Found: 17
Select item for more details and to access through your institution.
Detecting Implicit Security Exceptions Using an Improved Variable-Length Sequential Pattern Mining Method.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2017, v. 27, n. 8, p. 1235, doi. 10.1142/S0218194017500462
- By:
- Publication type:
- Article
A novel defect prediction method based on semantic feature enhancement.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 9, p. 1, doi. 10.1002/smr.2674
- By:
- Publication type:
- Article
A novel test case prioritization approach for black‐box testing based on K‐medoids clustering.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 4, p. 1, doi. 10.1002/smr.2565
- By:
- Publication type:
- Article
A novel combinatorial testing approach with fuzzing strategy.
- Published in:
- Journal of Software: Evolution & Process, 2023, v. 35, n. 12, p. 1, doi. 10.1002/smr.2537
- By:
- Publication type:
- Article
A review of improved extreme learning machine methods for data stream classification.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 23, p. 33375, doi. 10.1007/s11042-019-7543-2
- By:
- Publication type:
- Article
Gridwave: a grid-based clustering algorithm for market transaction data based on spatial-temporal density-waves and synchronization.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 22, p. 29623, doi. 10.1007/s11042-017-5441-z
- By:
- Publication type:
- Article
Malware recognition approach based on self‐similarity and an improved clustering algorithm.
- Published in:
- IET Software (Wiley-Blackwell), 2022, v. 16, n. 5, p. 527, doi. 10.1049/sfw2.12067
- By:
- Publication type:
- Article
CAAS: a novel collective action-based ant system algorithm for solving TSP problem.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 12, p. 9257, doi. 10.1007/s00500-019-04452-y
- By:
- Publication type:
- Article
RETRACTED: Environmental monitoring and early warning based on redundant fuzzy c-means clustering algorithm.
- Published in:
- International Journal of Electrical Engineering Education, 2023, v. 60, p. 1279, doi. 10.1177/0020720919884240
- By:
- Publication type:
- Article
Minimal Rare Pattern-Based Outlier Detection Approach For Uncertain Data Streams Under Monotonic Constraints.
- Published in:
- Computer Journal, 2023, v. 66, n. 1, p. 16, doi. 10.1093/comjnl/bxab139
- By:
- Publication type:
- Article
Detecting Outliers in Data Streams Based on Minimum Rare Pattern Mining and Pattern Matching.
- Published in:
- Information Technology & Control, 2022, v. 51, n. 2, p. 268, doi. 10.5755/j01.itc.51.2.30524
- By:
- Publication type:
- Article
WMFP-Outlier: An Efficient Maximal Frequent-Pattern-Based Outlier Detection Approach for Weighted Data Streams.
- Published in:
- Information Technology & Control, 2019, v. 48, n. 4, p. 505, doi. 10.5755/j01.itc.48.4.22176
- By:
- Publication type:
- Article
An Efficient Outlier Detection Approach Over Uncertain Data Stream Based on Frequent Itemset Mining.
- Published in:
- Information Technology & Control, 2019, v. 48, n. 1, p. 34, doi. 10.5755/j01.itc.48.1.21162
- By:
- Publication type:
- Article
An optimized time series combined forecasting method based on neural networks.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 4, p. 2986, doi. 10.1007/s11227-019-03064-5
- By:
- Publication type:
- Article
Minimal weighted infrequent itemset mining-based outlier detection approach on uncertain data stream.
- Published in:
- Neural Computing & Applications, 2020, v. 32, n. 11, p. 6619, doi. 10.1007/s00521-018-3876-4
- By:
- Publication type:
- Article
An Efficient Outlier Detection Approach for Streaming Sensor Data Based on Neighbor Difference and Clustering.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/3062541
- By:
- Publication type:
- Article
Mining Recent Maximal Frequent Itemsets Over Data Streams with Sliding Window.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2019, v. 16, n. 6, p. 961, doi. 10.34028/iajit/16/6/1
- By:
- Publication type:
- Article