Situation identification techniques in pervasive computing: A review J Ye, S Dobson, S McKeever Pervasive and mobile computing 8 (1), 36-66, 2012 | 618 | 2012 |
Understanding Web content management systems: evolution, lifecycle and market S McKeever Industrial management & data systems 103 (9), 686-692, 2003 | 236 | 2003 |
Activity recognition using temporal evidence theory S McKeever, J Ye, L Coyle, C Bleakley, S Dobson Journal of Ambient Intelligence and Smart Environments 2 (3), 253-269, 2010 | 128 | 2010 |
Resolving uncertainty in context integration and abstraction: context integration and abstraction J Ye, S McKeever, L Coyle, S Neely, S Dobson Proceedings of the 5th international conference on Pervasive services, 131-140, 2008 | 59 | 2008 |
Flying free: A research overview of deep learning in drone navigation autonomy T Lee, S Mckeever, J Courtney Drones 5 (2), 52, 2021 | 55 | 2021 |
A Systematic Review of Urban Navigation Systems for Visually Impaired People F El-zahraa El-taher, A Taha, J Courtney, S Mckeever Sensors 21 (9), 3013, 2021 | 51* | 2021 |
Using dempster-shafer theory of evidence for situation inference S McKeever, J Ye, L Coyle, S Dobson European Conference on Smart Sensing and Context, 149-162, 2009 | 47 | 2009 |
Harnessing the power of text mining for the detection of abusive content in social media H Chen, S Mckeever, SJ Delany Advances in Computational Intelligence Systems: Contributions Presented at …, 2017 | 46 | 2017 |
Face recognition-based real-time system for surveillance FP Mahdi, MM Habib, MAR Ahad, S Mckeever, ASM Moslehuddin, ... Intelligent Decision Technologies 11 (1), 79-92, 2017 | 43 | 2017 |
A context quality model to support transparent reasoning with uncertain context S McKeever, J Ye, L Coyle, S Dobson International Workshop on Quality of Context, 65-75, 2009 | 42 | 2009 |
A comparison of classical versus deep learning techniques for abusive content detection on social media sites H Chen, S McKeever, SJ Delany Social Informatics: 10th International Conference, SocInfo 2018, St …, 2018 | 36 | 2018 |
The use of deep learning distributed representations in the identification of abusive text H Chen, S McKeever, SJ Delany Proceedings of the International AAAI Conference on Web and Social Media 13 …, 2019 | 35 | 2019 |
Abusive Text Detection Using Neural Networks. H Chen, S McKeever, SJ Delany 25th Irish Conference on Artificial Intelligence and Cognitive Science …, 2017 | 30 | 2017 |
Using feature selection with machine learning for generation of insurance insights A Taha, B Cosgrave, S Mckeever Applied Sciences 12 (6), 3209, 2022 | 24 | 2022 |
Presenting a labelled dataset for real-time detection of abusive user posts H Chen, S Mckeever, SJ Delany Proceedings of the international conference on web intelligence, 884-890, 2017 | 23 | 2017 |
Explaining deep learning models for tabular data using layer-wise relevance propagation I Ullah, A Rios, V Gala, S Mckeever Applied Sciences 12 (1), 136, 2021 | 20 | 2021 |
Synthesising Tabular Datasets Using Wasserstein Conditional GANS with Gradient Penalty (WCGAN-GP) M Walia, B Tierney, S McKeever AICS 2020: 28th Irish Conference on Artificial Intelligence and Cognitive …, 2020 | 19* | 2020 |
Presenting a hybrid processing mining framework for automated simulation model generation M Mesabbah, S McKeever 2018 Winter Simulation Conference (WSC), 1370-1381, 2018 | 15 | 2018 |
A multilayered uncertainty model for context aware systems S McKeever, J Ye, L Coyle, S Dobson Technological University Dublin, 2008 | 15 | 2008 |
Detecting Hacker Threats: Performance of Word and Sentence Embedding Models in Identifying Hacker Communications. AL Queiroz, S Mckeever, B Keegan AICS 2019 : Proceedings for the 27th AIAI Irish Conference on Artificial …, 2019 | 13 | 2019 |