default search action
Suriayati Chuprat
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c11]Imran Harith Azmy, Azri Azmi, Nazri Kama, Hazlifah Mohd Rusli, Suriayati Chuprat, Asyraf Wahi Anuar:
Methods for Application Development by Non-Programmers: A Systematic Literature Review. WSSE 2023: 1-8 - 2022
- [c10]Ahmad Naim Irfan, Suriayati Chuprat, Mohd Naz'ri Mahrin, Aswami Ariffin:
Taxonomy of Cyber Threat Intelligence Framework. ICTC 2022: 1295-1300 - 2020
- [j6]Mimi Liza Abdul Majid, Suriayati Chuprat:
Adapting Market-Oriented Policies for Scheduling Divisible Loads on Clouds. Int. J. Distributed Syst. Technol. 11(2): 45-55 (2020) - [c9]Nargis Fatima, Sumaira Nazir, Suriayati Chuprat:
Software Engineering Wastes - A Perspective of Modern Code Review. ICSIM 2020: 93-99 - [c8]Sumaira Nazir, Nargis Fatima, Suriayati Chuprat:
Modern Code Review Benefits-Primary Findings of A Systematic Literature Review. ICSIM 2020: 210-215
2010 – 2019
- 2019
- [j5]Saif S. Al-jaboriy, Nilam Nur Amir Sjarif, Suriayati Chuprat, Wafaa Mustafa Abduallah:
Acute lymphoblastic leukemia segmentation using local pixel information. Pattern Recognit. Lett. 125: 85-90 (2019) - [c7]Nilam Nur Amir Sjarif, Suriayati Chuprat, Mohd Naz'ri Mahrin, Noor Azurati Ahmad, Aswami Ariffin, Firham M. Senan, Nazri Ahmad Zamani, Afifah Saupi:
Endpoint Detection and Response: Why Use Machine Learning? ICTC 2019: 283-288 - 2017
- [j4]Maryam Khanian Najafabadi, Mohd Naz'ri Mahrin, Suriayati Chuprat, Haslina Md Sarkan:
Improving the accuracy of collaborative filtering recommendations using clustering and association rules mining on implicit data. Comput. Hum. Behav. 67: 113-128 (2017) - 2014
- [j3]Sarfraz Nawaz Brohi, Mervat Adib Bamiah, Suriayati Chuprat, Jamalul-lail Ab Manan:
Design and Implementation of a Privacy Preserved off-Premises Cloud Storage. J. Comput. Sci. 10(2): 210-223 (2014) - [j2]Mervat Adib Bamiah, Sarfraz Nawaz Brohi, Suriayati Chuprat, Jamalul-lail Ab Manan:
Trusted Cloud Computing Framework for Healthcare Sector. J. Comput. Sci. 10(2): 240-250 (2014) - [i1]Jafar Shayan, Ahmad Azarnik, Suriayati Chuprat, Sasan Karamizadeh, Mojtaba Alizadeh:
Identifying Benefits and risks associated with utilizing cloud computing. CoRR abs/1401.5155 (2014) - 2013
- [j1]Suriayati Chuprat, Saiful Amri Mazlan:
A Linear Programming Approach for Scheduling Divisible Real-Time Workloads. Int. J. Comput. Their Appl. 20(1): 23-31 (2013) - 2011
- [c6]Fatma Susilawati Mohamad, Azizah Abdul Manaf, Suriayati Chuprat:
The Use of Elimination Method and Nearest Neighbor for Oil Palm Fruit Ripeness Indicator. ICSECS (1) 2011: 674-686 - [c5]Suriayati Chuprat, Sanjoy K. Baruah:
Real-Time Divisible Load Theory: Incorporating Computation Costs. RTCSA (1) 2011: 33-37
2000 – 2009
- 2009
- [c4]Suriayati Chuprat, Shaharuddin Salleh, Steve Goddard:
Real-Time Divisible Load Theory: A Perspective. ICPP Workshops 2009: 6-10 - 2008
- [c3]Suriayati Chuprat, Sanjoy K. Baruah:
Scheduling Divisible Real-Time Loads on Clusters with Varying Processor Start Times. RTCSA 2008: 15-24 - 2007
- [c2]Suriayati Chuprat, Sanjoy K. Baruah:
Deadline-based scheduling of divisible real-time loads. PDCS 2007: 7-12 - [c1]Suriayati Chuprat, Shaharuddin Salleh:
A deadline-based algorithm for dynamic task scheduling with precedence constraints. Parallel and Distributed Computing and Networks 2007: 156-161
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint