Sciweavers

1298 search results - page 105 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
ICDM
2002
IEEE
162views Data Mining» more  ICDM 2002»
15 years 8 months ago
Phrase-based Document Similarity Based on an Index Graph Model
Document clustering techniques mostly rely on single term analysis of the document data set, such as the Vector Space Model. To better capture the structure of documents, the unde...
Khaled M. Hammouda, Mohamed S. Kamel
IH
2001
Springer
15 years 8 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
145
Voted
ICRA
2008
IEEE
185views Robotics» more  ICRA 2008»
15 years 10 months ago
Human detection using multimodal and multidimensional features
— This paper presents a novel human detection method based on a Bayesian fusion approach using laser range data and camera images. Laser range data analysis groups data points wi...
Luciano Spinello, Roland Siegwart
132
Voted
DSN
2008
IEEE
15 years 10 months ago
Using likely program invariants to detect hardware errors
In the near future, hardware is expected to become increasingly vulnerable to faults due to continuously decreasing feature size. Software-level symptoms have previously been used...
Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandr...
DATAMINE
2006
89views more  DATAMINE 2006»
15 years 3 months ago
Scalable Clustering Algorithms with Balancing Constraints
Clustering methods for data-mining problems must be extremely scalable. In addition, several data mining applications demand that the clusters obtained be balanced, i.e., be of ap...
Arindam Banerjee, Joydeep Ghosh