Browsing by Subject Statistics


jump to:
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 89 to 108 of 125 < previous   next >
Published DateTitleAuthor(s)
20-Aug-2014Online Social Media in the Syria Conflict: Encompassing the Extremes and the In-BetweensO'Callaghan, DerekPrucha, NicoGreene, DerekConway, MauraCarthy, JoeCunningham, Pádraig
2016Online Trans-dimensional von Mises-Fisher Mixture Models for User ProfilesQin, XiangjuCunningham, PádraigSalter-Townshend, Michael
20-Aug-2014Overlapping Stochastic Community FindingMcDaid, AaronHurley, Neil J.Murphy, Thomas Brendan
16-Dec-2017Prediction of NB-UVB phototherapy treatment response of psoriasis patients using data miningMohamed, SharifaHuang, BingquanKechadi, Tahar
2017Prediction of tool-wear in turning of medical grade cobalt chromium molybdenum alloy (ASTM F75) using non-parametric Bayesian modelsMcParland, DamienBaron, SzymonO'Rourke, SarahDowling, Denis P.Ahearne, EamonnParnell, Andrew C.
12-Dec-2016Properties of Latent Variable Network ModelsRastelli, RiccardoFriel, NialRaftery, Adrian E.
6-Nov-2016Real time News Story Detection and Tracking with HashtagsPoghosyan, GevorgIfrim, Georgiana
31-Jan-2014Reconstruction et analyse smantique de chronologies cybercriminellesKechadi, TaharChabot, YoanBertaux, AurélieNicolle, Christophe
2014Reference Architecture for a Cloud Forensic Readiness SystemDe Marco, LuciaFerrucci, FilomenaKechadi, Tahar
2-Oct-2015Reformulation Strategies of Repeated References in the Context of Robot Perception Errors in Situated DialogueSchutte, NeilsKelleher, JohnMacNamee, Brian
28-Aug-2015Reformulations of the Map Equation for Community Finding and BlockmodellingHurley, Neil J.Duriakova, Erika
Jan-2017Robot perception errors and human resolution strategies in situated human-robot dialogueSchutte, NielsKelleher, JohnMacNamee, Brian
2015Role Analysis in Networks Using Mixtures of Exponential Random Graph ModelsSalter-Townshend, MichaelMurphy, Thomas Brendan
Sep-2015Security Threats of URL Shortening: A Users PerspectiveLe-Khac, Nhien-AnKechadi, Tahar
28-Aug-2013Simmelian Backbones: Amplifying Hidden Homophily in Facebook NetworksNick, BoboLee, ConradCunningham, PádraigBrandes, Ulrik
13-Feb-2015Simulating SQL-Injection Cyber-attacks using GNS3Al-Mahrouqi, AadilTobin, PatrickAbdalla, SamehKechadi, Tahar
22-May-2015SLAFM: A Service Level Agreements Formal Model for Cloud ComputingDe Marco, LuciaFerrucci, FilomenaKechadi, Tahar
2014Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial ToolFaheem, MuhammadLe-Khac, Nhien-AnKechadi, Tahar
25-May-2016Spreading the News: How Can Journalists Gain More Engagement for their TweetsOrellana-Rodriguez, ClaudiaGreene, DerekKeane, Mark T.
2015The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current TrendsKechadi, TaharFaheem, MuhammadLe-Khac, Nhien-An