default search action
Kenneth Adamson
Person information
- affiliation: University of Ulster at Jordanstown, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [i1]Alex G. Büchner, Werner Dubitzky, Alfons Schuster, Philippe Lopes, Peter G. O'Donoghue, John G. Hughes, David A. Bell, Kenny Adamson, John A. White, John M. C. C. Anderson, Maurice D. Mulvenna:
Corporate Evidential Decision Making in Performance Prediction Domains. CoRR abs/1302.1523 (2013)
2000 – 2009
- 2004
- [c24]Jianzhong Chen, Mary Shapcott, Sally I. McClean, Kenneth Adamson:
Hierarchical Model-Based Clustering for Relational Data. ICEIS (2) 2004: 92-97 - [c23]Jianzhong Chen, Mary Shapcott, Sally I. McClean, Kenneth Adamson:
Hierarchical model-based clustering of relational data with aggregates. SAC 2004: 620-621 - 2003
- [c22]Weiru Liu, Xin Hong, Kenneth Adamson:
Computational-Workload Based Binarization and Partition of Qualitative Markov Trees for Belief Combination. ECSQARU 2003: 306-318 - 2002
- [c21]Norbert A. Pilz, Kenneth Adamson:
Code Optimization Techniques of Data-Intensive Tasks onto Statically Scheduled Architectures: Optimal Performance on the TigerSharc. PARA 2002: 172-184 - [c20]Jianzhong Chen, Mary Shapcott, Sally I. McClean, Kenneth Adamson:
Learning with Concept Hierarchies in Probabilistic Relational Data Mining. WAIM 2002: 104-115 - 2000
- [j6]Alfons Schuster, Mary Shapcott, Kenny Adamson, David A. Bell:
A multiple approach to data analysis and uncertainty management in knowledge-based systems. Int. J. Intell. Syst. 15(2): 93-116 (2000) - [j5]Francisco Azuaje, Werner Dubitzky, Norman D. Black, Kenny Adamson:
Retrieval strategies for case-based reasoning: a categorised bibliography. Knowl. Eng. Rev. 15(4): 371-379 (2000) - [j4]Francisco Azuaje, Werner Dubitzky, Norman D. Black, Kenneth Adamson:
Discovering relevance knowledge in data: a growing cell structures approach. IEEE Trans. Syst. Man Cybern. Part B 30(3): 448-460 (2000) - [c19]Fiona Palmer, Roy Sterritt, Mary Shapcott, Edwin P. Curran, Kenneth Adamson:
Exploring Dynamic Belief Network Visualisation. Artificial Intelligence and Soft Computing 2000: 246-252 - [c18]Roy Sterritt, Kenneth Adamson, Mary Shapcott, Edwin P. Curran:
Parallel Data Mining of Bayesian Networks from Telecommunications Network Data. IPDPS Workshops 2000: 415-426 - [c17]Roy Sterritt, Kenny Adamson, Edwin P. Curran, C. Mary Shapcott:
Probabilistic networks for verifying automated testing of high speed telecommunication equipment through the development lifecycle. SMC 2000: 465-471 - [c16]Alfons Schuster, Roy Sterritt, Kenny Adamson, Edwin P. Curran, C. Mary Shapcott:
Towards a decision support system for automated testing of complex telecommunication networks. SMC 2000: 2002-2006
1990 – 1999
- 1999
- [j3]Francisco Azuaje, Werner Dubitzky, Philippe Lopes, Norman D. Black, Kenneth Adamson, X. Wu, John A. White:
Predicting coronary disease risk based on short-term RR interval measurements: a neural network approach. Artif. Intell. Medicine 15(3): 275-297 (1999) - [j2]Francisco Azuaje, Werner Dubitzky, Norman D. Black, Kenny Adamson:
Improving clinical decision support through case-based data fusion. IEEE Trans. Biomed. Eng. 46(10): 1181-1185 (1999) - [c15]Ivan Hanley, Terry J. Anderson, Kenneth Adamson:
The Dynamic Grid Search Interface for the World Wide Web. Applied Informatics 1999: 183-190 - [c14]Philip S. Taylor, Terry J. Anderson, Peter N. Nicholl, Kenneth Adamson:
The Potential of Multimedia Comments. Applied Informatics 1999: 584-587 - [c13]Roy Sterritt, Kenneth Adamson, Edwin P. Curran, Mary Shapcott:
Visualisation and Context of Telecommunications Data. Applied Informatics 1999: 588-591 - [c12]Xin Hong, Kenneth Adamson, Weiru Liu:
Using Parallel Techniques to Improve the Computational Efficiency of Evidential Combination. ICTAI 1999: 55- - 1997
- [c11]Werner Dubitzky, Alfons Schuster, John G. Hughes, David A. Bell, Kenneth Adamson:
How Similar is VERY YOUNG to 43 Years of Age? On the Representation and Comparison of Polymorphic Properties. IJCAI (1) 1997: 226-231 - [c10]Alfons Schuster, Werner Dubitzky, Philippe Lopes, Kenneth Adamson, David A. Bell, John G. Hughes, John A. White:
Aggregating Features and Matching Cases on Vague Linguistic Expressions. IJCAI (1) 1997: 252-257 - [c9]Alex G. Büchner, Werner Dubitzky, Alfons Schuster, Philippe Lopes, Peter G. O'Donoghue, John G. Hughes, David A. Bell, Kenneth Adamson, John A. White, John M. C. C. Anderson, Maurice D. Mulvenna:
Corporate Evidential Decision Making in Performance Prediction Domains. UAI 1997: 38-45 - 1995
- [c8]Ian McClelland, Kenneth Adamson, Norman D. Black:
Telecardiology. AIME 1995: 409-410 - 1994
- [c7]Kenneth Adamson:
A Knowledge Based Approach to Real Time Systems Modelling. Applied Informatics 1994: 1-3 - [c6]Kenneth Adamson, John G. Keating:
DIME - Distributed Interactive Medical Environment. Applied Informatics 1994: 164-166 - [c5]John G. Keating, Kenneth Adamson, J. Halligan, D. J. Gleeson, M. Klima, Susan M. P. McKenna-Lawlor:
A Software Tool for Investigating Optical Signal Processing. Applied Informatics 1994: 210-213 - [c4]Kenneth Adamson, Ruan I. O'Tiarnaigh, John G. Keating, F. Owens:
Parallelism in Speech Synthesis. Applied Informatics 1994: 222-224 - [c3]Ruan I. O'Tiarnaigh, J. Halligan, John G. Keating, J. Seery, Kenneth Adamson:
A Portable Software Tool for Parallel Systems Development. Applied Informatics 1994: 310-313
1980 – 1989
- 1989
- [c2]Kenneth Adamson, G. Donnan, Norman D. Black:
Biomedical imaging using transputers and the IMSG170 Colour Palette. ICASSP 1989: 1544-1547 - 1988
- [j1]Kenneth Adamson, G. Donnan, Norman D. Black:
Simple transformation rules in the application of transputers to the physiological processing of speech. Microprocess. Microprogramming 24(1-5): 397-402 (1988) - 1987
- [c1]Kenneth Adamson, G. Donnan, Norman D. Black:
Investigation of the application of concurrency to a digital simulation of the human basilar membrane. ECST 1987: 1140-1143
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-02 20:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint