default search action
Morgan C. Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j6]Shuai Liu, Hong Ji, Morgan C. Wang:
Nonpooling Convolutional Neural Network Forecasting for Seasonal Time Series With Trends. IEEE Trans. Neural Networks Learn. Syst. 31(8): 2879-2888 (2020) - 2017
- [j5]Jui-Long Hung, Morgan C. Wang, Shuyan Wang, Maha M. Abdelrasoul, Yaohang Li, Wu He:
Identifying At-Risk Students for Early Interventions - A Time-Series Clustering Approach. IEEE Trans. Emerg. Top. Comput. 5(1): 45-55 (2017) - 2009
- [j4]Xiaogang Su, Chih-Ling Tsai, Morgan C. Wang:
Tree-structured model diagnostics for linear regression. Mach. Learn. 74(2): 111-131 (2009) - 2004
- [j3]David S. Vogel, Eric Gottschalk, Morgan C. Wang:
Anti-matter detection: particle physics model for KDD Cup 2004. SIGKDD Explor. 6(2): 109-112 (2004) - [j2]David S. Vogel, Eric Gottschalk, Morgan C. Wang:
Protein matching with custom neural network objective functions. SIGKDD Explor. 6(2): 125-127 (2004) - 2000
- [j1]Morgan C. Wang, Charles D. Dziuban, Patsy D. Moskal:
A Web-Based Survey System for Distributed Learning Impact Evaluation. Internet High. Educ. 2(4): 211-220 (2000)
Conference and Workshop Papers
- 2008
- [c9]Muazzam Siddiqui, Morgan C. Wang, Joohan Lee:
A survey of data mining techniques for malware detection using file features. ACM Southeast Regional Conference 2008: 509-510 - [c8]Muazzam Siddiqui, Morgan C. Wang, Joohan Lee:
Detecting Trojans Using Data Mining Techniques. IMTIC 2008: 400-411 - 2006
- [c7]Bruce D. Caulkins, Joohan Lee, Morgan C. Wang:
Bootstrapping methodology for the Session-based Anomaly Notification Detector (SAND). ACM Southeast Regional Conference 2006: 175-179 - 2005
- [c6]Bruce D. Caulkins, Joohan Lee, Morgan C. Wang:
A dynamic data mining technique for intrusion detection systems. ACM Southeast Regional Conference (2) 2005: 148-153 - [c5]Bruce D. Caulkins, Joohan Lee, Morgan C. Wang:
Packet- vs. Session-Based Modeling for Intrusion Detection Systems. ITCC (1) 2005: 116-121 - [c4]Jianyong Dai, Joohan Lee, Morgan C. Wang:
Analytical Modeling of Data Mining Process Based on Distributed Tuple Space. PDPTA 2005: 1135-1141 - [c3]Jianyong Dai, Joohan Lee, Morgan C. Wang:
Efficient Parallel Data Mining for Massive Datasets: Parallel Random Forests Classifier. PDPTA 2005: 1142-1148 - 2004
- [c2]David S. Vogel, Morgan C. Wang:
1-dimensional splines as building blocks for improving accuracy of risk outcomes models. KDD 2004: 841-846 - 1998
- [c1]Morgan C. Wang:
The On-Line Survey System for Distance Learning Education at the University of Central Florida. WebNet 1998
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint