Susan McKeever

According to our database1, Susan McKeever authored at least 33 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Addressing the "Leaky Pipeline": A Review and Categorisation of Actions to Recruit and Retain Women in Computing Education.
CoRR, 2022

An audio processing pipeline for acquiring diagnostic quality heart sounds via mobile phone.
Comput. Biol. Medicine, 2022

Combining Text and Image Knowledge with GANs for Zero-Shot Action Recognition in Videos.
Proceedings of the 17th International Joint Conference on Computer Vision, 2022

Detecting Patches on Road Pavement Images Acquired with 3D Laser Sensors using Object Detection and Deep Learning.
Proceedings of the 17th International Joint Conference on Computer Vision, 2022

2021
A Systematic Review of Urban Navigation Systems for Visually Impaired People.
Sensors, 2021

Increasing Gender Balance Across Academic Staffing in Computer Science - case study.
CoRR, 2021

Addressing the Recruitment and Retention of Female Students in Computer Science at Third Level.
CoRR, 2021

Wider Vision: Enriching Convolutional Neural Networks via Alignment to External Knowledge Bases.
CoRR, 2021

Feature Fusion of Raman Chemical Imaging and Digital Histopathology using Machine Learning for Prostate Cancer Detection.
CoRR, 2021

Fairer Evaluation of Zero Shot Action Recognition in Videos.
Proceedings of the 16th International Joint Conference on Computer Vision, 2021

Pothole Detection under Diverse Conditions using Object Detection Models.
Proceedings of the International Conference on Image Processing and Vision Engineering, 2021

Zero-Shot Action Recognition with Knowledge Enhanced Generative Adversarial Networks.
Proceedings of the 13th International Joint Conference on Computational Intelligence, 2021

2020
Explaining Deep Learning Models for Structured Data using Layer-Wise Relevance Propagation.
CoRR, 2020

Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

Synthesising Tabular Data using Wasserstein Conditional GANs with Gradient Penalty (WCGAN-GP).
Proceedings of The 28th Irish Conference on Artificial Intelligence and Cognitive Science, 2020

Exploring Composite Dataset Biases for Heart Sound Classification.
Proceedings of The 28th Irish Conference on Artificial Intelligence and Cognitive Science, 2020

2019
A Hybrid Process Mining Framework for Automated Simulation Modelling for Healthcare.
Proceedings of the 2019 Winter Simulation Conference, 2019

The Use of Deep Learning Distributed Representations in the Identification of Abusive Text.
Proceedings of the Thirteenth International Conference on Web and Social Media, 2019

Sound Transformation: Applying Image Neural Style Transfer Networks to Audio Spectograms.
Proceedings of the Computer Analysis of Images and Patterns, 2019

Detecting Hacker Threats: Performance of Word and Sentence Embedding Models in Identifying Hacker Communications.
Proceedings of the Proceedings for the 27th AIAI Irish Conference on Artificial Intelligence and Cognitive Science, 2019

2018
Presenting a Hybrid Processing Mining Framework for Automated simulation Model Generation.
Proceedings of the 2018 Winter Simulation Conference, 2018

A Comparison of Classical Versus Deep Learning Techniques for Abusive Content Detection on Social Media Sites.
Proceedings of the Social Informatics, 2018

2017
Face recognition-based real-time system for surveillance.
Intell. Decis. Technol., 2017

Presenting a labelled dataset for real-time detection of abusive user posts.
Proceedings of the International Conference on Web Intelligence, 2017

Abusive Text Detection Using Neural Networks.
Proceedings of the 25th Irish Conference on Artificial Intelligence and Cognitive Science, Dublin, Ireland, December 7, 2017

2016
Harnessing the Power of Text Mining for the Detection of Abusive Content in Social Media.
Proceedings of the Advances in Computational Intelligence Systems, 2016

2012
Situation identification techniques in pervasive computing: A review.
Pervasive Mob. Comput., 2012

2010
Activity recognition using temporal evidence theory.
J. Ambient Intell. Smart Environ., 2010

2009
A Context Quality Model to Support Transparent Reasoning with Uncertain Context.
Proceedings of the Quality of Context, First International Workshop, 2009

Using Dempster-Shafer Theory of Evidence for Situation Inference.
Proceedings of the Smart Sensing and Context, 4th European Conference, 2009

2008
Resolving uncertainty in context integration and abstraction: context integration and abstraction.
Proceedings of the 5th international conference on Pervasive services, 2008

2003
Understanding Web content management systems: evolution, lifecycle and market.
Ind. Manag. Data Syst., 2003

Defining the Range of B2B E-Commerce Formats.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003


  Loading...