Sciweavers

77 search results - page 2 / 16
» Clustering Validity Checking Methods: Part II
Sort
View
BMCBI
2006
148views more  BMCBI 2006»
13 years 5 months ago
Predicting Class II MHC-Peptide binding: a kernel based approach using similarity scores
Background: Modelling the interaction between potentially antigenic peptides and Major Histocompatibility Complex (MHC) molecules is a key step in identifying potential T-cell epi...
Jesper Salomon, Darren R. Flower
ISCC
2007
IEEE
13 years 11 months ago
Validating Attacks on Authentication Protocols
— It is possible to show that well-known attacks on authentication protocols are flawed. This is a problem, since good protocols may thus be dismissed rather than improved and p...
Anders Moen Hagalisletto
MM
2006
ACM
130views Multimedia» more  MM 2006»
13 years 11 months ago
An unsupervised method for clustering images based on their salient regions of interest
We have developed a biologically-motivated, unsupervised way of grouping together images whose salient regions of interest (ROIs) are perceptually similar regardless of the visual...
Gustavo B. Borba, Humberto R. Gamba, Oge Marques, ...
ISSTA
2012
ACM
11 years 7 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
FUZZIEEE
2007
IEEE
13 years 11 months ago
Adaptive Optimization of the Number of Clusters in Fuzzy Clustering
In this paper, we present a local, adaptive optimization scheme for adjusting the number of clusters in fuzzy C-means clustering. This method is especially motivated by online app...
Jürgen Beringer, Eyke Hüllermeier