default search action
Selwyn Piramuthu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j91]Yu-Ju Tu, Selwyn Piramuthu:
Ethical consumerism, supply chains, and deceptions with RFID-based systems. Inf. Manag. 61(7): 104016 (2024) - 2023
- [j90]Bryndis Stefansdottir, Martin Grunow, Selwyn Piramuthu:
Dynamics of sensor-based information in supply chains with perishables substitutable by non-perishables. Ann. Oper. Res. 329(1): 1357-1380 (2023) - [j89]Pierrick Pelé, Julia Schulze, Selwyn Piramuthu, Wei Zhou:
IoT and Blockchain Based Framework for Logistics in Food Supply Chains. Inf. Syst. Frontiers 25(5): 1743-1756 (2023) - 2022
- [j88]Yu-Ju Tu, Selwyn Piramuthu:
Models to address RFID-based ticket-switching in retailing. Decis. Support Syst. 153: 113666 (2022) - [j87]Xiang Ning Zhu, Gabrielle Peko, David Sundaram, Selwyn Piramuthu:
Blockchain-Based Agile Supply Chain Framework with IoT. Inf. Syst. Frontiers 24(2): 563-578 (2022) - [j86]Yu-Ju Tu, Gaurav Kapoor, Selwyn Piramuthu:
On Group Ownership Delegate Protocol for RFID Systems. Inf. Syst. Frontiers 24(5): 1577-1584 (2022) - [e7]Erich J. Neuhold, Xavier Fernando, Joan Lu, Selwyn Piramuthu, Aravindan Chandrabose:
Computer, Communication, and Signal Processing - 6th IFIP TC 5 International Conference, ICCCSP 2022, Chennai, India, February 24-25, 2022, Revised Selected Papers. IFIP Advances in Information and Communication Technology 651, Springer 2022, ISBN 978-3-031-11632-2 [contents] - 2021
- [j85]Yu-Ju Tu, Wei Zhou, Selwyn Piramuthu:
Critical risk considerations in auto-ID security: Barcode vs. RFID. Decis. Support Syst. 142: 113471 (2021) - [j84]Shenle Pan, Wei Zhou, Selwyn Piramuthu, Vaggelis Giannikas, Chao Chen:
Smart city for sustainable urban freight logistics. Int. J. Prod. Res. 59(7): 2079-2089 (2021) - [j83]Mayadah Hassan, Selwyn Piramuthu:
Review of auto-ID technology use in warehouse management. Int. J. RF Technol. Res. Appl. 12(1): 35-51 (2021) - [j82]Yu-Ju Tu, Gaurav Kapoor, Selwyn Piramuthu:
Security of lightweight mutual authentication protocols. J. Supercomput. 77(5): 4565-4581 (2021) - 2020
- [j81]Yu-Ju Tu, Selwyn Piramuthu:
On addressing RFID/NFC-based relay attacks: An overview. Decis. Support Syst. 129 (2020) - [j80]Robin Doss, Rolando Trujillo-Rasua, Selwyn Piramuthu:
Secure attribute-based search in RFID-based inventory control systems. Decis. Support Syst. 132: 113270 (2020) - [j79]Ya Yang, Huihui Chi, Wei Zhou, Tijun Fan, Selwyn Piramuthu:
Deterioration control decision support for perishable inventory management. Decis. Support Syst. 134: 113308 (2020)
2010 – 2019
- 2019
- [c45]Yu-Ju Tu, Huihui Chi, Wei Zhou, Gaurav Kapoor, Enes Eryarsoy, Selwyn Piramuthu:
Critical Evaluation of RFID Applications in Healthcare. FNSS 2019: 240-248 - [e6]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27-29, 2019, Proceedings. Communications in Computer and Information Science 1113, Springer 2019, ISBN 978-3-030-34352-1 [contents] - 2018
- [j78]Montbel Thibaud, Huihui Chi, Wei Zhou, Selwyn Piramuthu:
Internet of Things (IoT) in high-risk Environment, Health and Safety (EHS) industries: A comprehensive review. Decis. Support Syst. 108: 79-95 (2018) - [j77]Yu-Ju Tu, Wei Zhou, Selwyn Piramuthu:
A novel means to address RFID tag/item separation in supply chains. Decis. Support Syst. 115: 13-23 (2018) - [j76]Malcolm Townsend, Thanh Le Quoc, Gaurav Kapoor, Hao Hu, Wei Zhou, Selwyn Piramuthu:
Real-Time business data acquisition: How frequent is frequent enough? Inf. Manag. 55(4): 422-429 (2018) - [j75]Zhanguo Zhu, Feng Chu, Alexandre Dolgui, Chengbin Chu, Wei Zhou, Selwyn Piramuthu:
Recent advances and opportunities in sustainable food supply chain: a model-oriented review. Int. J. Prod. Res. 56(17): 5700-5722 (2018) - [j74]Juheng Zhang, Selwyn Piramuthu:
Product recommendation with latent review topics. Inf. Syst. Frontiers 20(3): 617-625 (2018) - [j73]Wei Zhou, Selwyn Piramuthu:
IoT security perspective of a flexible healthcare supply chain. Inf. Technol. Manag. 19(3): 141-153 (2018) - [c44]Selwyn Piramuthu:
Authentication Protocols for an Object with Dynamic RFID Tags. FNSS 2018: 93-101 - [e5]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - 4th International Conference, FNSS 2018, Paris, France, July 9-11, 2018, Proceedings. Communications in Computer and Information Science 878, Springer 2018, ISBN 978-3-319-94420-3 [contents] - 2017
- [j72]Wei Zhou, Selwyn Piramuthu:
Identification shrinkage in inventory management: an RFID-based solution. Ann. Oper. Res. 258(2): 285-300 (2017) - [j71]Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
A secure search protocol for low cost passive RFID tags. Comput. Networks 122: 70-82 (2017) - [j70]Selwyn Piramuthu, Robin Doss:
On sensor-based solutions for simultaneous presence of multiple RFID tags. Decis. Support Syst. 95: 102-109 (2017) - [j69]Wei Zhou, Selwyn Piramuthu, Feng Chu, Chengbin Chu:
RFID-enabled flexible warehousing. Decis. Support Syst. 98: 99-112 (2017) - [j68]Tony Yu-Ju Tu, Selwyn Piramuthu:
Lightweight non-distance-bounding means to address RFID relay attacks. Decis. Support Syst. 102: 12-21 (2017) - [c43]Selwyn Piramuthu:
RFID-Based Non-repudiation Protocols for Supply Chains. FNSS 2017: 56-69 - [e4]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings. Communications in Computer and Information Science 759, Springer 2017, ISBN 978-3-319-65547-5 [contents] - 2016
- [j67]Tracey Yuan Ting Wong, Gabrielle Peko, David Sundaram, Selwyn Piramuthu:
Mobile environments and innovation co-creation processes & ecosystems. Inf. Manag. 53(3): 336-344 (2016) - [c42]Wei Zhou, Frederique Alexandre-Bailly, Selwyn Piramuthu:
Dynamic Organizational Learning with IoT and Retail Social Network Data. HICSS 2016: 3822-3828 - [c41]Huihui Chi, Wei Zhou, Selwyn Piramuthu:
Temporal Ownership Boundary in Sharing Economy. WEB 2016: 54-66 - [e3]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings. Communications in Computer and Information Science 670, 2016, ISBN 978-3-319-48020-6 [contents] - 2015
- [j66]Saravanan Sundaresan, Robin Doss, Wanlei Zhou, Selwyn Piramuthu:
Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy. Comput. Commun. 55: 112-124 (2015) - [j65]Wei Zhou, Selwyn Piramuthu:
Effect of ticket-switching on inventory and shelf-space allocation. Decis. Support Syst. 69: 31-39 (2015) - [j64]Valeria Sadovykh, David Sundaram, Selwyn Piramuthu:
Do online social networks support decision-making? Decis. Support Syst. 70: 15-30 (2015) - [j63]Valeria Sadovykh, David Sundaram, Selwyn Piramuthu:
Do decision-making structure and sequence exist in health online social networks? Decis. Support Syst. 74: 102-120 (2015) - [j62]Wei Zhou, Selwyn Piramuthu:
Effects of ticket-switching on inventory management: Actual vs. information system-based data. Decis. Support Syst. 77: 31-40 (2015) - [j61]Selwyn Piramuthu, Antonio Rizzi, Giuseppe Vignali, Andrea Volpi:
Benchmarking of RFID devices for apparel applications: An experimental approach. Int. J. RF Technol. Res. Appl. 6(2-3): 151-169 (2015) - [j60]Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
Secure Tag Search in RFID Systems Using Mobile Readers. IEEE Trans. Dependable Secur. Comput. 12(2): 230-242 (2015) - [c40]Wei Zhou, Selwyn Piramuthu:
IoT and Supply Chain Traceability. FNSS 2015: 156-165 - [e2]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings. Communications in Computer and Information Science 523, Springer 2015, ISBN 978-3-319-19209-3 [contents] - [e1]El-Sayed M. El-Alfy, Sabu M. Thampi, Hideyuki Takagi, Selwyn Piramuthu, Thomas Hanne:
Advances in Intelligent Informatics - Proceedings of the Third International Symposium on Intelligent Informatics, ISI 2014, September 24-27, 2014, Greater Noida, Delhi, India. Advances in Intelligent Systems and Computing 320, Springer 2015, ISBN 978-3-319-11217-6 [contents] - 2014
- [j59]Wei Zhou, Selwyn Piramuthu:
Consumer preference and service quality management with RFID. Ann. Oper. Res. 216(1): 35-51 (2014) - [j58]Pascal Urien, Selwyn Piramuthu:
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks. Decis. Support Syst. 59: 28-36 (2014) - [j57]Wei Zhou, Wenjing Duan, Selwyn Piramuthu:
A social network matrix for implicit and explicit social network plates. Decis. Support Syst. 68: 89-97 (2014) - [j56]Selwyn Piramuthu, Sina Wochner, Martin Grunow:
Should retail stores also RFID-tag 'cheap' items? Eur. J. Oper. Res. 233(1): 281-291 (2014) - [j55]Enes Eryarsoy, Selwyn Piramuthu:
Experimental evaluation of sequential bias in online customer reviews. Inf. Manag. 51(8): 964-971 (2014) - [j54]Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags. IEEE Trans. Inf. Forensics Secur. 9(6): 961-975 (2014) - 2013
- [j53]Wei Zhou, Selwyn Piramuthu:
Preventing ticket-switching of RFID-tagged items in apparel retail stores. Decis. Support Syst. 55(3): 802-810 (2013) - [j52]Selwyn Piramuthu, Poorya Farahani, Martin Grunow:
RFID-generated traceability for contaminated product recall in perishable food supply networks. Eur. J. Oper. Res. 225(2): 253-262 (2013) - [j51]Sylvain Bureau, Wei Zhou, Selwyn Piramuthu:
Item-level RFID in retailing: What can B&M retailers learn from online retailers? Int. J. RF Technol. Res. Appl. 5(1-2): 107-122 (2013) - [c39]Pascal Urien, Selwyn Piramuthu:
Towards a secure Cloud of Secure Elements concepts and experiments with NFC mobiles. CTS 2013: 166-173 - [c38]Pascal Urien, Selwyn Piramuthu:
Framework and authentication protocols for smartphone, NFC, and RFID in retail transactions. ISSNIP 2013: 77-82 - [c37]Pascal Urien, Selwyn Piramuthu:
Internet Smart Card for perishable food cold supply chain. ISSNIP 2013: 83-88 - [c36]Pascal Urien, Selwyn Piramuthu:
Securing NFC Mobile Services with Cloud of Secure Elements (CoSE). MobiCASE 2013: 322-331 - 2012
- [j50]Selwyn Piramuthu, Gaurav Kapoor, Wei Zhou, Sjouke Mauw:
Input online review data and related bias in recommender systems. Decis. Support Syst. 53(3): 418-424 (2012) - [j49]Wei Zhou, Eun Jung Yoon, Selwyn Piramuthu:
Simultaneous multi-level RFID tag ownership & transfer in health care environments. Decis. Support Syst. 54(1): 98-108 (2012) - [j48]Farzad Shafiei, David Sundaram, Selwyn Piramuthu:
Multi-enterprise collaborative decision support system. Expert Syst. Appl. 39(9): 7637-7651 (2012) - [j47]Selwyn Piramuthu:
Vulnerabilities of RFID protocols proposed in ISF. Inf. Syst. Frontiers 14(3): 647-651 (2012) - [j46]Anne-Katrin Wickboldt, Selwyn Piramuthu:
Patient Safety Through RFID: Vulnerabilities in Recently Proposed Grouping Protocols. J. Medical Syst. 36(2): 431-435 (2012) - [j45]Gaurav Kapoor, Selwyn Piramuthu:
Single RFID Tag Ownership Transfer Protocols. IEEE Trans. Syst. Man Cybern. Part C 42(2): 164-173 (2012) - [c35]Wei Zhou, Selwyn Piramuthu:
A Critical Evaluation of RFID in Manufacturing. APMS (2) 2012: 41-48 - [c34]Sjouke Mauw, Selwyn Piramuthu:
A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items. STM 2012: 209-224 - 2011
- [j44]Selwyn Piramuthu:
RFID mutual authentication protocols. Decis. Support Syst. 50(2): 387-393 (2011) - [j43]Yannick Meiller, Sylvain Bureau, Wei Zhou, Selwyn Piramuthu:
Adaptive knowledge-based system for health care applications with RFID-generated information. Decis. Support Syst. 51(1): 198-207 (2011) - [j42]Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu:
Multi-tag and multi-owner RFID ownership transfer in supply chains. Decis. Support Syst. 52(1): 258-270 (2011) - [j41]Gaurav Kapoor, Selwyn Piramuthu:
Vulnerabilities in Chen and Deng's RFID mutual authentication and privacy protection protocol. Eng. Appl. Artif. Intell. 24(7): 1300-1302 (2011) - [j40]Wei Zhou, Selwyn Piramuthu:
Current Developments in RFID Research. J. Organ. Comput. Electron. Commer. 21(4): 265-267 (2011) - [j39]Sylvain Bureau, Yannick Meiller, Wei Zhou, Selwyn Piramuthu:
Performance Drivers for RFID-Generated Item-Level Information in the Oil Industry. J. Organ. Comput. Electron. Commer. 21(4): 295-314 (2011) - [j38]Yu-Ju Tu, Selwyn Piramuthu:
A Decision-Support Model for Filtering RFID Read Data in Supply Chains. IEEE Trans. Syst. Man Cybern. Part C 41(2): 268-273 (2011) - [c33]Wei Zhou, Selwyn Piramuthu:
Combining fuzzy evidence from HB protocol variant for RFID authentication in supply chains. FSKD 2011: 816-819 - [c32]Yannick Meiller, Sylvain Bureau, Wei Zhou, Selwyn Piramuthu:
RFID-Embedded Decision Support for Tracking Surgical Equipment. HICSS 2011: 1-6 - [c31]Wei Zhou, Selwyn Piramuthu:
Remanufacturing/Refurbishment with RFID-Generated Item-Level Information. APMS 2011: 165-170 - [c30]Wei Zhou, Eun Jung Yoon, Selwyn Piramuthu:
Varying Levels of RFID Tag Ownership in Supply Chains. OTM Workshops 2011: 228-235 - [c29]Wei Zhou, Eun Jung Yoon, Selwyn Piramuthu:
Hierarchical RFID Tag Ownership and Transfer in Supply Chains. WEB 2011: 390-398 - 2010
- [j37]M. Daud Ahmed, David Sundaram, Selwyn Piramuthu:
Knowledge-based scenario management - Process and support. Decis. Support Syst. 49(4): 507-520 (2010) - [j36]Wei Zhou, Selwyn Piramuthu:
Framework, strategy and evaluation of health care processes with RFID. Decis. Support Syst. 50(1): 222-233 (2010) - [j35]David Sundaram, Wei Zhou, Selwyn Piramuthu, Schalk Pienaar:
Knowledge-based RFID enabled Web Service architecture for supply chain management. Expert Syst. Appl. 37(12): 7937-7946 (2010) - [j34]Gaurav Kapoor, Selwyn Piramuthu:
Vulnerabilities in some recently proposed RFID ownership transfer protocols. IEEE Commun. Lett. 14(3): 260-262 (2010) - [c28]Sylvain Bureau, Markus Bick, Selwyn Piramuthu, Yannick Meiller, Wei Zhou, Samuel Fosso Wamba:
Radio frequency identification: a case for health care. iiWAS 2010: 875-878 - [c27]Selwyn Piramuthu:
Sequential Bias, Online Product Reviews, and Recommender Systems. ICDM (Workshops) 2010: 5-13
2000 – 2009
- 2009
- [j33]Yu-Ju Tu, Wei Zhou, Selwyn Piramuthu:
Identifying RFID-embedded objects in pervasive healthcare applications. Decis. Support Syst. 46(2): 586-593 (2009) - [j32]Wei Zhou, Yu-Ju Tu, Selwyn Piramuthu:
RFID-enabled item-level retail pricing. Decis. Support Syst. 48(1): 169-179 (2009) - [j31]Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu:
Challenges associated with RFID tag implementations in supply chains. Eur. J. Inf. Syst. 18(6): 526-533 (2009) - [j30]Wei Zhou, Gaurav Kapoor, Selwyn Piramuthu:
RFID-enabled item-level product information revelation. Eur. J. Inf. Syst. 18(6): 570-577 (2009) - [j29]Denise Emerson, Wei Zhou, Selwyn Piramuthu:
Goodwill, inventory penalty, and adaptive supply chain management. Eur. J. Oper. Res. 199(1): 130-138 (2009) - [j28]Selwyn Piramuthu, Riyaz T. Sikora:
Iterative feature construction for improving inductive learning algorithms. Expert Syst. Appl. 36(2): 3401-3406 (2009) - [j27]Selwyn Piramuthu, Michael J. Shaw:
Learning-enhanced adaptive DSS: a Design Science perspective. Inf. Technol. Manag. 10(1): 41-54 (2009) - [j26]Gaurav Kapoor, Selwyn Piramuthu:
Sequential Bias in Online Product Reviews. J. Organ. Comput. Electron. Commer. 19(2): 85-95 (2009) - [c26]Wei Zhou, Selwyn Piramuthu:
Healthcare Process Mining with RFID. Business Process Management Workshops 2009: 405-411 - [c25]David Sundaram, Wei Zhou, Schalk Pienaar, Selwyn Piramuthu:
Web Services-based architecture for RFID applications. EDOCW 2009: 100-106 - [c24]Farzad Shafiei, David Sundaram, Selwyn Piramuthu:
Implementing a multi-enterprise collaborative DSS. EDOCW 2009: 220-229 - [c23]Wei Zhou, Gaurav Kapoor, Selwyn Piramuthu:
Modified Slotted ALOHA protocol for RFID tag collisions. ICITST 2009: 1-2 - [c22]David Sundaram, Wei Zhou, Selwyn Piramuthu, Schalk Pienaar:
On Building a Web Services-based Prototype for RFID Applications. Intelligent Environments (Workshops) 2009: 109-115 - [c21]Wei Zhou, Selwyn Piramuthu:
RFID and Real-Time CRM. Intelligent Environments (Workshops) 2009: 125-133 - [c20]Gaurav Kapoor, Selwyn Piramuthu:
Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols. NetCoM 2009: 354-357 - [c19]Wei Zhou, Selwyn Piramuthu:
Remanufacturing with RFID Item-Level Information. WEB 2009: 96-104 - 2008
- [j25]Juheng Zhang, Subhajyoti Bandyopadhyay, Selwyn Piramuthu:
Real option valuation on grid computing. Decis. Support Syst. 46(1): 333-343 (2008) - [j24]Selwyn Piramuthu:
Input data for decision trees. Expert Syst. Appl. 34(2): 1220-1226 (2008) - [j23]Selwyn Piramuthu:
Adaptive Framework for Collisions in RFID Tag Identification. J. Inf. Knowl. Manag. 7(1): 9-14 (2008) - [j22]Yu-Ju Tu, Selwyn Piramuthu:
Reducing False Reads in RFID-Embedded Supply Chains. J. Theor. Appl. Electron. Commer. Res. 3(2): 60-70 (2008) - [j21]Selwyn Piramuthu:
Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems. IEEE Trans. Syst. Man Cybern. Part C 38(3): 360-376 (2008) - [c18]Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu:
Distance Bounding Protocol for Multiple RFID Tag Authentication. EUC (2) 2008: 115-120 - [c17]Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu:
RFID and Information Security in Supply Chains. MSN 2008: 59-62 - 2007
- [j20]Selwyn Piramuthu:
Protocols for RFID tag/reader authentication. Decis. Support Syst. 43(3): 897-914 (2007) - [j19]Riyaz Sikora, Selwyn Piramuthu:
Framework for efficient feature selection in genetic algorithm based data mining. Eur. J. Oper. Res. 180(2): 723-737 (2007) - [c16]Selwyn Piramuthu:
On Sequential Bias in Web-Based Reviews. AWIC 2007: 298-303 - 2006
- [j18]Selwyn Piramuthu:
On preprocessing data for financial credit risk evaluation. Expert Syst. Appl. 30(3): 489-497 (2006) - [c15]Selwyn Piramuthu:
On Existence Proofs for Multiple RFID Tags. ICPS 2006: 317-320 - 2005
- [j17]Selwyn Piramuthu:
Knowledge-based framework for automated dynamic supply chain configuration. Eur. J. Oper. Res. 165(1): 219-230 (2005) - [j16]Selwyn Piramuthu:
Machine learning for dynamic multi-product supply chain formation. Expert Syst. Appl. 29(4): 985-990 (2005) - [j15]Riyaz Sikora, Selwyn Piramuthu:
Efficient Genetic Algorithm Based Data Mining Using Feature Selection with Hausdorff Distance. Inf. Technol. Manag. 6(4): 315-331 (2005) - [j14]Selwyn Piramuthu:
Feature Selection for Reduction of Tabular Knowledge-Based Systems. Inf. Technol. Manag. 6(4): 351-362 (2005) - [j13]Selwyn Piramuthu:
Knowledge-based web-enabled agents and intelligent tutoring systems. IEEE Trans. Educ. 48(4): 750-756 (2005) - [c14]H. Michael Chung, Selwyn Piramuthu:
Data Mining and Process Mining: Business Impact and Application Challenges. HICSS 2005 - 2004
- [j12]Selwyn Piramuthu:
Evaluating feature selection methods for learning in data mining applications. Eur. J. Oper. Res. 156(2): 483-494 (2004) - [j11]Selwyn Piramuthu:
Feature construction for reduction of tabular knowledge-based systems. Inf. Sci. 168(1-4): 201-215 (2004) - [j10]Selwyn Piramuthu:
Knowledge-Based Framework for Validating Workflow Sequences. J. Inf. Knowl. Manag. 3(3): 273-278 (2004) - [c13]Denise Emerson, Selwyn Piramuthu:
Agent-Based Framework for Dynamic Supply Chain Configuration. HICSS 2004 - [c12]Selwyn Piramuthu, H. Michael Chung:
Data and Process Mining: Minitrack Introduction. HICSS 2004 - 2003
- [j9]Selwyn Piramuthu:
On learning to predict Web traffic. Decis. Support Syst. 35(2): 213-229 (2003) - [c11]Selwyn Piramuthu, H. Michael Chung:
Data Mining and Information Retrieval. HICSS 2003: 67 - 2002
- [c10]H. Michael Chung, Fredric C. Gey, Selwyn Piramuthu:
Minitrack Introduction. HICSS 2002: 66 - 2001
- [j8]Sang C. Park, Selwyn Piramuthu, Michael J. Shaw:
Dynamic rule refinement in knowledge-based data mining systems. Decis. Support Syst. 31(2): 205-222 (2001) - 2000
- [j7]Mary Beth Watson-Manheim, Selwyn Piramuthu, S. Narasimhan:
Exploratory analysis of factors influencing performance dynamics of telecommuters and traditional office workers. IEEE Trans. Syst. Man Cybern. Part C 30(2): 239-251 (2000) - [c9]Selwyn Piramuthu:
Electronic commerce and data mining: minimum degree ordering for identifying association rules. IRMA Conference 2000: 1061
1990 – 1999
- 1999
- [j6]Selwyn Piramuthu:
Financial credit-risk evaluation with neural and neurofuzzy systems. Eur. J. Oper. Res. 112(2): 310-321 (1999) - [j5]Selwyn Piramuthu:
Feature Selection for Financial Credit-Risk Evaluation Decisions. INFORMS J. Comput. 11(3): 258-266 (1999) - [c8]Selwyn Piramuthu:
The Hausdorff Distance Measure for Feature Selection in Learning Applications. HICSS 1999 - 1998
- [j4]Selwyn Piramuthu, Narayan Raman, Michael J. Shaw:
Decision support system for scheduling a Flexible Flow System: Incorporation of feature construction. Ann. Oper. Res. 78: 219-234 (1998) - [c7]Selwyn Piramuthu:
Evaluating Feature Selection Methods for Learning in Data Mining Applications. HICSS (5) 1998: 294-301 - 1997
- [c6]Selwyn Piramuthu:
Feature Construction for Verification and Validation of Tabular Knowledge Base Systems. EUROVAV 1997: 181-190 - 1996
- [c5]Selwyn Piramuthu:
Effects of Feature Selection with 'Blurring' on NeuroFuzzy Systems. ALT 1996: 135-142 - [c4]Selwyn Piramuthu:
Neural versus neurofuzzy systems for credit approval. ESANN 1996 - 1994
- [j3]Selwyn Piramuthu, Michael J. Shaw, James A. Gentry:
A classification approach using multi-layered neural networks. Decis. Support Syst. 11(5): 509-525 (1994) - 1993
- [j2]Selwyn Piramuthu, Narayan Raman, Michael J. Shaw, Sang-Chan Park:
Integration of simulation modeling and inductive learning in an adaptive decision support system. Decis. Support Syst. 9(1): 127-142 (1993) - [j1]Selwyn Piramuthu, Chung-Ming Kuan, Michael J. Shaw:
Learning Algorithms for Neural-Net Decision Support. INFORMS J. Comput. 5(4): 361-373 (1993) - 1991
- [c3]Harish Ragavan, Selwyn Piramuthu:
The Utility of Feature Construcuon for Back-Propagation. IJCAI 1991: 844-850 - 1990
- [c2]Sang-Chan Park, Selwyn Piramuthu, Narayan Raman, Michael J. Shaw:
Integrating Inductive Learning and Simulation in Rule-based Scheduling. Expert Systems in Engineering 1990: 152-167 - [c1]Selwyn Piramuthu:
Feature Construction for Back-Propagation. PPSN 1990: 264-268
Coauthor Index
aka: Yu-Ju Tu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint