Sciweavers

543 search results - page 59 / 109
» An Experimental Comparison of Several Clustering and Initial...
Sort
View
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
15 years 5 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
PAMI
2008
161views more  PAMI 2008»
15 years 1 months ago
TRUST-TECH-Based Expectation Maximization for Learning Finite Mixture Models
The Expectation Maximization (EM) algorithm is widely used for learning finite mixture models despite its greedy nature. Most popular model-based clustering techniques might yield...
Chandan K. Reddy, Hsiao-Dong Chiang, Bala Rajaratn...
JCDL
2011
ACM
374views Education» more  JCDL 2011»
14 years 4 months ago
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Bela Gipp, Norman Meuschke, Jöran Beel
PAMI
2007
186views more  PAMI 2007»
15 years 1 months ago
The Medial Scaffold of 3D Unorganized Point Clouds
—We introduce the notion of the medial scaffold, a hierarchical organization of the medial axis of a 3D shape in the form of a graph constructed from special medial curves connec...
Frederic F. Leymarie, Benjamin B. Kimia
TKDE
2010
229views more  TKDE 2010»
14 years 12 months ago
Deriving Concept-Based User Profiles from Search Engine Logs
—User profiling is a fundamental component of any personalization applications. Most existing user profiling strategies are based on objects that users are interested in (i.e., p...
Kenneth Wai-Ting Leung, Dik Lun Lee