Sciweavers

1298 search results - page 101 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
101
Voted
VIS
2003
IEEE
121views Visualization» more  VIS 2003»
16 years 4 months ago
Hierarchical Clustering for Unstructured Volumetric Scalar Fields
We present a method to represent unstructured scalar fields at multiple levels of detail. Using a parallelizable classification algorithm to build a cluster hierarchy, we generate...
Christopher S. Co, Bjørn Heckel, Hans Hagen...
DATE
2010
IEEE
154views Hardware» more  DATE 2010»
15 years 8 months ago
ERSA: Error Resilient System Architecture for probabilistic applications
There is a growing concern about the increasing vulnerability of future computing systems to errors in the underlying hardware. Traditional redundancy techniques are expensive for...
Larkhoon Leem, Hyungmin Cho, Jason Bau, Quinn A. J...
131
Voted
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
15 years 1 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
119
Voted
SOFTVIS
2005
ACM
15 years 9 months ago
Visual data mining in software archives
Software archives contain historical information about the development process of a software system. Using data mining techniques rules can be extracted from these archives. In th...
Michael Burch, Stephan Diehl, Peter Weißgerb...
KDD
2005
ACM
124views Data Mining» more  KDD 2005»
16 years 3 months ago
A multinomial clustering model for fast simulation of computer architecture designs
Computer architects utilize simulation tools to evaluate the merits of a new design feature. The time needed to adequately evaluate the tradeoffs associated with adding any new fe...
Kaushal Sanghai, Ting Su, Jennifer G. Dy, David R....