M. Tahar Kechadi

According to our database1, M. Tahar Kechadi authored at least 223 papers between 1992 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management.
J. Comput. Sci. Technol., 2019

Knowledge Map: Toward a New Approach Supporting the Knowledge Management in Distributed Data Mining.
CoRR, 2019

Recurrent neural network approach for cyclic job shop scheduling problem.
CoRR, 2019

A Security-Aware Access Model for Data-Driven EHR System.
CoRR, 2019

Human Activity Recognition with Convolutional Neural Netowrks.
CoRR, 2019

DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge.
CoRR, 2019

Predicting Soil pH by Using Nearest Fields.
Proceedings of the Artificial Intelligence XXXVI, 2019

Rehabilitation Exercise Segmentation for Autonomous Biofeedback Systems with ConvFSM.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

Designing and Implementing Data Warehouse for Agricultural Big Data.
Proceedings of the Big Data - BigData 2019, 2019

2018
Scalability-aware mechanism based on workload prediction in ultra-peer networks.
Peer-to-Peer Networking and Applications, 2018

Green Approach for Joint Management of Geo-Distributed Data Centers and Interconnection Networks.
J. Network Syst. Manage., 2018

An Efficient Data Warehouse for Crop Yield Prediction.
CoRR, 2018

Forensic Analysis of the exFAT artefacts.
CoRR, 2018

Human Activity Recognition with Convolutional Neural Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

Short Paper: Application of Noisy Attacks on Image Steganography.
Proceedings of the Networked Systems - 6th International Conference, 2018

Ontology Based Approach for Precision Agriculture.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2018

Internet of Things Forensics - Challenges and a Case Study.
Proceedings of the Advances in Digital Forensics XIV, 2018

Automatic classification of knee rehabilitation exercises using a single inertial sensor: A case study.
Proceedings of the 15th IEEE International Conference on Wearable and Implantable Body Sensor Networks, 2018

2017
LPCN: Least polar-angle connected node algorithm to find a polygon hull in a connected euclidean graph.
J. Netw. Comput. Appl., 2017

Forensic Analysis of Virtual Hard Drives.
JDFSL, 2017

A multi-act sequential game-based multi-objective clustering approach for categorical data.
Neurocomputing, 2017

Semantic Grid resource discovery based on SKOS ontology.
IJGUC, 2017

Automatic multi-objective clustering based on game theory.
Expert Syst. Appl., 2017

Distributed Spatial Data Clustering as a New Approach for Big Data Analysis.
CoRR, 2017

Increasing digital investigator availability through efficient workflow management and automation.
CoRR, 2017

Toward a Distributed Knowledge Discovery system for Grid systems.
CoRR, 2017

Grid-based Approaches for Distributed Data Mining Applications.
CoRR, 2017

D-LPCN: A distributed least polar-angle connected node algorithm for finding the boundary of a wireless sensor network.
Ad Hoc Networks, 2017

Investigation and Automating Extraction of Thumbnails Produced by Image Viewers.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Volkswagen Car Entertainment System Forensics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems.
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017

A Steganography Technique for Images Based on Wavelet Transform.
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017

Prediction of NB-UVB phototherapy treatment response of psoriasis patients using data mining.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

Performance Evaluation of a Distributed Clustering Approach for Spatial Datasets.
Proceedings of the Data Mining, 2017

2016
A Natural Language Processing Tool for White Collar Crime Investigation.
Trans. Large-Scale Data- and Knowledge-Centered Systems, 2016

ELM-based spammer detection in social networks.
The Journal of Supercomputing, 2016

Clustering of optimized data for email forensics.
RAIRO - Operations Research, 2016

A New Distributed Chinese Wall Security Policy Model.
JDFSL, 2016

Phased Method for Solving Multi-Objective MPM Job Shop Scheduling Problem.
IJMSTR, 2016

Dimensionality reduction in data mining: A Copula approach.
Expert Syst. Appl., 2016

Toward a new tool to extract the Evidence from a Memory Card of Mobile phones.
CoRR, 2016

Data Reduction in Very Large Spatio-Temporal Data Sets.
CoRR, 2016

Forensics Acquisition of IMVU: A Case Study.
CoRR, 2016

An efficient customer search tool within an Anti-Money Laundering application implemented on an international bank's dataset.
CoRR, 2016

Toward a new mobile cloud forensic framework.
CoRR, 2016

An Integrated Classification Model for Financial Data Mining.
CoRR, 2016

Android and Wireless data-extraction using Wi-Fi.
CoRR, 2016

Energy-Efficient Data Mining Techniques for Emergency Detection in Wireless Sensor Networks.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Efficient Intermediate Data Placement in Federated Cloud Data Centers Storage.
Proceedings of the Mobile, Secure, and Programmable Networking, 2016

Data Mining Techniques Applied to Wireless Sensor Networks for Early Forest Fire Detection.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

A Fuzzy Rule-Based Learning Algorithm for Customer Churn Prediction.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2016

Classical Mechanics Optimization for Image Segmentation.
Proceedings of the Swarm Intelligence Based Optimization - Second International Conference, 2016

Hierarchical Aggregation Approach for Distributed Clustering of Spatial Datasets.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

Leveraging IMU data for accurate exercise performance classification and musculoskeletal injury risk screening.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

The limb movement analysis of rehabilitation exercises using wearable inertial sensors.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

Efficient Large Scale Clustering Based on Data Partitioning.
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016

Towards Automatic Service Level Agreements Information Extraction.
Proceedings of the CLOSER 2016, 2016

Retrieval and Clustering of Medicines Within Healthcare Data Records.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

A Parallel Data Mining Algorithm for PageRank Computation.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

Healthcare Big Data: Challenges and Opportunities.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

Missing Data Analysis Using Multiple Imputation in Relation to Parkinson's Disease.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

2015
Forensic Acquisition of IMVU: A Case Study.
JDFSL, 2015

Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser.
JDFSL, 2015

The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends.
IJDCF, 2015

An ontology-based approach for the reconstruction and analysis of digital incidents timelines.
Digital Investigation, 2015

HTML5 Zero Configuration Covert Channels: Security Risks and Challenges.
CoRR, 2015

Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service.
Comput. Secur., 2015

A parallel genetic algorithms framework based on Hadoop MapReduce.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Toward Scheduling I/O Request of Mapreduce Tasks Based on Markov Model.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

Integrated intelligent method for solving multi-objective MPM job shop scheduling problem.
Proceedings of the 6th International Conference on Information, 2015

Toward a new approach for massive LiDAR data processing.
Proceedings of the 2nd IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2015

Distributed clustering algorithm for spatial data mining.
Proceedings of the 2nd IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2015

An agent-based negotiation approach for knowledge exchange in cloud service platforms.
Proceedings of the 2nd IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2015

Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

Forensics in Industrial Control System: A Case Study.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

Gaussian Mixture Model Based Interest Prediction In Social Networks.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

SLAFM - A Service Level Agreement Formal Model for Cloud Computing.
Proceedings of the CLOSER 2015, 2015

Overview of the Forensic Investigation of Cloud Services.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync.
JDFSL, 2014

BitTorrent Sync: First Impressions and Digital Forensic Implications.
Digital Investigation, 2014

A complete formalized knowledge representation model for advanced digital forensics timeline analysis.
Digital Investigation, 2014

Digital Evidence Bag Selection for P2P Network Investigation.
CoRR, 2014

The Case for a Collaborative Universal Peer-to-Peer Botnet Investigation Framework.
CoRR, 2014

CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool.
Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques, 2014

Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications.
Proceedings of the Computational Forensics, 2014

Automatic Timeline Construction and Analysis for Computer Forensics Purposes.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Forensic Analysis of the TomTom Navigation Application.
Proceedings of the Advances in Digital Forensics X, 2014

Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014

Reconstruction et analyse sémantique de chronologies cybercriminelles.
Proceedings of the 14èmes Journées Francophones Extraction et Gestion des Connaissances, 2014

Clustering Based on Sequential Multi-Objective Games.
Proceedings of the Data Warehousing and Knowledge Discovery, 2014

BitTorrent Sync: Network Investigation Methodology.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Multiple project portfolio scheduling using recurrent neural networks.
IJSPM, 2013

An effective hybrid learning system for telecommunication churn prediction.
Expert Syst. Appl., 2013

Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results.
Digital Investigation, 2013

A Framework for Genetic Algorithms Based on Hadoop.
CoRR, 2013

CKDD Track Report.
Proceedings of the 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2013

Cloud Forensic Readiness: Foundations.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

Feature Selection Parallel Technique for Remotely Sensed Imagery Classification.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

RNN Modelling for Bi-Objective MPM Job Shop Scheduling Problem.
Proceedings of the Fifth International Conference on Computational Intelligence, 2013

Universal Peer-to-Peer Network Investigation Framework.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
A Tree-Based Approach for Detecting Redundant Business Rules in Very Large Financial Datasets.
IJBIR, 2012

Customer churn prediction in telecommunications.
Expert Syst. Appl., 2012

CKDD Track Report: Cooperative Knowledge Discovery and Data Mining.
Proceedings of the 21st IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2012

An Integrated Model for Financial Data Mining.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2012

Key Terms for Service Level Agreements to Support Cloud Forensics.
Proceedings of the Advances in Digital Forensics VIII, 2012

An Open Framework for Smartphone Evidence Acquisition.
Proceedings of the Advances in Digital Forensics VIII, 2012

Toward a new classification model for analysing financial datasets.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

ANTS ROAD: A New Tool for SQLite Data Recovery on Android Devices.
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012

The Weighted Tardiness as Objective Function of a RNN Model for the Job Scheduling Problem.
Proceedings of the Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation, 2012

Mining on the Cloud - K-means with MapReduce.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

Project Portfolio: A Job Scheduling Approach.
Proceedings of the Sixth International Conference on Complex, 2012

2011
Behavioural Proximity Discovery: an adaptive approach for root cause analysis.
IJBIDM, 2011

Investigating Cybercrimes that Occur on Documented P2P Networks.
IJACI, 2011

Efficient Distributed Approach for Density-Based Clustering.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011

Cooperative Knowledge Discovery & Data Mining Track Report - CKDD 2011.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011

A Rule-Based Method for Customer Churn Prediction in Telecommunication Services.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011

Cloud Forensics.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

Comparing two density-based clustering methods for reducing very large spatio-temporal dataset.
Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011

Evaluation of a clustering technique based on game theory.
Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011

Ontology for knowledge management and improvement of data mining result.
Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011

Study and analysis of temporal data using Hidden Markov models.
Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011

New approach for distributed clustering.
Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011

On a Distributed Approach for Density-Based Clustering.
Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops, 2011

A New Hybrid Clustering Method for Reducing Very Large Spatio-temporal Dataset.
Proceedings of the Advanced Data Mining and Applications - 7th International Conference, 2011

2010
Performance study of distributed Apriori-like frequent itemsets mining.
Knowl. Inf. Syst., 2010

Recent Advances in Parallel Virtual Machine and Message Passing Interface.
IJHPCA, 2010

A new feature set with new window techniques for customer churn prediction in land-line telecommunications.
Expert Syst. Appl., 2010

Multi-objective feature selection by using NSGA-II for customer churn prediction in telecommunications.
Expert Syst. Appl., 2010

Data Reduction in Very Large Spatio-Temporal Datasets.
Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2010

The Data Wave: Data Management and Mining.
Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2010

Cooperative Knowledge Discovery & Data Mining CKDD.
Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2010

Local PCA Regression for Missing Data Estimation in Telecommunication Dataset.
Proceedings of the PRICAI 2010: Trends in Artificial Intelligence, 2010

Performance Evaluation of a Knowledge-based Solution for Detecting Money Laundering in an Investment Bank.
Proceedings of the 2010 International Conference on Information & Knowledge Engineering, 2010

A Real-Time Recognition System for Handwritten Mathematics: Structural Development.
Proceedings of the International Conference on Frontiers in Handwriting Recognition, 2010

A Real-Time Recognition System for Handwritten Mathematics: Backtracking and Relationship Discovery.
Proceedings of the International Conference on Frontiers in Handwriting Recognition, 2010

Analysis of Deputy and Party Similarities through Hierarchical Clustering.
Proceedings of the Fourth International Conference on Digital Society, 2010

Customer Segmentation Architecture Based on Clustering Techniques.
Proceedings of the Fourth International Conference on Digital Society, 2010

Application of Data Mining for Anti-money Laundering Detection: A Case Study.
Proceedings of the ICDMW 2010, 2010

Semantic Modelling of Digital Forensic Evidence.
Proceedings of the Digital Forensics and Cyber Crime, 2010

Fuzzy Spatial Analysis Techniques for Mathematical Expression Recognition.
Proceedings of the Artificial Intelligence and Soft Computing, 2010

Self-clustering for identification of customer purchase behaviours.
Proceedings of the Extraction et gestion des connaissances (EGC'2010), 2010

A Data Mining-Based Solution for Detecting Suspicious Money Laundering Cases in an Investment Bank.
Proceedings of the Second International Conference on Advances in Databases, 2010

Persistent Locality Management of Scientific Application Workflows.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010

Using PCA to Predict Customer Churn in Telecommunication Dataset.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

A Clustering-Based Data Reduction for Very Large Spatio-Temporal Datasets.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

Using Genetic K-Means Algorithm for PCA Regression Data in Customer Churn Prediction.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
Preprocessing Techniques for Online Handwriting Recognition.
Proceedings of the Intelligent Text Categorization and Clustering, 2009

Correlating Orphaned Windows Registry Data Structures.
JDFSL, 2009

On the persistence of deleted windows registry data structures.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

An Efficient Search Tool For An Anti-Money Laundering Application Of An Multi-National Bank's Dataset.
Proceedings of the 2009 International Conference on Information & Knowledge Engineering, 2009

Online Acquisition of Digital Forensic Evidence.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

Investigating Encrypted Material.
Proceedings of the Forensics in Telecommunications, 2009

Formal Model For Fault Recognition In Modern Telecommunication Networks.
Proceedings of The 2009 International Conference on Data Mining, 2009

Customer Churn Prediction for Broadband Internet Services.
Proceedings of the Data Warehousing and Knowledge Discovery, 11th International Conference, 2009

Kernel-based Principal Components Analysis on Large Telecommunication Data.
Proceedings of the Eighth Australasian Data Mining Conference, AusDM 2009, Melbourne, 2009

2008
Extraction and Categorisation of User Activity from Windows Restore Points.
JDFSL, 2008

Handling Large Volumes of Mined Knowledge with a Self-Reconfigurable Topology on Distributed Systems.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008

On the recognition of online handwritten mathematics using feature-based fuzzy rules and relationship precedence.
Proceedings of the FUZZ-IEEE 2008, 2008

Persistent Workflow on the Grid.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Mining Spatio-Temporal Data at Different Levels of Detail.
Proceedings of the European Information Society: Taking Geoinformation Science One Step Further, 2008

2007
Exploratory spatio-temporal data mining and visualization.
J. Vis. Lang. Comput., 2007

Towards a framework for mining and analysing spatio-temporal datasets.
International Journal of Geographical Information Science, 2007

A comparative study of peer to peer dynamic load balancing on embedded topologies.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2007

Scalable 2-Pass Data Mining Technique for Large Scale Spatio-temporal Datasets.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Efficient Load Balancing on Irregular Network Topologies Using B+tree Structures.
Proceedings of the 6th International Symposium on Parallel and Distributed Computing (ISPDC 2007), 2007

Preprocessing Techniques for Online Handwriting Recognition.
Proceedings of the Seventh International Conference on Intelligent Systems Design and Applications, 2007

Lightweight Clustering Technique for Distributed Data Mining Applications.
Proceedings of the Advances in Data Mining. Theoretical Aspects and Applications, 2007

An efficient support management tool for distributed data mining environments.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

Mathpad: A Fuzzy Logic-Based Recognition System for Handwritten Mathematics.
Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 2007

THON: A Tessellation-based Hierarchical Overlay Network for DGET Grid Middleware.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

FECk: A New Efficient Clustering Algorithm for the Events Correlation Problem in Telecommunication Networks.
Proceedings of the Future Generation Communication and Networking, 2007

Variance-based Clustering Technique for Distributed Data Mining Applications.
Proceedings of the 2007 International Conference on Data Mining, 2007

Cufres: clustering using fuzzy representative eventsselection for the fault recognition problem intelecommunication networks.
Proceedings of the First Ph.D. Workshop in CIKM, 2007

A New Approach for Distributed Density Based Clustering on Grid Platform.
Proceedings of the Data Management. Data, 2007

2006
A universal performance factor for multi-criteria evaluation of multistage interconnection networks.
Future Gener. Comput. Syst., 2006

Transparent Migration of Multi-Threaded Applications on a Java Based Grid
CoRR, 2006

Entity Based Peer-to-Peer in a Data Grid Environment
CoRR, 2006

A Java Based Architecture of P2P-Grid Middleware.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications & Conference on Real-Time Computing Systems and Applications, 2006

TreeP: A Self-reconfigurable Topology for Unstructured P2P Systems.
Proceedings of the Applied Parallel Computing. State of the Art in Scientific Computing, 2006

Behavioural Proximity Approach for Alarm Correlation in Telecommunication Networks.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

Security Framework for P2P Based Grid Systems.
Proceedings of the 5th International Symposium on Parallel and Distributed Computing (ISPDC 2006), 2006

On the Efficiency of Dynamic Load Balancing on P2P Irregular Network Topologies.
Proceedings of the 5th International Symposium on Parallel and Distributed Computing (ISPDC 2006), 2006

A Hybrid HMM-SVM Method for Online Handwriting Symbol Recognition.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

A visual approach for spatio-temporal data mining.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006

A Hybrid Recogniser for Handwritten Symbols Based on Fuzzy Logic and Self-Organizing Maps.
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006

Admire framework: Distributed data mining on data grid platforms.
Proceedings of the ICSOFT 2006, 2006

A Fast Feature Selection Model for Online Handwriting Symbol Recognition.
Proceedings of the Fifth International Conference on Machine Learning and Applications, 2006

An HMM-SNN Method for Online Handwriting Symbol Recognition.
Proceedings of the Image Analysis and Recognition, Third International Conference, 2006

An Online Fuzzy Approach to the Structural Analysis of Handwritten Mathematical Expressions.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2006

Performance Evaluation of Two Data Mining Techniques of Network Alarms Analysis.
Proceedings of the 2006 International Conference on Data Mining, 2006

Virtual Structured P2P Network Topology for Distributed Computing.
Proceedings of the 2006 IEEE International Conference on Cluster Computing, 2006

Structural analysis of handwritten mathematical expressions through fuzzy parsing.
Proceedings of the IASTED International Conference on Advances in Computer Science and Technology, 2006

2005
Dynamic task scheduling for irregular network topologies.
Parallel Comput., 2005

A Practical Approach for Electricity Load Forecasting.
Proceedings of the Third World Enformatika Conference, 2005

A New Efficient Clustering Algorithm for Network Alarm Analysis.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Dynamic Load Balancing of Content Requests in Peer to Peer Systems.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Efficient Two-Pass Dynamic Load Balancing for Computational Clusters.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Tools for Statistical Analysis with Missing Data: Application to a Large Medical Database.
Proceedings of the Connecting Medical Informatics and Bio-Informatics - Proceedings of MIE 2005, 2005

An Efficient Hybrid Approach for Online Recognition of Handwritten Symbols.
Proceedings of the MICAI 2005: Advances in Artificial Intelligence, 2005

A Recurrent Neural Network Recogniser for Online Recognition of Handwritten Symbols.
Proceedings of the ICEIS 2005, 2005

Neural Network Effective Approach for Energy Load Forecasting.
Proceedings of the IASTED International Conference on Computational Intelligence, 2005

TreeP: A Tree Based P2P Network Architecture.
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005

Multi-Context-Recurrent Neural Network for Load Forecasting.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2005

Evaluation of a Neural Network Approach on FMS Cyclic Task Scheduling Problem.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2005

2004
Performance study of a dynamic task scheduling for heterogeneous distributed systems.
Operational Research, 2004

Dynamic Task Scheduling in Computing Cluster Environments.
Proceedings of the 3rd International Symposium on Parallel and Distributed Computing (ISPDC 2004), 2004

Comparative Analysis of Two Associative Memory Neural Networks.
Proceedings of the 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2004), 2004

Application of fuzzy logic to online recognition of handwritten symbols.
Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition, 2004

Distributed Resource Discovery in Wide Area Grid Environments.
Proceedings of the Computational Science, 2004

Suitability of Two Associative Memory Neural Networks to Character Recognition.
Proceedings of the AI 2004: Advances in Artificial Intelligence, 2004

Feature Extraction of Handwritten Symbols Using Fuzzy Logic.
Proceedings of the Advances in Artificial Intelligence, 2004

2003
Performance Study of Scheduling Mechanisms for Peer-to-Peer Computing Environments.
Proceedings of the Parallel Processing and Applied Mathematics, 2003

On The Load Distribution and Performance of Meta-Computing Systems.
Proceedings of the 2nd International Symposium on Parallel and Distributed Computing (ISPDC 2003), 2003

A Study of an Evaluation Methodology for Unbuffered Multistage Interconnection Networks.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

1999
Recurrent Neural Network Approach for Partitioning Irregular Graphs.
Proceedings of the High-Performance Computing and Networking, 7th International Conference, 1999

1998
A Parallel Technique for Partitioning Nodes of Weighted Graphs.
Proceedings of the High-Performance Computing and Networking, 1998

1997
Analysis and Simulation of an Out-Of-Order Execution Model in Vector Multiprocessor Systems.
Parallel Comput., 1997

Topology Preserving Dynamic Load Balancing for Parallel Molecular Simulations.
Proceedings of the ACM/IEEE Conference on Supercomputing, 1997

1996
On the Crossover Points for Dynamic Load Balancing of Long-Chained Molecules.
Proceedings of the Applied Parallel Computing, 1996

Parallel Simulation Environment for Polymers, DNA and Protein Molecular Chains.
Proceedings of the High-Performance Computing and Networking, 1996

1995
Dynamic Domain Decomposition and Load Balancing for Parallel Simulations of Long-Chained Molecules.
Proceedings of the Applied Parallel Computing, 1995

1992
Performance improvement for vector pipeline multiprocessor systems using a disordered execution model.
Proceedings of the 19th Annual International Symposium on Computer Architecture. Gold Coast, 1992


  Loading...