Sciweavers

1298 search results - page 117 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
158
Voted
WISE
2005
Springer
15 years 9 months ago
A Web Recommendation Technique Based on Probabilistic Latent Semantic Analysis
Web transaction data between Web visitors and Web functionalities usually convey user task-oriented behavior pattern. Mining such type of clickstream data will lead to capture usag...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
PKDD
2009
Springer
175views Data Mining» more  PKDD 2009»
15 years 10 months ago
Latent Dirichlet Bayesian Co-Clustering
Co-clustering has emerged as an important technique for mining contingency data matrices. However, almost all existing coclustering algorithms are hard partitioning, assigning each...
Pu Wang, Carlotta Domeniconi, Kathryn B. Laskey
138
Voted
ICPR
2006
IEEE
16 years 4 months ago
Dissimilarity-based classification for vectorial representations
General dissimilarity-based learning approaches have been proposed for dissimilarity data sets [11, 10]. They arise in problems in which direct comparisons of objects are made, e....
Elzbieta Pekalska, Robert P. W. Duin
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 10 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
111
Voted
ICCV
2011
IEEE
14 years 3 months ago
Source Constrained Clustering
We consider the problem of quantizing data generated from disparate sources, e.g. subjects performing actions with different styles, movies with particular genre bias, various con...
Ekaterina Taralova, Fernando DelaTorre, Martial He...