Showing results 171 to 190 of 252
< previous
next >
Issue Date | Title | Author(s) |
2022-08-17 | Proof by Earnestness (PoE) to determine the authenticity of subjective information in blockchains - application in supply chain risk management | Bui, HT; Hussain, OK; Prior, D; Hussain, FK; Saberi, M |
2016-01-01 | Provider-based optimized personalized viable SLA (OPV-SLA) framework to prevent SLA violation | Hussain, W; Hussain, FK; Hussain, OK; Chang, E |
2009-10-01 | A QoS-based service retrieval methodology for digital ecosystems | Dong, H; Hussain, FK; Chang, E |
2006-01-01 | Quantifying risk in financial terms in an e-transaction | Hussain, OK; Chang, E; Hussain, FK; Dillon, TS |
2020-07-01 | Real time dataset generation framework for intrusion detection systems in IoT | Al-Hadhrami, Y; Hussain, FK |
2018-12-01 | Recruiting the K-most influential prospective workers for crowdsourcing platforms | Shahsavari, M; Golpayegani, AH; Saberi, M; Hussain, FK |
2022-01-01 | Regression Analysis Using Machine Learning Approaches for Predicting Container Shipping Rates | Khan, IA; Hussain, FK |
2023-11-01 | Reinforcement Learning-Based News Recommendation System | Aboutorab, H; Hussain, OK; Saberi, M; Hussain, FK; Prior, D |
2018-01-01 | Representation Phase: Ontology Usage Ontology (U Ontology) | Ashraf, J; Hussain, OK; Hussain, FK; Chang, EJ |
2005-12-01 | Reputation ontology for reputation systems | Chang, E; Hussain, FK; Dillon, T |
2006-11-14 | Reputation relationship and its inner relationships for service oriented environments | Hussain, FK; Chang, E; Dillon, TS |
2004-12-01 | Repute relationships for reputation management in peer-to-peer communication - I | Hussain, FK; Chang, E; Dillon, T |
2015-01-01 | A Review and comparison of service E-Contract Architecture Metamodels | Braytee, A; Gill, AQ; Kennedy, PJ; Hussain, FK |
2013-01 | Risk Assessment and Management in the Networked Economy | Hussain, O; Dillon, TS; Hussain, FK; Chang, E |
2005-12-01 | Risk in trusted decentralized communications | Hussain, OK; Chang, E; Hussain, FK; Dillon, TS; Soh, B |
2017-01-01 | Risk Management Framework to Avoid SLA Violation in Cloud from a Provider's Perspective | Hussain, W; Hussain, FK; Hussain, OK; Xhafa, F; Barolli, L; Amato, F |
2018-01-01 | Risk-based framework for SLA violation abatement from the cloud service provider's perspective | Hussain, W; Hussain, FK; Hussain, O; Bagia, R; Chang, E |
2011-01-01 | Rule-based business policies specification, reasoning and integration for business process model extraction | Janjua, NK; Hussain, FK |
2022-03-11 | Secured Land Title Transfer System in Australia using VPN based Blockchain Network | Sheikh, MA; Khattak, F; Khan, GZ; Hussain, FK |
2014-01-01 | Self-adaptive semantic focused crawler for mining services information discovery | Dong, H; Hussain, FK |