Sciweavers

4526 search results - page 771 / 906
» An overview of clustering methods
Sort
View
92
Voted
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
15 years 7 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...
CIKM
2007
Springer
15 years 6 months ago
Finding and linking incidents in news
News reports are being produced and disseminated in overwhelming volume, making it difficult to keep up with the newest information. Most previous research in automatic news organ...
Ao Feng, James Allan
KES
2007
Springer
15 years 6 months ago
Models for Identifying Structures in the Data: A Performance Comparison
This paper reports on the unsupervised analysis of seismic signals recorded in Italy, respectively on the Vesuvius volcano, located in Naples, and on the Stromboli volcano, located...
Anna Esposito, Antonietta M. Esposito, Flora Giudi...
MLDM
2005
Springer
15 years 6 months ago
Supervised Evaluation of Dataset Partitions: Advantages and Practice
In the context of large databases, data preparation takes a greater importance : instances and explanatory attributes have to be carefully selected. In supervised learning, instanc...
Sylvain Ferrandiz, Marc Boullé
102
Voted
ESTIMEDIA
2003
Springer
15 years 5 months ago
Perception Coprocessors for Embedded Systems
Recognizing speech, gestures, and visual features are important interface capabilities for embedded mobile systems. Perception algorithms have many traits in common with more conv...
Binu K. Mathew, Al Davis, Ali Ibrahim