Campbell Wilson
Cited by
Cited by
Vibration spectrum imaging: A novel bearing fault classification approach
M Amar, I Gondal, C Wilson
IEEE transactions on Industrial Electronics 62 (1), 494-502, 2014
Dynamic Key Cryptography and Applications.
HH Ngo, X Wu, PD Le, C Wilson, B Srinivasan
Int. J. Netw. Secur. 10 (3), 161-174, 2010
Criminal motivation on the dark web: A categorisation model for law enforcement
J Dalins, C Wilson, M Carman
Digital Investigation 24, 62-71, 2018
Feature re-weighting in content-based image retrieval
G Das, S Ray, C Wilson
International conference on image and video retrieval, 193-200, 2006
PhosContext2vec: a distributed representation of residue-level sequence contexts and its application to general and kinase-specific phosphorylation site prediction
Y Xu, J Song, C Wilson, JC Whisstock
Scientific reports 8 (1), 1-14, 2018
A theory-driven approach to predict frustration in an ITS
R Rajendran, S Iyer, S Murthy, C Wilson, J Sheard
IEEE transactions on learning technologies 6 (4), 378-388, 2013
Towards criteria for visual layout of instructional multimedia interfaces
D Chang, C Wilson, L Dooley
Journal of Educational Technology Systems 32 (1), 3-29, 2003
A measure for image quality
LP Dung, S Bala, M Salahadin, K Santosh, W Campbell
Proceedings of the 1998 ACM symposium on Applied Computing, 513-519, 1998
Unitary anomaly detection for ubiquitous safety in machine health monitoring
M Amar, I Gondal, C Wilson
International Conference on Neural Information Processing, 361-368, 2012
A conceptual query-driven design framework for data warehouse
R Nair, C Wilson, B Srinivasan
World Academy of Science, Engineering and Technology 25 (1), 141-146, 2007
PPINA–a forensic investigation protocol for privacy enhancing technologies
G Antoniou, C Wilson, D Geneiatakis
IFIP International Conference on Communications and Multimedia Security, 185-195, 2006
A fast and scalable algorithm for scheduling large numbers of devices under real-time pricing
S He, M Wallace, G Gange, A Liebman, C Wilson
International Conference on Principles and Practice of Constraint …, 2018
Monte-Carlo Filesystem Search–A crawl strategy for digital forensics
J Dalins, C Wilson, M Carman
Digital Investigation 13, 58-71, 2015
Formal verification of a secure mobile banking protocol
HH Ngo, O Dandash, PD Le, B Srinivasan, C Wilson
International Conference on Computer Science and Information Technology, 410-421, 2011
Laying foundations for effective machine learning in law enforcement. Majura–A labelling schema for child exploitation materials
J Dalins, Y Tyshetskiy, C Wilson, MJ Carman, D Boudry
Digital Investigation 26, 40-54, 2018
Impact of Ad Hoc Network Parameters and Conditions on Video Conferencing Quality
A Hidayat, C Wilson
International Journal of Video & Image Processing and Network Security …, 2011
Bio-inspired audio content-based retrieval framework (B-ACRF)
NA Draman, C Wilson, S Ling
World Academy of Science, Engineering and Technology 29 (5), 785-790, 2009
Use of self-organizing maps for texture feature selection in content-based image retrieval
C Guo, C Wilson
2008 IEEE International Joint Conference on Neural Networks (IEEE World …, 2008
A general inference network based architecture for multimedia information retrieval
C Wilson, B Srinivasan, M Indrawan
2000 IEEE International Conference on Multimedia and Expo. ICME2000 …, 2000
Modelling RTP-based residential load scheduling for demand response in smart grids
S He, A Liebman, A Rendl, M Wallace, CC Wilson
International Workshop on Constraint Modelling and Reformulation 2014, 36-51, 2014
The system can't perform the operation now. Try again later.
Articles 1–20