Sciweavers

1263 search results - page 27 / 253
» An objective approach to cluster validation
Sort
View
HAIS
2009
Springer
15 years 2 months ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
CEC
2009
IEEE
15 years 2 months ago
Automatic clustering with multi-objective Differential Evolution algorithms
—This paper applies the Differential Evolution (DE) algorithm to the task of automatic fuzzy clustering in a Multi-objective Optimization (MO) framework. It compares the performa...
Kaushik Suresh, Debarati Kundu, Sayan Ghosh, Swaga...
ASWEC
2008
IEEE
15 years 4 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
ESWS
2006
Springer
15 years 1 months ago
Modelling Ontology Evaluation and Validation
We present a comprehensive approach to ontology evaluation and validation, which have become a crucial problem for the development of semantic technologies. Existing evaluation met...
Aldo Gangemi, Carola Catenacci, Massimiliano Ciara...
CODES
2005
IEEE
15 years 3 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...