UM

Browse/Search Results:  1-3 of 3 Help

Selected(0)Clear Items/Page:    Sort:
A comprehensive study of finding copy-and-paste clones from program source codes Journal article
Khan,Kamran, Bhutto,Shaheed Zulfiqar Ali, Rehman,Saif Ur, Aziz,Kamran, Fong,Simon. A comprehensive study of finding copy-and-paste clones from program source codes[J]. Journal of Emerging Technologies in Web Intelligence, 2014, 6(1), 111-118.
Authors:  Khan,Kamran;  Bhutto,Shaheed Zulfiqar Ali;  Rehman,Saif Ur;  Aziz,Kamran;  Fong,Simon
Favorite | TC[Scopus]:0 | Submit date:2021/03/09
A model for implementing security at application level in service oriented architecture Journal article
Nabi,Said, Rehman,Saif Ur, Fong,Simon, Aziz,Kamran. A model for implementing security at application level in service oriented architecture[J]. Journal of Emerging Technologies in Web Intelligence, 2014, 6(1), 157-163.
Authors:  Nabi,Said;  Rehman,Saif Ur;  Fong,Simon;  Aziz,Kamran
Favorite | TC[Scopus]:5 | Submit date:2021/03/09
Application Level Security In Soa  Service Oriented Architecture (Soa)  Service Oriented Computing (Soc)  Service Oriented Software (Sos)  Soa Security Policy  Web Services Architecture (Wsa)  
DBSCAN: Past, Present and Future Conference paper
Kamran Khan, Saif Ur Rehman, Kamran Aziz, Simon Fong, S.Sarasvady, Amrita Vishwa. DBSCAN: Past, Present and Future[C]:IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA, 2014, 232-238.
Authors:  Kamran Khan;  Saif Ur Rehman;  Kamran Aziz;  Simon Fong;  S.Sarasvady; et al.
Favorite | TC[WOS]:322 TC[Scopus]:441 | Submit date:2019/02/13
Clustering  Data Mining Algorithms  Dbscan  Density  Sampling  Spatial Data