Scott Dick
Scott Dick
Professor, Electrical and Computer Engineering, University of Alberta
Verified email at - Homepage
Cited by
Cited by
Classifier ensembles for protein structural class prediction with varying homology
KD Kedarisetti, L Kurgan, S Dick
Biochemical and Biophysical Research Communications 348 (3), 981-988, 2006
Consumer trust in e-commerce web sites: A meta-study
P Beatty, I Reay, S Dick, J Miller
ACM Computing Surveys (CSUR) 43 (3), 1-46, 2011
Toward non-intrusive load monitoring via multi-label classification
SM Tabatabaei, S Dick, W Xu
IEEE Transactions on Smart Grid 8 (1), 26-40, 2017
Toward complex fuzzy logic
S Dick
IEEE Transactions on Fuzzy Systems 13 (3), 405-414, 2005
Applying novel resampling strategies to software defect prediction
L Pelayo, S Dick
NAFIPS 2007-2007 Annual Meeting of the North American Fuzzy Information …, 2007
Detecting visually similar web pages: Application to phishing detection
TC Chen, S Dick, J Miller
ACM Transactions on Internet Technology (TOIT) 10 (2), 1-38, 2010
ANCFIS: A neurofuzzy architecture employing complex fuzzy sets
Z Chen, S Aghakhani, J Man, S Dick
IEEE Transactions on Fuzzy Systems 19 (2), 305-322, 2011
On Pythagorean and Complex Fuzzy Set Operations
S Dick, R Yager, O Yazdanbahksh
IEEE, 2016
A systematic review of complex fuzzy sets and logic
O Yazdanbakhsh, S Dick
Fuzzy Sets and Systems 338, 1-22, 2018
Data mining in software metrics databases
S Dick, A Meeks, M Last, H Bunke, A Kandel
Fuzzy Sets and Systems 145 (1), 81-110, 2004
CRYSTALP2: sequence-based protein crystallization propensity prediction
L Kurgan, AA Razib, S Aghakhani, S Dick, M Mizianty, S Jahandideh
BMC structural biology 9 (1), 50, 2009
Comment on" Combinatorial rule explosion eliminated by a fuzzy rule configuration"[with reply]
S Dick, A Kandel, WE Combs
IEEE Transactions on Fuzzy Systems 7 (4), 475-478, 1999
Regranulation: A granular algorithm enabling communication between granular worlds
S Dick, A Schenker, W Pedrycz, A Kandel
Information Sciences 177 (2), 408-435, 2007
Evaluating stratification alternatives to improve software defect prediction
L Pelayo, S Dick
IEEE Transactions on Reliability 61 (2), 516-525, 2012
An anti-phishing system employing diffused information
TC Chen, T Stepan, S Dick, J Miller
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-31, 2014
A survey and analysis of the P3P protocol's agents, adoption, maintenance, and future
IK Reay, P Beatty, S Dick, J Miller
IEEE Transactions on Dependable and Secure Computing 4 (2), 151-164, 2007
P3P adoption on e-Commerce web sites: a survey and analysis
P Beatty, I Reay, S Dick, J Miller
IEEE Internet Computing 11 (2), 65-71, 2007
Highly scalable and robust rule learner: performance evaluation and comparison
LA Kurgan, KJ Cios, S Dick
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 36 …, 2006
A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations
I Reay, S Dick, J Miller
ACM Transactions on the Web (TWEB) 3 (2), 1-34, 2009
A similarity measure for fuzzy rulebases based on linguistic gradients
H Li, S Dick
Information Sciences 176 (20), 2960-2987, 2006
The system can't perform the operation now. Try again later.
Articles 1–20