Остановите войну!
for scientists:
default search action
Selwyn Piramuthu
- > Home > Persons > Selwyn Piramuthu
Publications
- 2018
- [c44]Selwyn Piramuthu:
Authentication Protocols for an Object with Dynamic RFID Tags. FNSS 2018: 93-101 - 2017
- [c43]Selwyn Piramuthu:
RFID-Based Non-repudiation Protocols for Supply Chains. FNSS 2017: 56-69 - 2012
- [j47]Selwyn Piramuthu:
Vulnerabilities of RFID protocols proposed in ISF. Inf. Syst. Frontiers 14(3): 647-651 (2012) - 2011
- [j44]Selwyn Piramuthu:
RFID mutual authentication protocols. Decis. Support Syst. 50(2): 387-393 (2011) - 2010
- [c27]Selwyn Piramuthu:
Sequential Bias, Online Product Reviews, and Recommender Systems. ICDM (Workshops) 2010: 5-13 - 2008
- [j24]Selwyn Piramuthu:
Input data for decision trees. Expert Syst. Appl. 34(2): 1220-1226 (2008) - [j23]Selwyn Piramuthu:
Adaptive Framework for Collisions in RFID Tag Identification. J. Inf. Knowl. Manag. 7(1): 9-14 (2008) - [j21]Selwyn Piramuthu:
Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems. IEEE Trans. Syst. Man Cybern. Part C 38(3): 360-376 (2008) - 2007
- [j20]Selwyn Piramuthu:
Protocols for RFID tag/reader authentication. Decis. Support Syst. 43(3): 897-914 (2007) - [c16]Selwyn Piramuthu:
On Sequential Bias in Web-Based Reviews. AWIC 2007: 298-303 - 2006
- [j18]Selwyn Piramuthu:
On preprocessing data for financial credit risk evaluation. Expert Syst. Appl. 30(3): 489-497 (2006) - [c15]Selwyn Piramuthu:
On Existence Proofs for Multiple RFID Tags. ICPS 2006: 317-320 - 2005
- [j17]Selwyn Piramuthu:
Knowledge-based framework for automated dynamic supply chain configuration. Eur. J. Oper. Res. 165(1): 219-230 (2005) - [j16]Selwyn Piramuthu:
Machine learning for dynamic multi-product supply chain formation. Expert Syst. Appl. 29(4): 985-990 (2005) - [j14]Selwyn Piramuthu:
Feature Selection for Reduction of Tabular Knowledge-Based Systems. Inf. Technol. Manag. 6(4): 351-362 (2005) - [j13]Selwyn Piramuthu:
Knowledge-based web-enabled agents and intelligent tutoring systems. IEEE Trans. Educ. 48(4): 750-756 (2005) - 2004
- [j12]Selwyn Piramuthu:
Evaluating feature selection methods for learning in data mining applications. Eur. J. Oper. Res. 156(2): 483-494 (2004) - [j11]Selwyn Piramuthu:
Feature construction for reduction of tabular knowledge-based systems. Inf. Sci. 168(1-4): 201-215 (2004) - [j10]Selwyn Piramuthu:
Knowledge-Based Framework for Validating Workflow Sequences. J. Inf. Knowl. Manag. 3(3): 273-278 (2004) - 2003
- [j9]Selwyn Piramuthu:
On learning to predict Web traffic. Decis. Support Syst. 35(2): 213-229 (2003) - 2000
- [c9]Selwyn Piramuthu:
Electronic commerce and data mining: minimum degree ordering for identifying association rules. IRMA Conference 2000: 1061 - 1999
- [j6]Selwyn Piramuthu:
Financial credit-risk evaluation with neural and neurofuzzy systems. Eur. J. Oper. Res. 112(2): 310-321 (1999) - [j5]Selwyn Piramuthu:
Feature Selection for Financial Credit-Risk Evaluation Decisions. INFORMS J. Comput. 11(3): 258-266 (1999) - [c8]Selwyn Piramuthu:
The Hausdorff Distance Measure for Feature Selection in Learning Applications. HICSS 1999 - 1998
- [c7]Selwyn Piramuthu:
Evaluating Feature Selection Methods for Learning in Data Mining Applications. HICSS (5) 1998: 294-301 - 1997
- [c6]Selwyn Piramuthu:
Feature Construction for Verification and Validation of Tabular Knowledge Base Systems. EUROVAV 1997: 181-190 - 1996
- [c5]Selwyn Piramuthu:
Effects of Feature Selection with 'Blurring' on NeuroFuzzy Systems. ALT 1996: 135-142 - [c4]Selwyn Piramuthu:
Neural versus neurofuzzy systems for credit approval. ESANN 1996 - 1990
- [c1]Selwyn Piramuthu:
Feature Construction for Back-Propagation. PPSN 1990: 264-268
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-06 23:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint