Sciweavers

1298 search results - page 113 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
117
Voted
NIPS
1998
15 years 4 months ago
Multi-Electrode Spike Sorting by Clustering Transfer Functions
A new paradigm is proposed for sorting spikes in multi-electrode data using ratios of transfer functions between cells and electrodes. It is assumed that for every cell and electr...
Dmitry Rinberg, Hanan Davidowitz, Naftali Tishby
131
Voted
SODA
1998
ACM
113views Algorithms» more  SODA 1998»
15 years 4 months ago
Fast Hierarchical Clustering and Other Applications of Dynamic Closest Pairs
We develop data structures for dynamic closest pair problems with arbitrary (not necessarily geometric) distance functions, based on a technique previously used by the author for ...
David Eppstein
123
Voted
IJSI
2008
122views more  IJSI 2008»
15 years 3 months ago
Mining Gene Expression Data using Domain Knowledge
Biology is now an information-intensive science and various research areas, like molecular biology, evolutionary biology or environmental biology, heavily depend on the availabilit...
Nicolas Pasquier, Claude Pasquier, Laurent Brisson...
VIS
2006
IEEE
100views Visualization» more  VIS 2006»
16 years 4 months ago
Visualizing Abstract Data Using Animation
ing Abstract Data Using Animation Amit P. Sawant Department of Computer Science, North Carolina State University Christopher G. Healey Department of Computer Science, North Carolin...
Amit Sawant, Christopher Healey
DRM
2003
Springer
15 years 8 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia