2009 |
8 | EE | J. Thomas Haigh,
Steven A. Harp,
Richard C. O'Brien,
Charles N. Payne,
Johnathan Gohde,
John Maraist:
Trapping Malicious Insiders in the SPDR Web.
HICSS 2009: 1-10 |
2005 |
7 | | Mark S. Boddy,
Johnathan Gohde,
Thomas Haigh,
Steven A. Harp:
Course of Action Generation for Cyber Security Using Classical Planning.
ICAPS 2005: 12-21 |
2000 |
6 | EE | Pang-Ning Tan,
Hannah Blau,
Steven A. Harp,
Robert P. Goldman:
Textual data mining of service center call records.
KDD 2000: 417-423 |
1999 |
5 | | Kamakshi Lakshminarayan,
Steven A. Harp,
Tariq Samad:
Imputation of Missing Data in Industrial Databases.
Appl. Intell. 11(3): 259-275 (1999) |
1998 |
4 | | Steven A. Harp,
Tariq Samad:
Optimizing Neural Network Models: Motivation and Case Studies.
Computers and Artificial Intelligence 17(2-3): (1998) |
1996 |
3 | | Kamakshi Lakshminarayan,
Steven A. Harp,
Robert P. Goldman,
Tariq Samad:
Imputation of Missing Data Using Machine Learning Techniques.
KDD 1996: 140-145 |
1989 |
2 | | Steven A. Harp,
Tariq Samad,
Aloke Guha:
Towards the Genetic Synthesisof Neural Networks.
ICGA 1989: 360-369 |
1 | EE | Steven A. Harp,
Tariq Samad,
Aloke Guha:
Designing Application-Specific Neural Networks Using the Genetic Algorithm.
NIPS 1989: 447-454 |