jung; Hsiao, Hsiao-Fen; Yeh, Wei-Chang (Elsevier, 2012)
    The 2008 financial tsunami had a serious impact on the economic development of many countries, including Taiwan. Thus, the ability to predict financial failure and their trends is crucial and attracts public and professional ...
  • Zhang, Shichao; Huang, Zifang; Zhang, Jilian; Zhu, Xiaofeng (Springer, 2008)
    Research on traditional association rules has gained a great attention during the past decade. Generally, an association rule A a?? B is used to predict that B likely occurs when A occurs. This is a kind of strong correlation, ...
  • Fariha, Anna; Ahmed, Chowdhury; Leung, Carson; Abdullah, S.; Cao, Longbing (Springer, 2013)
    In modern life, interactions between human beings frequently occur in meetings, where topics are discussed. Semantic knowledge of meetings can be revealed by discovering interaction patterns from these meetings. An existing ...
  • Li, Xin; Zhang, Lei; Chen, Enhong; Zong, Yu; Xu, Guandong (Springer Berlin / Heidelberg, 2013)
    It is common today for users to print the informative information from webpages due to the popularity of printers and internet. Thus, many web printing tools such as Smart Print and PrintUI are developed for online printing. ...
  • Zhang, Shichao; You, Xiaofang; Jin, Zhi; Wu, Xindong (Elsevier Science, 2009)
    When extracting knowledge (or patterns) from multiple databases, the data from different databases might be too large in volume to be merged into one database for centralized mining on one computer, the local information ...
  • Guo, Jing; Zhang, Peng; Tan, Jianlong; Guo, Li (Elsevier, 2012)
    Mininghottopicsfrom twitter streamshas attractedalotof attentionin recent years.Traditionalhottopicmining from InternetWeb pages were mainly basedontext clustering.However, comparedtothetextsinWeb pages, twitter texts are ...
  • Cao, Longbing; Zhao, Yanchang; Zhang, Chengqi (IEEE Computer Soc, 2008)
    Impact-targeted activities are rare but they may have a significant impact on the society. For example, isolated terrorism activities may lead to a disastrous event, threatening the national security. Similar issues can ...