Up a level
Export as [feed] RSS
Group by: Date | Creators | Item Type | Uncontrolled Keywords | No Grouping
Number of items: 53.

Active Contours

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

Associative Classification

Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Associative Classification Text Categorisation Document Classification

Barnes, Andrew, McCluskey, T.L. and Osborne, Hugh (2008) Benefits of associative classification within text categorisation. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 34-39. ISBN 978-1-86218-067-3

Automated planning

McCluskey, T.L., Vaquero, Tiago and Vallati, Mauro (2017) Engineering Knowledge for Automated Planning: Towards a Notion of Quality. In: K-CAP 2017, 4-6 December 2017, Austin, Texas.

Jimoh, Falilat, McCluskey, T.L. and Simon, Parkinson (2017) A Hybrid Approach to Process Planning: The Urban Traffic Controller Example. Journal of Computer Science, 13 (8). pp. 257-274. ISSN 1549-3636

Jimoh, Falilat and McCluskey, T.L. (2013) Self-management in road traffic networks. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2013 : CEARC'13. University of Huddersfield, Huddersfield, pp. 73-79. ISBN 9781862181212

Jimoh, Falilat, Chrpa, Lukas, McCluskey, T.L. and Shah, Mohammad Munshi Shahin (2013) Towards Application of Automated Planning in Urban Traffic Control. In: 2013 16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013). Institute of Electrical and Electronics Engineers ( IEEE ), pp. 985-990. ISBN 9781479929139

autonomic systems

Jimoh, Falilat, Chrpa, Lukas, McCluskey, T.L. and Shah, Mohammad Munshi Shahin (2013) Towards Application of Automated Planning in Urban Traffic Control. In: 2013 16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013). Institute of Electrical and Electronics Engineers ( IEEE ), pp. 985-990. ISBN 9781479929139

autonomic systems automated planning and scheduling control systems

Jimoh, F. and McCluskey, T.L. (2012) Using automated planning to enable autonomic properties in computer systems. In: Proceedings of The Queen’s Diamond Jubilee Computing and Engineering Annual Researchers’ Conference 2012: CEARC’12. University of Huddersfield, Huddersfield, p. 150. ISBN 978-1-86218-106-9

Classification

Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Composition

Mustafa, Faisal and McCluskey, T.L. (2008) Dynamic web services composition: current issues. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 48-54. ISBN 978-1-86218-067-3

Computer Vision

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

control systems

Jimoh, Falilat and McCluskey, T.L. (2013) Self-management in road traffic networks. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2013 : CEARC'13. University of Huddersfield, Huddersfield, pp. 73-79. ISBN 9781862181212

Data mining

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2015) Tutorial and Critical Analysis of Phishing Websites Methods. Computer Science Review, 17. pp. 1-24. ISSN 1574-0137

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Domain model

McCluskey, T.L., Vaquero, Tiago and Vallati, Mauro (2017) Engineering Knowledge for Automated Planning: Towards a Notion of Quality. In: K-CAP 2017, 4-6 December 2017, Austin, Texas.

Shah, Mohammad Munshi Shahin, McCluskey, T.L. and West, Margaret M. (2009) A study of synthesizing artificial intelligence (AI) planning domain models by using object constraints. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 64-69. ISBN 9781862180857

Dynamic Web Services

Mustafa, Faisal and McCluskey, T.L. (2008) Dynamic web services composition: current issues. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 48-54. ISBN 978-1-86218-067-3

features extraction

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

Information Management

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

Information Security

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

Intelligent Systems

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

Itemset

Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Knowledge acquisition

Shah, Mohammad Munshi Shahin, McCluskey, T.L. and West, Margaret M. (2009) A study of synthesizing artificial intelligence (AI) planning domain models by using object constraints. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 64-69. ISBN 9781862180857

Knowledge engineering

McCluskey, T.L., Vaquero, Tiago and Vallati, Mauro (2017) Engineering Knowledge for Automated Planning: Towards a Notion of Quality. In: K-CAP 2017, 4-6 December 2017, Austin, Texas.

Knowledge Representation

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

Machine Learning

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2015) Tutorial and Critical Analysis of Phishing Websites Methods. Computer Science Review, 17. pp. 1-24. ISSN 1574-0137

McCluskey, T.L., Cresswell, S.N., Richardson, N.E. and West, Margaret M. (2010) Action Knowledge Acquisition with Opmaker2. In: Agents and Artificial Intelligence. Communications in Computer and Information Science, 67 . Springer, pp. 137-150. ISBN 978-3-642-11818-0

Model predictive control

Jimoh, Falilat, McCluskey, T.L. and Simon, Parkinson (2017) A Hybrid Approach to Process Planning: The Urban Traffic Controller Example. Journal of Computer Science, 13 (8). pp. 257-274. ISSN 1549-3636

Neural Network

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

object-centred model

Shah, Mohammad Munshi Shahin, McCluskey, T.L. and West, Margaret M. (2009) A study of synthesizing artificial intelligence (AI) planning domain models by using object constraints. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 64-69. ISBN 9781862180857

Ontology

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

OWL

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

Phishing

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

Phishing Dataset

Mohammad, Rami, Thabtah, Fadi and McCluskey, T.L. (2015) Phishing Websites Dataset. [Dataset] (Unpublished)

phishing websites

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2015) Tutorial and Critical Analysis of Phishing Websites Methods. Computer Science Review, 17. pp. 1-24. ISSN 1574-0137

Planning and Scheduling

McCluskey, T.L., Cresswell, S.N., Richardson, N.E. and West, Margaret M. (2010) Action Knowledge Acquisition with Opmaker2. In: Agents and Artificial Intelligence. Communications in Computer and Information Science, 67 . Springer, pp. 137-150. ISBN 978-3-642-11818-0

Protégé

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

Quality of Service

Mustafa, Faisal and McCluskey, T.L. (2008) Dynamic web services composition: current issues. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 48-54. ISBN 978-1-86218-067-3

Requirements capture • Formal specification • Knowledge representation

McCluskey, T.L., Porteous, J.M., Naik, Y., Taylor, C. N. and Jones, S. (1995) A requirements capture method and its use in an air traffic control application. Software: Practice and Experience, 25 (1). pp. 47-71. ISSN 0038-0644

Rule

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

Scene Understanding

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

Security

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

Training Phase

Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Urban traffic control

Jimoh, Falilat, McCluskey, T.L. and Simon, Parkinson (2017) A Hybrid Approach to Process Planning: The Urban Traffic Controller Example. Journal of Computer Science, 13 (8). pp. 257-274. ISSN 1549-3636

Jimoh, Falilat and McCluskey, T.L. (2013) Self-management in road traffic networks. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2013 : CEARC'13. University of Huddersfield, Huddersfield, pp. 73-79. ISBN 9781862181212

urban transport control

Jimoh, Falilat, Chrpa, Lukas, McCluskey, T.L. and Shah, Mohammad Munshi Shahin (2013) Towards Application of Automated Planning in Urban Traffic Control. In: 2013 16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013). Institute of Electrical and Electronics Engineers ( IEEE ), pp. 985-990. ISBN 9781479929139

Validation trend mining Longitudinal data Temporal databases

Somaraki, V. and McCluskey, T.L. (2012) A robust validation framework for trend mining : a study in diabetic retinopathy. In: Proceedings of The Queen’s Diamond Jubilee Computing and Engineering Annual Researchers’ Conference 2012: CEARC’12. University of Huddersfield, Huddersfield, pp. 63-68. ISBN 978-1-86218-106-9

Web Threat

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

Website features

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

This list was generated on Thu Mar 28 18:07:22 2024 UTC.