2005 |
14 | EE | Bon K. Sy:
Signature-Based Approach for Intrusion Detection.
MLDM 2005: 526-536 |
2004 |
13 | | Bon K. Sy,
Anand Dinakar,
Jing Zou:
Intelligent Mailer.
IKE 2004: 245-251 |
12 | | Guoliang Qian,
Jing Zou,
Bon K. Sy:
Personal Assistant: A Case Study on Web Service vs. Web Based Application.
International Conference on Internet Computing 2004: 853-858 |
2003 |
11 | | Wei-Tsu Yang,
Bon K. Sy:
Information-Statistical Approach for a Strategic Planning of a Community-Based Wireless Project.
International Conference on Wireless Networks 2003: 242-248 |
10 | EE | Bon K. Sy:
Discovering Association Patterns Based on Mutual Information.
MLDM 2003: 369-378 |
2002 |
9 | EE | Howard C. Wasserman,
Keitaro Yukawa,
Bon K. Sy,
Kui-Lam Kwok,
Ihsin T. Phillips:
A Theoretical Foundation and a Method for Document Table Structure Extraction and Decompositon.
Document Analysis Systems 2002: 291-294 |
2001 |
8 | EE | Bon K. Sy,
Arjun K. Gupta:
Data Mining Approach Based on Information-Statistical Analysis: Application to Temporal-Spatial Data.
MLDM 2001: 128-140 |
1999 |
7 | | Bon K. Sy:
Enhancing Science and Technology Education: Pattern-based Learning and Curriculum Leading to Web Deployable Courseware.
WebNet 1999: 1025-1030 |
6 | | Sandra Honda Adams,
Richard Jou,
Ahmad H. Nasri,
Anne-Louise Radimski,
Bon K. Sy:
Integrating Multimedia Techniques into CS Pedagogy.
WebNet 1999: 63-68 |
1993 |
5 | | Bon K. Sy:
An Adaptive Reasoning Approach Towards Efficient Ordering of Composite Hypotheses.
Ann. Math. Artif. Intell. 10(3): 303-338 (1993) |
1992 |
4 | | Bon K. Sy:
Reasoning MPE to Multiply Connected Belief Networks Using Message Passing.
AAAI 1992: 570-576 |
1991 |
3 | | Bon K. Sy:
Reasoning composite beliefs using a qualitative approach.
Ann. Math. Artif. Intell. 4: 1-23 (1991) |
1989 |
2 | | Bon K. Sy:
Qualitative Reasoning of Bayesian Belief Using Meta-knowledge.
IJCAI 1989: 1128-1133 |
1986 |
1 | EE | Bon K. Sy,
Martin E. Kaliski:
An uncertainty-based software testing model using test universe partitions (abstract).
ACM Conference on Computer Science 1986: 408 |