Simon Fong

According to our database1, Simon Fong
  • authored at least 204 papers between 1998 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Carbon Oxides Gases for Occupancy Counting and Emergency Control in Fog Environment.
Symmetry, 2018

Clinical application of modified bag-of-features coupled with hybrid neural-based classifier in dengue fever classification using gene expression data.
Med. Biol. Engineering and Computing, 2018

A Survey of Data Mining and Deep Learning in Bioinformatics.
J. Medical Systems, 2018

Medical cyber-physical systems: A survey.
J. Medical Systems, 2018

A Deep Belief Network for Electricity Utilisation Feature Analysis of Air Conditioners Using a Smart IoT Platform.
JIPS, 2018

Fast multi-subsequence monitoring on streaming time-series based on Forward-propagation.
Inf. Sci., 2018

Adaptive multi-objective swarm fusion for imbalanced data classification.
Information Fusion, 2018

Clustering big IoT data by metaheuristic optimized mini-batch and parallel partition-based DGC in Hadoop.
Future Generation Comp. Syst., 2018

Gaussian Guided Self-Adaptive Wolf Search Algorithm Based on Information Entropy Theory.
Entropy, 2018

Swarm Intelligence: Past, Present and Future.
CoRR, 2018

Dynamic Group Optimization Algorithm With Embedded Chaos.
IEEE Access, 2018

How to Build a Chatbot: Chatbot Framework and its Capabilities.
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018

An Efficient Ranking Scheme for Frequent Subgraph Patterns.
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018

Swarm Search Methods in Weka for Data Mining.
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018

A Scalable Bluetooth Low Energy Design Model for Sensor Detection for an Indoor Real Time Location System.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

Investigation of Obstructions and Range Limit on Bluetooth Low Energy RSSI for the Healthcare Environment.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

Analysis of Bluetooth Low Energy Detection Range Improvements for Indoor Environments.
Proceedings of the Computational Science - ICCS 2018, 2018

2017
Emerging Service Orchestration Discovery and Monitoring.
IEEE Trans. Services Computing, 2017

Predicting the next turn at road junction from big traffic data.
The Journal of Supercomputing, 2017

Location-based big data analytics for guessing the next Foursquare check-ins.
The Journal of Supercomputing, 2017

Design of hand gesture interaction framework on clouds for multiple users.
The Journal of Supercomputing, 2017

Developing residential wireless sensor networks for ECG healthcare monitoring.
IEEE Trans. Consumer Electronics, 2017

Self-Adaptive Pre-Processing Methodology for Big Data Stream Mining in Internet of Things Environmental Sensor Monitoring.
Symmetry, 2017

3D Reconstruction Framework for Multiple Remote Robots on Cloud System.
Symmetry, 2017

Training Classifiers with Shadow Features for Sensor-Based Human Activity Recognition.
Sensors, 2017

Development of simulator for invoked reality environmental design.
Multimedia Tools Appl., 2017

Design and implementation of a same-user identification system in invoked reality space.
Multimedia Tools Appl., 2017

Managing Diabetes Therapy through Datastream Mining.
IT Professional, 2017

An adaptive meta-heuristic search for the internet of things.
Future Generation Comp. Syst., 2017

Simulation framework of ubiquitous network environments for designing diverse network robots.
Future Generation Comp. Syst., 2017

Cross Entropy Method Based Hybridization of Dynamic Group Optimization Algorithm.
Entropy, 2017

Epileptic Seizures Prediction Using Machine Learning Methods.
Comp. Math. Methods in Medicine, 2017

Longitudinal Ambient Mobile Sensor Monitoring for TCM-oriented Healthcare Assessments: Framework, Challenges and Applications.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

On Recognizing Abnormal Human Behaviours by Data Stream Mining with Misclassified Recalls.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Visual clustering-based apriori ARM methodology for obtaining quality association rules.
Proceedings of the 10th International Symposium on Visual Information Communication and Interaction, 2017

An IoT-Based Smart Controlling System of Air Conditioner for High Energy Efficiency.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Evaluation of Real Time Location System technologies in the health care sector.
Proceedings of the Computational Science and Its Applications - ICCSA 2017, 2017

Assessment of Feasible Methods Used by the Health Care Industry for Real Time Location.
Proceedings of the Position Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017

General Precautions against Security Threats for Computer Networks in SMEs: From the Perspective of Big Data and IOT.
Proceedings of the International Conference on Big Data and Internet of Things, 2017

Facial Feature Based Secure Information Transmission.
Proceedings of the International Conference on Big Data and Internet of Things, 2017

Human Body and Face Detection based Anti-shoulder Attack System on ATM.
Proceedings of the International Conference on Big Data and Internet of Things, 2017

An Implementation of VR Chemistry Experiment System.
Proceedings of the International Conference on Big Data and Internet of Things, 2017

Big Data Mining Algorithms for Fog Computing.
Proceedings of the International Conference on Big Data and Internet of Things, 2017

Generating Neural Networks with Optimal Features through Particle Swarm Optimization.
Proceedings of the International Conference on Big Data and Internet of Things, 2017

A DCT-based Information Hiding Method for Network Authentication.
Proceedings of the International Conference on Big Data and Internet of Things, 2017

2016
Gesture Recognition Method Using Sensing Blocks.
Wireless Personal Communications, 2016

Accelerated PSO Swarm Search Feature Selection for Data Stream Mining Big Data.
IEEE Trans. Services Computing, 2016

Improving the classification performance of biological imbalanced datasets by swarm optimization algorithms.
The Journal of Supercomputing, 2016

Discovering sub-patterns from time series using a normalized cross-match algorithm.
The Journal of Supercomputing, 2016

NSPRING: the SPRING extension for subsequence matching of time series supporting normalization.
The Journal of Supercomputing, 2016

Recent advances in metaheuristic algorithms: Does the Makara dragon exist?
The Journal of Supercomputing, 2016

Improvised methods for tackling big data stream mining challenges: case study of human activity recognition.
The Journal of Supercomputing, 2016

A time series pre-processing methodology with statistical and spectral analysis for classifying non-stationary stochastic biosignals.
The Journal of Supercomputing, 2016

Finding approximate solutions of NP-hard optimization and TSP problems using elephant search algorithm.
The Journal of Supercomputing, 2016

Autonomous path based data acquisition in sensor networks.
The Journal of Supercomputing, 2016

Towards implementation of residual-feedback GMDH neural network on parallel GPU memory guided by a regression curve.
The Journal of Supercomputing, 2016

GPU-enabled back-propagation artificial neural network for digit recognition in parallel.
The Journal of Supercomputing, 2016

Hierarchical classification in text mining for sentiment analysis of online news.
Soft Comput., 2016

Recent advances in machine intelligence.
Soft Comput., 2016

Run-based exception prediction for workflows.
Journal of Systems and Software, 2016

Self-regularized causal structure discovery for trajectory-based networks.
J. Comput. Syst. Sci., 2016

Atmospheric pattern recognition of human activities on ubiquitous sensor network using data stream mining algorithms.
IJSNet, 2016

Financial time series pattern matching with extended UCR Suite and Support Vector Machine.
Expert Syst. Appl., 2016

Eidetic Wolf Search Algorithm with a global memory structure.
European Journal of Operational Research, 2016

A decision support system using combined-classifier for high-speed data stream in smart grid.
Enterprise IS, 2016

From Swarm Intelligence to Metaheuristics: Nature-Inspired Optimization Algorithms.
IEEE Computer, 2016

Adaptive swarm cluster-based dynamic multi-objective synthetic minority oversampling technique algorithm for tackling binary imbalanced datasets in biomedical data classification.
BioData Mining, 2016

Fuzzy Aspect Based Opinion Classification System for Mining Tourist Reviews.
Adv. Fuzzy Systems, 2016

Normalized Cross-Match: Pattern Discovery Algorithm from Biofeedback Signals.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2016

Effective Local Metric Learning for Water Pipe Assessment.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2016

Improving Metaheuristics by Natural Selection.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

Self-Adaptive Wolf Search Algorithm.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

Brick-Up Metaheuristic Algorithms.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

Elephant search algorithm on data clustering.
Proceedings of the 12th International Conference on Natural Computation, 2016

Optimizing self-adaptive gender ratio of elephant search algorithm by min-max strategy.
Proceedings of the 12th International Conference on Natural Computation, 2016

Competitive Intelligence Study on Macau Food and Beverage Industry.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

Adaptive Multi-objective Swarm Crossover Optimization for Imbalanced Data Classification.
Proceedings of the Advanced Data Mining and Applications - 12th International Conference, 2016

Real-Time Stream Mining Electric Power Consumption Data Using Hoeffding Tree with Shadow Features.
Proceedings of the Advanced Data Mining and Applications - 12th International Conference, 2016

A Generic Service Framework for Stock Market Prediction.
Proceedings of the IEEE International Conference on Services Computing, 2016

Lightweight Feature Selection Methods Based on Standardized Measure of Dispersion for Mining Big Data.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
A map-like visualisation method based on liquid modelling.
J. Vis. Lang. Comput., 2015

A heuristic optimization method inspired by wolf preying behavior.
Neural Computing and Applications, 2015

Countering the concept-drift problems in big data by an incrementally optimized stream mining model.
Journal of Systems and Software, 2015

Gesture Recognition from Data Streams of Human Motion Sensor Using Accelerated PSO Swarm Search Feature Selection Algorithm.
J. Sensors, 2015

PSOVina: The hybrid particle swarm optimization algorithm for protein-ligand docking.
J. Bioinformatics and Computational Biology, 2015

Text Analytics for Predicting Question Acceptance Rates.
IT Professional, 2015

A review of metaheuristics in robotics.
Computers & Electrical Engineering, 2015

A Joint Optimization Framework of Sparse Coding and Discriminative Clustering.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Optimized Swarm Search-Based Feature Selection for Text Mining in Sentiment Analysis.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

A real-time interactive data mining and visualization system using parallel computing.
Proceedings of the Tenth International Conference on Digital Information Management, 2015

Extending the grenade explosion approach for effective clustering.
Proceedings of the Tenth International Conference on Digital Information Management, 2015

Elephant Search Algorithm for optimization problems.
Proceedings of the Tenth International Conference on Digital Information Management, 2015

A Comparative Analysis of Pruning Methods for C4.5 and Fuzzy C4.5.
Proceedings of the Artificial Intelligence Research and Development, 2015

Online registration system for recreational cycling marathons: Lessons learned.
Proceedings of the Artificial Intelligence Research and Development, 2015

A Data Modification Technique in PPDM Based on Ant Colony Optimization Approach.
Proceedings of the Artificial Intelligence Research and Development, 2015

Hidden Markov Model Based Character Segmentation Factor Applied To Urdu Script.
Proceedings of the Artificial Intelligence Research and Development, 2015

Debunking the designs of contemporary nature-inspired computing algorithms: from moving particles to roaming elephants.
Proceedings of the Fourth International Conference on Future Generation Communication Technology (FGCT 2015), 2015

2014
Bat Algorithm is Better Than Intermittent Search Strategy.
Multiple-Valued Logic and Soft Computing, 2014

Feature Selection in Life Science Classification: Metaheuristic Swarm Search.
IT Professional, 2014

Underwater Sonar Signals Recognition by Incremental Data Stream Mining with Conflict Analysis.
IJDSN, 2014

Bat Algorithm is Better Than Intermittent Search Strategy.
CoRR, 2014

Framework of Lightweight Secure Media Transfer for Mobile Law Enforcement Apps.
Proceedings of the Security in Computing and Communications, 2014

A Novel Disease Outbreak Prediction Model for Compact Spatial-Temporal Environments.
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2014

Classifying Sonar Signals Using an Incremental Data Stream Mining Methodology with Conflict Analysis.
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2014

Location-Based Mutual and Mobile Information Navigation System: Lemmings.
Proceedings of the Intelligent Distributed Computing, 2014

A novel feature selection by clustering coefficients of variations.
Proceedings of the Ninth International Conference on Digital Information Management, 2014

DBSCAN: Past, present and future.
Proceedings of the Fifth International Conference on the Applications of Digital Information and Web Technologies, 2014

An event driven neural network system for evaluating public moods from online users' comments.
Proceedings of the Fifth International Conference on the Applications of Digital Information and Web Technologies, 2014

2013
Selecting Optimal Feature Set in High-Dimensional Data by Swarm Search.
J. Applied Mathematics, 2013

Optimizing dynamic supply chain formation in supply mesh using CSET model.
Information Systems Frontiers, 2013

Web 2.0 Recommendation service by multi-collaborative filtering trust network algorithm.
Information Systems Frontiers, 2013

Human-Robot Interaction Learning Using Demonstration-Based Learning and Q-Learning in a Pervasive Sensing Environment.
IJDSN, 2013

Optimizing Classification Decision Trees by Using Weighted Naïve Bayes Predictors to Reduce the Imbalanced Class Problem in Wireless Sensor Network.
IJDSN, 2013

Identifying Optimal Spatial Groups for Maximum Coverage in Ubiquitous Sensor Network by Using Clustering Algorithms.
IJDSN, 2013

Performance evaluation of incremental decision tree learning under noisy data streams.
IJCAT, 2013

Using causality modeling and Fuzzy Lattice Reasoning algorithm for predicting blood glucose.
Expert Syst. Appl., 2013

Visualizing recent changes in Wikipedia.
SCIENCE CHINA Information Sciences, 2013

Performance evaluation management model to accelerate the development of e-government in China.
Proceedings of the 7th International Conference on Theory and Practice of Electronic Governance, 2013

An Application of Oversampling, Undersampling, Bagging and Boosting in Handling Imbalanced Datasets.
Proceedings of the First International Conference on Advanced Data and Information Engineering, 2013

Improving the Accuracy of Incremental Decision Tree Learning Algorithm via Loss Function.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Swarm Search for Feature Selection in Classification.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Countering the Concept-Drift Problem in Big Data Using iOVFDT.
Proceedings of the IEEE International Congress on Big Data, 2013

Comparison of Cutoff Strategies for Geometrical Features in Machine Learning-Based Scoring Functions.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

2012
Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006.
JIPS, 2012

A Very Fast Decision Tree Algorithm for Real-Time Data Mining of Imperfect Data Streams in a Distributed Wireless Sensor Network.
IJDSN, 2012

Trend following algorithms in automated derivatives market trading.
Expert Syst. Appl., 2012

An efficient new multi-language clone detection approach from large source code.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Incrementally Optimized Decision Tree for Mining Imperfect Data Streams.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Incrementally optimized decision tree for noisy big data.
Proceedings of the 1st International Workshop on Big Data, 2012

Rare Events Forecasting Using a Residual-Feedback GMDH Neural Network.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

A layered approach to link analysis and visualization of event data.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

Wolf search algorithm with ephemeral memory.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

Integrating nature-inspired optimization algorithms to K-means clustering.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

Graph mining: A survey of graph mining techniques.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

Trend following with float-encoding genetic algorithm.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

Opinion mining over twitterspace: Classifying tweets programmatically using the R approach.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

Mining twitterspace for information: Classifying sentiments programmatically using Java.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

Not Every Friend on a Social Network Can be Trusted: An Online Trust Indexing Algorithm.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2012

Nature-Inspired Clustering Algorithms for Web Intelligence Data.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2012

Bat algorithm for topology optimization in microelectronic applications.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012

Building a diseases symptoms ontology for medical diagnosis: An integrative approach.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012

Quantitative analysis of trust factors on social network using data mining approach.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012

Analysis of general opinions about Sina Weibo micro-blog real-name verification system.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012

Not every friend on a social network can be trusted: Classifying imposters using decision trees.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012

Multi-objective Optimization for Incremental Decision Tree Learning.
Proceedings of the Data Warehousing and Knowledge Discovery, 2012

2011
Stream-based Biomedical Classification Algorithms for Analyzing Biosignals.
JIPS, 2011

Role of Segment Progressive Filter in Dynamic Data mining.
JDIM, 2011

Real-time Business Intelligence System Architecture with Stream Mining.
IJWA, 2011

Social Network Collaborative Filtering Framework and Online Trust Factors: a Case Study on Facebook.
IJWA, 2011

Analysis of Collaboration Effectiveness and Individuals' Contribution in FLOSS Communities.
ECEASST, 2011

Accelerated Particle Swarm Optimization and Support Vector Machine for Business Optimization and Applications.
Proceedings of the Networked Digital Technologies - Third International Conference, 2011

Multi-way Association Clustering Analysis on Adaptive Real-Time Multicast Data.
Proceedings of the Networked Digital Technologies - Third International Conference, 2011

Experimental Research on DFA-Based MLML IDS Security Evaluation.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Information Sharing over Collaborative Social Networks Using XACML.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

Expert finding and query answering for Collaborative Inter-Organizational system by using Rule Responder.
Proceedings of the Sixth IEEE International Conference on Digital Information Management, 2011

A PPDM model using Bayesian Network for hiding sensitive XML Association Rules.
Proceedings of the Sixth IEEE International Conference on Digital Information Management, 2011

Bayesian based subgroup discovery.
Proceedings of the Sixth IEEE International Conference on Digital Information Management, 2011

Predicting car purchase intent using data mining approach.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Moderated VFDT in Stream Mining Using Adaptive Tie Threshold and Incremental Pruning.
Proceedings of the Data Warehousing and Knowledge Discovery, 2011

2010
Data mining and automatic OLAP schema generation.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Visualizing e-Government portal and its performance in WEBVS.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Real-time business intelligence system architecture with stream mining.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Social network collaborative filtering framework and online trust factors: A case study on Facebook.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

2009
Decision-Support for Optimizing Supply Chain Formation Based on CSET Model.
Proceedings of the 2009 IEEE Conference on Commerce and Enterprise Computing, 2009

Hidden Cluster Detection for Infectious Disease Control and Quarantine Management.
Proceedings of the Visual Information Communication, 2009

A Conceptual Model for Combining Enhanced OLAP and Data Mining Systems.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Framework of Business Intelligence-Driven Data Mining for E-business.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

The Application of Trend Following Strategies in Stock Market Trading.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Critical path based approach for predicting temporal exceptions in resource constrained concurrent workflows.
Proceedings of the iiWAS'2009, 2009

Design of a web-based tendering system for e-government procurement.
Proceedings of the ICEGOV 2009, 2009

A web-based performance monitoring system for e-government services.
Proceedings of the ICEGOV 2009, 2009

2008
Knowledge-empowered automated negotiation system for e-Commerce.
Knowl. Inf. Syst., 2008

A method for measuring co-authorship relationships in MediaWiki.
Proceedings of the 2008 International Symposium on Wikis, 2008

Comparative Study on M-Commerce Applications in Various Scenarios.
Proceedings of the 2008 IEEE / WIC / ACM International Conference on Web Intelligence, 2008

Supporting mobile payment QOS by data mining GSM network traffic.
Proceedings of the iiWAS'2008, 2008

Double-agent architecture for collaborative supply chain formation.
Proceedings of the iiWAS'2008, 2008

On designing a market monitoring web agent system.
Proceedings of the iiWAS'2008, 2008

User Acceptance Testing of Mobile Payment in Various Scenarios.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

Applying Pareto-Optimal and JIT Techniques for Supply Chains.
Proceedings of the 8th International Conference on Hybrid Intelligent Systems (HIS 2008), 2008

Using Genetic Algorithm for Hybrid Modes of Collaborative Filtering in Online Recommenders.
Proceedings of the 8th International Conference on Hybrid Intelligent Systems (HIS 2008), 2008

2007
Knowledge-Empowered Automated Negotiation System for B2B e-Commerce.
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007

Efficient and Secure Card-based Payment System Based on ANSI X9.59-2006.
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007

A Model of B2B Negotiation using Knowledge.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

Applying Knowledge Beads for Automated Negotiation.
Proceedings of the ICE-B 2007, 2007

A Hybrid GA-based Collaborative Filtering Model for Online Recommenders.
Proceedings of the ICE-B 2007, 2007

Incorporating Knowledge into e-Commerce Automated Negotiation.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

A Logical Model for Detecting Irregular Actions in Physical Access Environment.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

A Security Model for Detecting Suspicious Patterns in Physical Environment.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2005
Mobile Mini-payment Scheme Using SMS-Credit.
Proceedings of the Computational Science and Its Applications, 2005

2004
On Designing a Flexible E-Payment System with Fraud Detection Capability.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

Knowledge Oriented Negotiation for Agent-Based B2B Electronic Commerce.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

Smart Card-Based Irregular Access Patterns Detection System.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2003
Negotiation Paradigms Based on Knowledge Bead's Methodology.
Proceedings of the 2003 IEEE / WIC International Conference on Web Intelligence, 2003

Data Mining on Users' Access Trials for Web Business Intelligence.
Proceedings of the IASTED International Conference on Neural Networks and Computational Intelligence, 2003

Negotiation Paradigms for E-Commerce Agents using Knowledge Beads Methodology.
Proceedings of the 2nd International Conference on Cyberworlds (CW 2003), 2003

Automated Negotiation with Multiple Concept-based Alternatives in Multi-agent Systems.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003

2002
Mining Online Users? Access Records for Web Business Intelligence.
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002

Mining Operational Data for Improving GSM Network Performance.
Proceedings of the FSDK'02, 2002

2000
Modeling personnel and roles for electronic commerce retail.
Proceedings of the ACM SIGCPR Conference on Computer Personnel Research, 2000

ATM QoS Support via Output Port Controllers.
ICC (2), 2000

1999
Object-Oriented Design of an E-Commerce System for Retailing Business.
Proceedings of the Internet Applications, 5th International Computer Science Conference, 1999

Knowledge Beads - Approach for Knowledge Representation and Market Place Negotiations for Internet Agents.
Proceedings of the Internet Applications, 5th International Computer Science Conference, 1999

1998
Performance analysis of shared buffer ATM switches with different cell departure models.
Int. J. Communication Systems, 1998

Queuing analysis of shared-buffer switches with control scheme under bursty traffic.
Computer Communications, 1998


  Loading...